Artifact-Centric Modeling Using BPMN

  • Niels Lohmann
  • Martin Nyolt
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7221)


BPMN offers a rich pool of language constructs to model different aspects of choreographies, interorganizational business processes and service compositions. With collaborations and choreographies, BPMN enables the modeler concentrate on the control flow and the message flow, respectively. At the same time, data flow is only treated as a subordinate extension. In contrast, recent artifact-centric approaches model processes from the point of view of the data objects that are manipulated during the process. This paper investigates to what extend BPMN is suitable to model artifact-centric processes and which extensions are required to comfortably support this modeling approach.


Access Control Business Process Data Object Goal State Service Composition 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Awad, A., Decker, G., Weske, M.: Efficient Compliance Checking Using BPMN-Q and Temporal Logic. In: Dumas, M., Reichert, M., Shan, M.-C. (eds.) BPM 2008. LNCS, vol. 5240, pp. 326–341. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  2. 2.
    Bocchi, L., Guanciale, R., Strollo, D., Tuosto, E.: BPMN Modelling of Services with Dynamically Reconfigurable Transactions. In: Maglio, P.P., Weske, M., Yang, J., Fantinato, M. (eds.) ICSOC 2010. LNCS, vol. 6470, pp. 396–410. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  3. 3.
    Decker, G., Barros, A.: Interaction Modeling Using BPMN. In: ter Hofstede, A.H.M., Benatallah, B., Paik, H.-Y. (eds.) BPM Workshops 2007. LNCS, vol. 4928, pp. 208–219. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  4. 4.
    Decker, G., Overdick, H., Weske, M.: Oryx – An Open Modeling Platform for the BPM Community. In: Dumas, M., Reichert, M., Shan, M.-C. (eds.) BPM 2008. LNCS, vol. 5240, pp. 382–385. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  5. 5.
    Decker, G., Puhlmann, F.: Extending BPMN for Modeling Complex Choreographies. In: Meersman, R., Tari, Z. (eds.) OTM 2007, Part I. LNCS, vol. 4803, pp. 24–40. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  6. 6.
    Dijkman, R.M., Dumas, M., Ouyang, C.: Semantics and analysis of business process models in BPMN. Information & Software Technology 50(12), 1281–1294 (2008)CrossRefGoogle Scholar
  7. 7.
    Gagné, D., Trudel, A.: Time-BPMN. In: CEC 2009, pp. 361–367. IEEE (2009)Google Scholar
  8. 8.
    Korherr, B., List, B.: Extending the EPC and the BPMN with business process goals and performance measures. In: ICEIS 2007, pp. 287–294 (2007)Google Scholar
  9. 9.
    Lohmann, N.: Compliance by Design for Artifact-Centric Business Processes. In: Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. LNCS, vol. 6896, pp. 99–115. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  10. 10.
    Lohmann, N., Wolf, K.: Artifact-Centric Choreographies. In: Maglio, P.P., Weske, M., Yang, J., Fantinato, M. (eds.) ICSOC 2010. LNCS, vol. 6470, pp. 32–46. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  11. 11.
    Nyolt, M.: Modellierung artefaktzentrierter Geschäftsprozesse. Bachelorarbeit, Universität Rostock, Rostock, Germany (2011), (in German)Google Scholar
  12. 12.
    Reisig, W.: Petri Nets. EATCS Monographs on Theoretical Computer Science edn. Springer (1985)Google Scholar
  13. 13.
    Rodríguez, A., Fernández-Medina, E., Piattini, M.: A BPMN extension for the modeling of security requirements in business processes. IEICE Transactions 90-D(4), 745–752 (2007)Google Scholar
  14. 14.
    Saeedi, K., Zhao, L., Sampaio, P.R.F.: Extending BPMN for supporting customer-facing service quality requirements. In: ICWS 2010, pp. 616–623. IEEE (2010)Google Scholar
  15. 15.
    Wolter, C., Schaad, A.: Modeling of Task-Based Authorization Constraints in BPMN. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 64–79. Springer, Heidelberg (2007)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Niels Lohmann
    • 1
  • Martin Nyolt
    • 1
  1. 1.Institut für InformatikUniversität RostockRostockGermany

Personalised recommendations