{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T22:38:35Z","timestamp":1762641515628},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,9,26]],"date-time":"2012-09-26T00:00:00Z","timestamp":1348617600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SOCA"],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1007\/s11761-012-0121-3","type":"journal-article","created":{"date-parts":[[2012,9,25]],"date-time":"2012-09-25T22:20:20Z","timestamp":1348611620000},"page":"59-73","source":"Crossref","is-referenced-by-count":30,"title":["Domain-specific language for event-based compliance monitoring in process-driven SOAs"],"prefix":"10.1007","volume":"7","author":[{"given":"Emmanuel","family":"Mulo","sequence":"first","affiliation":[]},{"given":"Uwe","family":"Zdun","sequence":"additional","affiliation":[]},{"given":"Schahram","family":"Dustdar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,9,26]]},"reference":[{"issue":"3","key":"121_CR1","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1145\/1281480.1281484","volume":"1","author":"U Zdun","year":"2007","unstructured":"Zdun U, Hentrich C, Dustdar S (2007) Modeling process-driven and service-oriented architectures using patterns and pattern primitives. ACM Trans Web 1(3):14","journal-title":"ACM Trans Web"},{"key":"121_CR2","doi-asserted-by":"crossref","unstructured":"Kung P, Hagen C, Rodel M, Seifert S (2005) Business process monitoring& measurement in a large bank: challenges and selected approaches. In: Proceedings of the 16th international workshop on database and expert systems applications, pp 955\u2013961","DOI":"10.1109\/DEXA.2005.60"},{"issue":"7","key":"121_CR3","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/1160434.1160449","volume":"4","author":"JC Cannon","year":"2006","unstructured":"Cannon JC, Byers M (2006) Compliance deconstructed. Queue 4(7):30\u201337","journal-title":"Queue"},{"key":"121_CR4","volume-title":"Security engineering","author":"R Anderson","year":"2008","unstructured":"Anderson R (2008) Security engineering. Wiley, New York"},{"key":"121_CR5","unstructured":"O\u2019Grady S (2004) SOA meets compliance: compliance oriented architecture. http:\/\/redmonk.com\/public\/COA_final.pdf . Accessed April 2010"},{"key":"121_CR6","doi-asserted-by":"crossref","unstructured":"Sadiq SW, Governatori G, Namiri K (2007) Modeling control objectives for business process compliance. In: Alonso G, Dadam P, Rosemann M (eds) BPM. Lecture notes in computer science, vol 4714. Springer, Berlin, pp 149\u2013164","DOI":"10.1007\/978-3-540-75183-0_12"},{"key":"121_CR7","unstructured":"Bonazzi R, Hussami L, Pigneur Y (2010) Compliance management is becoming a major issue in is design. In: D\u2019Atri A, Sacc\u00e0 D (eds) Information systems: people, organizations, institutions, and technologies. Physica-Verlag, Heidelberg, pp 391\u2013398"},{"key":"121_CR8","doi-asserted-by":"crossref","unstructured":"Mulo E, Zdun U, Dustdar S (2009) Monitoring web service event trails for business compliance. In: SOCA, IEEE, pp 1\u20138","DOI":"10.1109\/SOCA.2009.5410273"},{"key":"121_CR9","doi-asserted-by":"crossref","unstructured":"Stoneburner G, Goguen A, Feringa A (2002) National institute of standards and technology special publications 800\u201330: risk management guide for information technology Systems","DOI":"10.6028\/NIST.SP.800-30"},{"key":"121_CR10","unstructured":"IT Governance Institute (ITGI) (2006) IT control objectives for Sarbanes-Oxley. 2nd edn. Information Systems Audit and Control Association (ISACA) Inc"},{"key":"121_CR11","volume-title":"Essential business process modeling","author":"M Havey","year":"2005","unstructured":"Havey M (2005) Essential business process modeling. O\u2019Reilly Media, Inc., USA"},{"key":"121_CR12","unstructured":"Object Management Group\/Business Process Management Initiative (2008) Business process modeling notation (bpmn) version 1.0"},{"key":"121_CR13","unstructured":"Zur Muehlen M, Rosemann M (2000) Workflow-based process monitoring and controlling-technical and organizational issues. In: Proceedings of the 33rd annual hawaii international conference on system, sciences, vol 2, pp 10"},{"key":"121_CR14","doi-asserted-by":"crossref","unstructured":"McGregor C, Kumaran S (2002) Business process monitoring using web services in B2B e-commerce. In: Proceedings of the international parallel and distributed processing symposium (IPDPS 2002), pp 219\u2013226","DOI":"10.1109\/IPDPS.2002.1016632"},{"issue":"3","key":"121_CR15","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1016\/j.compind.2003.10.007","volume":"53","author":"D Grigori","year":"2004","unstructured":"Grigori D, Casati F, Castellanos M, Dayal U, Sayal M, Shan MC (2004) Business process intelligence. Comput Ind 53(3):321\u2013343","journal-title":"Comput Ind"},{"key":"121_CR16","volume-title":"The power of events: an introduction to complex event processing in distributed enterprise systems","author":"DC Luckham","year":"2002","unstructured":"Luckham DC (2002) The power of events: an introduction to complex event processing in distributed enterprise systems. Addison-Wesley, Reading"},{"key":"121_CR17","doi-asserted-by":"crossref","unstructured":"Greiner T, D\u00fcster W, Pouatcha F, von Ammon R, Brandl HM, Guschakowski D (2006) Business activity monitoring of norisbank taking the example of the application easycredit and the future adoption of complex event processing (CEP). In: Proceedings of the 4th international symposium on principles and practice of programming in Java (PPPJ \u201906), ACM, New York, pp 237\u2013242","DOI":"10.1145\/1168054.1168090"},{"key":"121_CR18","doi-asserted-by":"crossref","unstructured":"Rozsnyai S, Vecera R, Schiefer J, Schatten A (2007) Event cloud\u2014searching for correlated business events. In: The 9th IEEE international conference on e-commerce technology and the 4th IEEE international conference on enterprise computing, e-commerce and e-services (CEC\/EEE 2007), pp 409\u2013420","DOI":"10.1109\/CEC-EEE.2007.47"},{"key":"121_CR19","unstructured":"Wei M, Ari I, Li J, Dekhil M (2007) ReCEPtor: sensing complex events in data streams for service-oriented architectures. Technical report HPL-2007-176, HP Labs"},{"key":"121_CR20","unstructured":"Brandl HM (2007) Complex event processing in the context of business activity monitoring. University of Applied Sciences Regensburg, Master\u2019s thesis"},{"key":"121_CR21","doi-asserted-by":"crossref","unstructured":"Wu E, Diao Y, Rizvi S (2006) High-performance complex event processing over streams. In: Proceedings of the ACM SIGMOD international conference on management of data (SIGMOD \u201906), ACM, New York, pp 407\u2013418","DOI":"10.1145\/1142473.1142520"},{"key":"121_CR22","doi-asserted-by":"crossref","unstructured":"V\u00f6lter M (2009) Md* best practices. J Object Technol 8(6):79\u2013102","DOI":"10.5381\/jot.2009.8.6.c6"},{"key":"121_CR23","unstructured":"Workflow Management Coalition Specification (1999) Workflow management coalition terminology& glossary (Document No. WFMC-TC-1011). Workflow Management Coalition Specification"},{"key":"121_CR24","doi-asserted-by":"crossref","unstructured":"Wohed P, van der Aalst WMP, Dumas M, ter Hofstede AHM, Russell N (2006) On the suitability of bpmn for business process modelling. In: Dustdar S, Fiadeiro JL, Sheth AP (eds) Business process management. Lecture notes in computer science, vol 4102. Springer, Berlin, pp 161\u2013176","DOI":"10.1007\/11841760_12"},{"issue":"7","key":"121_CR25","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1016\/j.infsof.2010.03.004","volume":"52","author":"U Zdun","year":"2010","unstructured":"Zdun U (2010) A DSL toolkit for deferring architectural decisions in DSL-based software design. Inf Softw Technol 52(7):733\u2013748","journal-title":"Inf Softw Technol"},{"key":"121_CR26","unstructured":"EsperTech (2009) Esper reference documentation version 3.2.0. EsperTech Inc"},{"key":"121_CR27","first-page":"528","volume":"1","author":"V Basili","year":"1994","unstructured":"Basili V, Caldiera G, Rombach H (1994) The goal question metric approach. Encycl Softw Eng 1:528\u2013532","journal-title":"Encycl Softw Eng"},{"issue":"2","key":"121_CR28","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/0164-1212(93)90077-B","volume":"23","author":"W Li","year":"1993","unstructured":"Li W, Henry SM (1993) Object-oriented metrics that predict maintainability. J Syst Softw 23(2):111\u2013122","journal-title":"J Syst Softw"},{"issue":"3","key":"121_CR29","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/52.676735","volume":"15","author":"L Hatton","year":"1998","unstructured":"Hatton L (1998) Does oo sync with how we think? IEEE Softw 15(3):46\u201354","journal-title":"IEEE Softw"},{"key":"121_CR30","unstructured":"Henderson-Sellers B (1996) Object-oriented metrics: measures of complexity. Prentice Hall object-oriented series, Prentice Hall PTR,"},{"key":"121_CR31","doi-asserted-by":"crossref","unstructured":"Oman P, Hagemeister J (1992) Metrics for assessing a software system\u2019s maintainability. In: Proceerdings of the 1992, conference on software maintenance, pp 337\u2013344","DOI":"10.1109\/ICSM.1992.242525"},{"key":"121_CR32","unstructured":"Mahbub K, Spanoudakis G (2004) A framework for requirements monitoring of service based systems. In: Aiello M, Aoyama M, Curbera F, Papazoglou MP (eds) ACM, ICSOC, pp 84\u201393"},{"key":"121_CR33","unstructured":"Giblin C, Liu AY, Zhou X (2005) Regulations expressed as logical models (REALM). In: A.I.O.S. Press (ed) Proceedings of the 18th annual conference on legal knowledge and information systems (JURIX \u201905), pp 37\u201348"},{"key":"121_CR34","unstructured":"Giblin C, M\u00fcller S, Pfitzmann B (2006) From regulatory policies to event monitoring rules: towards model-driven compliance automation. Technical report RZ 3662, IBM Research"},{"issue":"1","key":"121_CR35","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A Rozinat","year":"2008","unstructured":"Rozinat A, van der Aalst WMP (2008) Conformance checking of processes based on monitoring real behavior. Inf Syst 33(1):64\u201395","journal-title":"Inf Syst"},{"key":"121_CR36","doi-asserted-by":"crossref","unstructured":"Baresi L, Ghezzi C, Guinea S (2004) Smart monitors for composed services. In: Proceedings of the 2nd international conference on Service oriented computing (ICSOC \u201904), ACM, New York, 193\u2013202","DOI":"10.1145\/1035167.1035195"},{"key":"121_CR37","unstructured":"Baresi L, Guinea S, Plebani P (2006) Lecture notes in computer science. In: WS-policy for service monitoring. Springer, Berlin, pp. 72\u201383"},{"key":"121_CR38","doi-asserted-by":"crossref","unstructured":"Erradi A, Maheshwari P, Tosic V (2007) WS-policy based monitoring of composite web services. In: 5th IEEE European conference on web services (ECOWS \u201907), pp 99\u2013108","DOI":"10.1109\/ECOWS.2007.31"},{"key":"121_CR39","doi-asserted-by":"crossref","unstructured":"Vaculin R, Sycara K (2007) Specifying and monitoring composite events for semantic web services. In: 5th IEEE European conference on web services (ECOWS \u201907), pp 87\u201396","DOI":"10.1109\/ECOWS.2007.29"},{"key":"121_CR40","doi-asserted-by":"crossref","unstructured":"Li Z, Jin Y, Han J (2006) A runtime monitoring and validation framework for web service interactions. In: The Australian software engineering conference (ASWEC \u201906), pp 70\u201379","DOI":"10.1109\/ASWEC.2006.6"},{"key":"121_CR41","doi-asserted-by":"crossref","unstructured":"Benatallah B, Casati F, Toumani F (2004) Analysis and management of web service protocols. In: Proceedings of the 23rd international conference on conceptual modeling (ER \u201904), Shanghai, pp 524\u2013541","DOI":"10.1007\/978-3-540-30464-7_40"},{"key":"121_CR42","doi-asserted-by":"crossref","unstructured":"Sayal M, Casati F, Dayal U, Shan MC (2002) Business process cockpit. In: VLDB, Morgan Kaufmann, pp 880\u2013883","DOI":"10.1016\/B978-155860869-6\/50086-X"}],"container-title":["Service Oriented Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11761-012-0121-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11761-012-0121-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11761-012-0121-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,4]],"date-time":"2019-07-04T05:48:33Z","timestamp":1562219313000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11761-012-0121-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,26]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,3]]}},"alternative-id":["121"],"URL":"https:\/\/doi.org\/10.1007\/s11761-012-0121-3","relation":{},"ISSN":["1863-2386","1863-2394"],"issn-type":[{"value":"1863-2386","type":"print"},{"value":"1863-2394","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,9,26]]}}}