skip to main content
10.1145/2695664.2699488acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Runtime detection of business process compliance violations: an approach based on anti patterns

Published: 13 April 2015 Publication History

Abstract

Today's enterprises demand a high degree of compliance in their business processes to meet diverse regulations and legislations. Several industrial studies have shown that compliance management is a daunting task, and organizations are still struggling and spending billions of dollars annually to ensure and prove their compliance. Theoretically, design-time compliance checking could provide a preliminary assurance that corresponding running instances would be compliant to relevant laws and regulations; however, due to the existence of human and machine related errors and the absence of necessary contextual information during design-time, runtime compliance monitoring becomes a must. In this paper, we present a generic proactive runtime Business Process (BP) compliance monitoring framework:BP-MaaS, which incorporates a wide range of expressive high-level compliance patterns for the abstract specification of runtime constraints. Compliance monitoring is achieved by means of anti-patterns, a novel evaluation approach that is independent of any underlying technology and could be applied to the checking of compliance in the different phases of the BP lifecycle. As a proof-of-concept, complex event processing (CEP) technology is adopted as one of the possible realizations of the framework.

References

[1]
W. M. P. V. D. Aalst and A. K. A. D. Medeiros. Process Mining and Security: Detecting Anomalous Process Executions. In (WISP), 2004.
[2]
A. Awad, M. Weidlich, and M. Weske. Specification, Verification and Explanation of Violation for Data Aware Compliance Rules. In ICSOC/ServiceWave, 2009.
[3]
A. Awad and M. Weske. Visualization of compliance violation in business process models. In BPM Workshops, 2009.
[4]
R. Baldwin, M. Cave, and M. Lodge. Understanding regulation: theory, strategy, and practice. Oxford University Press, 2011.
[5]
F. Barbon and et al. Run-time monitoring of instances and classes of web service compositions. In ICWS, 2006.
[6]
C. Beeri, A. Eyal, T. Milo, and A. Pilberg. Monitoring business processes with queries. In VLDB, 2007.
[7]
R. Cheng, S. Sadiq, and M. Indulska. Framework for Business Process and Rule Integration: A Case of BPMN and SBVR. 2011.
[8]
A. Elgammal, O. Turetken, W.-J. van den Heuvel, and M. Papazoglou. Formalizing and appling compliance patterns for business process compliance. Software and Systems Modeling, 2014.
[9]
O. Etzion and P. Niblett. Event processing in action. Manning, 2010.
[10]
S. Hallé and R. Villemaire. Runtime monitoring of message-based workflows with data. In EDOC, 2008.
[11]
S. Hallé and R. Villemaire. XML Methods for Validation of Temporal Properties on Message Traces with Data. In OTM, 2008.
[12]
B. S. Lerner, S. Christov, L. J. Osterweil, R. Bendraou, U. Kannengiesser, and A. Wise. Exception Handling Patterns in Process-Aware Information Systems. IEEE TSE, 36(2), 2010.
[13]
L. T. Ly, F. M. Maggi, M. Montali, S. Rinderle-Ma, and W. M. P. V. D. Aalst. A Framework for the Systematic Comparison and Evaluation of Compliance Monitoring Approaches. In EDOC, 2013.
[14]
L. T. Ly, S. Rinderle-Ma, D. Knuplesch, and P. Dadam. Monitoring Business Process Compliance Using Compliance Rule Graphs. In OTM, 2011.
[15]
F. M. Maggi, M. Montali, M. Westergaard, and W. M. P. V. D. Aalst. Monitoring Business Constraints with Linear Temporal Logic: An Approach Based on Colored Automata. In BPM, 2011.
[16]
K. Mahbub and G. Spanoudakis. A framework for requirents monitoring of service based systems. In ICSOC, 2004.
[17]
V. Mijovic and S. Vranes. A survey and Evaluation of CEP Tools. In YUINFO, 2011.
[18]
M. Montali, F. M. Maggi, F. Chesani, P. Mello, and W. M. P. van der Aalst. Monitoring business constraints with the event calculus. 2013.
[19]
E. Mulo, U. Zdun, and S. Dustdar. Domain-specific language for event-based compliance monitoring in process-driven SOAs. Service Oriented Computing and Applications, 7(1), 2013.
[20]
M. Papazoglou. Web services and business transactions. World Wide Web, 6(1):49--91, 2003.
[21]
M. Pesic, H. Schonenberg, and W. M. P. van der Aalst. Declare: Full support for loosely-structured processes. In EDOC, 2007.
[22]
S. Rinderle-Ma, S. Kabicher, and L. T. Ly. Activity-Oriented Clustering Techniques in Large Process and Compliance Rule Repositories. In BPM Workshops. 2012.
[23]
N. Russell, W. M. P. V. D. Aalst, A. H. M. ter Hofstede, and D. Edmond. Workflow Resource Patterns: Identification, Representation and Tool Support. In CAiSE, 2005.
[24]
S. Sakr. GraphREL: A Decomposition-Based and Selectivity-Aware Relational framework for processing sub-graph queries. In DASFAA, 2009.
[25]
S. Sebahi and M.-S. Hacid. Business process monitoring with bpath - (short paper). In OTM Conferences (1), 2010.
[26]
R. Thullner, S. Rozsnyai, J. Schiefer, H. Obweger, and M. Suntinger. Proactive business process compliance monitoring with event-based systems. In EDOC Workshops, 2011.
[27]
M. Weidlich, H. Ziekow, and J. Mendling. Event-based Monitoring of Process Execution Violations. In BPM, 2011.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '15: Proceedings of the 30th Annual ACM Symposium on Applied Computing
April 2015
2418 pages
ISBN:9781450331968
DOI:10.1145/2695664
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 April 2015

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

SAC 2015
Sponsor:
SAC 2015: Symposium on Applied Computing
April 13 - 17, 2015
Salamanca, Spain

Acceptance Rates

SAC '15 Paper Acceptance Rate 291 of 1,211 submissions, 24%;
Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)16
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media