S/N
|
Article
|
Source
|
Year
|
Authors
|
1
|
A Prolog Model of the Income Tax Act of Canada
|
Study 1
|
1987
|
D. M. Sherman
|
2
|
An Algorithm to Generate Compliance Monitors from Regulations
|
Study 1
|
2006
|
T.D. Breaux, A.I. Antón
|
3
|
An E-Government Information Architecture for Regulation Analysis and Compliance Assistance
|
Study 1
|
2004
|
G. T. Lau, S. Kerrigan, K. H. Law and G. Wiederhold
|
4
|
Annotating Accommodation Advertisements using CERNO
|
Study 1
|
2007
|
N. Kiyavitskaya, N. Zeni, L. Mich, J. R. Cordy and John Mylopoulos
|
5
|
Automated extraction of normative references in legal texts
|
Study 1
|
2003
|
M. Palmirani, R. Brighi and M. Massini.
|
6
|
Automatic semantics extraction in law documents
|
Study 1
|
2005
|
C.Biagioli, E.Francesconi, A.Passerini, S.Montemagni, C.Soria
|
7
|
Combining Structured and Unstructured Information in a Retrieval Model for Accessing Legislation
|
Study 1
|
2005
|
M.-F. Moens.
|
8
|
Dynamics of Legal Provisions and its Representation
|
Study 1
|
2005
|
J. Martinek and J. Cybulka
|
9
|
Ensuring Compliance between Policies, Requirements and Software Design: A Case Study
|
Study 1
|
2006
|
H. Qingfeng, P. Otto, A. I. Antón and L. Jones
|
10
|
Esplex: A rule and conceptual model for representing statutes
|
Study 1
|
1987
|
C. Biagioli, P. Mariani and D. Tiscornia
|
11
|
Indian Central Civil Service Pension Rules: A Case Study in Logic Programming Applied to Regulations
|
Study 1
|
1991
|
M.J. Sergot, A.S. Kamble and K.K. Baja
|
12
|
Induction of Defeasible Logic Theories in the Legal Domain
|
Study 1
|
2003
|
B. Johnston and G. Governatori
|
13
|
Information Infrastructure for Regulation Management and Compliance Checking
|
Study 1
|
2001
|
S. Kerrigan, G. Lau, L. Zhou, G. Wiederhold and K. H. Law
|
14
|
Legal information retrieval and application to e-rulemaking
|
Study 1
|
2005
|
G.T. Lau, K.H. Law and G. Wiederhold
|
15
|
Legal Requirements Reuse: A Critical Success Factor for Requirements Quality and Personal Data Protection
|
Study 1
|
2002
|
A. Toval, A. Olmos and M. Piattini
|
16
|
Legol: modelling legal rules by computer
|
Study 1
|
1979
|
R. K. Stamper
|
17
|
Logic programming for large scale applications in law: A formalisation of supplementary benefit legislation
|
Study 1
|
1987
|
T. J. M. Bench-Capon, G. O. Robinson, T. W. Routen and M. J. Sergot
|
18
|
Logic-Based Regulation Compliance-Assistance
|
Study 1
|
2003
|
S. Kerrigan, K.H. Law
|
19
|
On the analysis of regulations using defeasible rules
|
Study 1
|
1999
|
G. Antóniou, D. Billington and M.J. Maher
|
20
|
On the Modelling and Analysis of Regulations
|
Study 1
|
1999
|
G. Antóniou, D. Billington, G. Governatori and M.J. Maher
|
21
|
ON-LINE: An Architecture for Modelling Legal Information
|
Study 1
|
1995
|
A. Valente and J. Breuker
|
22
|
Permissions and Obligations in Hierarchical Normative Systems
|
Study 1
|
2003
|
G. Boella and L. van der Torre
|
23
|
Privacy and Contextual Integrity: Framework and Applications
|
Study 1
|
2006
|
A. Barth, A. Datta, J. C. Mitchell and H. Nissenbaum
|
24
|
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
|
Study 1
|
2006
|
M.J. May, C.A. Gunter and I. Lee
|
25
|
Privacy as Contextual Integrity
|
Study 1
|
2004
|
H. Nissenbaum
|
26
|
Representing Law in Partial Information Structures
|
Study 1
|
1997
|
Niels Peek
|
27
|
Requirements Engineering in the Health Care Domain
|
Study 1
|
2002
|
L.M. Cysneiros
|
28
|
Similarity Analysis on Government Regulations
|
Study 1
|
2003
|
G.T. Lau, K.H. Law andG. Wiederhold
|
29
|
Some Fundamental Legal Conceptions as Applied in Judicial Reasoning
|
Study 1
|
1913
|
W.N. Hohfeld.
|
30
|
Symbolic Logic: A Razor-Edged Tool for Drafting and Interpreting Legal Documents
|
Study 1
|
1957
|
L. E. Allen
|
31
|
Temporalised Normative Positions in Defeasible Logic
|
Study 1
|
2005
|
G. Governatori, A. Rotolo and G. Sartor.
|
32
|
The British Nationality Act as a Logic Program
|
Study 1
|
1986
|
M. J. Sergot, F. Sadri, R. A. Kowalski, F. Kriwaczek, P. Hammond, and H. T. Cory
|
33
|
The ChoicePoint Dilemma: How Data Brokers Should Handle the Privacy of Personal Information
|
Study 1
|
2006
|
P.N. Otto, A.I. Antón and D.L. Baumer
|
34
|
The Other Formalization of Law: SGML Modelling and Tagging,
|
Study 1
|
1997
|
D. Poulin, G. Huard and A. Lavoie
|
35
|
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering
|
Study 1
|
2001
|
A. I. Antón, J. B. Earp, C. Potts and T. A. Alspaugh
|
36
|
The TAXMAN Project: Towards a Cognitive Theory of Legal Argument
|
Study 1
|
1980
|
L. Thorne McCarty
|
37
|
Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations
|
Study 1
|
2006
|
T.D. Breaux, M.W. Vail, A.I. Antón.
|
38
|
Using a Security Requirements Engineering Methodology in Practice: The compliance with the Italian Data Protection Legislation
|
Study 1
|
2004
|
F. Massacci, M. Prest and N. Zannone
|
39
|
A business-aware web services transactions model
|
Study 2
|
2006
|
M. Papazoglou and B. Kratz
|
40
|
A distributed requirements management framework for legal compliance and accountability
|
Study 2
|
2008
|
T. D. Breaux, A. I. Antón and E. H. Spafford
|
41
|
A formal analysis of a business contract language
|
Study 2
|
2006
|
G. Governatori and Z. Milosevic
|
42
|
A logical language for expressing authorisations
|
Study 2
|
1997
|
S. Jajodia, P. Samarati, and V. Subrahmanian
|
43
|
A Petri net-based model for web service composition
|
Study 2
|
2003
|
R. Hamadi and B. Benatallah
|
44
|
A privacy policy model for enterprises
|
Study 2
|
2002
|
G. Karjoth and M. Schunter
|
45
|
A requirements management framework for privacy compliance
|
Study 2
|
2007
|
S. Ghanavati, D. Amyot and L. Peyton
|
46
|
A semantic based user privacy protection
|
Study 2
|
2005
|
A. Tumer, A. Dogac, and H. Toroslu,
|
47
|
A Semantical Perspective on Verification of Knowledge
|
Study 2
|
2002
|
N. Leemans, J. Treur, and M. Willems
|
48
|
A static compliance-checking framework for business process models
|
Study 2
|
2007
|
Y. Liu, S. Muller, and K. Xu,
|
49
|
A system for non-monotonic rules on the web
|
Study 2
|
2004
|
G. Antóniou, A. Bikakis, and G. Wagner
|
50
|
An architecture for flexible web service QoS negotiation
|
Study 2
|
2005
|
M. Comuzzi and B. Pernici
|
51
|
An environment for goal-driven requirements engineering
|
Study 2
|
1998
|
E. Darimont, P. Delor, P. Massonet, and A. van Lamsweerde
|
52
|
An Event-Condition-Action Language for XML
|
Study 2
|
2002
|
J. Bailey, A. Poulovassilis and P. Wood
|
53
|
An introduction to the web services policy language (WSPL)
|
Study 2
|
2004
|
A. Anderson
|
54
|
An ontology for modelling security: The Tropos approach,
|
Study 2
|
2003
|
H. Mouratidis, P. Giorgini and G. Manson,
|
55
|
Analyzing goal semantics for rights, permissions, and obligations
|
Study 2
|
2005
|
T. D. Breaux and A. I. Antón
|
56
|
AO4BPEL: An aspect-oriented extension to BPEL
|
Study 2
|
2007
|
A. Charfi and M. Mezini
|
57
|
Auditing business process compliance
|
Study 2
|
2007
|
A. Ghose and G. Koliadis
|
58
|
Authorization and privacy for semantic web services
|
Study 2
|
2004
|
L. Kagal, T. Finin, M. Paolucci, N. Srinivasan, K. Sycara and G. Denker
|
59
|
Autonomous Agents for Business Process Management
|
Study 2
|
1996
|
N. Jennings, P. Faratin, T. Norman, P. O'Brien and B. Odgers,
|
60
|
Business rules in a service development and execution environment
|
Study 2
|
2007
|
A. Kamada and M. Mendes,
|
61
|
Business Rules Integration in BPEL A Service- Oriented Approach
|
Study 2
|
2005
|
F. Rosenberg and S. Dustdar
|
62
|
Compliance proofs for collaborative interactions using aspect-oriented approach
|
Study 2
|
2007
|
A. Svirskas, C. Courbis, R. Molva and J. Bedzinskas
|
63
|
Compliance with data protection laws using Hippocratic database active enforcement and auditing
|
Study 2
|
2007
|
C. Johnson and T. Grandison
|
64
|
Composition of coordinated web services
|
Study 2
|
2004
|
S. Tai, R. Khalaf and T. Mikalsen
|
65
|
Composition of Semantic Web Services using Linear Logic Theorem Proving
|
Study 2
|
2006
|
J. Rao, P. Kungas and M. Matskin
|
66
|
Concern-specific languages in a visual web service creation environment
|
Study 2
|
2006
|
M. Braem, N. Joncheere, W. van der Perren, R. V. D. Straeten and V. Jonckers
|
67
|
Coordinated Forward Error Recovery for Composite Web Services
|
Study 2
|
2003
|
F. Tartanoglu, V. Issarny, A. Romanovsky and N. Levy,
|
68
|
Designing a generic payment service
|
Study 2
|
1998
|
J. Peiro, N. Asokan, M. Steiner and M. Waidner
|
69
|
Designing compliant business processes with obligations and permissions
|
Study 2
|
2006
|
S. Goedertier and J. Vanthienen
|
70
|
Electronic document management: challenges and opportunities for information systems managers
|
Study 2
|
1995
|
R. Sprague
|
71
|
Evaluating and Selecting Digital Payment Mechanisms
|
Study 2
|
1997
|
J. Mackie-Mason and K. White
|
72
|
Exchanging EPC business process models with EPML
|
Study 2
|
2004
|
J. Mendling and M. Nuettgens
|
73
|
Exploring web services from a business value perspective
|
Study 2
|
2005
|
B. van der Raadt, J. Gordijn, and E. Yu,
|
74
|
Extracting privacy requirements from legislation
|
Study 2
|
2006
|
G. Yee, L. Korba, and R. Song
|
75
|
FBCM - strategy modeling method for the validation of software requirements,
|
Study 2
|
2007
|
A. Kokune, M. Mizuno, K. Kadoya, and S. Yamamoto
|
76
|
Flexible Composition of Enterprise Web Services,
|
Study 2
|
2003
|
L. Zeng, B. Benatallah, H. Lei, A. Ngu, D. Flaxer, and H. Chang
|
77
|
Framework for control objectives: Management guidelines and maturity models (COBIT 4.1)
|
Study 2
|
2007
|
IT Governance Institute
|
78
|
Goal decomposition and scenario analysis in business process re-engineering
|
Study 2
|
1994
|
A. Antón, W. McCracken, and C. Potts
|
79
|
Goal oriented requirements engineering: Trends and issues
|
Study 2
|
2006
|
S. Yamamoto, H. Kaiya, K. Cox, and S. Bleistein
|
80
|
Goal-directed requirements acquisition,
|
Study 2
|
1993
|
A. Dardenne, A. van Lamsweerde, and S. Fickas
|
81
|
Goal-oriented requirements engineering: A guided tour
|
Study 2
|
2001
|
A. van Lamsweerde
|
82
|
Handbook of Process Algebra
|
Study 2
|
2001
|
J. Bergstra, A. Ponse, and S. Smolka
|
83
|
Hybrid Aspects for Integrating Rule-Based Knowledge and Object-Oriented Functionality
|
Study 2
|
2005
|
M. d’Hondt,
|
84
|
Integrating risks in business process models,
|
Study 2
|
2005
|
D. Neiger, L. Churilov, M. Z. Muehlen and M. Rosemann
|
85
|
Inter-enterprise collaborative business process management
|
Study 2
|
2001
|
Q. Chen and M. Hsu
|
86
|
Isolating process-level concerns using Padus
|
Study 2
|
2006
|
M. Braem, K. Verlaenen, N. Joncheere, W. Vanderperren, R. V. D. Straeten, E. Truyen, W. Joosen, and V. Jonckers,
|
87
|
Modeling control objectives for business process compliance
|
Study 2
|
2007
|
S. Shazia, G. Governatori and K. Namiri
|
88
|
Modeling conversation policies using permissions and obligations
|
Study 2
|
2007
|
L. Kagal and T. Finin
|
89
|
Modern process management with SOA, BAM and CEP - from static process models to executable workflows and monitoring on business level
|
Study 2
|
2006
|
D. Jobst and T. Greiner
|
90
|
Netcash: A design for practical electronic currency on the Internet.
|
Study 2
|
1993
|
B. Medvinsky,
|
91
|
On compliance of business processes with business contracts
|
Study 2
|
2007
|
G. Governatori, Z. Milosevic, S. Sadiq, and M. Orlowska
|
92
|
On the Adaptive Development and Management of Business Collaborations
|
Study 2
|
2007
|
B. Orriens
|
93
|
On the specification of payment requirements for collaborative services
|
Study 2
|
2008
|
B. Orriens and J. Yang,
|
94
|
On the specification of quality requirements for collaborative services
|
Study 2
|
2008
|
B. Orriens and J. Yang
|
95
|
Operational and Algebraic Semantics of Concurrent Processes
|
Study 2
|
1993
|
R. Milner,
|
96
|
Organisational business plans - the standard model for business rule motivation
|
Study 2
|
2000
|
A. Kolber, D. Hay, C. Estep, D. Struck, G. Lam, J. Healy, J. Hall, J. Zachman, K. Healy, M. Eulenberg, N. Fishman, R. Ross, T. Moriarty, and W. Selkow
|
97
|
Pattern-based Translation of BPMN Process Models to BPEL Web Services
|
Study 2
|
2007
|
C. Ouyang, M. Dumas, A. ter Hofstede, and W. van der Aalst
|
98
|
Policy refinement for DiffServ quality of service management
|
Study 2
|
2005
|
A. Bandara, E. Lupu, A. Russo, N. Dulay, M. Sloman, P. Flegkas, M. Charalambides, and G. Pavlou
|
99
|
Ponder: A language for specifying security and management policies for distributed systems
|
Study 2
|
2000
|
N. Damianou, N. Dulay, E. Lupu, and M. Sloman
|
100
|
Preserving privacy in web services
|
Study 2
|
2002
|
A. Rezgui, M. Ouzzani, A. Bouguettaya, and B. Medjahed
|
101
|
Principles and Practice in Verifying Rule Based Systems
|
Study 2
|
1992
|
A. Preece, R. Shinghal, and A. Batarekh
|
102
|
Principles of Constraint Programming
|
Study 2
|
2003
|
K. Apt
|
103
|
Principles of the Business Rule Approach
|
Study 2
|
2003
|
R. Ross
|
104
|
Privacy Issues in the Web Services Architecture (WSA).
|
Study 2
|
2006
|
B. Carminati, E. Ferrari, and P. Hung
|
105
|
Process modeling: the deontic way
|
Study 2
|
2006
|
V. Padmanabhan, G. Governatori, S. Sadiq, R. Colomb, and A. Rotolo.,
|
106
|
QoS-aware middleware for web services composition
|
Study 2
|
2004
|
L. Zeng, B. Benatallah, A. Ngu, M. Dumas, J. Kalagnanam, and H. Chang
|
107
|
Quality of service for workflows and web service processes
|
Study 2
|
2004
|
J. Cardoso, A. Sheth, J. Miller, J. Arnold, and K. Kochut
|
108
|
Quality-of-service specification in distributed object systems
|
Study 2
|
1998
|
S. Froland and J. Koistinen
|
109
|
RBSLA - a declarative rule-based service level agreement language based on RuleML
|
Study 2
|
2005
|
A. Paschke,
|
110
|
Reo: a Channel-based Coordination Model for Component Composition
|
Study 2
|
2004
|
F. Arbab
|
111
|
Representing and using non-functional requirements - a process-oriented approach
|
Study 2
|
1992
|
J. Mylopoulos, L. Chung, and B. Nixon
|
112
|
Requirements for applying aspect-oriented techniques in web service composition languages
|
Study 2
|
2007
|
M. Braem and N. Joncheer
|
113
|
Requirements for network payment: the NetCheque perspective
|
Study 2
|
1995
|
B. Neuman and G. Medvinsky
|
114
|
Rewerse policy specification
|
Study 2
|
2005
|
P. Bonatti and D. Olmedilla
|
115
|
Role of an auditing and reporting service in compliance management
|
Study 2
|
2007
|
J. Ramanathan, R. J. Cohen, E. Plassmann, and K. Ramamoorthy
|
116
|
Service Compliance: Towards Electronic Compliance Programs
|
Study 2
|
2008
|
G. Koliadis and A. K. Ghose
|
117
|
Specification and querying security constraints in the EFSOC framework
|
Study 2
|
2004
|
K. Leune, M. Papazoglou, and W. van den Heuvel
|
118
|
The design of QoS-capable web services
|
Study 2
|
2004
|
T. Yu and K. Lin
|
119
|
The Power of Events: An Introduction to Complex Event Processing
|
Study 2
|
2002
|
D. Luckham,
|
120
|
The RuleM family of web rule languages
|
Study 2
|
2006
|
H. Boley,
|
121
|
The SPIN Model Checker: Primer and Reference Manual
|
Study 2
|
2003
|
G. Holzmann
|
122
|
The Unified Modeling Language User Guide
|
Study 2
|
1998
|
G. Booch, J. Rumbaugh, and I. Jacobson
|
123
|
The well-founded semantics for general logic programs
|
Study 2
|
1991
|
A. van Gelder, K. Ross, and J. Schlipf
|
124
|
Towards a formal framework for business process compliance
|
Study 2
|
2008
|
K. Namiri and N. Stojanovic
|
125
|
Towards modeling and reasoning support for early-phase requirements engineering
|
Study 2
|
1997
|
E. Yu,
|
126
|
Transactional BPEL processes with AO4BPEL aspects
|
Study 2
|
2007
|
A. Charfi, B. Schmeling, and M. Mezini
|
127
|
User requirements notation (URN) language requirements and framework
|
Study 2
|
2003
|
ITU-T
|
128
|
Validating strategic alignment of organisational it requirements using goal modelling and problem diagrams
|
Study 2
|
2006
|
S. Bleistein, K. Cox, and J. Verner
|
129
|
Vidre - a distributed service-oriented business rule engine based on RuleML
|
Study 2
|
2006
|
C. Nagl, F. Rosenberg, and S. Dustdar
|
130
|
Web services and business transactions
|
Study 2
|
2003
|
M. Papazoglou
|
131
|
Web services on demand: WSLA-driven automated management
|
Study 2
|
2004
|
A. Dan, D. Davis, R. Kearney, A. Keller, R. King, D. Kuebler, H. Ludwig, M. Polan, M. Spreitzer, and A. Youssef
|
132
|
What does it mean to say that a specification is complete?
|
Study 2
|
1987
|
K. Yue
|
133
|
What’s in a service? towards accurate description of non-functional service properties
|
Study 2
|
2002
|
J. O’Sullivan, D. Edmond, and A. ter Hofstede
|
134
|
Workflow mining: a survey of issues and approaches
|
Study 2
|
2003
|
W. van der Aalst, B. F. van Dongen, J. Herbst, L. Maruster, G. Schimm, and A. J. M. M. Weijters,
|
135
|
WSOL: A language for the formal specification of various constraints and classes of service for web services
|
Study 2
|
2002
|
V. Tosic, B. Pagurek, and K. Patel
|
136
|
XSRL: An XML webservices request language
|
Study 2
|
2002
|
M. Papazoglou, M. Aiello, M. Pistore, and J. Yang,
|
137
|
|