{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:53:08Z","timestamp":1747806788882},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/soca.2011.6166257","type":"proceedings-article","created":{"date-parts":[[2012,3,13]],"date-time":"2012-03-13T16:53:27Z","timestamp":1331657607000},"page":"1-4","source":"Crossref","is-referenced-by-count":11,"title":["Modelling and transforming security constraints in privacy-aware business processes"],"prefix":"10.1109","author":[{"given":"Jutta","family":"Mulle","sequence":"first","affiliation":[]},{"given":"Silvia","family":"von Stackelberg","sequence":"additional","affiliation":[]},{"given":"Klemens","family":"Bohm","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ECOWS.2011.16"},{"journal-title":"A Security Language for BPMN Process Models","year":"2011","author":"mu?lle","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.03.015"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1093\/ietisy\/e90-d.4.745"},{"key":"2","article-title":"Modelling Security Goals in Business Processes","author":"wolter","year":"2008","journal-title":"Modellierung"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ECOWS.2010.24"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19680-5_16"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2010.63"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77010-7_15"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2003.1232051"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2009.90"},{"journal-title":"Privacy-Aware Workflow Management","year":"2009","author":"alhaqbani","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87742-4"}],"event":{"name":"2011 IEEE International Conference on Service-Oriented Computing and Applications (SOCA)","start":{"date-parts":[[2011,12,12]]},"location":"Irvine, CA, USA","end":{"date-parts":[[2011,12,14]]}},"container-title":["2011 IEEE International Conference on Service-Oriented Computing and Applications (SOCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6156051\/6166194\/06166257.pdf?arnumber=6166257","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T13:33:21Z","timestamp":1490103201000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6166257\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/soca.2011.6166257","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}