Skip to main content

From Instance Spanning Models to Instance Spanning Rules

  • Conference paper
  • First Online:
Enterprise, Business-Process and Information Systems Modeling (BPMDS 2018, EMMSAD 2018)

Abstract

Instance Spanning Constraints (ISCs) allow to control the behavior of multiple business processes and their instances which is crucial in many application domains (e.g., for process synchronization). The modeling and visualization of ISCs hence constitutes an essential brick in process compliance management. Currently, no approach exists for representing a set of Instance Spanning Rules (ISRs) based on an ISC. Existing work rather focuses on visualizing ISCs at the more abstract Instance Spanning Model (ISM) level. However, the gap between the ISM and the ISR level must be bridged in order to enable the enactment of an ISC at process level. Hence, this paper collects requirements for the implementation of ISRs through an ISM, e.g., by specification of data elements. Based on the requirements an existing visual modeling language is tailored towards the modeling of ISRs and the corresponding XML specifications are provided. Both, visual modeling and XML representation are prototypically implemented and illustrated by means of a set of use cases. Finally, an algorithm for deriving the common ISM of a set of ISRs is introduced and evaluated based on a given test set.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://gruppe.wst.univie.ac.at/projects/crisp/index.php?t=visualization.

  2. 2.

    ISM schema: http://gruppe.wst.univie.ac.at/projects/crisp/index.php?t=visualization.

  3. 3.

    ISR visualization: http://gruppe.wst.univie.ac.at/~gallm6/ISC_Viz/ISR/.

  4. 4.

    ISM visualization: http://gruppe.wst.univie.ac.at/~gallm6/ISC_Viz/ISM/.

  5. 5.

    http://gruppe.wst.univie.ac.at/projects/crisp/index.php?t=visualization.

  6. 6.

    http://gruppe.wst.univie.ac.at/projects/crisp/index.php?t=visualization.

References

  1. Awad, A., Weidlich, M., Weske, M.: Visually specifying compliance rules and explaining their violations for business processes. J. Vis. Lang. Comput. 22(1), 30–55 (2011)

    Article  Google Scholar 

  2. Awad, A.: BPMN-Q: a language to query business processes. In: Proceedings of EMISA 2007, pp. 115–128 (2007)

    Google Scholar 

  3. Becker, J., Ahrendt, C., Coners, A., Weiß, B., Winkelmann, A.: Business rule based extension of a semantic process modeling language for managing business process compliance in the financial sector. In: GI Jahrestagung (1), pp. 201–206 (2010)

    Google Scholar 

  4. Fdhila, W., Gall, M., Rinderle-Ma, S., Mangler, J., Indiono, C.: Classification and formalization of instance-spanning constraints in process-driven applications. In: La Rosa, M., Loos, P., Pastor, O. (eds.) BPM 2016. LNCS, vol. 9850, pp. 348–364. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45348-4_20

    Chapter  Google Scholar 

  5. Gall, M., Rinderle-Ma, S.: Visual modeling of instance-spanning constraints in process-aware information systems. In: Advanced Information Systems Engineering, pp. 597–595, May 2017

    Google Scholar 

  6. Ghose, A., Koliadis, G.: Auditing business process compliance. In: Krämer, B.J., Lin, K.-J., Narasimhan, P. (eds.) ICSOC 2007. LNCS, vol. 4749, pp. 169–180. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74974-5_14

    Chapter  Google Scholar 

  7. Heinlein, C.: Workflow and process synchronization with interaction expressions and graphs. In: International Conference on Data Engineering, pp. 243–252 (2001)

    Google Scholar 

  8. Indiono, C., Mangler, J., Fdhila, W., Rinderle-Ma, S.: Rule-based runtime monitoring of instance-spanning constraints in process-aware information systems. In: Debruyne, C., Panetto, H., Meersman, R., Dillon, T., Kühn, E., O’Sullivan, D., Ardagna, C.A. (eds.) OTM 2016. LNCS, vol. 10033, pp. 381–399. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-48472-3_22

    Chapter  Google Scholar 

  9. Leitner, M., Mangler, J., Rinderle-Ma, S.: Definition and enactment of instance-spanning process constraints. In: Wang, X.S., Cruz, I., Delis, A., Huang, G. (eds.) WISE 2012. LNCS, vol. 7651, pp. 652–658. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-35063-4_49

    Chapter  Google Scholar 

  10. Ly, L.T., Maggi, F.M., Montali, M., Rinderle-Ma, S., van der Aalst, W.M.P.: Compliance monitoring in business processes: functionalities, application, and tool-support. Inf. Syst. 54, 209–234 (2015)

    Article  Google Scholar 

  11. Ly, L.T., Rinderle-Ma, S., Dadam, P.: Design and verification of instantiable compliance rule graphs in process-aware information systems. In: Pernici, B. (ed.) CAiSE 2010. LNCS, vol. 6051, pp. 9–23. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13094-6_3

    Chapter  Google Scholar 

  12. Mangler, J., Rinderle-Ma, S.: IUPC: identification and unification of process constraints. CoRR abs/1104.3609 (2011). http://arxiv.org/abs/1104.3609

  13. Moody, D.: The physics of notations: toward a scientific basis for constructing visual notations in software engineering. IEEE Trans. Softw. Eng. 35(6), 756–779 (2009)

    Article  Google Scholar 

  14. Pufahl, L., Herzberg, N., Meyer, A., Weske, M.: Flexible batch configuration in business processes based on events. In: Franch, X., Ghose, A.K., Lewis, G.A., Bhiri, S. (eds.) ICSOC 2014. LNCS, vol. 8831, pp. 63–78. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45391-9_5

    Chapter  Google Scholar 

  15. Rinderle-Ma, S., Gall, M., Fdhila, W., Mangler, J., Indiono, C.: Collecting examples for instance-spanning constraints. Technical report, CoRR abs/1603.01523 (2016)

    Google Scholar 

  16. Warner, J., Atluri, V.: Inter-instance authorization constraints for secure workflow management. In: Symposium on Access Control Models and Technologies, pp. 190–199 (2006)

    Google Scholar 

  17. Wieringa, R.J.: Design Science Methodology for Information Systems and Software Engineering. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-43839-8

    Book  Google Scholar 

  18. Winter, K., Rinderle-Ma, S.: Discovering instance-spanning constraints from process execution logs based on classification techniques. In: 21st IEEE International Enterprise Distributed Object Computing Conference, pp. 79–88 (2017)

    Google Scholar 

Download references

Acknowledgment

This work has been funded by the Vienna Science and Technology Fund (WWTF) through project ICT15-072.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manuel Gall .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gall, M., Rinderle-Ma, S. (2018). From Instance Spanning Models to Instance Spanning Rules. In: Gulden, J., Reinhartz-Berger, I., Schmidt, R., Guerreiro, S., Guédria, W., Bera, P. (eds) Enterprise, Business-Process and Information Systems Modeling. BPMDS EMMSAD 2018 2018. Lecture Notes in Business Information Processing, vol 318. Springer, Cham. https://doi.org/10.1007/978-3-319-91704-7_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-91704-7_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-91703-0

  • Online ISBN: 978-3-319-91704-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics