{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T06:58:43Z","timestamp":1760079523624,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,11,11]],"date-time":"2010-11-11T00:00:00Z","timestamp":1289433600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,11,11]]},"DOI":"10.1145\/1882992.1883092","type":"proceedings-article","created":{"date-parts":[[2010,11,12]],"date-time":"2010-11-12T14:38:38Z","timestamp":1289572718000},"page":"629-636","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["The production rule framework"],"prefix":"10.1145","author":[{"given":"Jeremy C.","family":"Maxwell","sequence":"first","affiliation":[{"name":"North Carolina State University &amp; Allscripts Healthcare Solutions, Raleigh, NC, USA"}]},{"given":"Annie I.","family":"Ant\u00f3n","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/41735.41757"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/41735.41762"},{"key":"e_1_3_2_1_3_1","volume-title":"North Carolina State University","author":"Breaux T.D.","year":"2009","unstructured":"T.D. Breaux , \" Legal Requirements Acquisition for the Specification of Legally Compliant Information Systems\", Ph.D. Dissertation , North Carolina State University , 2009 . T.D. Breaux, \"Legal Requirements Acquisition for the Specification of Legally Compliant Information Systems\", Ph.D. Dissertation, North Carolina State University, 2009."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70746"},{"key":"e_1_3_2_1_5_1","first-page":"218","volume-title":"Proc. of the 19th Intl. Conf. on Advanced Information Systems Engineering","author":"Ghanavati S.","year":"2007","unstructured":"S. Ghanavati , D. Amyot , L. Peyton , \" Towards a Framework for Tracking Legal Compliance in Healthcare\" , Proc. of the 19th Intl. Conf. on Advanced Information Systems Engineering , Trondheim, Norway , 2007 , pp. 218 -- 232 . S. Ghanavati, D. Amyot, L. Peyton, \"Towards a Framework for Tracking Legal Compliance in Healthcare\", Proc. of the 19th Intl. Conf. on Advanced Information Systems Engineering, Trondheim, Norway, 2007, pp. 218--232."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2009.42"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.2307\/785533"},{"key":"e_1_3_2_1_8_1","volume-title":"Oct. 19","author":"Krebs B.","year":"2009","unstructured":"B. Krebs , \" ChoicePoint Breach , Exposed 13,750 Consumer Records\" , The Washington Post , Oct. 19 , 2009 , http:\/\/voices.washingtonpost.com\/securityfix\/2009\/10\/choicepoint_breach_exposed_137.html. B. Krebs, \"ChoicePoint Breach, Exposed 13,750 Consumer Records\", The Washington Post, Oct. 19, 2009, http:\/\/voices.washingtonpost.com\/securityfix\/2009\/10\/choicepoint_breach_exposed_137.html."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03748-1_8"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/RELAW.2009.9"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-009-0089-5"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2009.21"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/RELAW.2009.3"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.24"},{"key":"e_1_3_2_1_16_1","volume-title":"Software Security: Building Security In","author":"McGraw G.","year":"2006","unstructured":"G. McGraw , Software Security: Building Security In , Addison-Wesley , 2006 . G. McGraw, Software Security: Building Security In, Addison-Wesley, 2006."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.142871"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.126"},{"key":"e_1_3_2_1_19_1","volume-title":"Artificial Intelligence and Intelligent Systems","author":"Padhy N.P.","year":"2005","unstructured":"N.P. Padhy , Artificial Intelligence and Intelligent Systems , Oxford University Press , 2005 . N.P. Padhy, Artificial Intelligence and Intelligent Systems, Oxford University Press, 2005."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/112646.112661"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/5689.5920"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/41735.41750"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/RELAW.2009.1"},{"key":"e_1_3_2_1_24_1","first-page":"120","volume-title":"Proc. of the 37th Intl. Conf. on Technology of Object-Oriented Languages and Systems","author":"Sindre G.","year":"2000","unstructured":"G. Sindre , A.L. Opdahl , \"Eliciting security requirements by misuse cases \", Proc. of the 37th Intl. Conf. on Technology of Object-Oriented Languages and Systems , 2000 , pp. 120 -- 131 . G. Sindre, A.L. Opdahl, \"Eliciting security requirements by misuse cases\", Proc. of the 37th Intl. Conf. on Technology of Object-Oriented Languages and Systems, 2000, pp. 120--131."},{"key":"e_1_3_2_1_25_1","volume-title":"Pearson Education","author":"Sommerville I.","year":"2004","unstructured":"I. Sommerville , Software Engineering , Pearson Education , 2004 , 7 th ed. I. Sommerville, Software Engineering, Pearson Education, 2004, 7th ed.","edition":"7"},{"key":"e_1_3_2_1_26_1","volume-title":"The Art of Prolog: Advanced Programming Techniques","author":"Sterling L.","year":"1994","unstructured":"L. Sterling , and E. Shapiro , The Art of Prolog: Advanced Programming Techniques , MIT Press , 1994 , 2 nd ed. L. Sterling, and E. Shapiro, The Art of Prolog: Advanced Programming Techniques, MIT Press, 1994, 2nd ed.","edition":"2"},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. of the 2nd Latin America Workshop on Requirements Engineering","author":"Toro A.D.","year":"1999","unstructured":"A.D. Toro , B.B. Jimenez , A.R. Cortes , M.T. Bonilla , \" A Requirements Elicitation Approach Based in Templates and Patterns\" , Proc. of the 2nd Latin America Workshop on Requirements Engineering , Buenos Aires , 1999 . A.D. Toro, B.B. Jimenez, A.R. Cortes, M.T. Bonilla, \"A Requirements Elicitation Approach Based in Templates and Patterns\", Proc. of the 2nd Latin America Workshop on Requirements Engineering, Buenos Aires, 1999."},{"key":"e_1_3_2_1_28_1","series-title":"Applied Social Research Methods Series","volume-title":"Case Study Research: Design and Methods","author":"Yin R.K.","year":"2003","unstructured":"R.K. Yin , Case Study Research: Design and Methods , in Applied Social Research Methods Series , Vol. 5 , 2003 , 3 rd ed. R.K. Yin, Case Study Research: Design and Methods, in Applied Social Research Methods Series, Vol. 5, 2003, 3rd ed.","edition":"3"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-010-0108-6"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.17"}],"event":{"name":"IHI '10: ACM International Health Informatics Symposium","sponsor":["SIGHIT ACM Special Interest Group on Health Informatics"],"location":"Arlington Virginia USA","acronym":"IHI '10"},"container-title":["Proceedings of the 1st ACM International Health Informatics Symposium"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1882992.1883092","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1882992.1883092","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:12Z","timestamp":1750243932000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1882992.1883092"}},"subtitle":["developing a canonical set of software requirements for compliance with law"],"short-title":[],"issued":{"date-parts":[[2010,11,11]]},"references-count":29,"alternative-id":["10.1145\/1882992.1883092","10.1145\/1882992"],"URL":"https:\/\/doi.org\/10.1145\/1882992.1883092","relation":{},"subject":[],"published":{"date-parts":[[2010,11,11]]},"assertion":[{"value":"2010-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}