Advertisement

Detecting Runtime Business Process Compliance with Artifact Lifecycles

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7759)

Abstract

Detecting business process compliance in runtime is the complementary to static compliance checking in the stage of process design, and allows checking whether an execution of a business process satisfies a given constraint. In this paper, runtime compliance checking is used for artifact-centric business process and artifact lifecycles are treated as business constraints. Previous methods for runtime compliance checking mainly put focus on activities in business process and lose the attention for data. In this work we concentrate on both the evolution of artifacts (data) and services (activities) to identify the frontier between decidability and undecidability of the runtime compliance problem. We also provide decidable results and the implement method under regular and context-free artifact lifecycles.

Keywords

BPM artifact compliance decidability 

References

  1. 1.
    Nigam, A., Caswell, N.S.: Business artifacts: An approach to operational specification. IBM Systems Journal 42(3), 428–445 (2003)CrossRefGoogle Scholar
  2. 2.
    Bhattacharya, K., Gerede, C.E., Hull, R., Liu, R., Su, J.: Towards Formal Analysis of Artifact-Centric Business Process Models. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 288–304. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  3. 3.
    Gerede, C.E., Su, J.: Specification and Verification of Artifact Behaviors in Business Process Models. In: Krämer, B.J., Lin, K.-J., Narasimhan, P. (eds.) ICSOC 2007. LNCS, vol. 4749, pp. 181–192. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  4. 4.
    Deutsch, A., Hull, R., Patrizi, F., Vianu, V.: Automatic verification of data-centric business processes. In: International Conference on Database Theory (ICDT 2009), pp. 252–267. ACM Press (2009)Google Scholar
  5. 5.
    Rozinat, A., Jong, I., Gunther, C., Aalst, W.: Conformance Analysis of ASML’s Test Process. In: GRCIS 2009, vol. 459, pp. 1–15. CEUR-WS.org (2009)Google Scholar
  6. 6.
    Fahland, D., de Leoni, M., van Dongen, B.F., van der Aalst, W.M.P.: Conformance Checking of Interacting Processes with Overlapping Instances. In: Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. LNCS, vol. 6896, pp. 345–361. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  7. 7.
    Maggi, F.M., Montali, M., Westergaard, M., van der Aalst, W.M.P.: Monitoring Business Constraints with Linear Temporal Logic: An Approach Based on Colored Automata. In: Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. LNCS, vol. 6896, pp. 132–147. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  8. 8.
    Ying, W., Guohua, L., Zhen, H., et al.: The Research on Validity of Artifact in BPM. In: International Conference on Business Management and Electronic Information, pp. 15–18. IEEE, Piscataway (2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Qi He
    • 1
    • 2
  1. 1.School of Computer ScienceFudan UniversityChina
  2. 2.College of Information TechnologyShanghai Ocean UniversityChina

Personalised recommendations