Skip to main content

Toward Resilience Assessment in Business Process Architectures

  • Conference paper
Computer Safety, Reliability, and Security (SAFECOMP 2014)

Abstract

This paper investigates options to access the resilience of business process architectures, thereby connecting the two hitherto unconnected areas of Business Process Management and Information System Resilience. The overarching goal is to provide for robust and reliable business process execution even under adverse and unexpected situations. Specifically, this paper focuses on one particular resilience indicator as a basis for assessment, namely time. This is because timeliness and time behavior of activities in business processes directly mirror effects and impacts of a changing environment on the business process. We develop an approach based on process mining to analyze the event logs generated during the execution of processes which extract probability distributions of a process’s time behavior to model the effects of occured events. A case study substantiates the applicability of the approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. van der Aalst, W.: Process Mining – Discovery, Conformance and Enhancement of Business Processes. Springer (2011)

    Google Scholar 

  2. van der Aalst, W.M., Schonenberg, M., Song, M.: Time prediction based on process mining. Information Systems 36(2), 450–475 (2011)

    Article  Google Scholar 

  3. Accorsi, R., Stocker, T., Müller, G.: On the exploitation of process mining for security audits: the process discovery case. In: Proceedings of the ACM Symposium on Applied Computing, pp. 1462–1468. ACM (2013)

    Google Scholar 

  4. Antunes, P., Mourão, H.: Resilient business process management: Framework and services. Expert Syst. Appl. 38(2), 1241–1254 (2011), http://dx.doi.org/10.1016/j.eswa.2010.05.017

    Article  Google Scholar 

  5. Atluri, V., Warner, J.: Security for workflow systems. In: Gertz, M., Jajodia, S. (eds.) Handbook of Database Security, pp. 213–230. Springer (2008)

    Google Scholar 

  6. Bruneau, M., Chang, S.E., Eguchi, R.T., Lee, G.C., O’Rourke, T.D., Reinhorn, A.M., Shinozuka, M., Tierney, K., Wallace, W.A., von Winterfeldt, D.: A framework to quantitatively assess and enhance the seismic resilience of communities. Earthquake Spectra 19(4), 733–752 (2003), http://earthquakespectra.org/doi/abs/10.1193/1.1623497

    Article  Google Scholar 

  7. Butler, B.S., Gray, P.H.: Reliability, mindfulness, and information systems. MIS Quarterly 30(2), 211–224 (2006)

    Google Scholar 

  8. Caralli, R.A., Allen, J.H., Curtis, P.D., Young, L.R.: Cert resilience management model, version 1.0 (2010), http://www.worldcat.org/oclc/668434211

  9. van Dongen, B.F., Crooy, R.A., van der Aalst, W.M.P.: Cycle time prediction: When will this case finally be finished? In: Meersman, R., Tari, Z. (eds.) OTM 2008, Part I. LNCS, vol. 5331, pp. 319–336. Springer, Heidelberg (2008), http://link.springer.com/chapter/10.1007/978-3-540-88871-0_22

    Google Scholar 

  10. Eder, J., Panagos, E., Pozewaunig, H., Rabinovich, M.: Time management in workflow systems. In: BIS 1999, pp. 265–280. Springer (1999)

    Google Scholar 

  11. Fenz, S., Neubauer, T., Accorsi, R., Koslowski, T.: FORISK: Formalizing information security risk and compliance management. In: 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), pp. 1–4. IEEE (2013)

    Google Scholar 

  12. Hollnagel, E., Woods, D.D., Leveson, N. (eds.): Resilience engineering: Concepts and precepts. Ashgate, Aldershot and England and and Burlington and VT (2006)

    Google Scholar 

  13. Koslowski, T., Zimmermann, C.: Towards a detective approach to process-centered resilience. In: Accorsi, R., Ranise, S. (eds.) STM 2013. LNCS, vol. 8203, pp. 176–190. Springer, Heidelberg (2013), http://dx.doi.org/10.1007/978-3-642-41098-7_12

    Chapter  Google Scholar 

  14. Müller, G., Koslowski, T.G., Accorsi, R.: Resilience - A new research field in business information systems? In: Abramowicz, W. (ed.) BIS Workshops 2013. LNBIP, vol. 160, pp. 3–14. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  15. Pika, A., van der Aalst, W.M.P., Fidge, C.J., ter Hofstede, A.H.M., Wynn, M.T.: Profiling event logs to configure risk indicators for process delays. In: Salinesi, C., Norrie, M.C., Pastor, Ó. (eds.) CAiSE 2013. LNCS, vol. 7908, pp. 465–481. Springer, Heidelberg (2013), http://link.springer.com/10.1007/978-3-642-38709-8_30

    Chapter  Google Scholar 

  16. Pozewaunig, H., Eder, J., Liebhart, W.: ePERT: extending PERT for workflow management system. In: ADBIS, pp. 217–224 (1997), http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.21.7538&rep=rep1&type=pdf

  17. Ramchandani, C.: Analysis of asynchronous concurrent systems by timed petri nets. Tech. rep., Massachusetts Institute of Technology, Cambridge, MA, USA (1974)

    Google Scholar 

  18. Runeson, P., Höst, M.: Guidelines for conducting and reporting case study research in software engineering. Empirical Software Engineering 14(2), 131–164 (2009), http://link.springer.com/10.1007/s10664-008-9102-8

    Article  Google Scholar 

  19. Tsai, J.P., Jennhwa Yang, S., Chang, Y.H.: Timing constraint petri nets and their application to schedulability analysis of real-time system specifications. IEEE Transactions on Software Engineering 21(1), 32–49 (1995)

    Article  Google Scholar 

  20. Wolter, K.: Resilience assessment and evaluation of computing systems. Springer, Berlin (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Zahoransky, R.M., Koslowski, T., Accorsi, R. (2014). Toward Resilience Assessment in Business Process Architectures. In: Bondavalli, A., Ceccarelli, A., Ortmeier, F. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2014. Lecture Notes in Computer Science, vol 8696. Springer, Cham. https://doi.org/10.1007/978-3-319-10557-4_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-10557-4_39

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-10556-7

  • Online ISBN: 978-3-319-10557-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics