Abstract
Keeping business processes compliant with regulations is of major importance for companies. Considering the huge number of models each company possesses, automation of compliance maintenance becomes essential. Therefore, many approaches focused on automation of various aspects of compliance problem, e.g., compliance verification. Such techniques allow localizing the problem within the process model. However, they are not able to resolve the violations. In this paper we address the problem of (semi) automatic violation resolution, addressing violations of execution ordering compliance rules. We build upon previous work in categorizing the violations into types and employ automated planning to ensure compliance. The problem of choosing the concrete resolution strategy is addressed by the concept of context.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Sarbanes-Oxley Act of 2002. Public Law 107-204 (116 Statute 745), United States Senate and House of Representatives in Congress (2002)
Awad, A., Decker, G., Weske, M.: Efficient Compliance Checking Using BPMN-Q and Temporal Logic. In: Dumas, M., Reichert, M., Shan, M.-C. (eds.) BPM 2008. LNCS, vol. 5240, pp. 326–341. Springer, Heidelberg (2008)
Awad, A., Smirnov, S., Weske, M.: Towards Resolving Compliance Violations in Business Process Models. In: GRCIS, vol. 459. CEUR-WS.org (2009)
Awad, A., Weske, M.: Visualization of compliance violation in business process models. In: 5th Workshop on Business Process Intelligence BPI 2009. Springer, Heidelberg (to appear, 2009)
Decker, G., Kopp, O., Leymann, F., Pfitzner, K., Weske, M.: Modeling Service Choreographies Using BPMN and BPEL4Chor. In: Bellahsène, Z., Léonard, M. (eds.) CAiSE 2008. LNCS, vol. 5074, pp. 79–93. Springer, Heidelberg (2008)
Förster, A., Engels, G., Schattkowsky, T., Van Der Straeten, R.: Verification of Business Process Quality Constraints Based on VisualProcess Patterns. In: TASE, pp. 197–208. IEEE Computer Society, Los Alamitos (2007)
Ghose, A., Koliadis, G.: Auditing Business Process Compliance. In: Krämer, B.J., Lin, K.-J., Narasimhan, P. (eds.) ICSOC 2007. LNCS, vol. 4749, pp. 169–180. Springer, Heidelberg (2007)
Goedertier, S., Vanthienen, J.: Compliant and Flexible Business Processes with Business Rules. In: BPMDS. CEUR Workshop Proceedings, vol. 236. CEUR-WS.org (2006)
Goedertier, S., Vanthienen, J.: Designing Compliant Business Processes from Obligations and Permissions. In: Eder, J., Dustdar, S. (eds.)BPD 2006. LNCS, vol. 4103, pp. 5–14. Springer, Heidelberg (2006)
Governatori, G., Milosevic, Z.: Dealing with Contract Violations: Formalism and Domain Specific Language. In: EDOC, pp. 46–57. IEEE Computer Society Press, Los Alamitos (2005)
Governatori, G., Milosevic, Z., Sadiq, S.: Compliance Checking between Business Processes and Business Contracts. In: EDOC, pp. 221–232. IEEE Computer Society Press, Los Alamitos (2006)
Hartman, T.: The Cost of Being Public in the Era of Sarbanes-Oxley. Foley&Lardner, Chicago, Ill (2006)
Lu, R., Sadiq, S., Governatori, G.: Compliance Aware Business Process Design. In: ter Hofstede, A.H.M., Benatallah, B., Paik, H.-Y. (eds.) BPM Workshops 2007. LNCS, vol. 4928, pp. 120–131. Springer, Heidelberg (2008)
Lu, R., Sadiq, S., Governatori, G.: Measurement of Compliance Distance in Business Processes. Inf. Sys. Manag. 25(4), 344–355 (2008)
Lui, Y., Müller, S., Xu, K.: A Static Compliance-checking Framework for Business Process Models. IBM Systems Journal 46(2), 335–362 (2007)
Ly, L.T., Göser, K., Rinderle-Ma, S., Dadam, P.: Compliance of Semantic Constraints – A Requirements Analysis for Process Management Systems. In: GRCIS, vol. 339. CEUR-WS.org (2008)
Marconi, A., Pistore, M., Traverso, P.: Automated Composition of Web Services: the ASTRO Approach. IEEE Data Eng. Bull. 31(3), 23–26 (2008)
Meyer, H., Weske, M.: Automated Service Composition Using Heuristic Search. In: Dustdar, S., Fiadeiro, J.L., Sheth, A.P. (eds.) BPM 2006. LNCS, vol. 4102, pp. 81–96. Springer, Heidelberg (2006)
Milosevic, Z., Sadiq, S., Orlowska, M.: Translating Business Contract into Compliant Business Processes. In: EDOC, pp. 211–220. IEEE Computer Society Press, Los Alamitos (2006)
Namiri, K., Stojanovic, N.: Pattern-Based Design and Validation of Business Process Compliance. In: Meersman, R., Tari, Z. (eds.) OTM 2007, Part I. LNCS, vol. 4803, pp. 59–76. Springer, Heidelberg (2007)
Nau, D., Ghallab, M., Traverso, P.: Automated Planning: Theory & Practice. Morgan Kaufmann Publishers Inc., San Francisco (2004)
Sadiq, S., Governatori, G., Namiri, K.: Modeling Control Objectives for Business Process Compliance. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 149–164. Springer, Heidelberg (2007)
van der Aalst, W., Weijters, T., Maruster, L.: Workflow Mining: Discovering Process Models from Event Logs. IEEE Trans. on Knowl. and Data Eng. 16(9), 1128–1142 (2004)
Vanhatalo, J., Völzer, H., Koehler, J.: The Refined Process Structure Tree. In: Dumas, M., Reichert, M., Shan, M.-C. (eds.) BPM 2008. LNCS, vol. 5240, Springer, Heidelberg (2008)
Vanhatalo, J., Völzer, H., Leymann, F.: Faster and More Focused Control-Flow Analysis for Business Process Models Through SESE Decomposition. In: Krämer, B.J., Lin, K.-J., Narasimhan, P. (eds.) ICSOC 2007. LNCS, vol. 4749, pp. 43–55. Springer, Heidelberg (2007)
Weber, B., Reichert, M.: Refactoring process models in large process repositories. In: Bellahsène, Z., Léonard, M. (eds.) CAiSE 2008. LNCS, vol. 5074, pp. 124–139. Springer, Heidelberg (2008)
Yu, J., Manh, T.P., Han, J., Jin, Y., Han, Y., Wang, J.: Pattern Based Property Specification and Verification for Service Composition. In: Aberer, K., Peng, Z., Rundensteiner, E.A., Zhang, Y., Li, X. (eds.) WISE 2006. LNCS, vol. 4255, pp. 156–168. Springer, Heidelberg (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Awad, A., Smirnov, S., Weske, M. (2009). Resolution of Compliance Violation in Business Process Models: A Planning-Based Approach. In: Meersman, R., Dillon, T., Herrero, P. (eds) On the Move to Meaningful Internet Systems: OTM 2009. OTM 2009. Lecture Notes in Computer Science, vol 5870. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-05148-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-05148-7_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-05147-0
Online ISBN: 978-3-642-05148-7
eBook Packages: Computer ScienceComputer Science (R0)