Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-3-642-05148-7_4guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Resolution of Compliance Violation in Business Process Models: A Planning-Based Approach

Published: 07 November 2009 Publication History

Abstract

Keeping business processes compliant with regulations is of major importance for companies. Considering the huge number of models each company possesses, automation of compliance maintenance becomes essential. Therefore, many approaches focused on automation of various aspects of compliance problem, e.g., compliance verification. Such techniques allow localizing the problem within the process model. However, they are not able to resolve the violations. In this paper we address the problem of (semi) automatic violation resolution, addressing violations of execution ordering compliance rules. We build upon previous work in categorizing the violations into types and employ automated planning to ensure compliance. The problem of choosing the concrete resolution strategy is addressed by the concept of context.

References

[1]
Sarbanes-Oxley Act of 2002. Public Law 107-204 (116 Statute 745), United States Senate and House of Representatives in Congress (2002).
[2]
Awad, A., Decker, G., Weske, M.: Efficient Compliance Checking Using BPMN-Q and Temporal Logic. In: Dumas, M., Reichert, M., Shan, M.-C. (eds.) BPM 2008. LNCS, vol. 5240, pp. 326-341. Springer, Heidelberg (2008).
[3]
Awad, A., Smirnov, S., Weske, M.: Towards Resolving Compliance Violations in Business Process Models. In: GRCIS, vol. 459. CEUR-WS.org (2009).
[4]
Awad, A., Weske, M.: Visualization of compliance violation in business process models. In: 5th Workshop on Business Process Intelligence BPI 2009. Springer, Heidelberg (to appear, 2009).
[5]
Decker, G., Kopp, O., Leymann, F., Pfitzner, K., Weske, M.: Modeling Service Choreographies Using BPMN and BPEL4Chor. In: Bellahsène, Z., Léonard, M. (eds.) CAiSE 2008. LNCS, vol. 5074, pp. 79-93. Springer, Heidelberg (2008).
[6]
Förster, A., Engels, G., Schattkowsky, T., Van Der Straeten, R.: Verification of Business Process Quality Constraints Based on VisualProcess Patterns. In: TASE, pp. 197-208. IEEE Computer Society, Los Alamitos (2007).
[7]
Ghose, A., Koliadis, G.: Auditing Business Process Compliance. In: Krämer, B.J., Lin, K.-J., Narasimhan, P. (eds.) ICSOC 2007. LNCS, vol. 4749, pp. 169-180. Springer, Heidelberg (2007).
[8]
Goedertier, S., Vanthienen, J.: Compliant and Flexible Business Processes with Business Rules. In: BPMDS. CEUR Workshop Proceedings, vol. 236. CEUR-WS.org (2006).
[9]
Goedertier, S., Vanthienen, J.: Designing Compliant Business Processes from Obligations and Permissions. In: Eder, J., Dustdar, S. (eds.) BPD 2006. LNCS, vol. 4103, pp. 5-14. Springer, Heidelberg (2006).
[10]
Governatori, G., Milosevic, Z.: Dealing with Contract Violations: Formalism and Domain Specific Language. In: EDOC, pp. 46-57. IEEE Computer Society Press, Los Alamitos (2005).
[11]
Governatori, G., Milosevic, Z., Sadiq, S.: Compliance Checking between Business Processes and Business Contracts. In: EDOC, pp. 221-232. IEEE Computer Society Press, Los Alamitos (2006).
[12]
Hartman, T.: The Cost of Being Public in the Era of Sarbanes-Oxley. Foley&Lardner, Chicago, Ill (2006).
[13]
Lu, R., Sadiq, S., Governatori, G.: Compliance Aware Business Process Design. In: ter Hofstede, A.H.M., Benatallah, B., Paik, H.-Y. (eds.) BPM Workshops 2007. LNCS, vol. 4928, pp. 120-131. Springer, Heidelberg (2008).
[14]
Lu, R., Sadiq, S., Governatori, G.: Measurement of Compliance Distance in Business Processes. Inf. Sys. Manag. 25(4), 344-355 (2008).
[15]
Lui, Y., Müller, S., Xu, K.: A Static Compliance-checking Framework for Business Process Models. IBM Systems Journal 46(2), 335-362 (2007).
[16]
Ly, L.T., Göser, K., Rinderle-Ma, S., Dadam, P.: Compliance of Semantic Constraints - A Requirements Analysis for Process Management Systems. In: GRCIS, vol. 339. CEUR-WS.org (2008).
[17]
Marconi, A., Pistore, M., Traverso, P.: Automated Composition ofWeb Services: the ASTRO Approach. IEEE Data Eng. Bull. 31(3), 23-26 (2008).
[18]
Meyer, H., Weske, M.: Automated Service Composition Using Heuristic Search. In: Dustdar, S., Fiadeiro, J.L., Sheth, A.P. (eds.) BPM 2006. LNCS, vol. 4102, pp. 81-96. Springer, Heidelberg (2006).
[19]
Milosevic, Z., Sadiq, S., Orlowska, M.: Translating Business Contract into Compliant Business Processes. In: EDOC, pp. 211-220. IEEE Computer Society Press, Los Alamitos (2006).
[20]
Namiri, K., Stojanovic, N.: Pattern-Based Design and Validation of Business Process Compliance. In: Meersman, R., Tari, Z. (eds.) OTM 2007, Part I. LNCS, vol. 4803, pp. 59-76. Springer, Heidelberg (2007).
[21]
Nau, D., Ghallab, M., Traverso, P.: Automated Planning: Theory & Practice. Morgan Kaufmann Publishers Inc., San Francisco (2004).
[22]
Sadiq, S., Governatori, G., Namiri, K.: Modeling Control Objectives for Business Process Compliance. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 149-164. Springer, Heidelberg (2007).
[23]
van der Aalst, W., Weijters, T., Maruster, L.: Workflow Mining: Discovering Process Models from Event Logs. IEEE Trans. on Knowl. and Data Eng. 16(9), 1128-1142 (2004).
[24]
Vanhatalo, J., Völzer, H., Koehler, J.: The Refined Process Structure Tree. In: Dumas, M., Reichert, M., Shan, M.-C. (eds.) BPM 2008. LNCS, vol. 5240, Springer, Heidelberg (2008).
[25]
Vanhatalo, J., Völzer, H., Leymann, F.: Faster and More Focused Control-Flow Analysis for Business Process Models Through SESE Decomposition. In: Krämer, B.J., Lin, K.-J., Narasimhan, P. (eds.) ICSOC 2007. LNCS, vol. 4749, pp. 43-55. Springer, Heidelberg (2007).
[26]
Weber, B., Reichert, M.: Refactoring process models in large process repositories. In: Bellahsène, Z., Léonard, M. (eds.) CAiSE 2008. LNCS, vol. 5074, pp. 124-139. Springer, Heidelberg (2008).
[27]
Yu, J., Manh, T.P.,Han, J., Jin, Y., Han, Y.,Wang, J.: Pattern Based Property Specification and Verification for Service Composition. In: Aberer, K., Peng, Z., Rundensteiner, E.A., Zhang, Y., Li, X. (eds.) WISE 2006. LNCS, vol. 4255, pp. 156-168. Springer, Heidelberg (2006).

Cited By

View all
  • (2019)Automatic Business Process Model Extension to Repair Constraint ViolationsService-Oriented Computing10.1007/978-3-030-33702-5_9(102-118)Online publication date: 28-Oct-2019
  • (2015)Model-driven regulatory complianceProceedings of the 18th International Conference on Model Driven Engineering Languages and Systems10.5555/3351736.3351788(436-445)Online publication date: 30-Sep-2015
  1. Resolution of Compliance Violation in Business Process Models: A Planning-Based Approach

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    OTM '09: Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part I
    November 2009
    789 pages
    ISBN:9783642051470
    • Editors:
    • Robert Meersman,
    • Tharam Dillon,
    • Pilar Herrero

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 07 November 2009

    Author Tags

    1. Business process modeling
    2. compliance checking
    3. process model parsing
    4. process model restructuring

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)Automatic Business Process Model Extension to Repair Constraint ViolationsService-Oriented Computing10.1007/978-3-030-33702-5_9(102-118)Online publication date: 28-Oct-2019
    • (2015)Model-driven regulatory complianceProceedings of the 18th International Conference on Model Driven Engineering Languages and Systems10.5555/3351736.3351788(436-445)Online publication date: 30-Sep-2015

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media