{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:57:29Z","timestamp":1750309049132,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":39,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1145\/3216122.3216155","type":"proceedings-article","created":{"date-parts":[[2018,7,10]],"date-time":"2018-07-10T16:26:42Z","timestamp":1531240002000},"page":"217-225","source":"Crossref","is-referenced-by-count":2,"title":["The Deployment of an Enhanced Model-Driven Architecture for Business Process Management"],"prefix":"10.1145","author":[{"given":"Richard","family":"McClatchey","sequence":"first","affiliation":[{"name":"University of the West of England, Bristol, UK"}]}],"member":"320","reference":[{"unstructured":"J. Jest on & J. Neil's (2006), Business Process Management. Practical Guidelines to Successful Implementation. Butterworth-Heinemann publishers, 2006.","key":"key-10.1145\/3216122.3216155-1"},{"doi-asserted-by":"crossref","unstructured":"A. Branson et al. (2014), \"CRISTAL: A Practical Study in Designing Systems to Cope with Change\". Information Systems 42, pp 139--152 http:\/\/dx.doi.org\/10.1016\/j.is.2013.12.009. Elsevier publishers.","key":"key-10.1145\/3216122.3216155-2","DOI":"10.1016\/j.is.2013.12.009"},{"unstructured":"Agilium-NG product. See http:\/\/www.agilium.com Last accessed March 2018.","key":"key-10.1145\/3216122.3216155-3"},{"unstructured":"M. Weske \"Business Process Management. Concepts, Languages, Architectures\". Springer publishers, 2007.","key":"key-10.1145\/3216122.3216155-4"},{"unstructured":"A. van Deursen et al. (2007), \"Model-Driven Software Evolution: A Research Agenda\". Proceedings of the 11th European Conference on Software Maintenance and Reengineering. Workshop on Model-Driven Software Evolution - MoDSE2007. Amsterdam, the Netherlands.","key":"key-10.1145\/3216122.3216155-5"},{"doi-asserted-by":"crossref","unstructured":"C. Atkinson and T. Kuhne (2003) \"Model-Driven Development: A Meta-modelling Foundation\". IEEE Spectrum Vol 20 No. 5 pp 36--41. September 2003. IEEE Press","key":"key-10.1145\/3216122.3216155-6","DOI":"10.1109\/MS.2003.1231149"},{"unstructured":"The Object Management Group (OMG), URL http:\/\/www.omg.org. Last accessed March 2018.","key":"key-10.1145\/3216122.3216155-7"},{"doi-asserted-by":"crossref","unstructured":"F. Estrella et al. (2001), \"Meta-Data Objects as the Basis for System Evolution\". Lecture Notes in Computer Science Volume 2118, p. 390-399 ISBN 3-540-42298-6 Springer-Verlag.","key":"key-10.1145\/3216122.3216155-8","DOI":"10.1007\/3-540-47714-4_35"},{"unstructured":"E. Gamma, R. Helm, R. Johnson and J. Vlissides (1995), Design Patterns: Elements of Reusable Object-Oriented Software, Addison-Wesley.","key":"key-10.1145\/3216122.3216155-9"},{"doi-asserted-by":"crossref","unstructured":"J. Yoder and R. Johnson (2002), \"The Adaptive Object Model Architectural Style\". Proceedings of the Working IEEE\/IFIP Conference on Software Architecture 2002 (WICSA3 '02)","key":"key-10.1145\/3216122.3216155-10","DOI":"10.1007\/978-0-387-35607-5_1"},{"doi-asserted-by":"crossref","unstructured":"F. Estrella et al. (2003), \"Pattern Reification as the Basis for Description-Driven Systems\". Journal of Software and System Modelling Volume 2 Number 2, pp 108--119 Springer-Verlag, 2003.","key":"key-10.1145\/3216122.3216155-11","DOI":"10.1007\/s10270-003-0023-0"},{"doi-asserted-by":"crossref","unstructured":"G. Kiczales (1993), \"Metaobject Protocols: Why We Want Them and What Else Can They Do?\", Chapter in Object-Oriented Programming: The CLOS Perspective, pp 101--118, MIT Press.","key":"key-10.1145\/3216122.3216155-12","DOI":"10.7551\/mitpress\/5087.003.0008"},{"unstructured":"J. Sowa, (1984) Conceptual Structures: Information Processing in Mind and Machine, Addison-Wesley.","key":"key-10.1145\/3216122.3216155-13"},{"unstructured":"B. Kerherve and O. Gerbe (1997), \"Models for Metadata or Metamodels for Data\", Proceedings of the Second IEEE Metadata Conference, Maryland, USA, September.","key":"key-10.1145\/3216122.3216155-14"},{"unstructured":"S. Chatrchyan et al. (2008), \"The CMS Experiment at the CERN LHC\". The CMS Collaboration, Journal of Instrumentation Vol 3 361 pages IoP Publishers.","key":"key-10.1145\/3216122.3216155-15"},{"unstructured":"[A. Goldberg, A et al, Smalltalk-80: the Language and its Implementation. Addison-Wesley Longman Publishing Co. 1983.","key":"key-10.1145\/3216122.3216155-16"},{"doi-asserted-by":"crossref","unstructured":"Y. Simmhan et al., (2005) \"A Survey of Data Provenance in e-Science\". In ACM SIGMOD Record, Vol 34, P. 31--36.","key":"key-10.1145\/3216122.3216155-17","DOI":"10.1145\/1084805.1084812"},{"doi-asserted-by":"crossref","unstructured":"L. Moreau, B. Cliffort, et al (2011) \"The Open Provenance Model Core Specification (v1. 1)\". Future Generation Computer Systems, 27(6), pp. 743--756","key":"key-10.1145\/3216122.3216155-18","DOI":"10.1016\/j.future.2010.07.005"},{"doi-asserted-by":"crossref","unstructured":"S. Ram and J. Liu, (2012) \"A Semantic Foundation for Provenance Management\". Journal of Data Semantics 1(1), pp. 11--17.","key":"key-10.1145\/3216122.3216155-19","DOI":"10.1007\/s13740-012-0002-0"},{"doi-asserted-by":"crossref","unstructured":"A. Anjum et al. (2011) \"Provenance management for neuroimaging workflows in neugrid\". Proceedings of the IEEE P2P, Parallel, Grid, Cloud and Internet Computin International Conference (3PGCIC), pp. 67--74.","key":"key-10.1145\/3216122.3216155-20","DOI":"10.1109\/3PGCIC.2011.20"},{"unstructured":"C. Goble (2002) \"Position statement: Musings on provenance, workflow and (semantic web) annotations for bioinformatics\". Workshop on Data Derivation and Provenance, Chicago, October 2002.","key":"key-10.1145\/3216122.3216155-21"},{"doi-asserted-by":"crossref","unstructured":"L. Moreau, L. and P. Groth, (2013) Provenance: An Introduction to Prov. San Rafael, California: Morgan & Claypool Publishers.","key":"key-10.1145\/3216122.3216155-22","DOI":"10.2200\/S00528ED1V01Y201308WBE007"},{"doi-asserted-by":"crossref","unstructured":"L. Carata, S. Akoush, N. Balakrishnan et al. (2014). \"A Primer on Provenance\". Communications of the ACM, 57(5), pp. 52--60.","key":"key-10.1145\/3216122.3216155-23","DOI":"10.1145\/2596628"},{"unstructured":"The World Wide Web Consortium W3C (2013. \"PROV-DM: The PROV Data Mode\"l [online] Available from: https:\/\/www.w3.org\/TR\/prov-dm\/","key":"key-10.1145\/3216122.3216155-24"},{"doi-asserted-by":"crossref","unstructured":"C. Houy, P. Fettke et al., (2010) \"BPM-in-the-Large -- Towards a Higher Level of Abstraction in Business Process Management\". E-Government and E-Services \/ Global Information Systems Processes. GISP2010 Workshop at the World Computer Congress WCC-2010. Brisbane, Australia.","key":"key-10.1145\/3216122.3216155-25","DOI":"10.1007\/978-3-642-15346-4_19"},{"unstructured":"Y. Simmhan, B. Plale and D. Gannon (2005) \"A Survey of Data Provenance Techniques\". Computer Science Department, Indiana University, Bloomington IN, 47405","key":"key-10.1145\/3216122.3216155-26"},{"doi-asserted-by":"crossref","unstructured":"J. Cheney, S.Chong, N. Foster et al.(2009) \"Provenance: a future history\". Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications, pp. 957--964.","key":"key-10.1145\/3216122.3216155-27","DOI":"10.1145\/1639950.1640064"},{"doi-asserted-by":"crossref","unstructured":"F. Curbera, F., Doganata, et al. (2008). \"Business Provenance-a Technology to Increase Traceability of End-to-End Operations\". Proceedings of the OTM Confederated International Conferences\" On the Move to Meaningful Internet Systems\", pp. 100--119.","key":"key-10.1145\/3216122.3216155-28","DOI":"10.1007\/978-3-540-88871-0_10"},{"doi-asserted-by":"crossref","unstructured":"Y. Doganata, K Grueneberg et al. (2011) \"Authoring and Deploying Business Policies Dynamically for Compliance Monitoring\". In Policies for Distributed Systems and Networks (POLICY), pp. 161--164.","key":"key-10.1145\/3216122.3216155-29","DOI":"10.1109\/POLICY.2011.27"},{"doi-asserted-by":"crossref","unstructured":"A. Martens, A. Slominski, et al. (2012) \"Advanced Case Management Enabled by Business Provenance\". Proceedings of the International Conference on Web Services (ICWS), pp. 639--641","key":"key-10.1145\/3216122.3216155-30","DOI":"10.1109\/ICWS.2012.68"},{"unstructured":"W.Uronkarn and T. Senivongse (2014) \"Change Pattern-driven Traceability of Business Processes\". Proceedings of the International MultiConference of Engineers and Computer Scientists.","key":"key-10.1145\/3216122.3216155-31"},{"unstructured":"J. Shamdasani et al. (2014) \"CRISTAL-ISE: Provenance applied in industry\". Proceedings of the International Conference on Enterprise Information Systems (ICEIS) Vol 3, pp 453--458","key":"key-10.1145\/3216122.3216155-32"},{"doi-asserted-by":"crossref","unstructured":"D. Georgakopoulos et al. (1995), \"An Overview of Workflow Management\", Journal of Distributed and Parallel Database Systems 3 (2), pp 119--153.","key":"key-10.1145\/3216122.3216155-33","DOI":"10.1007\/BF01277643"},{"doi-asserted-by":"crossref","unstructured":"R. McClatchey et al. (2017). \"Evolvable Systems for Big Data Management in Business\", Proc of the 4th International Symposium on Big Data Principles, Architectures & Applications (BDAA 2017) at the 15th International Conference on High Performance Computing & Simulation (HPCS 2017), Genoa Italy July 2017.","key":"key-10.1145\/3216122.3216155-34","DOI":"10.1109\/HPCS.2017.14"},{"unstructured":"A. van Deursen et al. (2007), \"Model-Driven Software Evolution: A Research Agenda\". Proceedings of the 11th European Conference on Software Maintenance and Reengineering. Workshop on Model-Driven Software Evolution - MoDSE2007. Amsterdam, the Netherlands.","key":"key-10.1145\/3216122.3216155-35"},{"unstructured":"ADempiere ERP. See http:\/\/http:\/\/www.adempiere.com. Last accessed March 2018","key":"key-10.1145\/3216122.3216155-36"},{"unstructured":"Whitestein Living Systems Process Suite. See http:\/\/http:\/\/www.whitestein.com\/products\/process-suite\/. Last accessed March 2018","key":"key-10.1145\/3216122.3216155-37"},{"unstructured":"Compiere ERP Software. See http:\/\/www.compiere.com. Last accessed March 2018","key":"key-10.1145\/3216122.3216155-38"},{"doi-asserted-by":"crossref","unstructured":"P. Matsumoto et al. (2011) \"AOM Metadata Extension Points\" Proceedings of the 18th Conference on Pattern Languages of Programs (PLoP), Portland, Oregon, USA.","key":"key-10.1145\/3216122.3216155-39","DOI":"10.1145\/2578903.2579150"}],"event":{"number":"22","sponsor":["Concordia University"],"acronym":"IDEAS 2018","name":"the 22nd International Database Engineering & Applications Symposium","start":{"date-parts":[[2018,6,18]]},"location":"Villa San Giovanni, Italy","end":{"date-parts":[[2018,6,20]]}},"container-title":["Proceedings of the 22nd International Database Engineering &amp; Applications Symposium on - IDEAS 2018"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3216122.3216155","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3216155&ftid=1986356&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:29:34Z","timestamp":1750285774000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3216122.3216155"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1145\/3216122.3216155","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}