Information Technology Reference
In-Depth Information
knowledge is required to decide about consistency of such requirements and introduced
an LTL encoding for compliance rules and domain knowledge. This was used to gener-
ated traces, which are analyzed for inconsistencies. Finally, we proposed an approach
to the synthesis of process templates that goes beyond existing work on process mining
by focusing on data dependencies of activity execution. We also discussed the analysis
of generated templates with respect to semantical errors.
In our approach, we addressed control- and data-flow aspects of compliance rules, in
contrast to similar approaches that focus on control-flow aspects only. The considera-
tion of data-flow aspects comes with new challenges which we addressed in this paper
by introducing correctness criteria for the set of generated traces. We illustrate that data
dependencies may show rather interactions that are hard to handle at the first place. As
a consequence, our approach is iterative - the required knowledge is built incremen-
tally each time constraints are under-specified. In future work, we want to consider
constraints on role resolution for generating process templates.
References
1. Sarbanes-Oxley Act of 2002. US Public Law 107-204 (2002)
2. van der Aalst, W.M.P., Pesic, M., Song, M.: Beyond process mining: From the past to present
and future. In: Pernici, B. (ed.) CAiSE 2010. LNCS, vol. 6051, pp. 38-52. Springer, Heidel-
berg (2010)
3. van der Aalst, W.M.P., Reijers, H.A., Weijters, A.J.M.M., van Dongen, B.F., de Medeiros,
A.K.A., Song, M., Verbeek, H.M.W.E.: Business process mining: An industrial application.
Inf. Syst. 32(5), 713-732 (2007)
4. van der Aalst, W.M.P., Weijters, T., Maruster, L.: Workflow mining: Discovering process
models from event logs. IEEE Trans. Knowl. Data Eng. 16(9), 1128-1142 (2004)
5. Agrawal, R., Gunopulos, D., Leymann, F.: Mining process models from workflow logs. In:
Schek, H.-J., Saltor, F., Ramos, I., Alonso, G. (eds.) EDBT 1998. LNCS, vol. 1377, pp. 469-
483. Springer, Heidelberg (1998)
6. Awad, A., Weidlich, M., Weske, M.: Visually specifying compliance rules and explaining
their violations for business processes. J. Vis. Lang. Comput. 22(1), 30-55 (2011)
7. Clarke, E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press, Cambridge (1999)
8. Commission, F.S.: Guidelines on anti-money laundering & counter-financing of terrorism
(2007)
9. Ellson, J., Gansner, E.R., Koutsofios, E., North, S.C., Woodhull, G.: Graphviz - open source
graph drawing tools. In: Graph Drawing, pp. 483-484 (2001)
10. F orster, A., Engels, G., Schattkowsky, T., Van Der Straeten, R.: Verification of Business
Process Quality Constraints Based on VisualProcess Patterns. In: TASE, pp. 197-208. IEEE
Computer Society Press, Los Alamitos (2007)
11. Goedertier, S., Vanthienen, J.: Compliant and Flexible Business Processes with Business
Rules. In: BPMDS. CEUR Workshop Proceedings. CEUR-WS.org, vol. 236 (2006)
12. Goedertier, S., Vanthienen, J.: Designing Compliant Business Processes with Obligations
and Permissions. In: Eder, J., Dustdar, S. (eds.) BPM Workshops 2006. LNCS, vol. 4103, pp.
5-14. Springer, Heidelberg (2006)
13. Lu, R., Sadiq, S.K., Governatori, G.: Compliance Aware Business Process Design. In:
ter Hofstede, A.H.M., Benatallah, B., Paik, H.-Y. (eds.) BPM Workshops 2007. LNCS,
vol. 4928, pp. 120-131. Springer, Heidelberg (2008)
Search WWH ::




Custom Search