{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T07:40:32Z","timestamp":1741851632202,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642246050"},{"type":"electronic","value":"9783642246067"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24606-7_40","type":"book-chapter","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T01:19:30Z","timestamp":1319505570000},"page":"495-503","source":"Crossref","is-referenced-by-count":5,"title":["Content-Based Validation of Business Process Modifications"],"prefix":"10.1007","author":[{"given":"Maya","family":"Lincoln","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Avigdor","family":"Gal","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"40_CR1","unstructured":"Awad, A., Smirnov, S., Weske, M.: Towards Resolving Compliance Violations in Business Process Models. GRCIS. CEUR-WS. org (2009)"},{"key":"40_CR2","unstructured":"El Kharbili, M., Stein, S., Markovic, I., Pulverm, E.: Towards a framework for semantic business process compliance management. In: Proc. of the Workshop on Governance, Risk and Compliance for Information Systems, pp. 1\u201315. Citeseer (2008)"},{"key":"40_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/978-3-540-24773-9_7","volume-title":"Abstract State Machines 2004. Advances in Theory and Practice","author":"R. Farahbod","year":"2004","unstructured":"Farahbod, R., Gl\u00e4sser, U., Vajihollahi, M.: Specification and validation of the business process execution language for web services. In: Zimmermann, W., Thalheim, B. (eds.) ASM 2004. LNCS, vol.\u00a03052, pp. 78\u201394. Springer, Heidelberg (2004)"},{"key":"40_CR4","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/EDOC.2006.22","volume-title":"10th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2006","author":"G. Governatori","year":"2006","unstructured":"Governatori, G., Milosevic, Z., Sadiq, S.: Compliance checking between business processes and business contracts. In: 10th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2006, pp. 221\u2013232. IEEE, Los Alamitos (2006)"},{"key":"40_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-540-75183-0_13","volume-title":"Business Process Management","author":"J. Kuster","year":"2007","unstructured":"Kuster, J., Ryndina, K., Gall, H.: Generation of business process models for object life cycle compliance. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol.\u00a04714, pp. 165\u2013181. Springer, Heidelberg (2007)"},{"key":"40_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-642-13881-2_28","volume-title":"Natural Language Processing and Information Systems","author":"H. Leopold","year":"2010","unstructured":"Leopold, H., Smirnov, S., Mendling, J.: Refactoring of process model activity labels. In: Hopfe, C.J., Rezgui, Y., M\u00e9tais, E., Preece, A., Li, H. (eds.) NLDB 2010. LNCS, vol.\u00a06177, pp. 268\u2013276. Springer, Heidelberg (2010)"},{"key":"40_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/978-3-642-15618-2_11","volume-title":"Business Process Management","author":"M. Lincoln","year":"2010","unstructured":"Lincoln, M., Golani, M., Gal, A.: Machine-assisted design of business process models using descriptor space analysis. In: Hull, R., Mendling, J., Tai, S. (eds.) BPM 2010. LNCS, vol.\u00a06336, pp. 128\u2013144. Springer, Heidelberg (2010)"},{"key":"40_CR8","doi-asserted-by":"crossref","unstructured":"Lincoln, M., Karni, R., Wasser, A.: A Framework for Ontological Standardization of Business Process Content. In: Int. Conf. on Enterprise Information Systems, pp. 257\u2013263 (2007)","DOI":"10.5220\/0002393902570263"},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"Ly, L.T., Rinderle-Ma, S., Goser, K., Dadam, P.: On enabling integrated process compliance with semantic constraints in process management systems. Information Systems Frontiers, 1\u201325 (2009)","DOI":"10.1007\/s10796-009-9185-9"},{"key":"40_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/978-3-540-72988-4_31","volume-title":"Advanced Information Systems Engineering","author":"J. Mendling","year":"2007","unstructured":"Mendling, J., van der Aalst, W.M.P.: Formalization and verification of ePCs with OR-joins based on state and context. In: Krogstie, J., Opdahl, A.L., Sindre, G. (eds.) CAiSE 2007 and WES 2007. LNCS, vol.\u00a04495, pp. 439\u2013453. Springer, Heidelberg (2007)"},{"key":"40_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/11841760_11","volume-title":"Business Process Management","author":"F. Puhlmann","year":"2006","unstructured":"Puhlmann, F., Weske, M.: Investigations on soundness regarding lazy activities. In: Dustdar, S., Fiadeiro, J.L., Sheth, A.P. (eds.) BPM 2006. LNCS, vol.\u00a04102, pp. 145\u2013160. Springer, Heidelberg (2006)"},{"issue":"2","key":"40_CR12","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1023\/A:1008604709862","volume":"10","author":"M. Reichert","year":"1998","unstructured":"Reichert, M., Dadam, P.: ADEPT flex-supporting dynamic changes of workflows without losing control. J. of Intelligent Information Systems\u00a010(2), 93\u2013129 (1998)","journal-title":"J. of Intelligent Information Systems"},{"issue":"1","key":"40_CR13","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s10270-003-0018-x","volume":"2","author":"M. Reichert","year":"2003","unstructured":"Reichert, M., Dadam, P., Bauer, T.: Dealing with forward and backward jumps in workflow management systems. Software and Systems Modeling\u00a02(1), 37\u201358 (2003)","journal-title":"Software and Systems Modeling"},{"issue":"1","key":"40_CR14","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.datak.2004.01.002","volume":"50","author":"S. Rinderle","year":"2004","unstructured":"Rinderle, S., Reichert, M., Dadam, P.: Correctness criteria for dynamic changes in workflow systems\u2013a survey. Data & Knowledge Engineering\u00a050(1), 9\u201334 (2004)","journal-title":"Data & Knowledge Engineering"},{"key":"40_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/11568322_23","volume-title":"Conceptual Modeling \u2013 ER 2005","author":"N. Russell","year":"2005","unstructured":"Russell, N., ter Hofstede, A.H.M., Edmond, D., van der Aalst, W.M.P.: Workflow data patterns: Identification, representation and tool support. In: Delcambre, L.M.L., Kop, C., Mayr, H.C., Mylopoulos, J., Pastor, \u00d3. (eds.) ER 2005. LNCS, vol.\u00a03716, pp. 353\u2013368. Springer, Heidelberg (2005)"},{"key":"40_CR16","unstructured":"Sadiq, S., Orlowska, M., Sadiq, W., Foulger, C.: Data flow and validation in workflow modelling. In: Proc. 15th Australasian database conference, vol.\u00a027, pp. 207\u2013214. Australian Computer Society, Inc. (2004)"},{"key":"40_CR17","doi-asserted-by":"crossref","unstructured":"Smirnov, S., Weidlich, M., Mendling, J., Weske, M.: Action patterns in business process models. Service-Oriented Computing, 115\u2013129 (2009)","DOI":"10.1007\/978-3-642-10383-4_8"},{"key":"40_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-69534-9_2","volume-title":"Advanced Information Systems Engineering","author":"P. Soffer","year":"2008","unstructured":"Soffer, P., Kaner, M., Wand, Y.: Assigning ontology-based semantics to process models: The case of petri nets. In: Bellahs\u00e8ne, Z., L\u00e9onard, M. (eds.) CAiSE 2008. LNCS, vol.\u00a05074, pp. 16\u201331. Springer, Heidelberg (2008)"},{"key":"40_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"837","DOI":"10.1007\/978-3-540-85654-2_75","volume-title":"Database and Expert Systems Applications","author":"L.H. Thom","year":"2008","unstructured":"Thom, L.H., Reichert, M., Chiao, C.M., Iochpe, C., Hess, G.N.: Inventing Less, Reusing More, and Adding Intelligence to Business Process Modeling. In: Bhowmick, S.S., K\u00fcng, J., Wagner, R. (eds.) DEXA 2008. LNCS, vol.\u00a05181, pp. 837\u2013850. Springer, Heidelberg (2008)"},{"key":"40_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/3-540-63139-9_48","volume-title":"Application and Theory of Petri Nets 1997","author":"W.M.P. Aalst van der","year":"1997","unstructured":"van der Aalst, W.M.P.: Verification of workflow nets. In: Az\u00e9ma, P., Balbo, G. (eds.) ICATPN 1997. LNCS, vol.\u00a01248, pp. 407\u2013426. Springer, Heidelberg (1997)"},{"key":"40_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/3-540-45594-9","volume-title":"Business Process Management","author":"W.M.P. Aalst van der","year":"2000","unstructured":"van der Aalst, W.M.P.: Workflow verification: Finding control-flow errors using petri-net-based techniques. In: van der Aalst, W.M.P., Desel, J., Oberweis, A. (eds.) Business Process Management. LNCS, vol.\u00a01806, pp. 19\u2013128. Springer, Heidelberg (2000)"},{"issue":"4","key":"40_CR22","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.is.2004.02.002","volume":"30","author":"W.M.P. Aalst van der","year":"2005","unstructured":"van der Aalst, W.M.P., Ter Hofstede, A.: YAWL: yet another workflow language. Information Systems\u00a030(4), 245\u2013275 (2005)","journal-title":"Information Systems"},{"key":"40_CR23","unstructured":"Weber, I., Hoffmann, J., Mendling, J.: Semantic business process validation. In: Proc. of Int. Workshop on Semantic Business Process Management (2008)"},{"issue":"3","key":"40_CR24","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/s10619-010-7060-9","volume":"27","author":"I. Weber","year":"2010","unstructured":"Weber, I., Hoffmann, J., Mendling, J.: Beyond soundness: on the verification of semantic business process models. Distributed and Parallel Databases\u00a027(3), 271\u2013343 (2010)","journal-title":"Distributed and Parallel Databases"}],"container-title":["Lecture Notes in Computer Science","Conceptual Modeling \u2013 ER 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24606-7_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T07:08:30Z","timestamp":1741849710000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24606-7_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642246050","9783642246067"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24606-7_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}