{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T21:46:29Z","timestamp":1720475189078},"reference-count":52,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2014,6,1]],"date-time":"2014-06-01T00:00:00Z","timestamp":1401580800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Systems"],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1016\/j.is.2014.01.006","type":"journal-article","created":{"date-parts":[[2014,1,23]],"date-time":"2014-01-23T15:53:55Z","timestamp":1390492435000},"page":"195-215","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":11,"special_numbering":"C","title":["How to guarantee compliance between workflows and product lifecycles?"],"prefix":"10.1016","volume":"42","author":[{"given":"Zhaoxia","family":"Wang","sequence":"first","affiliation":[]},{"given":"Arthur H.M.","family":"ter Hofstede","sequence":"additional","affiliation":[]},{"given":"Chun","family":"Ouyang","sequence":"additional","affiliation":[]},{"given":"Moe","family":"Wynn","sequence":"additional","affiliation":[]},{"given":"Jianmin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiaochen","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.is.2014.01.006_bib1","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1142\/S0218126698000043","article-title":"The application of Petri nets to workflow management","volume":"8","author":"van der Aalst","year":"1998","journal-title":"J. Circuits Syst. Comput."},{"key":"10.1016\/j.is.2014.01.006_bib2","doi-asserted-by":"crossref","unstructured":"W.M.P. van der Aalst, Information and process integration in enterprises: rethinking documents, in: Three Good Reasons for Using a Petri-Net-Based Workflow Management System, The Kluwer International Series in Engineering and Computer Science, Kluwer Academic Publishers, Norwell, 1998, pp. 161\u2013182 (Chapter 10).","DOI":"10.1007\/978-1-4615-5499-8_10"},{"key":"10.1016\/j.is.2014.01.006_bib3","first-page":"130","article-title":"Process mining and verification of properties: an approach based on temporal logic","volume":"vol. 3760","author":"van der Aalst","year":"2005"},{"key":"10.1016\/j.is.2014.01.006_bib4","article-title":"ProM","volume":"vol. 489","author":"van der Aalst","year":"2009"},{"key":"10.1016\/j.is.2014.01.006_bib5","series-title":"Workflow Management","author":"van der Aalst","year":"2002"},{"key":"10.1016\/j.is.2014.01.006_bib6","first-page":"105","article-title":"Object-oriented versioning in a concurrent engineering design environment","volume":"vol. 2097","author":"Al-Khudair","year":"2001"},{"key":"10.1016\/j.is.2014.01.006_bib7","first-page":"326","article-title":"Efficient compliance checking using BPMN-Q and temporal logic","volume":"vol. 5240","author":"Awad","year":"2008"},{"key":"10.1016\/j.is.2014.01.006_bib8","first-page":"5","article-title":"Diagnosing and repairing data anomalies in process models","volume":"vol. 43","author":"Awad","year":"2010"},{"issue":"2","key":"10.1016\/j.is.2014.01.006_bib9","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/BF03342739","article-title":"Generalizability and applicability of model-based business process compliance-checking approaches\u2014a state-of-the-art analysis and research roadmap","volume":"5","author":"Becker","year":"2012","journal-title":"BuR\u2014Bus. Res."},{"issue":"February (1)","key":"10.1016\/j.is.2014.01.006_bib10","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/300830.300837","article-title":"The specification and enforcement of authorization constraints in workflow management systems","volume":"2","author":"Bertino","year":"1999","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"10.1016\/j.is.2014.01.006_bib11","doi-asserted-by":"crossref","unstructured":"G. Coulouris, J. Dollimore, M. Roberts, Role and task-based access control in the PerDiS groupware platform, in: RBAC \u05f398, Proceedings of the Third ACM Workshop on Role-Based Access Control, ACM, Fairfax, VA, USA, October 22\u201323, 1998, pp. 115\u2013121.","DOI":"10.1145\/286884.286908"},{"issue":"4","key":"10.1016\/j.is.2014.01.006_bib12","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1109\/32.4664","article-title":"Version support for engineering database systems","volume":"14","author":"Dittrich","year":"1988","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1","key":"10.1016\/j.is.2014.01.006_bib13","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1142\/S0218843012400023","article-title":"Using patterns for the analysis and resolution of compliance violations","volume":"21","author":"Elgammal","year":"2012","journal-title":"Int. J. Coop. Inf. Syst."},{"key":"10.1016\/j.is.2014.01.006_bib14","first-page":"169","article-title":"Auditing business process compliance","volume":"vol. 4749","author":"Ghose","year":"2007"},{"key":"10.1016\/j.is.2014.01.006_bib15","first-page":"5","article-title":"Designing compliant business processes with obligations and permissions","volume":"vol. 4103","author":"Goedertier","year":"2006"},{"key":"10.1016\/j.is.2014.01.006_bib16","first-page":"94","article-title":"Compliant and flexible business processes with business rules","volume":"vol. 236","author":"Goedertier","year":"2007"},{"issue":"4","key":"10.1016\/j.is.2014.01.006_bib17","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1142\/S0218843006001529","article-title":"A formal analysis of a business contract language","volume":"15","author":"Governatori","year":"2006","journal-title":"Int. J. Coop. Inf. Syst."},{"key":"10.1016\/j.is.2014.01.006_bib18","unstructured":"Mustafa Hashmi, Guido Governatori, Moe Thandar Wynn, Business process data compliance, in: Proceedings of the 6th International Conference on Rules on the Web (RuleML\u05f312), Lecture Notes in Computer Science, vol. 7438, Springer, Montpellier, France, 2012, pp. 32\u201346."},{"issue":"1","key":"10.1016\/j.is.2014.01.006_bib19","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2307\/25148625","article-title":"Design science in information systems research","volume":"28","author":"Hevner","year":"2004","journal-title":"MIS Q."},{"issue":"5","key":"10.1016\/j.is.2014.01.006_bib20","first-page":"1","article-title":"On compliance checking for clausal constraints in annotated process models","volume":"11","author":"Hoffmann","year":"2009","journal-title":"Inf. Syst. Front."},{"issue":"2","key":"10.1016\/j.is.2014.01.006_bib21","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/s10796-009-9179-7","article-title":"On compliance checking for clausal constraints in annotated process models","volume":"14","author":"Hoffmann","year":"2012","journal-title":"Inf. Syst. Front."},{"key":"10.1016\/j.is.2014.01.006_bib22","doi-asserted-by":"crossref","unstructured":"Jochen M. K\u00fcster, Ksenia Ryndina, Harald Gall, Generation of business process models for object life cycle compliance, in: BPM\u05f307: Proceedings of the 5th International Conference on Business Process Management, Springer-Verlag, Berlin, Heidelberg, 2007, pp. 165\u2013181.","DOI":"10.1007\/978-3-540-75183-0_13"},{"issue":"2","key":"10.1016\/j.is.2014.01.006_bib23","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1147\/sj.462.0335","article-title":"A static compliance-checking framework for business process models","volume":"46","author":"Liu","year":"2007","journal-title":"IBM Syst. J."},{"key":"10.1016\/j.is.2014.01.006_bib24","first-page":"120","article-title":"Compliance aware business process design","volume":"vol. 4928","author":"Lu","year":"2007"},{"key":"10.1016\/j.is.2014.01.006_bib25","first-page":"193","article-title":"Semantic correctness in adaptive process management systems","volume":"vol. 4102","author":"Ly","year":"2006"},{"issue":"1","key":"10.1016\/j.is.2014.01.006_bib26","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.datak.2007.06.007","article-title":"Integration and verification of semantic constraints in adaptive process management systems","volume":"64","author":"Ly","year":"2008","journal-title":"Data Knowl. Eng."},{"key":"10.1016\/j.is.2014.01.006_bib27","unstructured":"Dominic M\u00fcller, Manfred Reichert, Joachim Herbst, A new paradigm for the enactment and dynamic adaptation of data-driven process structures, in: Proceedings of the 20th International Conference on Advanced Information Systems Engineering (CAiSE\u05f308), Lecture Notes in Computer Science, vol. 5074, Springer, Montpellier, France, 2008, pp. 48\u201363."},{"issue":"4","key":"10.1016\/j.is.2014.01.006_bib28","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/5.24143","article-title":"Petri nets","volume":"77","author":"Murata","year":"1989","journal-title":"Proc. IEEE"},{"key":"10.1016\/j.is.2014.01.006_bib29","first-page":"59","article-title":"Pattern-based design and validation of business process compliance","volume":"vol. 4803","author":"Namiri","year":"2007"},{"issue":"5","key":"10.1016\/j.is.2014.01.006_bib30","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1016\/j.compind.2006.09.014","article-title":"Dynamic workflow change in PDM systems","volume":"58","author":"Qiu","year":"2007","journal-title":"Comput. Ind."},{"key":"10.1016\/j.is.2014.01.006_bib31","unstructured":"Elham Ramezani, Dirk Fahland, Wil M.P. van der Aalst, Where did i misbehave? Diagnostic information in compliance checking, in: Proceedings of the 10th International Conference on Business Process Management (BPM 2012), Lecture Notes in Business Information Processing, vol. 7481, Springer, Tallinn, Estonia, 2012, pp. 262\u2013278."},{"issue":"3","key":"10.1016\/j.is.2014.01.006_bib32","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1115\/1.2031270","article-title":"Streamlining product lifecycle processes","volume":"5","author":"Rangan","year":"2005","journal-title":"J. Comput. Inf. Sci. Eng."},{"key":"10.1016\/j.is.2014.01.006_bib33","series-title":"Proceedings of the 33rd International Conference on Very Large Data Bases, September 23\u201327","first-page":"627","article-title":"Reasoning about the behavior of semantic web services with concurrent transaction logic","author":"Roman","year":"2007"},{"key":"10.1016\/j.is.2014.01.006_bib34","first-page":"80","article-title":"Consistency of business process models and object life cycles","volume":"vol. 4364","author":"Ryndina","year":"2007"},{"key":"10.1016\/j.is.2014.01.006_bib35","article-title":"A tool for integrating object life cycle and business process modeling","volume":"vol. 272","author":"Ryndina","year":"2007"},{"key":"10.1016\/j.is.2014.01.006_bib36","first-page":"149","article-title":"Modeling control objectives for business process compliance","volume":"vol. 4714","author":"Sadiq","year":"2007"},{"issue":"2","key":"10.1016\/j.is.2014.01.006_bib37","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","article-title":"Role-based access control models","volume":"29","author":"Sandhu","year":"1996","journal-title":"IEEE Comput."},{"issue":"2\u20133","key":"10.1016\/j.is.2014.01.006_bib38","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1016\/j.compind.2007.06.015","article-title":"Process oriented framework to support PLM implementation","volume":"59","author":"Schuh","year":"2008","journal-title":"Comput. Ind."},{"issue":"7","key":"10.1016\/j.is.2014.01.006_bib39","doi-asserted-by":"crossref","first-page":"1026","DOI":"10.1016\/j.is.2011.04.004","article-title":"Soundness verification for conceptual workflow nets with data","volume":"36","author":"Sidorova","year":"2011","journal-title":"Inf. Syst."},{"key":"10.1016\/j.is.2014.01.006_bib40","first-page":"425","article-title":"Data-flow anti-patterns","volume":"vol. 5565","author":"Tr\u010dka","year":"2009"},{"issue":"3","key":"10.1016\/j.is.2014.01.006_bib41","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MS.2012.45","article-title":"Capturing compliance requirements","volume":"29","author":"T\u00fcretken","year":"2012","journal-title":"IEEE Softw."},{"issue":"1","key":"10.1016\/j.is.2014.01.006_bib42","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/j.datak.2005.02.004","article-title":"Consistency in model integration","volume":"56","author":"van Hee","year":"2006","journal-title":"Data Knowl. Eng."},{"key":"10.1016\/j.is.2014.01.006_bib43","unstructured":"H.M.W. Verbeek, Verification of WF-nets (Ph.D. thesis), Eindhoven University of Technology, Eindhoven, The Netherlands, 2004."},{"issue":"4","key":"10.1016\/j.is.2014.01.006_bib44","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1093\/comjnl\/44.4.246","article-title":"Diagnosing workflow processes using Woflan","volume":"44","author":"Verbeek","year":"2001","journal-title":"Comput. J."},{"key":"10.1016\/j.is.2014.01.006_bib45","first-page":"475","article-title":"Woflan 2.0","volume":"vol. 1825","author":"Verbeek","year":"2000"},{"issue":"4","key":"10.1016\/j.is.2014.01.006_bib46","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1142\/S0218843003000814","article-title":"W-RBAC-a workflow security model incorporating controlled overriding of constraints","volume":"12","author":"Wainer","year":"2003","journal-title":"Int. J. Coop. Inf. Syst."},{"key":"10.1016\/j.is.2014.01.006_bib47","unstructured":"Z. Wang, A.H.M. ter Hofstede, C. Ouyang, M. Wynn, J. Wang, X. Zhu, How to Guarantee Compliance Between Workflows and Product Lifecycles? Technical Report BPM Center BPM-11-10, BPMcenter.org, 2011."},{"issue":"3","key":"10.1016\/j.is.2014.01.006_bib48","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1007\/s10619-010-7060-9","article-title":"Beyond soundness","volume":"27","author":"Weber","year":"2010","journal-title":"Distrib. Parallel Databases"},{"issue":"1","key":"10.1016\/j.is.2014.01.006_bib49","doi-asserted-by":"crossref","first-page":"20","DOI":"10.3233\/ICA-1996-3103","article-title":"Integrated product and process management for engineering design applications","volume":"3","author":"Westfechtel","year":"1996","journal-title":"Integr. Comput.-Aided Eng."},{"issue":"12","key":"10.1016\/j.is.2014.01.006_bib50","doi-asserted-by":"crossref","first-page":"1111","DOI":"10.1109\/32.988710","article-title":"A layered architecture for uniform version management","volume":"27","author":"Westfechtel","year":"2001","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.is.2014.01.006_bib51","unstructured":"M.T.K. Wynn, Semantics, verification, and implementation of workflows with cancellation regions and OR-joins (Ph.D. thesis), Queensland University of Technology, Brisbane, Australia, 2006."},{"issue":"2","key":"10.1016\/j.is.2014.01.006_bib52","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1007\/s10270-010-0149-9","article-title":"Verifying workflow processes","volume":"10","author":"Zha","year":"2010","journal-title":"Softw. Syst. Model."}],"container-title":["Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0306437914000246?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0306437914000246?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2021,3,20]],"date-time":"2021-03-20T07:39:35Z","timestamp":1616225975000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0306437914000246"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":52,"alternative-id":["S0306437914000246"],"URL":"https:\/\/doi.org\/10.1016\/j.is.2014.01.006","relation":{},"ISSN":["0306-4379"],"issn-type":[{"value":"0306-4379","type":"print"}],"subject":[],"published":{"date-parts":[[2014,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"How to guarantee compliance between workflows and product lifecycles?","name":"articletitle","label":"Article Title"},{"value":"Information Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.is.2014.01.006","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2014 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}