{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T04:34:31Z","timestamp":1744173271832,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642331602"},{"type":"electronic","value":"9783642331619"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33161-9_3","type":"book-chapter","created":{"date-parts":[[2012,9,20]],"date-time":"2012-09-20T13:57:47Z","timestamp":1348149467000},"page":"9-20","source":"Crossref","is-referenced-by-count":1,"title":["Monitoring Security and Safety of Assets in Supply Chains"],"prefix":"10.1007","author":[{"given":"Ganna","family":"Monakova","sequence":"first","affiliation":[]},{"given":"Cristina","family":"Severin","sequence":"additional","affiliation":[]},{"given":"Achim D.","family":"Brucker","sequence":"additional","affiliation":[]},{"given":"Ulrich","family":"Flegel","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Schaad","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/11823865_7","volume-title":"E-Commerce and Web Technologies","author":"R. Bobrik","year":"2006","unstructured":"Bobrik, R., Bauer, T., Reichert, M.: Proviado \u2013 Personalized and Configurable Visualizations of Business Processes. In: Bauknecht, K., Pr\u00f6ll, B., Werthner, H. (eds.) EC-Web 2006. LNCS, vol.\u00a04082, pp. 61\u201371. Springer, Heidelberg (2006)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Brucker, A.D., Hang, I., L\u00fcckemeyer, G., Ruparel, R.: SecureBPMN: Modeling and enforcing access control requirements in business processes. In: SACMAT. ACM Press (2012)","DOI":"10.1145\/2295136.2295160"},{"key":"3_CR3","unstructured":"Herrmann, P., Herrmann, G.: Security requirement analysis of business processes 6, 305\u2013335 (2006)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Kader, A.: Increasing food availability by reducing postharvest losses of fresh produce. In: V International Postharvest Symposium. International Society for Horticulutral Science (2005)","DOI":"10.17660\/ActaHortic.2005.682.296"},{"key":"3_CR5","unstructured":"Lundqvist, J., de Fraiture, C., Molden, D.: Saving water: From field to fork \u2013 curbing losses and wastage in the food chain. In: SIWI Policy Brief (2008)"},{"key":"3_CR6","unstructured":"Mendling, J., Recker, J.: Towards systematic usage of labels and icons in business process models. In: 13th International Workshop on Exploring Modeling Methods for Systems Analysis and Design (2008)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Monakova, G., Brucker, A.D., Schaad, A.: Security and safety of assets in business processes. In: ACM Symposium on Applied Computing (SAC). ACM Press (2012)","DOI":"10.1145\/2245276.2232045"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Monakova, G., Leymann, F.: Workflow art: a framework for multidimensional workflow analysis. In: Enterprise Information Systems (2012)","DOI":"10.1080\/17517575.2012.688220"},{"key":"3_CR9","unstructured":"M\u00fclle, J., von Stackelberg, S., B\u00f6hm, K.: A security language for BPMN process models. Technical report, University Karlsruhe, KIT (2011)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Rinderle, S., Bobrik, R., Reichert, M., Bauer, T.: Business process visualization - use cases, challenges, solutions. In: ICEIS (3), pp. 204\u2013211 (2006)","DOI":"10.5220\/0002452402040211"},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1093\/ietisy\/e90-d.4.745","volume":"E90-D","author":"A. Rodr\u00edguez","year":"2007","unstructured":"Rodr\u00edguez, A., Fern\u00e1ndez-Medina, E., Piattini, M.: A bpmn extension for the modeling of security requirements in business processes. IEICE - Trans. Inf. Syst.\u00a0E90-D, 745\u2013752 (2007)","journal-title":"IEICE - Trans. Inf. Syst."},{"issue":"4","key":"3_CR12","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.sysarc.2008.10.002","volume":"55","author":"C. Wolter","year":"2009","unstructured":"Wolter, C., Menzel, M., Schaad, A., Miseldine, P., Meinel, C.: Model-driven business process security requirement specification. Journal of Systems Architecture\u00a055(4), 211\u2013223 (2009)","journal-title":"Journal of Systems Architecture"}],"container-title":["Communications in Computer and Information Science","Future Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33161-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T02:54:33Z","timestamp":1744167273000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33161-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642331602","9783642331619"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33161-9_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}