{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:06:15Z","timestamp":1725905175515},"publisher-location":"Cham","reference-count":44,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319625935"},{"type":"electronic","value":"9783319625942"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-62594-2_11","type":"book-chapter","created":{"date-parts":[[2017,7,19]],"date-time":"2017-07-19T01:13:38Z","timestamp":1500426818000},"page":"209-231","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An Universal Approach for Compliance Management Using Compliance Descriptors"],"prefix":"10.1007","author":[{"given":"Falko","family":"Koetter","sequence":"first","affiliation":[]},{"given":"Maximilien","family":"Kintz","sequence":"additional","affiliation":[]},{"given":"Monika","family":"Kochanowski","sequence":"additional","affiliation":[]},{"given":"Thatchanok","family":"Wiriyarattanakul","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Fehling","sequence":"additional","affiliation":[]},{"given":"Philipp","family":"Gildein","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"Wagner","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Leymann","sequence":"additional","affiliation":[]},{"given":"Anette","family":"Weisbecker","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,20]]},"reference":[{"key":"11_CR1","unstructured":"Abdullah, N.S., Indulska, M., Sadiq, S.W.: A study of compliance management in information systems research. In: ECIS, pp. 1711\u20131721 (2009)"},{"key":"11_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-04321-5","volume-title":"Informationsverarbeitung in Versicherungsunternehmen","author":"M Aschenbrenner","year":"2010","unstructured":"Aschenbrenner, M., Dicke, R., Karnarski, B., Schweiggert, F.: Informationsverarbeitung in Versicherungsunternehmen. Springer, Heidelberg (2010)"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-540-85758-7_24","volume-title":"Business Process Management","author":"A Awad","year":"2008","unstructured":"Awad, A., Decker, G., Weske, M.: Efficient compliance checking using BPMN-Q and temporal logic. In: Dumas, M., Reichert, M., Shan, M.-C. (eds.) BPM 2008. LNCS, vol. 5240, pp. 326\u2013341. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-85758-7_24"},{"key":"11_CR4","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-642-12186-9_17","volume-title":"Business Process Management Workshops","author":"A Awad","year":"2010","unstructured":"Awad, A., Weske, M.: Visualization of compliance violation in business process models. In: Rinderle-Ma, S., Sadiq, S., Leymann, F. (eds.) BPM 2009. LNBIP, vol. 43, pp. 182\u2013193. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-12186-9_17"},{"key":"11_CR5","unstructured":"BDO AG Wirtschaftspr\u00fcfungsgesellschaft: Compliance Survey bei Versicherungen (2010). http:\/\/www.bdo.de\/uploads\/media\/BDO_Compliance_Studie.pdf"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75183-0_7","volume-title":"Business Process Management","author":"R Bobrik","year":"2004","unstructured":"Bobrik, R., Reichert, M., Bauer, T.: View-based process visualization. In: Desel, J., Pernici, B., Weske, M. (eds.) BPM 2004. LNCS, vol. 3080. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-75183-0_7"},{"key":"11_CR7","unstructured":"Bundesdatenschutzgesetz (BDSG): Gesetze im Internet - Bundesdatenschutzgesetz (BDSG) (1990). http:\/\/www.gesetze-im-internet.de\/bundesrecht\/bdsg_1990\/gesamt.pdf . Accessed 19 Jan 2016"},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-662-45563-0_10","volume-title":"On the Move to Meaningful Internet Systems: OTM 2014 Conferences","author":"M Comuzzi","year":"2014","unstructured":"Comuzzi, M.: Aligning monitoring and compliance requirements in evolving business networks. In: Meersman, R., Panetto, H., Dillon, T., Missikoff, M., Liu, L., Pastor, O., Cuzzocrea, A., Sellis, T. (eds.) OTM 2014. LNCS, vol. 8841, pp. 166\u2013183. Springer, Heidelberg (2014). doi: 10.1007\/978-3-662-45563-0_10"},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1007\/11494744_25","volume-title":"Applications and Theory of Petri Nets 2005","author":"BF Dongen","year":"2005","unstructured":"Dongen, B.F., Medeiros, A.K.A., Verbeek, H.M.W., Weijters, A.J.M.M., Aalst, W.M.P.: The ProM framework: a new era in process mining tool support. In: Ciardo, G., Darondeau, P. (eds.) ICATPN 2005. LNCS, vol. 3536, pp. 444\u2013454. Springer, Heidelberg (2005). doi: 10.1007\/11494744_25"},{"key":"11_CR10","unstructured":"El Kharbili, M., Stein, S., Markovic, I., Pulverm\u00fcller, E.: Towards a framework for semantic business process compliance management. In: Proceedings of the 1st GRCIS, pp. 1\u201315 (2008)"},{"key":"11_CR11","unstructured":"El Kharbili, M., Stein, S., Pulverm\u00fcller, E.: Policy-based semantic compliance checking for business process management. In: MobIS Workshops, vol. 420, pp. 178\u2013192. Citeseer (2008)"},{"key":"11_CR12","unstructured":"Fehling, C., Koetter, F., Leymann, F.: Compliance Modeling - Formal Descriptors and Tools (2014). http:\/\/www.iaas.uni-stuttgart.de\/institut\/mitarbeiter\/fehling\/TR-2014-Compliance-Modeling.pdf"},{"key":"11_CR13","unstructured":"German Insurance Association (GDV): Verhaltensregeln fuer den Umgang mit personenbezogenen Daten durch die deutsche Versicherungswirtschaft (2012). http:\/\/www.gdv.de\/wp-content\/uploads\/2013\/03\/GDV_Code-of-Conduct_Datenschutz_2012.pdf . Accessed 19 Jan 2016"},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-540-74974-5_14","volume-title":"Service-Oriented Computing \u2013 ICSOC 2007","author":"A Ghose","year":"2007","unstructured":"Ghose, A., Koliadis, G.: Auditing business process compliance. In: Kr\u00e4mer, B.J., Lin, K.-J., Narasimhan, P. (eds.) ICSOC 2007. LNCS, vol. 4749, pp. 169\u2013180. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-74974-5_14"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/11837862_2","volume-title":"Business Process Management Workshops","author":"S Goedertier","year":"2006","unstructured":"Goedertier, S., Vanthienen, J.: Designing compliant business processes with obligations and permissions. In: Eder, J., Dustdar, S. (eds.) BPM 2006. LNCS, vol. 4103, pp. 5\u201314. Springer, Heidelberg (2006). doi: 10.1007\/11837862_2"},{"key":"11_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/978-3-642-31095-9_27","volume-title":"Advanced Information Systems Engineering","author":"D Karagiannis","year":"2012","unstructured":"Karagiannis, D., Moser, C., Mostashari, A.: Compliance evaluation featuring heat maps (CE-HM): a meta-modeling-based approach. In: Ralyt\u00e9, J., Franch, X., Brinkkemper, S., Wrycza, S. (eds.) CAiSE 2012. LNCS, vol. 7328, pp. 414\u2013428. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-31095-9_27"},{"key":"11_CR17","unstructured":"Kharbili, M.E., de Medeiros, A.K.A., Stein, S., van der Aalst, W.M.P.: Business process compliance checking: current state and future challenges. In: MobIS, LNI, vol. 141, pp. 107\u2013113. GI (2008)"},{"key":"11_CR18","unstructured":"Kintz, M.: A semantic dashboard description language for a process-oriented dashboard design methodology. In: Proceedings of 2nd MODIQUITOUS 2012, Copenhagen, Denmark (2012)"},{"key":"11_CR19","volume-title":"Introduction to Metamathematics","author":"SC Kleene","year":"1952","unstructured":"Kleene, S.C.: Introduction to Metamathematics. North-Holland Publishing Co., Amsterdam (1952)"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Knuplesch, D., Reichert, M.: A visual language for modeling multiple perspectives of business process compliance rules. In: Software and Systems Modeling, pp. 1\u201322. Springer, Heidelberg (2016)","DOI":"10.1007\/s10270-016-0526-0"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Knuplesch, D., Reichert, M., Pryss, R., Fdhila, W., Rinderle-Ma, S.: Ensuring compliance of distributed and collaborative workflows. In: 9th Collaboratecom, pp. 133\u2013142. IEEE (2013)","DOI":"10.4108\/icst.collaboratecom.2013.254095"},{"key":"11_CR22","unstructured":"Kochanowski, M., Fehling, C., Koetter, F., Leymann, F., Weisbecker, A.: Compliance in BPM today - an insight into experts\u2019 views and industry challenges. In: Proceedings of INFORMATIK 2014, GI (2014)"},{"key":"11_CR23","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/978-3-642-36285-9_41","volume-title":"Business Process Management Workshops","author":"F Koetter","year":"2013","unstructured":"Koetter, F., Kochanowski, M.: A model-driven approach for event-based business process monitoring. In: Rosa, M., Soffer, P. (eds.) BPM 2012. LNBIP, vol. 132, pp. 378\u2013389. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-36285-9_41"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Koetter, F., Kochanowski, M.: A model-driven approach for event-based business process monitoring. In: Information Systems and e-Business Management, pp. 1\u201332 (2014)","DOI":"10.1007\/s10257-014-0233-8"},{"key":"11_CR25","unstructured":"Koetter, F., Kochanowski, M., Kintz, M.: Leveraging model-driven monitoring for event-driven business process control. In: Workshop zur Ereignismodellierung und -verarbeitung im Geschaeftsprozessmanagement (EMOV) (2014, to appear)"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Koetter, F., Kochanowski, M., Renner, T., Fehling, C., Leymann, F.: Unifying compliance management in adaptive environments through variability descriptors (short paper). In: IEEE SOCA 2013, pp. 214\u2013219. IEEE (2013)","DOI":"10.1109\/SOCA.2013.23"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Koetter, F., Kochanowski, M., Weisbecker, A., Fehling, C., Leymann, F.: Integrating compliance requirements across business and IT. In: 18th EDOC, pp. 218\u2013225. IEEE (2014)","DOI":"10.1109\/EDOC.2014.37"},{"key":"11_CR28","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/978-3-642-17722-4_6","volume-title":"Information Systems Evolution","author":"LT Ly","year":"2011","unstructured":"Ly, L.T., Knuplesch, D., Rinderle-Ma, S., G\u00f6ser, K., Pfeifer, H., Reichert, M., Dadam, P.: SeaFlows toolset \u2013 compliance verification made easy for process-aware information systems. In: Soffer, P., Proper, E. (eds.) CAiSE Forum 2010. LNBIP, vol. 72, pp. 76\u201391. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-17722-4_6"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Mietzner, R., Metzger, A., Leymann, F., Pohl, K.: Variability modeling to support customization and deployment of multi-tenant-aware software as a service applications. In: Proceedings of PESOS 2009, pp. 18\u201325. IEEE Computer Society, Washington, DC (2009)","DOI":"10.1109\/PESOS.2009.5068815"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Papazoglou, M.: Making business processes compliant to standards and regulations. In: 2011 15th IEEE International Enterprise Distributed Object Computing Conference (EDOC), pp. 3\u201313, August 2011","DOI":"10.1109\/EDOC.2011.37"},{"key":"11_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-642-15618-2_4","volume-title":"Business Process Management","author":"S Patig","year":"2010","unstructured":"Patig, S., Casanova-Brito, V., V\u00f6geli, B.: IT requirements of business process management in practice \u2013 an empirical study. In: Hull, R., Mendling, J., Tai, S. (eds.) BPM 2010. LNCS, vol. 6336, pp. 13\u201328. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-15618-2_4"},{"key":"11_CR32","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1007\/978-3-319-06257-0_39","volume-title":"Business Process Management Workshops","author":"E Ramezani","year":"2014","unstructured":"Ramezani, E., Fahland, D., Aalst, W.M.P.: Supporting domain experts to select and configure precise compliance rules. In: Lohmann, N., Song, M., Wohed, P. (eds.) BPM 2013. LNBIP, vol. 171, pp. 498\u2013512. Springer, Cham (2014). doi: 10.1007\/978-3-319-06257-0_39"},{"key":"11_CR33","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/978-3-642-28115-0_43","volume-title":"Business Process Management Workshops","author":"E Ramezani","year":"2012","unstructured":"Ramezani, E., Fahland, D., Werf, J.M., Mattheis, P.: Separating compliance management and business process management. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM 2011. LNBIP, vol. 100, pp. 459\u2013464. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-28115-0_43"},{"key":"11_CR34","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-30409-5","volume-title":"Enabling Flexibility in Process-aware Information Systems: Challenges, Methods, Technologies","author":"M Reichert","year":"2012","unstructured":"Reichert, M., Weber, B.: Enabling Flexibility in Process-aware Information Systems: Challenges, Methods, Technologies. Springer, Heidelberg (2012)"},{"key":"11_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-540-75183-0_12","volume-title":"Business Process Management","author":"S Sadiq","year":"2007","unstructured":"Sadiq, S., Governatori, G., Namiri, K.: Modeling control objectives for business process compliance. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 149\u2013164. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-75183-0_12"},{"key":"11_CR36","unstructured":"SAI Global: 2013 Insurance Industry Compliance Benchmark Study (2013). http:\/\/compliance.saiglobal.com\/community\/resources\/-whitepapers"},{"key":"11_CR37","unstructured":"Scherer, G.S.H.: Assekuranz 2015 - Eine Standortbestimmung. Universit\u00e4t Sankt Gallen - Institut f\u00fcr Versicherungswirtschaft, Sankt Gallen, Schweiz (2015)"},{"key":"11_CR38","doi-asserted-by":"crossref","unstructured":"Schleicher, D., Fehling, C., Grohe, S., Leymann, F., Nowak, A., Schneider, P., Schumm, D.: Compliance domains: a means to model data-restrictions in cloud environments. In: 15th EDOC, pp. 257\u2013266. IEEE (2011)","DOI":"10.1109\/EDOC.2011.22"},{"key":"11_CR39","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-662-43745-2_4","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"F Semmelrodt","year":"2014","unstructured":"Semmelrodt, F., Knuplesch, D., Reichert, M.: Modeling the resource perspective of business process compliance rules with the extended compliance rule graph. In: Bider, I., Gaaloul, K., Krogstie, J., Nurcan, S., Proper, H.A., Schmidt, R., Soffer, P. (eds.) BPMDS\/EMMSAD -2014. LNBIP, vol. 175, pp. 48\u201363. Springer, Heidelberg (2014). doi: 10.1007\/978-3-662-43745-2_4"},{"issue":"6","key":"11_CR40","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MSP.2010.186","volume":"8","author":"H Takabi","year":"2010","unstructured":"Takabi, H., Joshi, J.B., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24\u201331 (2010)","journal-title":"IEEE Secur. Priv."},{"key":"11_CR41","unstructured":"Wagner, R., Steinh\u00fcser, D., Engelbrefcht, O., Meinherz, A.: Agenda 2015: Compliance Management als stetig wachsende Herausforderung f\u00fcr Versicherungen (2010)"},{"key":"11_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/978-3-642-41030-7_26","volume-title":"On the Move to Meaningful Internet Systems: OTM 2013 Conferences","author":"T Waizenegger","year":"2013","unstructured":"Waizenegger, T., et al.: Policy4TOSCA: a policy-aware cloud service provisioning approach to enable secure cloud computing. In: Meersman, R., Panetto, H., Dillon, T., Eder, J., Bellahsene, Z., Ritter, N., Leenheer, P., Dou, D. (eds.) OTM 2013. LNCS, vol. 8185, pp. 360\u2013376. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-41030-7_26"},{"issue":"6","key":"11_CR43","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/MIC.2010.147","volume":"14","author":"Y Wei","year":"2010","unstructured":"Wei, Y., Blake, M.B.: Service-oriented computing and cloud computing: challenges and opportunities. IEEE Internet Comput. 14(6), 72\u201375 (2010)","journal-title":"IEEE Internet Comput."},{"issue":"3","key":"11_CR44","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1016\/j.accinf.2012.06.013","volume":"13","author":"H Weigand","year":"2011","unstructured":"Weigand, H., Elsas, P.: Model-based auditing using REA. Int. J. Account. Inf. Syst. 13(3), 287\u2013310 (2011). Research Symposium on Information Integrity and Information Systems Assurance (2012)","journal-title":"Int. J. Account. Inf. Syst."}],"container-title":["Communications in Computer and Information Science","Cloud Computing and Services Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-62594-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,31]],"date-time":"2022-07-31T04:10:04Z","timestamp":1659240604000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-62594-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319625935","9783319625942"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-62594-2_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}