Advertisement

Mining the Role-Oriented Process Models Based on Genetic Algorithm

  • Weidong Zhao
  • Qinhe Lin
  • Yue Shi
  • Xiaochun Fang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7331)

Abstract

Traditional role-oriented process modeling seems to be subjective in identifying roles. To solve the problem, the similarity of activities is used in this paper. Sub-processes with high similarity are recognized as the process undertaken by a certain role. In this way, a relatively objective role identification approach is proposed, which determines the interaction between roles and establishes the role-activity diagram. Furthermore, by analyzing the interaction between roles, genetic algorithm is used to introduce multiple factors to optimize the identification. Therefore, an optimized role-oriented process modeling approach is established and an example is presented to show the feasibility of this approach.

Keywords

Process Mining Role-Activity Diagram Role Identification Genetic Algorithm 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Johnathan, E.C., Alexander, L.W.: Discovering Models of Software Processes from Event-Based Data. ACM Transactions on Software Engineering and Methodology 7, 215–249 (1998)CrossRefGoogle Scholar
  2. 2.
    van der Aalst, W.M.P., Weijters, A.J.M.M.: Process mining a research agenda. Computers in Industry 53, 231–244 (2003)CrossRefGoogle Scholar
  3. 3.
    Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (1994)Google Scholar
  4. 4.
    van der Aalst, W.M.P., Song, M.: Mining Social Networks: Uncovering Interaction Patterns in Business Processes. In: Desel, J., Pernici, B., Weske, M. (eds.) BPM 2004. LNCS, vol. 3080, pp. 244–260. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  5. 5.
    van der Aalst, W.M.P., Reijers, H.A., Song, M.: Discovering Social Networks from Event Logs. Computer Supported Cooperative Work 14, 549–593 (2005)CrossRefGoogle Scholar
  6. 6.
    Kuhlmann, M., Shohat, D., Schimpf, G.: Role mining - revealing business roles for security administration using data mining technology. In: Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, pp. 179–186. IEEE Press, New York (2003)CrossRefGoogle Scholar
  7. 7.
    Schlegelmilch, J., Steffens, U.: Role mining with ORCA. In: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, pp. 168–176. IEEE Press, New York (2005)CrossRefGoogle Scholar
  8. 8.
    Phalp, K.T., Henderson, P., Walters, R.J., Abeysinghe, G.: RolEnact: role-based enactable models of business processes. Information and Software Technology 40(3), 123–133 (1998)CrossRefGoogle Scholar
  9. 9.
    Zhao, W., Dai, W., Wang, A., Fang, X.: Role-activity Diagrams Modeling Based on Workflow Mining. In: 2009 World Congress on Computer Science and Information Engineering, pp. 301–305. IEEE Press, New York (2009)CrossRefGoogle Scholar
  10. 10.
    van der Aalst, W.M.P., Weijters, T., Maruster, L.: Workflow Mining: Discovering Process Models from Event Logs. IEEE Transactions on Knowledge and Data Engineering 16(9), 1128–1142 (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Weidong Zhao
    • 1
  • Qinhe Lin
    • 1
  • Yue Shi
    • 1
  • Xiaochun Fang
    • 1
  1. 1.Software SchoolFudan UniversityShanghaiChina

Personalised recommendations