{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T00:06:14Z","timestamp":1774915574878,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642251085","type":"print"},{"value":"9783642251092","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25109-2_7","type":"book-chapter","created":{"date-parts":[[2011,10,29]],"date-time":"2011-10-29T06:33:52Z","timestamp":1319870032000},"page":"82-99","source":"Crossref","is-referenced-by-count":68,"title":["Monitoring Business Process Compliance Using Compliance Rule Graphs"],"prefix":"10.1007","author":[{"given":"Linh Thao","family":"Ly","sequence":"first","affiliation":[]},{"given":"Stefanie","family":"Rinderle-Ma","sequence":"additional","affiliation":[]},{"given":"David","family":"Knuplesch","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Dadam","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Jacobsen, H.A., Muthusamy, V., Li, G.: The PADRES event processing network: Uniform querying of past and future events. IT - Information Technology, 250\u2013261 (2009)","DOI":"10.1524\/itit.2009.0549"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-3-642-13094-6_3","volume-title":"Advanced Information Systems Engineering","author":"L.T. Ly","year":"2010","unstructured":"Ly, L.T., Rinderle-Ma, S., Dadam, P.: Design and Verification of Instantiable Compliance Rule Graphs in Process-Aware Information Systems. In: Pernici, B. (ed.) CAiSE 2010. LNCS, vol.\u00a06051, pp. 9\u201323. Springer, Heidelberg (2010)"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Dwyer, M.B., Avrunin, G.S., Corbett, J.C.: Patterns in property specifications for finite-state verification. In: Proc. ICSE 1999, pp. 411\u2013420 (1999)","DOI":"10.1145\/302405.302672"},{"key":"7_CR4","unstructured":"Montali, M., Maggi, F., Chesani, F., Mello, P., van\u00a0der Aalst, W.: Monitoring business constraints with the event calculus. Technical report. Universita degli Studi di Bologna (2011)"},{"key":"7_CR5","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/978-3-642-17722-4_6","volume-title":"Information Systems Evolution","author":"L.T. Ly","year":"2011","unstructured":"Ly, L.T., Knuplesch, D., Rinderle-Ma, S., G\u00f6ser, K., Pfeifer, H., Reichert, M., Dadam, P.: SeaFlows toolset \u2013 compliance verification made easy for process-aware information systems. In: Soffer, P., Proper, E. (eds.) CAiSE Forum 2010. LNBIP, vol.\u00a072, pp. 76\u201391. Springer, Heidelberg (2011)"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:DAPD.0000026270.78463.77","volume":"16","author":"S. Rinderle","year":"2004","unstructured":"Rinderle, S., Reichert, M., Dadam, P.: Flexible support of team processes by adaptive workflow systems. Distributed and Parallel Databases\u00a016, 91\u2013116 (2004)","journal-title":"Distributed and Parallel Databases"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-642-19394-1_4","volume-title":"Service-Oriented Computing","author":"A. Elgammal","year":"2011","unstructured":"Elgammal, A., Turetken, O., van den Heuvel, W.-J., Papazoglou, M.: On the formal specification of regulatory compliance: A comparative analysis. In: Maximilien, E.M., Rossi, G., Yuan, S.-T., Ludwig, H., Fantinato, M. (eds.) ICSOC 2010. LNCS, vol.\u00a06568, pp. 27\u201338. Springer, Heidelberg (2011)"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Awad, A., Weske, M.: Visualization of compliance violation in business process models. In: Proc. BPI 2009 (2009)","DOI":"10.1007\/978-3-642-05148-7_4"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/11837862_18","volume-title":"Business Process Management Workshops","author":"M. Pesic","year":"2006","unstructured":"Pesic, M., van der Aalst, W.M.P.: A declarative approach for flexible business processes management. In: Eder, J., Dustdar, S. (eds.) BPM Workshops 2006. LNCS, vol.\u00a04103, pp. 169\u2013180. Springer, Heidelberg (2006)"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-642-23059-2_13","volume-title":"Business Process Management","author":"F.M. Maggi","year":"2011","unstructured":"Maggi, F.M., Montali, M., Westergaard, M., van der Aalst, W.M.P.: Monitoring business constraints with linear temporal logic: An approach based on colored automata. In: Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. LNCS, vol.\u00a06896, pp. 132\u2013147. Springer, Heidelberg (2011)"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Montali, M., Torroni, P.: Expressing and verifying business contracts with abductive logic. In: Normative Multi-agent Systems. Number 07122 in Dagstuhl Seminar Proceedings (2007)","DOI":"10.2753\/JEC1086-4415120401"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-642-23059-2_16","volume-title":"Business Process Management","author":"M. Weidlich","year":"2011","unstructured":"Weidlich, M., Ziekow, H., Mendling, J., G\u00fcnther, O., Weske, M., Desai, N.: Event-Based Monitoring of Process Execution Violations. In: Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. LNCS, vol.\u00a06896, pp. 182\u2013198. Springer, Heidelberg (2011)"},{"key":"7_CR13","unstructured":"Giblin, C., M\u00fcller, S., Pfitzmann, B.: From regulatory policies to event monitoring rules: Towards model-driven compliance automation. Technical Report Research Report RZ-3662. IBM Research GmbH (2006)"},{"key":"7_CR14","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-7091-0415-6_5","volume-title":"Service Engineering","author":"T. Holmes","year":"2011","unstructured":"Holmes, T., Mulo, E., Zdun, U., Dustdar, S.: Model-aware monitoring of soas for compliance. In: Dustdar, S., Li, F. (eds.) Service Engineering, pp. 117\u2013136. Springer, Heidelberg (2011)"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-642-17358-5_9","volume-title":"Service-Oriented Computing","author":"A. Birukou","year":"2010","unstructured":"Birukou, A., D\u2019Andrea, V., Leymann, F., Serafinski, J., Silveira, P., Strauch, S., Tluczek, M.: An integrated solution for runtime compliance governance in SOA. In: Maglio, P.P., Weske, M., Yang, J., Fantinato, M. (eds.) ICSOC 2010. LNCS, vol.\u00a06470, pp. 122\u2013136. Springer, Heidelberg (2010)"},{"key":"7_CR16","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.entcs.2004.10.013","volume":"121","author":"W.M.P. Aalst van der","year":"2005","unstructured":"van der Aalst, W.M.P., de Medeiros, A.K.A.: Process mining and security: Detecting anomalous process executions and checking process conformance. Electr. Notes Theor. Comput. Sci.\u00a0121, 3\u201321 (2005)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"7_CR17","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A. Rozinat","year":"2008","unstructured":"Rozinat, A., van der Aalst, W.M.P.: Conformance checking of processes based on monitoring real behavior. Inf. Syst.\u00a033, 64\u201395 (2008)","journal-title":"Inf. Syst."},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1007\/978-3-540-73094-1_28","volume-title":"Petri Nets and Other Models of Concurrency \u2013 ICATPN 2007","author":"W.M.P. Aalst van der","year":"2007","unstructured":"van der Aalst, W.M.P., van Dongen, B.F., G\u00fcnther, C.W., Mans, R.S., de Medeiros, A.K.A., Rozinat, A., Rubin, V., Song, M., Verbeek, H.M.W(E.), Weijters, A.J.M.M.T.: ProM 4.0: Comprehensive support for real process analysis. In: Kleijn, J., Yakovlev, A. (eds.) ICATPN 2007. LNCS, vol.\u00a04546, pp. 484\u2013494. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems: OTM 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25109-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T02:37:56Z","timestamp":1639363076000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25109-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642251085","9783642251092"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25109-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}