{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T21:25:49Z","timestamp":1648848349543},"reference-count":5,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Informatik Spektrum"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s00287-019-01204-y","type":"journal-article","created":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T12:03:12Z","timestamp":1573041792000},"page":"354-355","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Business Process Privacy Analysis in Pleak"],"prefix":"10.1007","volume":"42","author":[{"given":"Aivo","family":"Toots","sequence":"first","affiliation":[]},{"given":"Reedik","family":"Tuuling","sequence":"additional","affiliation":[]},{"given":"Maksym","family":"Yerokhin","sequence":"additional","affiliation":[]},{"given":"Marlon","family":"Dumas","sequence":"additional","affiliation":[]},{"given":"Luciano","family":"Garc\u00eda-Ba\u00f1uelos","sequence":"additional","affiliation":[]},{"given":"Peeter","family":"Laud","sequence":"additional","affiliation":[]},{"given":"Raimundas","family":"Matulevi\u010dius","sequence":"additional","affiliation":[]},{"given":"Alisa","family":"Pankova","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Pettai","sequence":"additional","affiliation":[]},{"given":"Pille","family":"Pullonen","sequence":"additional","affiliation":[]},{"given":"Jake","family":"Tom","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"1204_CR1","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.is.2013.12.006","volume":"47","author":"Rafael Accorsi","year":"2015","unstructured":"Accorsi R, Lehmann A, Lohmann N (2015) Information Leak Detection in Business Process Models: Theory, application, and tool support. Inf Syst 47: 244\u2013257","journal-title":"Information Systems"},{"key":"1204_CR2","doi-asserted-by":"crossref","unstructured":"Governatori G, Milosevic Z, Sadiq S (2006) Compliance checking between business processes and business contracts. In: Proceedings of the 10th International IEEE Enterprise Distributed Object Computing Conference EDOC\u201906, pp 221\u2013232","DOI":"10.1109\/EDOC.2006.22"},{"issue":"1","key":"1204_CR3","doi-asserted-by":"publisher","first-page":"1797","DOI":"10.1186\/s40064-016-3498-1","volume":"5","author":"A Van Looy","year":"2016","unstructured":"Van Looy A, Shafagatova A (2016) Business process performance measurement: A structured literature review of indicators, measures and metrics. SpringerPlus 5(1):1797","journal-title":"SpringerPlus"},{"issue":"6","key":"1204_CR4","doi-asserted-by":"publisher","first-page":"3235","DOI":"10.1007\/s10270-019-00718-z","volume":"18","author":"Pille Pullonen","year":"2019","unstructured":"Pullonen P, Tom J, Matulevi\u010dius R, Toots A (2019) Privacy-enhanced BPMN: Enabling data privacy analysis in business processes models. Softw Syst Model. https:\/\/doi.org\/10.1007\/s10270-019-00718-z","journal-title":"Software and Systems Modeling"},{"key":"1204_CR5","unstructured":"Toots A, Tuuling R, Yerokhin M, Dumas M, Garc\u00eda-Ba\u00f1uelos L, Laud P, Matulevii\u010dius R, Pankova A, Pettai M, Pullonen P, Tom J (2019) Business Process Privacy Analysis in Pleak. CoRR abs\/1902.05052 (2019). https:\/\/arxiv.org\/abs\/1902.05052"}],"container-title":["Informatik Spektrum"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00287-019-01204-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00287-019-01204-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00287-019-01204-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T00:19:25Z","timestamp":1604535565000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00287-019-01204-y"}},"subtitle":["(Extended Abstract)"],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":5,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["1204"],"URL":"https:\/\/doi.org\/10.1007\/s00287-019-01204-y","relation":{},"ISSN":["0170-6012","1432-122X"],"issn-type":[{"value":"0170-6012","type":"print"},{"value":"1432-122X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10]]},"assertion":[{"value":"6 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}