iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1007/978-3-319-46295-0_2
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:01:46Z","timestamp":1725865306289},"publisher-location":"Cham","reference-count":49,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319462943"},{"type":"electronic","value":"9783319462950"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-46295-0_2","type":"book-chapter","created":{"date-parts":[[2016,9,19]],"date-time":"2016-09-19T13:21:04Z","timestamp":1474291264000},"page":"18-36","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":53,"title":["Towards a Shared Ledger Business Collaboration Language Based on Data-Aware Processes"],"prefix":"10.1007","author":[{"given":"Richard","family":"Hull","sequence":"first","affiliation":[]},{"given":"Vishal S.","family":"Batra","sequence":"additional","affiliation":[]},{"given":"Yi-Min","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Alin","family":"Deutsch","sequence":"additional","affiliation":[]},{"given":"Fenno F. Terry","family":"Heath III","sequence":"additional","affiliation":[]},{"given":"Victor","family":"Vianu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,20]]},"reference":[{"issue":"4","key":"2_CR1","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1142\/S0218843001000412","volume":"10","author":"WMP van der Aalst","year":"2001","unstructured":"van der Aalst, W.M.P., Barthelmess, P., Ellis, C., Wainer, J.: Proclets: a framework for lightweight interacting workflow processes. Int. J. Coop. Inf. Syst. 10(4), 443\u2013481 (2001)","journal-title":"Int. J. Coop. Inf. Syst."},{"issue":"2","key":"2_CR2","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.datak.2004.07.003","volume":"53","author":"W van der Aalst","year":"2005","unstructured":"van der Aalst, W., Weske, M., Gr\u00fcnbauer, D.: Case handling: a new paradigm for business process support. Data Knowl. Eng. 53(2), 129\u2013162 (2005)","journal-title":"Data Knowl. Eng."},{"issue":"3","key":"2_CR3","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/0022-0000(86)90058-9","volume":"33","author":"S Abiteboul","year":"1986","unstructured":"Abiteboul, S., Bidoit, N.: Non first normal form relations: an algebra allowing data restructuring. J. Comput. Syst. Sci. 33(3), 361\u2013393 (1986)","journal-title":"J. Comput. Syst. Sci."},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Abiteboul, S., Vianu, V.: Collaborative data-driven workflows: think global, act local. In: International Symposyum on Principles of Database Systems (PODS) (2013)","DOI":"10.1145\/2463664.2463672"},{"issue":"4","key":"2_CR5","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1147\/sj.464.0703","volume":"46","author":"K Bhattacharya","year":"2007","unstructured":"Bhattacharya, K., Caswell, N.S., Kumaran, S., Nigam, A., Wu, F.Y.: Artifact-centered operational modeling: lessons from customer engagements. IBM Syst. J. 46(4), 703\u2013721 (2007)","journal-title":"IBM Syst. J."},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-540-75183-0_21","volume-title":"Business Process Management","author":"K Bhattacharya","year":"2007","unstructured":"Bhattacharya, K., Gerede, C.E., Hull, R., Liu, R., Su, J.: Towards formal analysis of artifact-centric business process models. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 288\u2013304. Springer, Heidelberg (2007)"},{"key":"2_CR7","unstructured":"Boaz, D., Limonad, L., Gupta, M.: BizArtifact: Artifact-centric Business Process Management (open-source code base), June 2013. http:\/\/sourceforge.net\/projects\/bizartifact\/. Accessed 20 July 2016"},{"key":"2_CR8","unstructured":"Boaz, D., Heath, T., Gupta, M., Limonad, L., Sun, Y., Hull, R., Vacul\u00edn, R.: The ACSI hub: a data-centric environment for service interoperation. In: Proceedings of BPM Demo Sessions (2014)"},{"key":"2_CR9","unstructured":"Business Process Model and Notation (BPMN), version 2.0, 3 January 2011. http:\/\/www.omg.org\/spec\/BPMN\/2.0. Accessed 10 July 2016"},{"key":"2_CR10","unstructured":"Brown, R.G.: Introducing R3 Corda$$^{\\rm TM}$$: A Distributed Ledger Designed for Financial Services. http:\/\/r3cev.com\/blog\/2016\/4\/4\/introducing-r3-corda-a-distributed-ledger-designed-for-financial-services. Accessed 20 July 2016"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Calvanese, D., De Giacomo, G., Montali, M.: Foundations of data-aware process analysis: a database theory perspective. In: International Symposyum Principles of Database Systems (PODS) (2013)","DOI":"10.1145\/2463664.2467796"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-642-03848-8_18","volume-title":"Business Process Management","author":"T Chao","year":"2009","unstructured":"Chao, T., Cohn, D., Flatgard, A., Hahn, S., Linehan, M., Nandi, P., Nigam, A., Pinel, F., Vergo, J., Wu, F.: Artifact-based transformation of IBM global financing. In: Dayal, U., Eder, J., Koehler, J., Reijers, H.A. (eds.) BPM 2009. LNCS, vol. 5701, pp. 261\u2013277. Springer, Heidelberg (2009)"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1007\/978-3-540-89652-4_63","volume-title":"Service-Oriented Computing \u2013 ICSOC 2008","author":"D Cohn","year":"2008","unstructured":"Cohn, D., Dhoolia, P., Heath III, F., Pinel, F., Vergo, J.: Siena: from powerpoint to web app in 5 minutes. In: Bouguettaya, A., Krueger, I., Margaria, T. (eds.) ICSOC 2008. LNCS, vol. 5364, pp. 722\u2013723. Springer, Heidelberg (2008)"},{"key":"2_CR14","first-page":"3","volume":"32","author":"D Cohn","year":"2009","unstructured":"Cohn, D., Hull, R.: Business artifacts: a data-centric approach to modeling business operations and processes. IEEE Data Eng. Bull. 32, 3\u20139 (2009)","journal-title":"IEEE Data Eng. Bull."},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1016\/j.is.2012.09.002","volume":"38","author":"E Damaggio","year":"2013","unstructured":"Damaggio, E., Hull, R., Vacul\u00edn, R.: On the equivalence of incremental and fixpoint semantics for business artifacts with guard-stage-milestone lifecycles. Inf. Syst. 38, 561\u2013584 (2013)","journal-title":"Inf. Syst."},{"issue":"3","key":"2_CR16","first-page":"35","volume":"31","author":"A Deutsch","year":"2008","unstructured":"Deutsch, A., Vianu, V.: WAVE: automatic verification of data-driven web services. IEEE Data Eng. Bull. 31(3), 35\u201339 (2008)","journal-title":"IEEE Data Eng. Bull."},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Deutsch, A., Hull, R., Patrizi, F., Vianu, V.: Automatic verification of data-centric business processes. In: International Conference on Database Theory (ICDT) (2009)","DOI":"10.1145\/1514894.1514924"},{"issue":"3","key":"2_CR18","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/2694428.2694430","volume":"43","author":"A Deutsch","year":"2014","unstructured":"Deutsch, A., Hull, R., Vianu, V.: Automatic verification of database-centric systems. SIGMOD Rec. 43(3), 5\u201317 (2014)","journal-title":"SIGMOD Rec."},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Deutsch, A., Li, Y., Vianu, V.: Verification of hierarchical artifact systems. In: International Symposyum on Principles of Database Systems (PODS) (2016)","DOI":"10.1145\/2902251.2902275"},{"volume-title":"Petri Nets: Fundamental Models, Verification and Applications","year":"2009","key":"2_CR20","unstructured":"Diaz, M. (ed.): Petri Nets: Fundamental Models, Verification and Applications. Wiley, Jersey City (2009)"},{"key":"2_CR21","unstructured":"Introducing the Digital Asset Modeling Language. https:\/\/digitalasset.com\/press\/introducing-daml.html. Accessed 20 July 2016"},{"key":"2_CR22","unstructured":"A Next-Generation Smart Contract and Decentralized ApplicationPlatform (2016). https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper. Accessed 20 July 2016"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Flood, M.D., Goodenough, O.R.: Contract as automaton: the computational representation of financial agreements, 26 March 2015. https:\/\/financialresearch.gov\/working-papers\/files\/OFRwp-2015-04_Contract-as-Automaton-The-Computational-Representation-of-Financial-Agreements.pdf. Accessed 16 July 2016","DOI":"10.2139\/ssrn.2538224"},{"issue":"2","key":"2_CR24","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1002\/spe.4380180203","volume":"18","author":"GJ Holzmann","year":"1988","unstructured":"Holzmann, G.J.: An improved protocol reachability analysis technique. Softw. Pract. Exper. 18(2), 137\u2013161 (1988)","journal-title":"Softw. Pract. Exper."},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Holzmann, G.J., Bosnacki, D.: Multi-core model checking with SPIN. In: International Parallel and Distributed Processing Symposium (IPDPS) (2007)","DOI":"10.1109\/IPDPS.2007.370410"},{"key":"2_CR26","unstructured":"Hulin, G.: On restructuring nested relations in partitioned normal form. In: International Conference on Very Large Data Bases (VLDB) (1990)"},{"key":"2_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-10383-4_1","volume-title":"Service-Oriented Computing","author":"R Hull","year":"2009","unstructured":"Hull, R., Narendra, N.C., Nigam, A.: Facilitating workflow interoperation using artifact-centric hubs. In: Baresi, L., Chi, C.-H., Suzuki, J. (eds.) ICSOC-ServiceWave 2009. LNCS, vol. 5900, pp. 1\u201318. Springer, Heidelberg (2009)"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Hull, R., et al.: Business artifacts with guard-stage-milestone lifecycles: Managing artifact interactions with conditions and events. In: ACM International Conference on Distributed Event-based Systems (DEBS) (2011)","DOI":"10.1145\/2002259.2002270"},{"key":"2_CR29","unstructured":"Hull, R., Su, J.: Report on NSF Workshop on Data-CentricWorkflows (2012). http:\/\/dcw2009.cs.ucsb.edu\/report.pdf"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Hull, R., Su, J., Vacul\u00edn, R.: Data management perspectives on business process management: tutorial overview. In: International Conference on Management of Data (SIGMOD) (2013)","DOI":"10.1145\/2463676.2467802"},{"key":"2_CR31","unstructured":"Hyperledger white paper (2015). www.the-blockchain.com\/docs\/Hyperledger%20Whitepaper.pdf. Accessed 16 July 2016"},{"key":"2_CR32","unstructured":"Kumaran, S., Nandi, P., Heath III., F.T., Bhaskaran, K., Das, R.: ADoc-oriented programming. In: Symposyum on Applications and the Internet (SAINT) (2003)"},{"issue":"4","key":"2_CR33","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1002\/smr.524","volume":"23","author":"V K\u00fcnzle","year":"2011","unstructured":"K\u00fcnzle, V., Reichert, M.: PHILharmonicflows: towards a framework for object-aware process management. J. Softw. Maint. 23(4), 205\u2013244 (2011)","journal-title":"J. Softw. Maint."},{"key":"2_CR34","doi-asserted-by":"crossref","unstructured":"Limonad, L., Boaz, D., Hull, R., Vacul\u00edn, R., Heath III., F.T.: A generic business artifacts based authorization framework for cross-enterprise collaboration. In: SRII Global Conference (2012)","DOI":"10.1109\/SRII.2012.19"},{"key":"2_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-642-23059-2_21","volume-title":"Business Process Management","author":"R Liu","year":"2011","unstructured":"Liu, R., Vacul\u00edn, R., Shan, Z., Nigam, A., Wu, F.: Business artifact-centric modeling for real-time performance monitoring. In: Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. LNCS, vol. 6896, pp. 265\u2013280. Springer, Heidelberg (2011)"},{"key":"2_CR36","doi-asserted-by":"crossref","unstructured":"Manna, Z., Pnueli, A.: Verification of concurrent programs, part i: the temporal framework. Technical Report STAN-CS-81-836, Stanford University (1981)","DOI":"10.21236\/ADA106750"},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"Marin, M., Hull, R., Vacul\u00edn, R.: Data-centric BPM and the emerging Case Management standard: a short survey. In: Business Process Management, Workshops (2012)","DOI":"10.1007\/978-3-642-36285-9_4"},{"key":"2_CR38","unstructured":"Moffitt, V.Z., Stoyanovich, J., Abiteboul, S., Miklau, G.: Collaborative access control in webdamlog. In: ACM International Conference on Management of Data (SIGMOD) (2015)"},{"key":"2_CR39","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2009). https:\/\/bitcoin.org\/bitcoin.pdf. Accessed 16 July 2016"},{"key":"2_CR40","unstructured":"Nguyen, T., Fiammante, M.: Match processes to business needs: ApplyBELA to case management, October, 2011. http:\/\/www-01.ibm.com\/software\/solutions\/soa\/newsletter\/october11\/bela_case_management.html. Accessed 20 July 2016"},{"issue":"3","key":"2_CR41","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1147\/sj.423.0428","volume":"42","author":"A Nigam","year":"2003","unstructured":"Nigam, A., Caswell, N.S.: Business artifacts: an approach to operational specification. IBM Syst. J. 42(3), 428\u2013445 (2003)","journal-title":"IBM Syst. J."},{"key":"2_CR42","doi-asserted-by":"crossref","unstructured":"Pnueli, A.: The temporal logic of programs. In: Symposium on Foundations of Computer Science (FOCS) (1977)","DOI":"10.1109\/SFCS.1977.32"},{"issue":"3","key":"2_CR43","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s11761-010-0065-4","volume":"4","author":"G Redding","year":"2010","unstructured":"Redding, G., et al.: A flexible, object-centric approach for business process modelling. SOCA 4(3), 191\u2013201 (2010)","journal-title":"SOCA"},{"key":"2_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-540-78238-4_15","volume-title":"Business Process Management Workshops","author":"G Redding","year":"2008","unstructured":"Redding, G., Dumas, M., ter Hofstede, A.H.M., Iordachescu, A.: Transforming object-oriented models to process-oriented models. In: ter Hofstede, A.H.M., Benatallah, B., Paik, H.-Y. (eds.) BPM Workshops 2007. LNCS, vol. 4928, pp. 132\u2013143. Springer, Heidelberg (2008)"},{"key":"2_CR45","unstructured":"Solidity. https:\/\/solidity.readthedocs.io\/en\/latest\/. Accessed 20 July 2016"},{"issue":"3","key":"2_CR46","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1147\/sj.473.0415","volume":"47","author":"J Strosnider","year":"2008","unstructured":"Strosnider, J., Nandi, P., Kumaran, S., Ghosh, S., Arsanjani, A.: Model-driven synthesis of SOA solutions. IBM Syst. J. 47(3), 415\u2013432 (2008)","journal-title":"IBM Syst. J."},{"issue":"1","key":"2_CR47","first-page":"1","volume":"7","author":"Yutian Sun","year":"2016","unstructured":"Sun, Y., Su, J., Yang, J.: Universal artifacts: a new approach to business process management (BPM) systems. ACM Trans. Manag. Inf. Syst. 7(1) (2016). Article id. 7","journal-title":"ACM Transactions on Management Information Systems"},{"key":"2_CR48","doi-asserted-by":"crossref","unstructured":"Weber, I., Xu, X.S., Riveret, R., Governatori, G., Ponomarev, A., Mendling, J.: Untrusted business process monitoring and execution using blockchain. In: International Conference Business Process Management (BPM), Rio de Janeiro, Brazil, September 2016","DOI":"10.1007\/978-3-319-45348-4_19"},{"key":"2_CR49","doi-asserted-by":"crossref","unstructured":"Zhang, F., Cecchetti, E., Croman, K., Juels, A., Shi, E.: Towncrier: an authenticated data feed for smart contracts. IACR Cryptology ePrint Archive 2016 (2016). http:\/\/eprint.iacr.org\/2016\/168. Accessed 20 July 2016","DOI":"10.1145\/2976749.2978326"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-46295-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,8]],"date-time":"2022-07-08T20:03:27Z","timestamp":1657310607000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-46295-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319462943","9783319462950"],"references-count":49,"URL":"http:\/\/dx.doi.org\/10.1007\/978-3-319-46295-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"20 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSOC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Service-Oriented Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Banff","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icsoc2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}