{"id":"https://openalex.org/W4236744023","doi":"https://doi.org/10.1109/icws.2004.1314721","title":"Protocol-based business process modeling and enactment","display_name":"Protocol-based business process modeling and enactment","publication_year":2004,"publication_date":"2004-01-01","ids":{"openalex":"https://openalex.org/W4236744023","doi":"https://doi.org/10.1109/icws.2004.1314721"},"language":"en","primary_location":{"id":"doi:10.1109/icws.2004.1314721","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icws.2004.1314721","pdf_url":null,"source":{"id":"https://openalex.org/S4363608934","display_name":"Proceedings. IEEE International Conference on Web Services, 2004.","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. IEEE International Conference on Web Services, 2004.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113647041","display_name":"Nirmit Desai","orcid":null},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"N. Desai","raw_affiliation_strings":["Department of Computer Science, North Carolina State University, Raleigh, NC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020679327","display_name":"Munindar P. Singh","orcid":"https://orcid.org/0000-0003-3599-3893"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"M.P. Singh","raw_affiliation_strings":["Department of Computer Science, North Carolina State University, Raleigh, NC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5113647041"],"corresponding_institution_ids":["https://openalex.org/I137902535"],"apc_list":null,"apc_paid":null,"fwci":6.5651,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.97151899,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"35","last_page":"42"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7332780361175537},{"id":"https://openalex.org/keywords/business-process-model-and-notation","display_name":"Business Process Model and Notation","score":0.7076418995857239},{"id":"https://openalex.org/keywords/business-process-modeling","display_name":"Business process modeling","score":0.7019188404083252},{"id":"https://openalex.org/keywords/artifact-centric-business-process-model","display_name":"Artifact-centric business process model","score":0.6746996641159058},{"id":"https://openalex.org/keywords/business-process","display_name":"Business process","score":0.6487013101577759},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.636820375919342},{"id":"https://openalex.org/keywords/business-rule","display_name":"Business rule","score":0.6322417855262756},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.5256679654121399},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5163008570671082},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.5147081017494202},{"id":"https://openalex.org/keywords/business-analysis","display_name":"Business analysis","score":0.46398308873176575},{"id":"https://openalex.org/keywords/business-logic","display_name":"Business logic","score":0.445640504360199},{"id":"https://openalex.org/keywords/business-process-management","display_name":"Business process management","score":0.4277638792991638},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.42770904302597046},{"id":"https://openalex.org/keywords/business-domain","display_name":"Business domain","score":0.4215543866157532},{"id":"https://openalex.org/keywords/business-process-discovery","display_name":"Business process discovery","score":0.41405755281448364},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.38185036182403564},{"id":"https://openalex.org/keywords/business-model","display_name":"Business model","score":0.36400866508483887},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19097232818603516},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.19038408994674683},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.17343619465827942},{"id":"https://openalex.org/keywords/work-in-process","display_name":"Work in process","score":0.11558917164802551},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11527293920516968},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.0773169994354248}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7332780361175537},{"id":"https://openalex.org/C179299601","wikidata":"https://www.wikidata.org/wiki/Q1017605","display_name":"Business Process Model and Notation","level":5,"score":0.7076418995857239},{"id":"https://openalex.org/C207505557","wikidata":"https://www.wikidata.org/wiki/Q4374012","display_name":"Business process modeling","level":4,"score":0.7019188404083252},{"id":"https://openalex.org/C162754035","wikidata":"https://www.wikidata.org/wiki/Q17006331","display_name":"Artifact-centric business process model","level":5,"score":0.6746996641159058},{"id":"https://openalex.org/C85345410","wikidata":"https://www.wikidata.org/wiki/Q851587","display_name":"Business process","level":3,"score":0.6487013101577759},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.636820375919342},{"id":"https://openalex.org/C11066294","wikidata":"https://www.wikidata.org/wiki/Q1518244","display_name":"Business rule","level":4,"score":0.6322417855262756},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.5256679654121399},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5163008570671082},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.5147081017494202},{"id":"https://openalex.org/C189076506","wikidata":"https://www.wikidata.org/wiki/Q1518232","display_name":"Business analysis","level":3,"score":0.46398308873176575},{"id":"https://openalex.org/C146222976","wikidata":"https://www.wikidata.org/wiki/Q1204997","display_name":"Business logic","level":2,"score":0.445640504360199},{"id":"https://openalex.org/C80309976","wikidata":"https://www.wikidata.org/wiki/Q7007379","display_name":"Business process management","level":4,"score":0.4277638792991638},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.42770904302597046},{"id":"https://openalex.org/C193669473","wikidata":"https://www.wikidata.org/wiki/Q5001867","display_name":"Business domain","level":5,"score":0.4215543866157532},{"id":"https://openalex.org/C93453677","wikidata":"https://www.wikidata.org/wiki/Q1017580","display_name":"Business process discovery","level":5,"score":0.41405755281448364},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.38185036182403564},{"id":"https://openalex.org/C4216890","wikidata":"https://www.wikidata.org/wiki/Q815823","display_name":"Business model","level":2,"score":0.36400866508483887},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19097232818603516},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.19038408994674683},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.17343619465827942},{"id":"https://openalex.org/C174998907","wikidata":"https://www.wikidata.org/wiki/Q357662","display_name":"Work in process","level":2,"score":0.11558917164802551},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11527293920516968},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0773169994354248},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icws.2004.1314721","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icws.2004.1314721","pdf_url":null,"source":{"id":"https://openalex.org/S4363608934","display_name":"Proceedings. IEEE International Conference on Web Services, 2004.","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. IEEE International Conference on Web Services, 2004.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.46000000834465027,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W117998471","https://openalex.org/W1479764148","https://openalex.org/W1603088196","https://openalex.org/W1850351066","https://openalex.org/W1996497597","https://openalex.org/W2163356393","https://openalex.org/W6638977638"],"related_works":["https://openalex.org/W93556318","https://openalex.org/W2097616329","https://openalex.org/W2479849232","https://openalex.org/W2097547132","https://openalex.org/W1964084506","https://openalex.org/W618145325","https://openalex.org/W2096807669","https://openalex.org/W1608895881","https://openalex.org/W2791290270","https://openalex.org/W3023969791"],"abstract_inverted_index":{"Business":[0],"processes":[1,58],"are":[2,59,117,139],"conventionally":[3],"modeled":[4,60],"as":[5,61,135],"monolithic":[6,93],"flows":[7,17,122,138],"that":[8,126],"capture":[9],"the":[10,31,108,156],"desired":[11],"business":[12,49,57,65,68,80,94,97,133,148],"logic.":[13],"However,":[14],"developing":[15],"process":[16,95],"is":[18],"challenging.":[19],"Because":[20],"a":[21,53,78,84,92],"flow":[22,149],"specifies":[23,70],"what":[24],"its":[25,34,73],"participants":[26],"should":[27],"do,":[28],"it":[29],"restricts":[30],"autonomy":[32],"of":[33,63,102,158],"participants,":[35],"thus":[36],"limiting":[37],"their":[38,48],"ability":[39],"to":[40,47],"exploit":[41],"opportunities":[42],"or":[43,86],"accommodate":[44],"exceptions":[45],"according":[46],"preferences.":[50],"We":[51,110],"take":[52],"dual":[54],"perspective":[55],"wherein":[56],"compositions":[62],"(instantiated)":[64],"protocols.":[66],"Each":[67],"protocol":[69,76],"interactions":[71],"among":[72],"partners;":[74],"each":[75,124],"serves":[77],"unique":[79],"purpose,":[81],"e.g.,":[82],"processing":[83],"payment":[85],"shipping":[87],"an":[88,112],"item.":[89],"Thus,":[90,151],"modularizing":[91],"via":[96],"protocols":[98,116],"allows":[99],"clear":[100],"separation":[101],"concerns":[103],"for":[104,123],"modeling":[105,160],"and":[106],"enacting":[107],"process.":[109],"develop":[111],"approach":[113,154],"in":[114],"which":[115],"compiled":[118],"into":[119],"local":[120,132],"skeletal":[121],"participant":[125],"can":[127,143],"be":[128,144],"fleshed":[129],"out":[130],"with":[131,161],"logic":[134],"needed.":[136],"Such":[137],"naturally":[140],"distributed":[141],"but":[142],"enacted":[145],"using":[146],"commercial":[147],"engines.":[150],"our":[152],"protocol-based":[153],"combines":[155],"benefit":[157],"improved":[159],"simplified":[162],"implementations.":[163]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
