<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>N.A.M.: Programming norm change. Journal of
Applied Non</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Toward Better Mapping between Regulations and Operational Details of Enterprises Using Vocabularies and Semantic Similarity</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sagar Sunkle</string-name>
          <email>sagar.sunkle@tcs.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Deepali Kholkar</string-name>
          <email>deepali.kholkar@tcs.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vinay Kulkarni</string-name>
          <email>vinay.vkulkarni@tcs.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Tata Research Development and Design Center Tata Consultancy Services 54B, Industrial Estate</institution>
          ,
          <addr-line>Hadapsar Pune, 411013</addr-line>
          <country country="IN">INDIA</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2013</year>
      </pub-date>
      <volume>17</volume>
      <issue>6403</issue>
      <fpage>15</fpage>
      <lpage>16</lpage>
      <abstract>
        <p>Industry governance, risk, and compliance (GRC) solutions stand to gain from various analyses offered by formal compliance checking approaches. Such adoption is made difficult by the fact that most formal approaches assume that a mapping between concepts of regulations and models of operational specifics exists. We propose to use Semantics of Business Vocabularies and Rules along with similarity measures to create an explicit mapping between concepts of regulations and models of operational specifics of enterprises. We believe that this proposal takes a step toward adapting and leveraging formal compliance checking approaches in industry GRC solutions.</p>
      </abstract>
      <kwd-group>
        <kwd>Regulatory Compliance</kwd>
        <kwd>Operational Details</kwd>
        <kwd>Business Process Models</kwd>
        <kwd>SBVR</kwd>
        <kwd>Semantic Similarity</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>
        With non-compliance being penalized severely in most countries and across various
business domains [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ], effective and efficient resolution of regulatory compliance is
high on priority for modern enterprises. While industry governance, risk, and
compliance (GRC) solutions help enterprises in managing regulatory compliance, they are
mostly document-oriented and are not as rigorous as formal approaches to compliance
checking. Formal compliance checking can offer several analysis benefits to
industry GRC solutions such as formally finding out (non-)compliance to regulations [
        <xref ref-type="bibr" rid="ref3 ref4 ref5 ref6 ref7 ref8 ref9">3–9</xref>
        ]
against document-based evidence as in industry GRC solutions, computable
explanation of proofs of (non-)compliance [
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ] against expert’s judgement as in industry
GRC, management of frequent changes in regulations [12, 13] against functional heat
maps derived from experts’ knowledge as in industry GRC, etc.
      </p>
      <p>Each formal approach ideally requires to relate regulations to operational specifics
of enterprises. A terminological mapping would essentially tell where in the operational
activities a rule from the regulation becomes applicable. Surprisingly, formal
compliance checking approaches implicitly assume such mapping to exist without describing
how to arrive at it as also indicated in [14–16].</p>
      <p>If some means were provided whereby similarity between concepts from regulations
and operational specifics could be formally established, then it would be easier to relate
concepts from regulations with operational specifics and indicate where a rule from
regulation becomes applicable. This would also make it easier to transfer results in
formal compliance checking to practical usage.</p>
      <p>We take a step in this direction by using Semantics of Business Vocabularies and
Rules (SBVR) to model vocabularies of regulations and operational specifics of
enterprises. We also propose to map the concepts from structured SBVR-based vocabularies
of regulations and operational specifics using semantic similarity measures.</p>
      <p>The paper is arranged as follows. In Section 2, we review several works in
formal compliance checking with regards if and how they map concepts from regulations
and operational specifics of enterprise and enlist our observations. Based on our
observations, we propose the use of SBVR-based vocabularies and semantic similarity
measures in Section 3 to map these conceptual realms. Section 4 concludes the paper.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Related Work and Motivation</title>
      <p>
        Several formal compliance checking approaches have been presented in literature. These
approaches treat business process (BP) models as the de-facto representation of
operational specifics of enterprise and check BP models for compliance against regulations.
Our specific aim in presenting the related work is to show how these approaches map
concepts from regulations with concepts from BP models. We consider five
representative formal compliance checking approaches, namely defeasible logic-based [
        <xref ref-type="bibr" rid="ref9">9, 17, 18</xref>
        ],
Petri-net based [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], compliance rule graph-based [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8, 19</xref>
        ], extended BP modeling
notation (BPMN) query and linear temporal logic (LTL)-based [
        <xref ref-type="bibr" rid="ref3">3, 20, 21</xref>
        ], and Business
Property Specification Language (BPSL) and LTL-based approaches [22, 23]. Table 1
illustrates these approaches in two columns. First column shows how each approach
maps labels/phrases from regulations to labels/phrases from approach-specific
representation of BP models and second column notes formalism in that approach. In the
following, we briefly elaborate the formal compliance checking approaches with
regards mapping between labels/phrases row by row from Table 1.
      </p>
      <p>
        First row from Table 1 shows defeasible logic-based approach for checking
compliance of BP models against regulations [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Regulations are modeled in Formal Contract
Language (FCL) which is a combination of efficient non-monotonic defeasible logic
and deontic logic of violations. First row shows a formulation of a regulation the
creation and approval of purchase requests must be undertaken by two separate purchase
officers. Labels CreatePR and ApprovedPR from FCL expression match with Create
Purchase Request and Approve Purchase Request activities from BP model
respectively. Label PurchaseOfficer from FCL expression maps to Purchaser from BP model.
It is evident that this mapping is presumed to exist implicitly in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. SBVR-based
transformation of business rules to FCL expressions is suggested in [18] and semantic
annotations of BP models in [17], but a structured terminological mapping of concepts is
yet not explored.
      </p>
      <p>Second row from Table 1 shows an approach in which an event log describing the
observed operational behavior is aligned with a Petri-net pattern that formalizes a
regulation. From the regulation shown in the second row of Table 1, phrases a discount of
Regulation: “A discount of 10% is granted if the customer is a gold customer; 5% are granted if
the customer is a silver customer.”
Regulation: “For paym ent runs with amount
beyond euro 10,000, the payment list has
to be signed before being transferred to the
bank and has to be led afterwards for later
audits.” +
Event “payment list A is transferred to the
bank”
Rule 1: Before opening an account,
customer information must be
obtained and verified.</p>
      <p> 
Rule 2: Whenever a customer
requests to open a deposit
account, customer information
must be  recorded before
opening the account.</p>
      <p>Compliance
Rule/Operati</p>
      <p>onal
Formalism</p>
      <p>Formal
Contract
Language
based on
Defeasible</p>
      <p>Logics;
Operational
Specifics as a</p>
      <p>Business
Process Model
Rules as
Petrinet Patterns,</p>
      <p>Operations
from the Event</p>
      <p>Log
Rules in terms
of Compliance
Rule Graph;
Operations in
terms of Events</p>
      <p>Rules in
Business
Process
Modeling</p>
      <p>Notation
(BPMN) Query
(BPMN-Q), later
in Temporal</p>
      <p>Logic;
operational
specifics in
terms of BPMN</p>
      <p>
        Models
10% is granted if the customer is a gold customer and 5% are granted if the customer
is a silver customer are mapped to phrases grant 10% gold and grant 5% silver. No
explicit terminological mapping exists in this approach [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>
        Third row from Table 1 shows an approach where events from operational event
trace are checked against graph-based compliance rule language called compliance rule
graph that formalizes a regulation. Phrases payment runs, list has to be signed,
transferred to the bank from the regulation are presumed to match with similarly named
events and are mapped to labels PR, SL, and TB respectively in the compliance rule
graphs. No explicit terminological mapping has been suggested in [19] from which this
example is taken or other publications from same authors [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ].
      </p>
      <p>
        Fourth row from Table 1 shows an example from [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. It uses BPMN-Q which is
a visual language based on BPMN used to query BP models by matching a process
graph to a query graph. Visual queries labelled Rule 1 and Rule 2 in the middle indicate
BPMN-Q queries adapted to expressing the regulation on left. Interestingly, the
concepts from BPMN-Q representation of the regulation match with the BP model shown
by process graph on the right. This is to be expected since BPMN-Q visual queries are
based on corresponding BP models. Yet, translation of regulations to BPMN-Q queries
does not preserve same concepts, for instance, phrase customer information must be
obtained is mapped to phrase Obtain Customer Info. Other publications by the same
authors [20,21] similarly do not express the need for explicit mapping and presume that
terminological mapping from regulation statements to BPMN-Q queries exists.
      </p>
      <p>Finally, fifth row from Table 1 shows an example from [22]. BP models expressed in
the Business Process Execution Language are transformed into Pi calculus and then into
Finite State Machines. Compliance rules captured in the graphical BPSL are translated
into LTL. This way, process models can be verified against these compliance rules by
means of model checking technology. The example shows that BPSL formulation of
labels RecordCustomerInfo and VerifyCustomerId map to BP labels RecordAccountInfo
and VerifyCustomerIdentity respectively. This approach too does not consider an
explicit terminological mapping and with several transformations between specifications,
lack of explicit mapping is likely to be problematic.</p>
      <p>Table 1 essentially shows that most formal compliance checking approaches assume
that labels/phrases from regulation statements map to labels/phrases used in various
regulation and BP specification languages. There are approaches that recognize the need
for explicit mapping between the concepts such as [16] and use word databases which
consider co-occurrent words and synonyms of an activity name from the BP models.
However, this approach lacks formal compliance checking as in other approaches
enumerated so far. Considerable research has been done on semantic similarity of texts
outside the context of regulatory compliance. An approach in [24] uses information content
of texts to yield similarity judgements that correlate more closely with human
assessments than other measures. Since rules and activities are short length pieces of text, it is
possible to use method described in [25], which combines corpus- and knowledge-based
similarity measures targeted at matching short length pieces of texts more accurately.</p>
      <p>Industry models of operational specifics, whether they are BPMN-based BP models
or enterprise data, are generally extremely large. Texts of regulations such as
SarbanesOxley (SOX), Foreign Account Tax Compliance Act (FATCA), BASEL-III,
DoddFrank and various anti money laundering regulations like Know Your Customer (KYC),
etc., are similarly large with several interdependent regulations. From semantic
similarity point of view, specific and short length pieces of texts need to be matched. Without
such an explicit terminological mapping between these two sets of concepts, it is
difficult to practically apply formal compliance checking approaches. In the next section,
we sketch our proposed approach in this direction.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Vocabularies and Semantic Similarity</title>
      <p>Our approach for mapping concepts from regulations and operational specifics is
illustrated in Figure 1. VocabularyReg and Terminological DictionaryOperations indicate
SBVR vocabularies of regulations and operational specifics respectively. Operational
specifics may be present in any BP modeling form or as enterprise data. The concepts
from individual vocabularies VocabularyReg and Terminological DictionaryOperations are
mapped using semantic similarity measures. By expressing these concepts with a
predetermined set of synonyms for each pair of concepts from both VocabularyReg and
Terminological DictionaryOperations, it is possible to express compliance checking
uniformly using a given formalism. We briefly describe next how SBVR can be used to
model aforementioned vocabularies.</p>
      <sec id="sec-3-1">
        <title>Regula'on   Text  </title>
        <p>VocabularyReg </p>
        <p>Formal   Terminological  
Representa'on   Dic'onaryopera'ons </p>
      </sec>
      <sec id="sec-3-2">
        <title>Opera'onal  </title>
        <p>Specifics  </p>
      </sec>
      <sec id="sec-3-3">
        <title>BPMN  </title>
        <p>Models  
Petri  Net  
Models  
Other  </p>
      </sec>
      <sec id="sec-3-4">
        <title>Enterprise   Data  </title>
      </sec>
      <sec id="sec-3-5">
        <title>Conceptual   Mapping  based   on  Seman'c   Similarity  </title>
        <p>Modeling Concept Vocabularies SBVR vocabularies for regulations and operations
can be defined in terms of four sections. First, vocabulary to capture the business
context is created, consisting of the semantic community and sub-communities owning the
regulation and to which the regulation applies. Each semantic community is unified by
shared understanding of an area, i.e., body of shared meanings and a body of shared
guidance containing business rules. These concepts are shown as Business Vocabulary
in SBVR metamodel in Figure 2.</p>
        <p>Second, the body of concepts is modeled by focusing on key terms in regulatory
rules. Concepts referred in the rule are modeled as noun concepts. A general concept is
defined for an entity that denotes a category. Specific details about an entity are captured
as characteristics. Verb concepts capture behavior in which noun concepts play a role.
Binary verb concepts capture relations between two concepts. Characteristics are unary
verb concepts. The SBVR metamodel for modeling regulation body of concepts are
shown as Meaning and Representation Vocabulary in Figure 2.</p>
        <p>Third, we build the body of guidance using policies laid down in the regulation. This
includes logical formulation of each policy (an obligation formulation for obligatory
rules) based on logical operations such as conjunctions, implications and negation. This
is shown in Business Rules Vocabulary in Figure 2.</p>
        <p>Fourth and lastly, we model the terminological dictionary that contains various
representations used by a semantic community for its concepts and rules defined above.
These consist of designations or alternate names for various concepts, definitions for
concepts and natural language statements for policies stated in the regulation. We also
use the terminological dictionary to capture the vocabulary used by the enterprise in its
business processes. Each activity in the process becomes a verb concept wording in the
terminological dictionary. SBVR concepts for modeling terminological variations are
shown as Terminological Dictionary in Figure 2.</p>
        <p>Mapping Concepts by Similarity Once the vocabularies of concepts from regulations
and BP models are available, we can use similarity measures as in [16, 24, 25]. Note
that the SBVR-based vocabularies provide a structured corpus where it is possible to
encode domain knowledge including interpretations of regulations by various
stakeholders [14]. The intended outcome of using vocabularies of regulations and BP
models and similarity measures is that unlike approaches illustrated in Table 1, an explicit
mapping between concepts of regulations and BP models will be achieved.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Conclusion</title>
      <p>We illustrated several formal compliance checking approaches that assume a
terminological mapping to exist between concepts of regulations and BP models when checking
BP models for compliance against regulations. Structured vocabularies with semantic
similarity between concepts would be needed when checking compliance of large BP
models in industry against extensive regulations like BASEL-III, Dodd-Frank, FATCA,
and various geography-specific KYC regulations. We plan to create an explicit mapping
between regulations and BP models concept for which we briefly described how SBVR
and semantic similarity measures can be used.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>French</given-names>
            <surname>Caldwell</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.A.W.</surname>
          </string-name>
          :
          <article-title>Magic quadrant for enterprise governance, risk and compliance platforms (Gartner) (</article-title>
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>English</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hammond</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Cost of compliance 2014 (Thomson Reuters Accelus) (</article-title>
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Awad</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Decker</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weske</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Efficient compliance checking using BPMN-Q and temporal logic</article-title>
          . In Dumas,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Reichert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Shan</surname>
          </string-name>
          , M., eds.: Business Process Management, 6th International Conference, BPM 2008, Milan, Italy, September 2-
          <issue>4</issue>
          ,
          <year>2008</year>
          . Proceedings. Volume
          <volume>5240</volume>
          of Lecture Notes in Computer Science., Springer (
          <year>2008</year>
          )
          <fpage>326</fpage>
          -
          <lpage>341</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Becker</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ahrendt</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Coners</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weiß</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Winkelmann</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Business rule based extension of a semantic process modeling language for managing business process compliance in the financial sector</article-title>
          . In Fähnrich,
          <string-name>
            <given-names>K.</given-names>
            ,
            <surname>Franczyk</surname>
          </string-name>
          , B., eds.:
          <article-title>Informatik 2010</article-title>
          .
          <article-title>Volume 175 of LNI</article-title>
          .,
          <source>GI</source>
          (
          <year>2010</year>
          )
          <fpage>201</fpage>
          -
          <lpage>206</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>El</given-names>
            <surname>Kharbili</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Stein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Markovic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            ,
            <surname>Pulvermüller</surname>
          </string-name>
          , E.:
          <article-title>Towards a framework for semantic business process compliance management</article-title>
          .
          <source>In: The Impact of Governance, Risk, and Compliance on Information Systems (GRCIS)</source>
          .
          <source>Volume 339 of CEUR Workshop Proceedings</source>
          ., Montpellier,
          <source>France (June 17</source>
          <year>2008</year>
          )
          <fpage>1</fpage>
          -
          <lpage>15</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Hashmi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Governatori</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wynn</surname>
          </string-name>
          , M.T.:
          <article-title>Normative requirements for business process compliance</article-title>
          . In Davis,
          <string-name>
            <given-names>J.G.</given-names>
            ,
            <surname>Demirkan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Motahari-Nezhad</surname>
          </string-name>
          , H.R., eds.:
          <source>Service Research and Innovation. Volume 177 of Lecture Notes in Business Information Processing.</source>
          , Springer (
          <year>2013</year>
          )
          <fpage>100</fpage>
          -
          <lpage>116</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Knuplesch</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reichert</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ly</surname>
            ,
            <given-names>L.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rinderle-Ma</surname>
          </string-name>
          , S.:
          <article-title>Visual modeling of business process compliance rules with the support of multiple perspectives</article-title>
          . In Ng, W.,
          <string-name>
            <surname>Storey</surname>
            ,
            <given-names>V.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Trujillo</surname>
          </string-name>
          , J., eds.: Conceptual Modeling - 32th International Conference, ER 2013,
          <article-title>Hong-</article-title>
          <string-name>
            <surname>Kong</surname>
          </string-name>
          , China,
          <source>November 11-13</source>
          ,
          <year>2013</year>
          . Proceedings. Volume
          <volume>8217</volume>
          of Lecture Notes in Computer Science., Springer (
          <year>2013</year>
          )
          <fpage>106</fpage>
          -
          <lpage>120</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Ly</surname>
            ,
            <given-names>L.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Knuplesch</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          , Rinderle-Ma,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Göser</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            ,
            <surname>Pfeifer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Reichert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Dadam</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.</surname>
          </string-name>
          :
          <article-title>Seaflows toolset - compliance verification made easy for process-aware information systems</article-title>
          . In Soffer, P.,
          <string-name>
            <surname>Proper</surname>
          </string-name>
          , E., eds.
          <source>: Information Systems Evolution - CAiSE Forum</source>
          <year>2010</year>
          , Hammamet, Tunisia, June 7-9,
          <year>2010</year>
          ,
          <source>Selected Extended Papers. Volume 72 of Lecture Notes in Business Information Processing.</source>
          , Springer (
          <year>2010</year>
          )
          <fpage>76</fpage>
          -
          <lpage>91</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Sadiq</surname>
            ,
            <given-names>S.W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Governatori</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Namiri</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Modeling control objectives for business process compliance</article-title>
          . In Alonso, G.,
          <string-name>
            <surname>Dadam</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosemann</surname>
          </string-name>
          , M., eds.: Business Process Management, 5th International Conference, BPM 2007, Brisbane, Australia,
          <source>September 24-28</source>
          ,
          <year>2007</year>
          , Proceedings. Volume
          <volume>4714</volume>
          of Lecture Notes in Computer Science., Springer (
          <year>2007</year>
          )
          <fpage>149</fpage>
          -
          <lpage>164</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Antoniou</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bikakis</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dimaresis</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Genetzakis</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Georgalis</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Governatori</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karouzaki</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kazepis</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kosmadakis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kritsotakis</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lilis</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Papadogiannakis</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pediaditis</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Terzakis</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Theodosaki</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zeginis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Proof explanation for a nonmonotonic semantic web rules language</article-title>
          .
          <source>Data &amp; Knowledge Engineering</source>
          <volume>64</volume>
          (
          <issue>3</issue>
          ) (
          <year>2008</year>
          )
          <fpage>662</fpage>
          -
          <lpage>687</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Ramezani</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fahland</surname>
            , D., van der Aalst,
            <given-names>W.M.P.</given-names>
          </string-name>
          :
          <article-title>Where did I misbehave? diagnostic information in compliance checking</article-title>
          . In Barros,
          <string-name>
            <given-names>A.P.</given-names>
            ,
            <surname>Gal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Kindler</surname>
          </string-name>
          , E., eds.: Business Process Management - 10th
          <source>International Conference, BPM 2012</source>
          , Tallinn, Estonia, September 3-
          <issue>6</issue>
          ,
          <year>2012</year>
          . Proceedings. Volume
          <volume>7481</volume>
          of Lecture Notes in Computer Science., Springer (
          <year>2012</year>
          )
          <fpage>262</fpage>
          -
          <lpage>278</lpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>