{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T00:02:56Z","timestamp":1774915376912,"version":"3.50.1"},"reference-count":27,"publisher":"World Scientific Pub Co Pte Ltd","issue":"02","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Coop. Info. Syst."],"published-print":{"date-parts":[[2008,6]]},"abstract":"<jats:p>Workflow modeling languages allow for the specification of executable business processes. They, however, typically do not provide any guidance for the adaptation of workflow models, i.e. they do not offer any methods or tools explaining and highlighting which adaptations of the models are feasible and which are not. Therefore, an approach to identify so-called configurable elements of a workflow modeling language and to add configuration opportunities to workflow models is presented in this paper. Configurable elements are the elements of a workflow model that can be modified such that the behavior represented by the model is restricted. More precisely, a configurable element can be either set to enabled, to blocked, or to hidden. To ensure that such configurations lead only to desirable models, our approach allows for imposing so-called requirements on the model's configuration. They have to be fulfilled by any configuration, and limit therefore the freedom of configuration choices. The identification of configurable elements within the workflow modeling language of YAWL and the derivation of the new \"configurable YAWL\" language provide a concrete example for a rather generic approach. A transformation of configured models into lawful YAWL models demonstrates its applicability.<\/jats:p>","DOI":"10.1142\/s0218843008001798","type":"journal-article","created":{"date-parts":[[2008,6,6]],"date-time":"2008-06-06T08:54:31Z","timestamp":1212742471000},"page":"177-221","source":"Crossref","is-referenced-by-count":164,"title":["CONFIGURABLE WORKFLOW MODELS"],"prefix":"10.1142","volume":"17","author":[{"given":"FLORIAN","family":"GOTTSCHALK","sequence":"first","affiliation":[{"name":"Department of Technology Management, Eindhoven University of Technology, P.O. Box 513, 5600MB Eindhoven, The Netherlands"}]},{"given":"WIL M. P.","family":"VAN DER AALST","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Eindhoven University of Technology, P.O. Box 513, 5600MB Eindhoven, The Netherlands"}]},{"given":"MONIQUE H.","family":"JANSEN-VULLERS","sequence":"additional","affiliation":[{"name":"Department of Technology Management, Eindhoven University of Technology, P.O. Box 513, 5600MB Eindhoven, The Netherlands"}]},{"given":"MARCELLO","family":"LA ROSA","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Queensland University of Technology, 126 Margaret St, Brisbane, QLD 4000, Australia"}]}],"member":"219","published-online":{"date-parts":[[2012,1,25]]},"reference":[{"key":"rf1","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7301.001.0001","volume-title":"Workflow Management: Models, Methods, and Systems","author":"van der Aalst W. M. P.","year":"2002"},{"key":"rf2","volume-title":"Workflow Handbook 1997, Workflow Management Coalition","author":"Lawrence P.","year":"1997"},{"key":"rf3","volume-title":"SAP R\/3 Business Blueprint: Understanding the Business Process Reference Model","author":"Curran T.","year":"1998"},{"key":"rf4","doi-asserted-by":"publisher","DOI":"10.1007\/BF02683509"},{"key":"rf5","doi-asserted-by":"publisher","DOI":"10.1007\/11678564_44"},{"key":"rf6","doi-asserted-by":"publisher","DOI":"10.1111\/j.1835-2561.2000.tb00067.x"},{"key":"rf9","volume-title":"Protos User Manual","author":"Pallas Athena B. V.","year":"2004"},{"key":"rf12","volume-title":"Practical Workflow for SAP \u2014 Effective Business Processes using SAP's WebFlow Engine","author":"Rickayzen A.","year":"2002"},{"key":"rf14","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2004.02.002"},{"key":"rf15","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022883727209"},{"key":"rf16","unstructured":"T.\u00a0Rieke and C.\u00a0Seel, Reference Modeling. Efficient Information Systems Design Through Reuse of Information Models, eds. J.\u00a0Becker and P.\u00a0Delfmann (2007)\u00a0pp. 79\u2013102."},{"key":"rf19","doi-asserted-by":"crossref","unstructured":"J.\u00a0Becker, P.\u00a0Delfmann and R.\u00a0Knackstedt, Reference Modeling. Efficient Information Systems Design Through Reuse of Information Models, eds. J.\u00a0Becker and P.\u00a0Delfmann (Springer, 2007)\u00a0pp. 27\u201358.","DOI":"10.1007\/978-3-7908-1966-3"},{"key":"rf20","doi-asserted-by":"publisher","DOI":"10.1142\/S0218843003000553"},{"key":"rf21","doi-asserted-by":"publisher","DOI":"10.1007\/11678564_47"},{"key":"rf22","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2005.05.003"},{"key":"rf24","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(02)00078-9"},{"key":"rf32","volume-title":"Software Engineering: A Practitioner's Approach","author":"Pressman R. S.","year":"2004"},{"key":"rf33","volume-title":"Configuration Management","author":"Estublier J.","year":"1994"},{"key":"rf36","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008719831436"},{"key":"rf39","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008747109146"},{"key":"rf40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30468-5_9"},{"key":"rf41","doi-asserted-by":"publisher","DOI":"10.1108\/14637150310461387"},{"key":"rf42","doi-asserted-by":"crossref","unstructured":"F.\u00a0Gottschalk, W. M. P.\u00a0van der Aalst and M. H.\u00a0Jansen-Vullers, Reference Modeling. Efficient Information Systems Design Through Reuse of Information Models, eds. J.\u00a0Becker and P.\u00a0Delfmann (Springer, 2007)\u00a0pp. 59\u201378.","DOI":"10.1007\/978-3-7908-1966-3_3"},{"key":"rf43","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(00)00321-2"},{"key":"rf44","doi-asserted-by":"publisher","DOI":"10.1016\/S1567-8326(00)00004-7"},{"key":"rf45","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45740-2_4"},{"key":"rf48","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-65306-6","volume-title":"Lectures on Petri Nets I: Basic Models","volume":"1491","author":"Reisig W.","year":"1998"}],"container-title":["International Journal of Cooperative Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218843008001798","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T16:28:14Z","timestamp":1738254494000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218843008001798"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":27,"journal-issue":{"issue":"02","published-online":{"date-parts":[[2012,1,25]]},"published-print":{"date-parts":[[2008,6]]}},"alternative-id":["10.1142\/S0218843008001798"],"URL":"https:\/\/doi.org\/10.1142\/s0218843008001798","relation":{},"ISSN":["0218-8430","1793-6365"],"issn-type":[{"value":"0218-8430","type":"print"},{"value":"1793-6365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,6]]}}}