{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:52:13Z","timestamp":1729619533667,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/edoc.2014.37","type":"proceedings-article","created":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T17:20:49Z","timestamp":1418059249000},"page":"218-225","source":"Crossref","is-referenced-by-count":8,"title":["Integrating Compliance Requirements across Business and IT"],"prefix":"10.1109","author":[{"given":"Falko","family":"Koetter","sequence":"first","affiliation":[]},{"given":"Monika","family":"Kochanowski","sequence":"additional","affiliation":[]},{"given":"Anette","family":"Weisbecker","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Fehling","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Leymann","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"14","article-title":"Towards a policy-framework for the deployment and management of cloud services","author":"waizenegger","year":"2013","journal-title":"SECURWARE'2013"},{"key":"ref11","first-page":"86","article-title":"Policy-aware provisioning of cloud applications","author":"breitenb\u00fccher","year":"2013","journal-title":"SECURWARE'2013"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2010.5707165"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30359-3_7"},{"key":"ref14","first-page":"1","article-title":"A model-driven approach for event-based business process monitoring","author":"koetter","year":"2014","journal-title":"Information Systems and e-Business Management"},{"key":"ref15","article-title":"Leveraging Model-Driven Monitoring for Event-Driven Business Process Control","author":"koetter","year":"2014","journal-title":"1 Workshop zur Ereignismodellierung und verarbeitung im Geschaeftsprozessmanagement (EMOV)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/EDOCW.2011.22"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SYNASC.2010.52"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1007\/978-3-642-41924-9_10","article-title":"Visual modeling of business process compliance rules with the support of multiple perspectives","author":"knuplesch","year":"2013","journal-title":"Conceptual Modeling"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2011.6166212"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2011.22"},{"article-title":"Ensuring business process compliance along the process life cycle","year":"2011","author":"knuplesch","key":"ref3"},{"key":"ref6","first-page":"169","article-title":"Auditing business process compliance","author":"ghose","year":"2007","journal-title":"ser ICSO C"},{"key":"ref5","first-page":"326","article-title":"Efficient compliance checking using bpmn-q and temporal logic","author":"awad","year":"2008","journal-title":"BPM '08"},{"article-title":"What is a compliant data center?","year":"2010","author":"carpathia","key":"ref8"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/11837862_2","article-title":"Designing compliant business processes with obligations and permissions","volume":"4103","author":"goedertier","year":"2006","journal-title":"BPM Ser Lecture Notes in Computer Science"},{"key":"ref2","first-page":"107","article-title":"Business process compliance checking: Current state and future challenges","volume":"141","author":"kharbili","year":"2008","journal-title":"MobIS Ser LNI"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41030-7_26"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2013.23"},{"journal-title":"German Insurance Association (GDV)","article-title":"Verhal-tensregeln fuer den Umgang mit personenbezogenen Daten durch die deutsche Versicherungswirtschaft","year":"2012","key":"ref20"},{"key":"ref22","article-title":"On the security of cloud storage services","author":"borgmann","year":"2012","journal-title":"Tech Rep"},{"year":"0","key":"ref21","article-title":"Bundesdatenschutzgesetz (BDSG)"},{"article-title":"Compliance Modeling-Formal Descriptors and Tools","year":"2014","author":"fehling","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/PESOS.2009.5068815"},{"article-title":"Introduction to metamathematics","year":"1952","author":"kleene","key":"ref25"}],"event":{"name":"2014 IEEE 18th International Enterprise Distributed Object Computing Conference (EDOC 2014)","start":{"date-parts":[[2014,9,1]]},"location":"Ulm, Germany","end":{"date-parts":[[2014,9,5]]}},"container-title":["2014 IEEE 18th International Enterprise Distributed Object Computing Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6970365\/6972032\/06972070.pdf?arnumber=6972070","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T21:44:22Z","timestamp":1498167862000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6972070\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/edoc.2014.37","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}