Skip to main content

Detecting Data-model-oriented Anomalies in Parallel Business Process

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9659))

Abstract

Currently, most information systems are data intensive. The data models of such are posing notable influence on business processes. However, the predominance of existed process verification methods leave out the impact of data models on process models. Meanwhile, with parallel structures in business processes multiplying, business process structures are becoming increasingly intricate and large in size. A parallel structure engenders also uncertainty, and consequently increases the chances and decreases the detectability of anomalies occasioned by process and data model conflicts. In this paper, these anomalies are analyzed and classified. A data state matrix and data operation algebra is introduced to establish the relation between the parallel-process model and the data model. Then, an anomaly detection method under the divide-and-conquer framework is proposed to ensure efficiency in detecting anomalies in business processes. Both theoretical analysis and experimental results prove this method to be highly efficient and effective in detecting data model oriented anomalies.

This work was supported by Natural Science Foundation of China (No. 61170003).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Scott Ananian, C.: The static single information form. Massachusetts Institute of Technology (1999). phdananian1999static

    Google Scholar 

  2. Bhattacharya, K., Gerede, C.E., Hull, R., Liu, R., Su, J.: Towards formal analysis of artifact-centric business process models. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 288–304. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  3. Chinosi, M., Trombetta, A.: Modeling and validating BPMN diagrams, pp. 353–360 (2009)

    Google Scholar 

  4. Crampton, J.: An algebraic approach to the analysis of constrained workflow systems, pp. 61–74 (2004)

    Google Scholar 

  5. Hsu, C.-L., Wang, F.-J.: Analysing inaccurate artifact usages in workflow specifications. IET Softw. 1(5), 188–205 (2007)

    Article  Google Scholar 

  6. Johnson, R., Pearson, D., Pingali, K.: The program structure tree: Computing control regions in linear time. ACM SIGPLAN Not. 29, 171–185 (1994)

    Article  Google Scholar 

  7. Leymann, F., et al.: Production Workflow: Concepts and Techniques. Prentice-Hall, Upper Saddle River (2000)

    MATH  Google Scholar 

  8. Li, M., Li, H., Tang, L., Qiu, B.: DOPA: A data-driven and ontology-based method for Ad Hoc process awareness in web information systems. In: Aberer, K., Peng, Z., Rundensteiner, E.A., Zhang, Y., Li, X. (eds.) WISE 2006. LNCS, vol. 4255, pp. 114–125. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  9. Polyvyanyy, A., García-Bañuelos, L., Dumas, M.: Structuring acyclic process models. Inf. Syst. 37(6), 518–538 (2012)

    Article  Google Scholar 

  10. Russell, N., ter Hofstede, A.H.M., Edmond, D., van der Aalst, W.M.P.: Workflow data patterns: identification, representation and tool support. In: Delcambre, L.M.L., Kop, C., Mayr, H.C., Mylopoulos, J., Pastor, Ó. (eds.) ER 2005. LNCS, vol. 3716, pp. 353–368. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  11. Russell, N., et al.: Workflow controlflow patterns: A revised view (2006)

    Google Scholar 

  12. Sadiq, S., Orlowska, M., Sadiq, W., Foulger, C.: Data flow and validation in workflow modelling, pp. 207–214 (2004)

    Google Scholar 

  13. Sun, S.X., et al.: Formulating the data-flow perspective for business process management. Inf. Syst. Res. 17(4), 374–391 (2006)

    Article  Google Scholar 

  14. Van der Aalst, W.M.P., et al.: Case handling: a new paradigm for business process support. Data Knowl. Eng. 53(2), 129–162 (2005)

    Article  Google Scholar 

  15. van Dongen, B.F., Jansen-Vullers, M.H., Verbeek, H.M.W., van der Aalst, W.M.P.: Verification of the sap reference models using EPC reduction, state-space analysis, and invariants. Comput. Ind. 58(6), 578–601 (2007)

    Article  Google Scholar 

  16. Vanhatalo, J., Völzer, H., Koehler, J.: The refined process structure tree. Data Knowl. Eng. 68(9), 793–818 (2009)

    Article  Google Scholar 

  17. Wang, L., Li, H., Qu, Q., Zhang, H., Zhou, B.: Verifying the consistency between business process model and data model, pp. 171–174 (2009)

    Google Scholar 

  18. Wynn, M.T., et al.: Business process verification-finally a reality!. Bus. Process Manage. J. 15(1), 74–92 (2009)

    Article  MathSciNet  Google Scholar 

  19. Zhou, B., et al.: PASE: A prototype for ad-hoc process-aware information system declaratively constructing environment, pp. 473–474 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongyan Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Yin, N., Wang, S., Li, H., Fan, L. (2016). Detecting Data-model-oriented Anomalies in Parallel Business Process. In: Cui, B., Zhang, N., Xu, J., Lian, X., Liu, D. (eds) Web-Age Information Management. WAIM 2016. Lecture Notes in Computer Science(), vol 9659. Springer, Cham. https://doi.org/10.1007/978-3-319-39958-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-39958-4_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-39957-7

  • Online ISBN: 978-3-319-39958-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics