{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T00:15:25Z","timestamp":1725754525538},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642416408"},{"type":"electronic","value":"9783642416415"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41641-5_17","type":"book-chapter","created":{"date-parts":[[2013,11,1]],"date-time":"2013-11-01T04:19:21Z","timestamp":1383279561000},"page":"236-250","source":"Crossref","is-referenced-by-count":7,"title":["An Experimental Study on the Design and Modeling of Security Concepts in Business Processes"],"prefix":"10.1007","author":[{"given":"Maria","family":"Leitner","sequence":"first","affiliation":[]},{"given":"Sigrid","family":"Schefer-Wenzl","sequence":"additional","affiliation":[]},{"given":"Stefanie","family":"Rinderle-Ma","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Strembeck","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"17_CR1","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1108\/14637159710161585","volume":"3","author":"M. Zairi","year":"1997","unstructured":"Zairi, M.: Business Process Management: A Boundaryless Approach to Modern Competitiveness. Business Process Management Journal\u00a03(1), 64\u201380 (1997)","journal-title":"Business Process Management Journal"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"zur Muehlen, M., Indulska, M.: Modeling Languages for Business Processes and Business Rules: A Representational Analysis. Information Systems\u00a035(4) (2010)","DOI":"10.1016\/j.is.2009.02.006"},{"key":"17_CR3","unstructured":"Weske, M.: Business Process Management: Concepts, Languages, Architectures. Springer (2007)"},{"key":"17_CR4","unstructured":"OMG: Business process model and notation (BPMN) version 2.0. OMG Document formal\/2011-01-03, Object Management Group (January 2011)"},{"key":"17_CR5","unstructured":"OMG: Unified Modeling Language (OMG UML): Superstructure version 2.4.1. OMG Document formal\/2011-08-06, Object Management Group (August 2011)"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Mendling, J.: Metrics for Process Models: Empirical Foundations of Verification, Error Prediction and Guidelines for Correctness. LNBIP, vol. 6. Springer, Heidelberg (2008)","DOI":"10.1007\/978-3-540-89224-3"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Scheer, A.W.: ARIS - Business Process Modeling, 3rd edn. Springer (2000)","DOI":"10.1007\/978-3-642-57108-4"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Johnson, M.E., Goetz, E.: Embedding Information Security into the Organization. IEEE Security & Privacy 5(3) (2007)","DOI":"10.1109\/MSP.2007.59"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Strembeck, M.: Scenario-Driven Role Engineering. IEEE Security & Privacy 8(1) (2010)","DOI":"10.1109\/MSP.2010.46"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Leitner, M.: Security policies in adaptive process-aware information systems: Existing approaches and challenges. In: 2011 Sixth International Conference on Availability, Reliability and Security (ARES), pp. 686\u2013691. IEEE (August 2011)","DOI":"10.1109\/ARES.2011.107"},{"issue":"4","key":"17_CR11","first-page":"4","volume":"2","author":"M. Leitner","year":"2011","unstructured":"Leitner, M., Mangler, J., Rinderle-Ma, S.: SPRINT-Responsibilities: design and development of security policies in process-aware information systems. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)\u00a02(4), 4\u201326 (2011)","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)"},{"key":"17_CR12","unstructured":"Wolter, C., Menzel, M., Meinel, C.: Modelling security goals in business processes. In: Modellierung, Berlin, Germany. LNI, vol.\u00a0127, pp. 197\u2013212. GI (2008)"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Leitner, M., Miller, M., Rinderle-Ma, S.: An analysis and evaluation of security aspects in the business process model and notation (2013) (in press)","DOI":"10.1109\/ARES.2013.34"},{"key":"17_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/11431855_16","volume-title":"Advanced Information Systems Engineering","author":"N. Russell","year":"2005","unstructured":"Russell, N., van der Aalst, W.M.P., ter Hofstede, A.H.M., Edmond, D.: Workflow Resource Patterns: Identification, Representation and Tool Support. In: Pastor, \u00d3., Falc\u00e3o e Cunha, J. (eds.) CAiSE 2005. LNCS, vol.\u00a03520, pp. 216\u2013232. Springer, Heidelberg (2005)"},{"issue":"2","key":"17_CR15","doi-asserted-by":"publisher","first-page":"40","DOI":"10.4018\/jismd.2010040103","volume":"1","author":"J. Mendling","year":"2010","unstructured":"Mendling, J., Recker, J., Reijers, H.A.: On the usage of labels and icons in business process modeling. International Journal of Information System Modeling and Design\u00a01(2), 40\u201358 (2010)","journal-title":"International Journal of Information System Modeling and Design"},{"key":"17_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-642-28714-5_12","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"N. Genon","year":"2012","unstructured":"Genon, N., Caire, P., Toussaint, H., Heymans, P., Moody, D.: Towards a more semantically transparent i* visual syntax. In: Regnell, B., Damian, D. (eds.) REFSQ 2011. LNCS, vol.\u00a07195, pp. 140\u2013146. Springer, Heidelberg (2012)"},{"issue":"6","key":"17_CR17","doi-asserted-by":"publisher","first-page":"756","DOI":"10.1109\/TSE.2009.67","volume":"35","author":"D. Moody","year":"2009","unstructured":"Moody, D.: The physics of notations: Toward a scientific basis for constructing visual notations in software engineering. IEEE Transactions on Software Engineering\u00a035(6), 756\u2013779 (2009)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"3","key":"17_CR18","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1016\/j.datak.2004.12.005","volume":"55","author":"D.L. Moody","year":"2005","unstructured":"Moody, D.L.: Theoretical and practical issues in evaluating the quality of conceptual models: current state and future directions. Data & Knowledge Engineering\u00a055(3), 243\u2013276 (2005)","journal-title":"Data & Knowledge Engineering"},{"key":"17_CR19","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/3-540-44617-6_31","volume-title":"Cognitive Technology: Instruments of Mind","author":"A.F. Blackwell","year":"2001","unstructured":"Blackwell, A.F., et al.: Cognitive dimensions of notations: Design tools for cognitive technology. In: Beynon, M., Nehaniv, C.L., Dautenhahn, K. (eds.) CT 2001. LNCS (LNAI), vol.\u00a02117, pp. 325\u2013341. Springer, Heidelberg (2001)"},{"issue":"4","key":"17_CR20","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1016\/j.jvlc.2006.04.004","volume":"17","author":"T. Green","year":"2006","unstructured":"Green, T., Blandford, A., Church, L., Roast, C., Clarke, S.: Cognitive dimensions: Achievements, new directions, and open questions. Journal of Visual Languages & Computing\u00a017(4), 328\u2013365 (2006)","journal-title":"Journal of Visual Languages & Computing"},{"issue":"1","key":"17_CR21","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1057\/palgrave.ejis.3000598","volume":"15","author":"J. Krogstie","year":"2006","unstructured":"Krogstie, J., Sindre, G., J\u00f8rgensen, H.: Process models representing knowledge for action: a revised quality framework. European Journal of Information Systems\u00a015(1), 91\u2013102 (2006)","journal-title":"European Journal of Information Systems"},{"key":"17_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/978-3-642-19440-5_25","volume-title":"Software Language Engineering","author":"N. Genon","year":"2011","unstructured":"Genon, N., Heymans, P., Amyot, D.: Analysing the cognitive effectiveness of\u00a0the\u00a0BPMN\u00a02.0\u00a0visual\u00a0notation. In: Malloy, B., Staab, S., van den Brand, M. (eds.) SLE 2010. LNCS, vol.\u00a06563, pp. 377\u2013396. Springer, Heidelberg (2011)"},{"key":"17_CR23","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/978-3-642-12814-1_20","volume-title":"Business Information Systems","author":"K. Figl","year":"2010","unstructured":"Figl, K., Mendling, J., Strembeck, M., Recker, J.: On the cognitive effectiveness of routing symbols in process modeling languages. In: Abramowicz, W., Tolksdorf, R. (eds.) BIS 2010. LNBIP, vol.\u00a047, pp. 230\u2013241. Springer, Heidelberg (2010)"},{"key":"17_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/3-540-45800-X_33","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"T. Lodderstedt","year":"2002","unstructured":"Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-based modeling language for model-driven security. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 426\u2013441. Springer, Heidelberg (2002)"},{"key":"17_CR25","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-21863-7_24","volume-title":"Business Information Systems","author":"B. Hoisl","year":"2011","unstructured":"Hoisl, B., Strembeck, M.: Modeling support for confidentiality and integrity of object flows in activity models. In: Abramowicz, W. (ed.) BIS 2011. LNBIP, vol.\u00a087, pp. 278\u2013289. Springer, Heidelberg (2011)"},{"key":"17_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-540-73031-6_27","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"G. Sindre","year":"2007","unstructured":"Sindre, G.: Mal-Activity Diagrams for Capturing Attacks on Business Processes. In: Sawyer, P., Heymans, P. (eds.) REFSQ 2007. LNCS, vol.\u00a04542, pp. 355\u2013366. Springer, Heidelberg (2007)"},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Shirey, R.: Internet Security Glossary. Request for Comments, vol.\u00a02828. IETF (May 2000)","DOI":"10.17487\/rfc2828"},{"key":"17_CR28","unstructured":"Information technology Industry Council: Information technology - role based access control. Technical Report ANSI INCITS 359-2004, American National Standards Institute, Inc (2004)"},{"key":"17_CR29","doi-asserted-by":"crossref","unstructured":"Petre, M.: Why looking isn\u2019t always seeing: Readership skills and graphical programming. Communications of the ACM\u00a038(6) (1995)","DOI":"10.1145\/203241.203251"},{"issue":"3","key":"17_CR30","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1109\/47.867942","volume":"43","author":"T. Boren","year":"2000","unstructured":"Boren, T., Ramey, J.: Thinking aloud: reconciling theory and practice. IEEE Transactions on Professional Communication\u00a043(3), 261\u2013278 (2000)","journal-title":"IEEE Transactions on Professional Communication"},{"key":"17_CR31","doi-asserted-by":"crossref","unstructured":"Strembeck, M., Mendling, J.: Modeling Process-related RBAC Models with Extended UML Activity Models. Information and Software Technology\u00a053(5) (2011)","DOI":"10.1016\/j.infsof.2010.11.015"},{"key":"17_CR32","unstructured":"Schefer-Wenzl, S., Strembeck, M.: A UML Extension for Modeling Break-Glass Policies. In: Rinderle-Ma, S., Weske, M. (eds.) EMISA 2012. LNI, vol.\u00a0206, pp. 25\u201338. GI (2012)"},{"key":"17_CR33","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1007\/978-3-642-22056-2_67","volume-title":"Advanced Information Systems Engineering Workshops","author":"S. Schefer","year":"2011","unstructured":"Schefer, S., Strembeck, M.: Modeling Support for Delegating Roles, Tasks, and Duties in a Process-Related RBAC Context. In: Salinesi, C., Pastor, O. (eds.) CAiSE Workshops 2011. LNBIP, vol.\u00a083, pp. 660\u2013667. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Business Information Processing","The Practice of Enterprise Modeling"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41641-5_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,31]],"date-time":"2019-07-31T17:59:09Z","timestamp":1564595949000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41641-5_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642416408","9783642416415"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41641-5_17","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2013]]}}}