{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T20:32:16Z","timestamp":1725654736973},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642281143"},{"type":"electronic","value":"9783642281150"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28115-0_44","type":"book-chapter","created":{"date-parts":[[2012,1,24]],"date-time":"2012-01-24T10:44:07Z","timestamp":1327401847000},"page":"465-470","source":"Crossref","is-referenced-by-count":2,"title":["Checking Satisfiability Aspects of Binding Constraints in a Business Process Context"],"prefix":"10.1007","author":[{"given":"Sigrid","family":"Schefer","sequence":"first","affiliation":[]},{"given":"Mark","family":"Strembeck","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Mendling","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"44_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/3-540-45594-9_11","volume-title":"Business Process Management","author":"W.M.P. Aalst van der","year":"2000","unstructured":"van der Aalst, W.M.P.: Workflow Verification: Finding Control-Flow Errors Using Petri-Net-Based Techniques. In: van der Aalst, W.M.P., Desel, J., Oberweis, A. (eds.) Business Process Management. LNCS, vol.\u00a01806, pp. 161\u2013183. Springer, Heidelberg (2000)"},{"key":"44_CR2","doi-asserted-by":"crossref","unstructured":"Botha, R.A., Eloff, J.H.: Separation of duties for access control enforcement in workflow environments. IBM Systems Journal\u00a040(3) (2001)","DOI":"10.1147\/sj.403.0666"},{"key":"44_CR3","doi-asserted-by":"crossref","unstructured":"Casati, F., Castano, S., Fugini, M.: Managing Workflow Authorization Constraints through Active Database Technology. Inf. Sys. Frontiers\u00a03(3) (2001)","DOI":"10.1023\/A:1011461409620"},{"key":"44_CR4","doi-asserted-by":"crossref","unstructured":"Crampton, J., Khambhammettu, H.: Delegation and Satisfiability in Workflow Systems. In: Proceedings of ACM SACMAT (2008)","DOI":"10.1145\/1377836.1377842"},{"key":"44_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/978-3-642-16934-2_16","volume-title":"On the Move to Meaningful Internet Systems, OTM 2010","author":"M. Strembeck","year":"2010","unstructured":"Strembeck, M., Mendling, J.: Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context. In: Meersman, R., Dillon, T.S., Herrero, P. (eds.) OTM 2010. LNCS, vol.\u00a06426, pp. 204\u2013221. Springer, Heidelberg (2010)"},{"key":"44_CR6","doi-asserted-by":"crossref","unstructured":"Strembeck, M., Mendling, J.: Modeling Process-related RBAC Models with Extended UML Activity Models. Inf. Software Techn.\u00a053(5) (2011)","DOI":"10.1016\/j.infsof.2010.11.015"},{"key":"44_CR7","unstructured":"Tan, K., Crampton, J., Gunter, C.A.: The Consistency of Task-Based Authorization Constraints in Workflow Systems. In: Proceedings of the 17th IEEE Workshop on Computer Security Foundations (June 2004)"},{"key":"44_CR8","doi-asserted-by":"crossref","unstructured":"Wainer, J., Barthelmess, P., Kumar, A.: W-RBAC - A Workflow Security Model Incorporating Controlled Overriding of Constraints. International Journal of Cooperative Information Systems\u00a012(4) (2003)","DOI":"10.1142\/S0218843003000814"},{"key":"44_CR9","doi-asserted-by":"crossref","unstructured":"Warner, J., Atluri, V.: Inter-instance authorization constraints for secure workflow management. In: Proc. of ACM SACMAT (2006)","DOI":"10.1145\/1133058.1133085"}],"container-title":["Lecture Notes in Business Information Processing","Business Process Management Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28115-0_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,26]],"date-time":"2021-12-26T16:22:53Z","timestamp":1640535773000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-28115-0_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642281143","9783642281150"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28115-0_44","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2012]]}}}