{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T02:53:03Z","timestamp":1648867983991},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,2,2]],"date-time":"2013-02-02T00:00:00Z","timestamp":1359763200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SOCA"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1007\/s11761-013-0129-3","type":"journal-article","created":{"date-parts":[[2013,2,1]],"date-time":"2013-02-01T11:04:38Z","timestamp":1359716678000},"page":"275-292","source":"Crossref","is-referenced-by-count":5,"title":["SOA-enabled compliance management: instrumenting, assessing, and analyzing service-based business processes"],"prefix":"10.1007","volume":"7","author":[{"given":"Carlos","family":"Rodr\u00edguez","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Schleicher","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Daniel","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Casati","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Leymann","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"Wagner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,2,2]]},"reference":[{"key":"129_CR1","doi-asserted-by":"crossref","unstructured":"Apte C, Bibelnieks E, Natarajan R, Pednault E, Tipu F, Campbell D, Nelson B (2001) Segmentation-based modeling for advanced targeted marketing. In: KDD\u201901, pp. 408\u2013413","DOI":"10.1145\/502512.502573"},{"key":"129_CR2","unstructured":"Brauer B, Kline S (2005) SOA governance: a key ingredient of the adaptive enterprise. Tech rep, Hewlett-Packard. http:\/\/goo.gl\/WxTSe"},{"key":"129_CR3","unstructured":"Brown W, Moore G, Tegan W (2006) SOA governance: IBM\u2019s approach. Tech rep, IBM. http:\/\/goo.gl\/q9Ini"},{"key":"129_CR4","unstructured":"Casati F, Castellanos M, Dayal U, Salazar N (2007) A generic solution for warehousing business process data. In: VLDB\u201907. VLDB Endowment, pp 1128\u20131137"},{"key":"129_CR5","doi-asserted-by":"crossref","unstructured":"Daniel F, Casati F, D\u2019Andrea V, Strauch S, Schumm D, Leymann F, Mulo E, Zdun U, Dustdar S, Sebahi S, de Marchi F, Hacid MS (2009) Business compliance governance in service-oriented architectures. In: AINA\u201909. IEEE Press","DOI":"10.1109\/AINA.2009.112"},{"key":"129_CR6","volume-title":"Measurement and data analysis for engineering and science","author":"P Dunn","year":"2004","unstructured":"Dunn P (2004) Measurement and data analysis for engineering and science. McGraw-Hill Science, New York"},{"key":"129_CR7","unstructured":"Goedertier S, Vanthienen J (2006) Designing compliant business processes from obligations and permission. In: BPM workshops, vol. 4103. Springer, pp 5\u201314"},{"key":"129_CR8","unstructured":"Governatori G, Hoffmann J, Sadiq SW, Weber I (2008) Detecting regulatory compliance for business process models through semantic annotations. In: BPM workshops, pp 5\u201317"},{"key":"129_CR9","doi-asserted-by":"crossref","unstructured":"Governatori G, Sadiq S (2009) The journey to business process compliance. In: Handbook of research on business process management, pp 426\u2013454","DOI":"10.4018\/978-1-60566-288-6.ch020"},{"issue":"8","key":"129_CR10","first-page":"1010","volume":"18","author":"G Greco","year":"2006","unstructured":"Greco G, Guzzo A, Pontieri L, Sacca D (2006) Discovering expressive process models by clustering log traces. IEEE TKDE 18(8):1010\u20131027","journal-title":"IEEE TKDE"},{"issue":"3","key":"129_CR11","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1016\/j.compind.2003.10.007","volume":"53","author":"D Grigori","year":"2004","unstructured":"Grigori D, Casati F, Castellanos M, Dayal U, Sayal M, Shan M (2004) Business process intelligence. Comput Ind 53(3):321\u2013343","journal-title":"Comput Ind"},{"key":"129_CR12","unstructured":"Grigori D, Casati F, Dayal U, Shan MC (2001) Improving business process quality through exception understanding, prediction, and prevention. In: VLDB\u201901. San Francisco, CA, USA, pp 159\u2013168"},{"key":"129_CR13","unstructured":"Hagerty J, Hackbush J, Gaughan D, Jacobson S (2008) The governance, risk management, and compliance spending report, 2008\u20132009: Inside the $32B GRC Market. Tech rep, AMR Research"},{"key":"129_CR14","doi-asserted-by":"crossref","unstructured":"Hoffmann J, Weber I, Governatori G (2012) On compliance checking for clausal constraints in annotated process models. Inf Syst Frontiers 14(2):155\u2013177","DOI":"10.1007\/s10796-009-9179-7"},{"key":"129_CR15","unstructured":"Khalaf R, Karastoyanova D, Leymann F (2007) Pluggable framework for enabling the execution of extended BPEL behavior. In: WESOA\u201907. Springer"},{"issue":"12","key":"129_CR16","doi-asserted-by":"crossref","first-page":"1683","DOI":"10.1109\/TKDE.2008.87","volume":"20","author":"HR Motahari-Nezhad","year":"2008","unstructured":"Motahari-Nezhad HR, Saint-Paul R, Benatallah B, Asati F (2008) Deriving protocol models from imperfect service conversation logs. IEEE Trans Knowl Data Eng 20(12):1683\u20131698","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"129_CR17","doi-asserted-by":"crossref","unstructured":"Musaraj K, Yoshida T, Daniel F, Hacid MS, Casati F, Benatallah B (2010) Message correlation and web service protocol mining from inaccurate logs. In: Proceedings of ICWS\u201910","DOI":"10.1109\/ICWS.2010.104"},{"key":"129_CR18","unstructured":"Oracle (2007) SOA governance: framework and best practices. Tech rep, Oracle. URL http:\/\/goo.gl\/dtZjz"},{"issue":"3","key":"129_CR19","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.compind.2003.10.004","volume":"53","author":"SS Pinter","year":"2004","unstructured":"Pinter SS, Golani M (2004) Discovering workflow models from activities\u2019 lifespans. Comput Ind 53(3):283\u2013296","journal-title":"Comput Ind"},{"issue":"4","key":"129_CR20","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1016\/j.is.2009.12.001","volume":"35","author":"V Popova","year":"2010","unstructured":"Popova V, Sharpanskykh A (2010) Modeling organizational performance indicators. Inf Syst 35(4):505\u2013527","journal-title":"Inf Syst"},{"key":"129_CR21","unstructured":"Rodriguez C, Daniel F, Casati F, Anstett T, Schleicher D, Burri S (2009) Warehouse model and diagnostic algorithms. Deliverable d6.2.2, MASTER project. URL http:\/\/www.master-fp7.eu\/"},{"key":"129_CR22","unstructured":"Rodr\u00edguez C, Daniel F, Casati F, Cappiello C (2009) Computing uncertain key indicators from uncertain data. In: ICIQ\u201909, pp 106\u2013120"},{"key":"129_CR23","doi-asserted-by":"crossref","unstructured":"Rodriguez C, Daniel F, Casati F, Cappiello C (2010) Toward uncertain business intelligence: the case of key indicators. IEEE Internet comput 14(4):32\u201340","DOI":"10.1109\/MIC.2010.59"},{"issue":"1","key":"129_CR24","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A Rozinat","year":"2008","unstructured":"Rozinat A, van der Aalst WMP (2008) Conformance checking of processes based on monitoring real behavior. Inf Syst 33(1):64\u201395","journal-title":"Inf Syst"},{"key":"129_CR25","unstructured":"Rozinat A, van der Aalst WMP (2006) Decision mining in business processes (BETA publicatie: working papers, No. 164) Eindhoven: Technische Universiteit Eindhoven, 16 pp. http:\/\/www.tue.nl\/en\/university\/departments\/industrial-design\/research\/experts-expertise\/detail\/ep\/p\/d\/ep-uid\/202689\/"},{"key":"129_CR26","doi-asserted-by":"crossref","unstructured":"Rozinat A, Van der Aalst W (2006) Conformance testing: measuring the fit and appropriateness of event logs and process models. In: Business process management workshops. Springer, pp 163\u2013176","DOI":"10.1007\/11678564_15"},{"key":"129_CR27","doi-asserted-by":"crossref","unstructured":"Sadiq SW, Governatori G, Namiri K (2007) Modeling control objectives for business process compliance. In: BPM\u201907, pp 149\u2013164","DOI":"10.1007\/978-3-540-75183-0_12"},{"key":"129_CR28","unstructured":"Sap AG (2007) Governance for modeling and implementing enterprise services at SAP. URL http:\/\/goo.gl\/kFAvS"},{"key":"129_CR29","doi-asserted-by":"crossref","unstructured":"Sayal M, Casati F, Dayal U, Shan MC (2002) Business process Cockpit. In: VLDB \u201902. VLDB Endowment, pp 880\u2013883","DOI":"10.1016\/B978-155860869-6\/50086-X"},{"key":"129_CR30","unstructured":"Schleicher D, Anstett T, Leymann F, Mietzner R (2009) Maintaining compliance in customizable process models. In: CoopIS\u201909. LNCS, vol 5870, pp 60\u201375"},{"issue":"2","key":"129_CR31","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1016\/j.eswa.2005.12.012","volume":"32","author":"H Seol","year":"2007","unstructured":"Seol H, Choi J, Park G, Park Y (2007) A framework for benchmarking service process using data envelopment analysis and decision tree. Expert Syst Appl 32(2):432\u2013440","journal-title":"Expert Syst Appl"},{"key":"129_CR32","doi-asserted-by":"crossref","unstructured":"Silveira P, Rodr\u00edguez C, Casati F, Daniel F, D\u2019Andrea V, Worledge C, Taheri Z (2009) On the design of compliance governance dashboards for effective compliance and audit management. In: NFPSLAM-SOC\u201909. Springer","DOI":"10.1007\/978-3-642-16132-2_20"},{"key":"129_CR33","unstructured":"Software AG (2007) SOA governance: \u201cRule your SOA\u201d. Tech rep, Software AG. URL http:\/\/goo.gl\/EtgEi"},{"key":"129_CR34","doi-asserted-by":"crossref","DOI":"10.1002\/9781118269213","volume-title":"Governance, risk, and compliance handbook","author":"A Tarantino","year":"2008","unstructured":"Tarantino A (2008) Governance, risk, and compliance handbook. Wiley, New York"},{"key":"129_CR35","unstructured":"Trent H (2008) Products for managing governance, risk, and compliance: market fluff or relevant stuff?. In-depth research report, Burton Group"},{"key":"129_CR36","doi-asserted-by":"crossref","unstructured":"Tsang S, Kao B, Yip KY, Ho WS, Lee SD (2009) Decision trees for uncertain data. In: ICDE\u201909. IEEE, pp 441\u2013444","DOI":"10.1109\/ICDE.2009.26"},{"key":"129_CR37","doi-asserted-by":"crossref","unstructured":"van Lessen T, Leymann F, Mietzner R, Nitzsche J, Schleicher D (2008) A management framework for WS-BPEL. In: ECOWS\u201908. IEEE, pp 187\u2013196","DOI":"10.1109\/ECOWS.2008.25"},{"key":"129_CR38","volume-title":"The deming management method","author":"M Walton","year":"1988","unstructured":"Walton M (1988) The deming management method. Perigee Books, New York"}],"container-title":["Service Oriented Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11761-013-0129-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11761-013-0129-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11761-013-0129-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,8]],"date-time":"2019-07-08T23:42:10Z","timestamp":1562629330000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11761-013-0129-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2,2]]},"references-count":38,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["129"],"URL":"https:\/\/doi.org\/10.1007\/s11761-013-0129-3","relation":{},"ISSN":["1863-2386","1863-2394"],"issn-type":[{"value":"1863-2386","type":"print"},{"value":"1863-2394","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,2,2]]}}}