A Security-aware Simulation Method for Generating Business Process Event Logs

Size: px
Start display at page:

Download "A Security-aware Simulation Method for Generating Business Process Event Logs"

Transcription

1 A Security-aware Simulation Method for Generating Business Process Event Logs Rafael Accorsi University of Freiburg, Germany Abstract. One of the difficulties at developing mechanisms for business process security monitoring and auditing is the existence of representative, realistic and controlled test runs. This paper presents ongoing work toward a business process simulation method geared to the synthesis of event logs. The novelty is that it considers the activity of an (internal) attacker able purposefully infringe the designated security requirements or simply manipulate the process control and data flow. The resultant logs can be, e.g., readily replayed on a reference monitor, business activity monitoring tool, or serve as input for process discovery tools. 1 Introduction Research into business process security and control is concerned with the formalization of security requirements (e.g., secrecy, integrity, binding of duties) and the development of well-founded techniques and tools for analyzing, monitoring and auditing these requirements in business process specifications. Techniques for this may include, for instance, program analysis [5,6], usage control [1,19] and various types of a posteriori process process analysis [2,4,23]. In this research area, a particular challenge appears when it comes to empirically testing the effectiveness of monitoring and auditing techniques and corresponding tools [3]. Here, controlled input with regard to structural vulnerabilities [15,16] is required to feed the tools with process runs and ascertain the kill-rate, i.e. the precision to identify the violation of the designated security properties. Business process simulation techniques can provide for these runs. However, the current state of the art approaches (e.g., [11,21,22]) and tool support (e.g.,[9,10]) do not take into account an attacker able to intentionally (albeit controllably) manipulate the process executions and violate the security properties that a specific process under consideration must satisfy. In particular, the capabilities of such an attacker must be determined, thereby defining an attacker model that can be configured for the simulated process. This paper presents ongoing work toward a business process simulation method geared to the synthesis of attacker-aware event logs. The method, depicted in Fig. 1, takes a business process specification and the security requirements applicable to the process as main inputs. Based upon the process specification, it automatically generates a series of process variants (so-called mutants) that

2 2 R. Accorsi initial model transformation operations t1 t i tn model variants mutant1 mutanti mutantn properties simulation individual traces with property annotations log 1 logi log n accumulated traces combined log Fig. 1. Overview of the approach. deviate from the prescribed control and data flow. Similarly, based upon the security requirements, incorrect process instantiations (with regard to the subjects and their rights) are generated while producing the individual traces. Together, these steps provide for a definition of an attacker model, which can be detailed configured for a particular test case. For versatility, the generated logs are outputted in a variety of formats, including XES and MXML (traditional formats for process mining), as well as CSV and plain text. The contributions summarized in this extended abstract are threefold: 1. It suggests transformation rules to derive mutants. Assuming a sound information flow net [7] that represents the process, each of the proposed transformations create a novel and sound net. 2. Considering traditional security and organizational properties for business processes [12], the approach allows for configurable instantiations of process models, thereby allowing for the controllable generation of event logs in which these requirements are violated. Together with structural mutants, these capabilities characterize an attacker model. 3. It describes a prototypical implementation that realizes some of the features of the attacker model, while providing for the configurable synthesizing of

3 A Security-aware Simulation Method for Generating Event Logs 3 event logs. Eventually, this implementation will be integrated as a SWAT plug-in. The Security Workflow Analysis Toolkit (SWAT) provides for a platform to business process analysis [8]. Overall, the generation of defect data has been applied to software process improvement in general [20], but has never been seen in the BPM area. This paper is a first step in this direction. We firmly believe that the controlled, push-button generation of (large) test data is a promising research direction and application domain in business process testing and improvement. This not only for testing mechanisms in the context of security (as in this paper), but also for compliance [1,17], resilience [13,24], visualization [14] and dependability [25] engineering for business process and process-aware information systems. Regarding the proposed methods, there are several issues that need to be added to obtain a fully-fledged log synthesizing tool, e.g. the simultaneous execution of parallel process models, thereby allowing for the trace interleaving. Further, the completeness of generated logs has not been investigated, i.e. are all the possible cases considered while generating the log. Soundness should be guaranteed by construction, but will be investigated formally in the future. These, as well as other conceptual and practical issues are subject of ongoing and further work. Paper structure. The remainder of this paper describes the main steps of the approach (Section 2), reports on its prototypical realization (Section 3) and summarizes the ongoing/further work (Section 4). 2 Building Blocks and Deviations 2.1 Building Blocks The main building blocks are, firstly, the process and environment specification and, secondly, the specification of the properties that must hold for the process. Process specification. The process specification considers a Petri net representation of the process. Specifically, we consider an Information Flow Net (IFnet) [7]. IFnet is a colored Petri net dialect that allows the annotation of activities with subject/role information, as well as the consideration of resources (modeled as colored tokens). These models can be obtained automatically for BPEL and BPMN specifications. The definition of a process provides a tuple P = (A, O, O), where A is a set of activities, O is the set of objects and O : A O assigns the objects employed by the activities. The environment in which the process P is executed is defined by a tuple E P = (P, S, R, R), where S stands for a set of subject, R for a set of roles and R for a set of tuples (s, r, a), where s S, r R and a A. If (s 1, r 2, a 5 ) R, this means that in P the subject s 1 is assigned the role r 2 for executing the activity a 5. To simplify the notation, we employ α(a, s, r) to denote that the activity a is executed by the subject s taking the role r. Security property specification. The specification of security properties assume a formalization using temporal logics. The properties we consider are standard

4 4 R. Accorsi and assume the organizational properties (e.g. binding of duties and four-eye rule) [12] and purely security properties arising from the violations of the role assignment relation R and, more generally, usage control policies on the style of Park and Sandhu [18] (e.g. obligations after the access to data). Of course there is a non-empty intersection, e.g., between misleading role assignment and a binding of duties, but this is not relevant for the purposes of the paper. With regard to their specification (and semantics), these properties are specified using linear temporal logics. For example, let α i (a i, s, r) and α j (a j, s, r ). The formula ψ BoD = (α i α j ) is an initial formalization to capture the separation of duties requirements. (This means: it is always the case that if s carried out a i on the role r, then eventually a should also execute a j on the role r.) Regarding the semantics, the idea is to have a trace corresponding to a process execution, whereas each event in the trace corresponds to the execution of an activity. A trace fulfills a property, e.g. separation of duties, iff the events appear in the order prescribed by the policies. The full version of the paper provides the formal definition of specification language and its semantics. 2.2 Process Deviations and Property Violations Given the specification of processes and properties, this section introduces the rules with which deviations (i.e. mutants) are generated. This comprises both the control flow and the instantiation of the process variables with subject/role information. Altogether, both aspects capture the activity of an attacker, whereas control flow only transformations could also be taken as failures of the execution engine. Control-Flow deviations. The control flow transformations regard only the structure of the process specification and assume, for the sake of simplicity, a correct instantiation of process variables. At the moment, the following mutants are considered. And2Xor: this transformation provides a mutant in which an AND-gate is rewritten as an XOR-gate. This means: while the original process requires traversing both paths of the AND-gate, the mutant assumes that only one (randomly chosen) path is traversed. Xor2And: the opposite of And2Xor, i.e. each XOR-gate is rewritten as ANDgate. Activity skipping: this transformation provides for mutants in which a transition is simply skipped during the execution. Activity swapping: this transformation provides for mutants in which the order of a pair of activities is swapped. By now, we assume that these transformations are not combined with each other (primitive mutant). In future, they will be combined to what we call composite mutant. Note, however, that we give full control to configure the sort and frequency of the deviations.

5 A Security-aware Simulation Method for Generating Event Logs 5 Fig. 2. Screenshot of the configuration panel. Security requirements. Given a mutant and the security requirements applicable to the process, this step computes mutants that consider the instantiation or control flow of the system violating at least one of policies. We do so by negating the formulae representing the policies. This negation provides us with a pattern of nonconformance with the policies. Hence, whenever applicable, the approach generates an execution trace in which this malicious execution pattern occurs. Coming back to the binding of duties requirement, by negating the formula ψ SoD, we obtain a pattern in which an activity pair prescribed to be performed by the same subjects is executed by different subjects or not executed at all. 3 Prototypical Realization The approach has been implemented in Python. Figure 2 depicts configuration panel of the application. It assumes as input an IFnet model containing the process specification, the details on the environment and a definition of the policies. Given that, the user can visualize and configure, on the one hand, execution parameters for each activity in the process. This includes, e.g., the average execution time to be simulated for each activity (useful to model delays and perturbations) and the overall frequency of a particular execution trace (handy for modeling outliers). On the other hand, the user can select the requirements that should hold for the process, thereby specifying the policy applicable to the process. Once this

6 6 R. Accorsi is carried out, the frequency and kind of security violations can be thoroughly configured. The output format can be selected among plain text, CSV, MXML and XES. The latter two formats are standard input for process mining technologies, thereby serving as a basis for generating logs to test with process mining tools. The former are useful as an input to be replayed, e.g., onto execution monitors. The performance itself is acceptable: for example, an execution log including 100K process run (middle size log) for a process including 15 activities, 50 roles and 100 subjects takes less than 2 minutes for the CSV output format and in average 3,5 minutes for XML-based formats (AMD quad core A8, 6GB Dual Channel DDR3 SDRAM at 1333Mhz under Windows). In future, this application will be realized as a module of the Security Workflow Analysis Toolkit (SWAT) [8]. SWAT is an extensible, Eclipse-based application that allows the specification of processes in BPEL and BPMN, their transformation into several Petri net dialects (e.g. open Workflow nets, IFnet, plain Petri nets) and analysis. At the moment, SWAT focuses on the analysis process models, in particular focusing on compliance and information flow. The simulation, an essential step for testing with process discovery methods, is a missing feature. 4 Summary and Further Work This paper presents and outlined a method to simulating business processes considering an attacker model. Overall, this approach is novel, both in the security and business process management community. With this approach at hand, one is able to quickly and highly-controllably simulate a process that comprises targeted security violations, as well as random failures that potentially lead to the violation of selected properties. The approach has been realized in a prototype. The results are promising and after the thorough testing and extension, it will be added to the a workbench specialized on the security reasoning of business processes. Besides the aforementioned ongoing work, the current effort is in the realization of parallel execution and the consideration of further security properties. Furthermore, the demonstration of formal properties, such as soundness and completeness, must have to be investigated as a means to provide evidence on the quality of the log files generated by the method. Overall, we believe that the automated generation of such event logs is a necessary step toward the development of tools for business process analysis. This not only for standard process-aware information systems. More importantly, with the advent of big data and business process management in the large, there will be the need to test with such log data. Today, generating these data is very tedious. Our proposal should, in the future, be also used for this setting. References 1. R. Accorsi, Y. Sato, and S. Kai. Compliance monitor for early warning risk determination. Wirtschaftsinformatik, 50(5): , October 2008.

7 A Security-aware Simulation Method for Generating Event Logs 7 2. R. Accorsi and T. Stocker. Automated privacy audits based on pruning of log data. In Proceedings of the EDOC International Workshop on Security and Privacy in Enterprise Computing. IEEE, R. Accorsi and T. Stocker. On the Exploitation of Process Mining for Security Audits: The Conformance Checking Case. In ACM Symposium on Applied Computing, pages ACM, R. Accorsi and C. Wonnemann. Auditing workflow executions against dataflow policies. In W. Abramowicz and R. Tolksdorf, editors, Proceedings of the Business Information Systems, volume 47 of Lecture Notes in Business Information Processing, pages Springer, R. Accorsi and C. Wonnemann. Static information flow analysis of workflow models. In W. Abramowicz, K.-P. F. Rainer Alt, and L. Maciaszek, editors, Conference on Business Process and Service Computing, volume 147 of Lecture Notes in Informatics, pages GI, R. Accorsi and C. Wonnemann. Strong non-leak guarantees for workflow models. In ACM Symposium on Applied Computing, pages ACM, R. Accorsi and C. Wonnemann. InDico: Information flow analysis of business processes for confidentiality requirements. In J. C. et al., editor, ERCIM Workshop on Security and Trust Management, volume 6710 of Lecture Notes in Computer Science, pages Springer, R. Accorsi, C. Wonnemann, and S. Dochow. SWAT: A security workflow toolkit for reliably secure process-aware information systems. In Conference on Availability, Reliability and Security, pages IEEE, A. Bahrami, D. A. Sadowski, and S. Bahrami. Enterprise architecture for business process simulation. In Winter Simulation Conference, pages , A. Burattin and A. Sperduti. PLG: A framework for the generation of business process models and their execution logs. In M. zur Muehlen and J. Su, editors, Business Process Management Workshops, volume 66 of Lecture Notes in Business Information Processing, pages Springer, Y. H. Cho, J. K. Kim, and K. S. Hie. Role-based approach to business process simulation modeling and analysis. Computers & Industrial Engineering, 35(1/2): , K. Knorr and S. Röhrig. Security requirements of e-business processes. In B. Schmid, K. Stanoevska-Slabeva, and V. Tschammer, editors, IFIP Conference on E-Commerce, E-Business, E-Government, volume 202 of IFIP Conference Proceedings, pages Kluwer, T. Koslowski and J. Strüker. Erp on demand platform - complementary effects using the example of a sustainability benchmarking service. Business & Information Systems Engineering, 3(6): , S. Kriglstein and S. Rinderle-Ma. Change visualizations in business processes - requirements analysis. In P. Richard, M. Kraus, R. S. Laramee, and J. Braz, editors, Conference on Computer Graphics Theory and Applications and International Conference on Information Visualization Theory and Applications, pages SciTePress, L. Lowis and R. Accorsi. On a classification approach for SOA vulnerabilities. In Proceedings of the IEEE International Computer Software and Applications Conference, pages IEEE Computer Society, L. Lowis and R. Accorsi. Finding vulnerabilities in SOA-based business processes. IEEE Transactions on Service Computing, 4(3): , August 2011.

8 8 R. Accorsi 17. L. T. Ly, S. Rinderle-Ma, D. Knuplesch, and P. Dadam. Monitoring business process compliance using compliance rule graphs. In R. Meersman, T. S. Dillon, P. Herrero, A. Kumar, M. Reichert, L. Qing, B. C. Ooi, E. Damiani, D. C. Schmidt, J. White, M. Hauswirth, P. Hitzler, and M. K. Mohania, editors, On the Move to Meaningful Internet Systems, volume 7044 of Lecture Notes in Computer Science, pages Springer, J. Park and R. Sandhu. The UCON ABC usage control model. ACM Transactions on Information and System Security, 7(1): , February A. Pretschner, F. Massacci, and M. Hilty. Usage control in service-oriented architectures. In C. Lambrinoudakis, G. Pernul, and A. M. Tjoa, editors, Proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business, volume 4657 of Lecture Notes in Computer Science, pages Springer, A. Raninen, T. Toroi, H. Vainio, and J. J. Ahonen. Defect data analysis as input for software process improvement. In O. Dieste, A. Jedlitschka, and N. J. Juzgado, editors, Conference on Product-Focused Software Process Improvement, volume 7343 of Lecture Notes in Computer Science, pages Springer, K. Tumay. Business process simulation. In Winter Simulation Conference, pages 93 98, W. van der Aalst. Business process simulation. In J. vom Brocke and M. Rosemann, editors, Handbook on Business Process Management, volume 1, pages Springer, W. van der Aalst. Process Mining Discovery, Conformance and Enhancement of Business Processes. Springer, Q. Wang and N. Li. Satisfiability and resiliency in workflow systems. In J. Biskup and J. Lopez, editors, Proceedings of the European Symposium On Research In Computer Security, volume 4734 of Lecture Notes in Computer Science, pages Springer, B. Wetzstein, P. Leitner, F. Rosenberg, I. Brandic, S. Dustdar, and F. Leymann. Monitoring and analyzing influential factors of business process performance. In IEEE International Enterprise Distributed Object Computing Conference, pages IEEE Computer Society, 2009.

SecSy: A Security-oriented Tool for Synthesizing Process Event Logs

SecSy: A Security-oriented Tool for Synthesizing Process Event Logs SecSy: A Security-oriented Tool for Synthesizing Process Event Logs Thomas Stocker and Rafael Accorsi University of Freiburg, Germany {stocker,accorsi}@iig.uni-freiburg.de Abstract. SecSy is a highly flexible

More information

An Approach to Data-driven Detective Internal Controls for Process-aware Information Systems

An Approach to Data-driven Detective Internal Controls for Process-aware Information Systems An Approach to Data-driven Detective Internal Controls for Process-aware Information Systems Rafael Accorsi University of Freiburg, Germany accorsi@iig.uni-freiburg.de ABSTRACT This paper argues for an

More information

SecSy: Security-aware Synthesis of Process Event Logs

SecSy: Security-aware Synthesis of Process Event Logs SecSy: Security-aware Synthesis of Process Event Logs Thomas Stocker and Rafael Accorsi University of Freiburg, Germany {stocker,accorsi}@iig.uni-freiburg.de Abstract: One difficulty at developing mechanisms

More information

Generation of a Set of Event Logs with Noise

Generation of a Set of Event Logs with Noise Generation of a Set of Event Logs with Noise Ivan Shugurov International Laboratory of Process-Aware Information Systems National Research University Higher School of Economics 33 Kirpichnaya Str., Moscow,

More information

Handling Big(ger) Logs: Connecting ProM 6 to Apache Hadoop

Handling Big(ger) Logs: Connecting ProM 6 to Apache Hadoop Handling Big(ger) Logs: Connecting ProM 6 to Apache Hadoop Sergio Hernández 1, S.J. van Zelst 2, Joaquín Ezpeleta 1, and Wil M.P. van der Aalst 2 1 Department of Computer Science and Systems Engineering

More information

Process Modelling from Insurance Event Log

Process Modelling from Insurance Event Log Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R

More information

Online Compliance Monitoring of Service Landscapes

Online Compliance Monitoring of Service Landscapes Online Compliance Monitoring of Service Landscapes J.M.E.M. van der Werf 1 and H.M.W. Verbeek 2 1 Department of Information and Computing Science, Utrecht University, The Netherlands J.M.E.M.vanderWerf@UU.nl

More information

Feature. Applications of Business Process Analytics and Mining for Internal Control. World

Feature. Applications of Business Process Analytics and Mining for Internal Control. World Feature Filip Caron is a doctoral researcher in the Department of Decision Sciences and Information Management, Information Systems Group, at the Katholieke Universiteit Leuven (Flanders, Belgium). Jan

More information

Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models?

Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models? Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models? Ludmila Penicina Institute of Applied Computer Systems, Riga Technical University, 1 Kalku, Riga, LV-1658,

More information

WoPeD - An Educational Tool for Workflow Nets

WoPeD - An Educational Tool for Workflow Nets WoPeD - An Educational Tool for Workflow Nets Thomas Freytag, Cooperative State University (DHBW) Karlsruhe, Germany freytag@dhbw-karlsruhe.de Martin Sänger, 1&1 Internet AG, Karlsruhe, Germany m.saenger09@web.de

More information

Ontology-Based Discovery of Workflow Activity Patterns

Ontology-Based Discovery of Workflow Activity Patterns Ontology-Based Discovery of Workflow Activity Patterns Diogo R. Ferreira 1, Susana Alves 1, Lucinéia H. Thom 2 1 IST Technical University of Lisbon, Portugal {diogo.ferreira,susana.alves}@ist.utl.pt 2

More information

Data-Aware Service Choreographies through Transparent Data Exchange

Data-Aware Service Choreographies through Transparent Data Exchange Institute of Architecture of Application Systems Data-Aware Service Choreographies through Transparent Data Exchange Michael Hahn, Dimka Karastoyanova, and Frank Leymann Institute of Architecture of Application

More information

Lluis Belanche + Alfredo Vellido. Intelligent Data Analysis and Data Mining. Data Analysis and Knowledge Discovery

Lluis Belanche + Alfredo Vellido. Intelligent Data Analysis and Data Mining. Data Analysis and Knowledge Discovery Lluis Belanche + Alfredo Vellido Intelligent Data Analysis and Data Mining or Data Analysis and Knowledge Discovery a.k.a. Data Mining II An insider s view Geoff Holmes: WEKA founder Process Mining

More information

Separating Compliance Management and Business Process Management

Separating Compliance Management and Business Process Management Separating Compliance Management and Business Process Management Elham Ramezani 1, Dirk Fahland 2, Jan Martijn van der Werf 2, and Peter Mattheis 1 1 Hochschule Furtwangen, Germany (ramezani Peter.Mattheis)@hs-furtwangen.de

More information

PLG: a Framework for the Generation of Business Process Models and their Execution Logs

PLG: a Framework for the Generation of Business Process Models and their Execution Logs PLG: a Framework for the Generation of Business Process Models and their Execution Logs Andrea Burattin and Alessandro Sperduti Department of Pure and Applied Mathematics University of Padua, Italy {burattin,sperduti}@math.unipd.it

More information

Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures

Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures Sven Feja 1, Ralph Herkenhöner 2, Meiko Jensen 3, Andreas Speck 1, Hermann de Meer 2, and Jörg Schwenk 3

More information

Process Mining for Electronic Data Interchange

Process Mining for Electronic Data Interchange Process Mining for Electronic Data Interchange R. Engel 1, W. Krathu 1, C. Pichler 2, W. M. P. van der Aalst 3, H. Werthner 1, and M. Zapletal 1 1 Vienna University of Technology, Austria Institute for

More information

X-Aware Business Process Management

X-Aware Business Process Management X-Aware Business Process Management In my last Column this year, I want to draw your attention to some current efforts in the space of BPM research and education that try to move BPM thinking forward into

More information

Process Mining and Monitoring Processes and Services: Workshop Report

Process Mining and Monitoring Processes and Services: Workshop Report Process Mining and Monitoring Processes and Services: Workshop Report Wil van der Aalst (editor) Eindhoven University of Technology, P.O.Box 513, NL-5600 MB, Eindhoven, The Netherlands. w.m.p.v.d.aalst@tm.tue.nl

More information

BPMN PATTERNS USED IN MANAGEMENT INFORMATION SYSTEMS

BPMN PATTERNS USED IN MANAGEMENT INFORMATION SYSTEMS BPMN PATTERNS USED IN MANAGEMENT INFORMATION SYSTEMS Gabriel Cozgarea 1 Adrian Cozgarea 2 ABSTRACT: Business Process Modeling Notation (BPMN) is a graphical standard in which controls and activities can

More information

Activity Mining for Discovering Software Process Models

Activity Mining for Discovering Software Process Models Activity Mining for Discovering Software Process Models Ekkart Kindler, Vladimir Rubin, Wilhelm Schäfer Software Engineering Group, University of Paderborn, Germany [kindler, vroubine, wilhelm]@uni-paderborn.de

More information

Process Mining. ^J Springer. Discovery, Conformance and Enhancement of Business Processes. Wil M.R van der Aalst Q UNIVERS1TAT.

Process Mining. ^J Springer. Discovery, Conformance and Enhancement of Business Processes. Wil M.R van der Aalst Q UNIVERS1TAT. Wil M.R van der Aalst Process Mining Discovery, Conformance and Enhancement of Business Processes Q UNIVERS1TAT m LIECHTENSTEIN Bibliothek ^J Springer Contents 1 Introduction I 1.1 Data Explosion I 1.2

More information

An Eclipse plug-in for Public Administration software system modelling and simulation

An Eclipse plug-in for Public Administration software system modelling and simulation An Eclipse plug-in for Public Administration software system modelling and simulation Riccardo Cognini, Damiano Falcioni, Andrea Polini, Alberto Polzonetti, and Barbara Re University of Camerino, School

More information

BIS 3106: Business Process Management. Lecture Two: Modelling the Control-flow Perspective

BIS 3106: Business Process Management. Lecture Two: Modelling the Control-flow Perspective BIS 3106: Business Process Management Lecture Two: Modelling the Control-flow Perspective Makerere University School of Computing and Informatics Technology Department of Computer Science SEM I 2015/2016

More information

A Software Framework for Risk-Aware Business Process Management

A Software Framework for Risk-Aware Business Process Management A Software Framework for Risk-Aware Business Management Raffaele Conforti 1, Marcello La Rosa 1,2, Arthur H.M. ter Hofstede 1,4, Giancarlo Fortino 3, Massimiliano de Leoni 4, Wil M.P. van der Aalst 4,1,

More information

EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES. Nataliya Golyan, Vera Golyan, Olga Kalynychenko

EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES. Nataliya Golyan, Vera Golyan, Olga Kalynychenko 380 International Journal Information Theories and Applications, Vol. 18, Number 4, 2011 EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES Nataliya Golyan, Vera Golyan, Olga Kalynychenko

More information

A Method for Eliciting Security Requirements from the Business Process Models

A Method for Eliciting Security Requirements from the Business Process Models A Method for Eliciting Security Requirements from the Business Process Models Naved Ahmed and Raimundas Matulevičius Institute of Computer Science, University of Tartu J. Liivi 2, 50409 Tartu, Estonia

More information

A Service Modeling Approach with Business-Level Reusability and Extensibility

A Service Modeling Approach with Business-Level Reusability and Extensibility A Service Modeling Approach with Business-Level Reusability and Extensibility Jianwu Wang 1,2, Jian Yu 1, Yanbo Han 1 1 Institute of Computing Technology, Chinese Academy of Sciences, 100080, Beijing,

More information

Business-Driven Software Engineering Lecture 3 Foundations of Processes

Business-Driven Software Engineering Lecture 3 Foundations of Processes Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster jku@zurich.ibm.com Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary

More information

Monitoring of Business Processes in the EGI

Monitoring of Business Processes in the EGI Monitoring of Business Processes in the EGI Radoslava Hristova Faculty of Mathematics and Informatics, University of Sofia St. Kliment Ohridski, 5 James Baucher, 1164 Sofia, Bulgaria radoslava@fmi.uni-sofia.bg

More information

Business Process Exchange and the Role of Remote Auditing in cloud Computing

Business Process Exchange and the Role of Remote Auditing in cloud Computing Business Process as a Service: Chances for Remote Auditing Rafael Accorsi Department of Telematics University of Freiburg, Germany accorsi@iig.uni-freiburg.de Abstract The advent of cloud computing allows

More information

Towards a Comprehensive Design-time Compliance Management: A Roadmap

Towards a Comprehensive Design-time Compliance Management: A Roadmap Towards a Comprehensive Design-time Management: A Roadmap Amal Elgammal, Ph.D. Candidate, Tilburg, The Netherlands, a.f.s.a.elgammal@uvt.nl Oktay Turetken, Post-doc Researcher, Tilburg, The Netherlands,

More information

Using Process Mining to Bridge the Gap between BI and BPM

Using Process Mining to Bridge the Gap between BI and BPM Using Process Mining to Bridge the Gap between BI and BPM Wil van der alst Eindhoven University of Technology, The Netherlands Process mining techniques enable process-centric analytics through automated

More information

Ensuring Cost-Optimal SLA Conformance for Composite Service Providers

Ensuring Cost-Optimal SLA Conformance for Composite Service Providers Ensuring Cost-Optimal SLA Conformance for Composite Service Providers Philipp Leitner Supervised by: Schahram Dustdar Distributed Systems Group Vienna University of Technology Argentinierstrasse 8/184-1

More information

On the Modeling and Verification of Security-Aware and Process-Aware Information Systems

On the Modeling and Verification of Security-Aware and Process-Aware Information Systems On the Modeling and Verification of Security-Aware and Process-Aware Information Systems 29 August 2011 What are workflows to us? Plans or schedules that map users or resources to tasks Such mappings may

More information

Modeling Guidelines Manual

Modeling Guidelines Manual Modeling Guidelines Manual [Insert company name here] July 2014 Author: John Doe john.doe@johnydoe.com Page 1 of 22 Table of Contents 1. Introduction... 3 2. Business Process Management (BPM)... 4 2.1.

More information

Flexible and Adaptive. Challenges and Solutions

Flexible and Adaptive. Challenges and Solutions Flexible and Adaptive Process-oriented oriented Information Systems Challenges and Solutions Peter Dadam, Manfred Reichert Institute of Databases and Information Systems University of Ulm D-89081 Ulm,

More information

Business Process Modeling

Business Process Modeling Business Process Concepts Process Mining Kelly Rosa Braghetto Instituto de Matemática e Estatística Universidade de São Paulo kellyrb@ime.usp.br January 30, 2009 1 / 41 Business Process Concepts Process

More information

IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD

IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Journal homepage: www.mjret.in ISSN:2348-6953 IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Deepak Ramchandara Lad 1, Soumitra S. Das 2 Computer Dept. 12 Dr. D. Y. Patil School of Engineering,(Affiliated

More information

Model Discovery from Motor Claim Process Using Process Mining Technique

Model Discovery from Motor Claim Process Using Process Mining Technique International Journal of Scientific and Research Publications, Volume 3, Issue 1, January 2013 1 Model Discovery from Motor Claim Process Using Process Mining Technique P.V.Kumaraguru *, Dr.S.P.Rajagopalan

More information

COCOVILA Compiler-Compiler for Visual Languages

COCOVILA Compiler-Compiler for Visual Languages LDTA 2005 Preliminary Version COCOVILA Compiler-Compiler for Visual Languages Pavel Grigorenko, Ando Saabas and Enn Tyugu 1 Institute of Cybernetics, Tallinn University of Technology Akadeemia tee 21 12618

More information

Process Mining Using BPMN: Relating Event Logs and Process Models

Process Mining Using BPMN: Relating Event Logs and Process Models Noname manuscript No. (will be inserted by the editor) Process Mining Using BPMN: Relating Event Logs and Process Models Anna A. Kalenkova W. M. P. van der Aalst Irina A. Lomazova Vladimir A. Rubin Received:

More information

Conformance Checking of RBAC Policies in Process-Aware Information Systems

Conformance Checking of RBAC Policies in Process-Aware Information Systems Conformance Checking of RBAC Policies in Process-Aware Information Systems Anne Baumgrass 1, Thomas Baier 2, Jan Mendling 2, and Mark Strembeck 1 1 Institute of Information Systems and New Media Vienna

More information

Process Mining: Making Knowledge Discovery Process Centric

Process Mining: Making Knowledge Discovery Process Centric Process Mining: Making Knowledge Discovery Process Centric Wil van der alst Department of Mathematics and Computer Science Eindhoven University of Technology PO Box 513, 5600 MB, Eindhoven, The Netherlands

More information

SERENITY Pattern-based Software Development Life-Cycle

SERENITY Pattern-based Software Development Life-Cycle SERENITY Pattern-based Software Development Life-Cycle Francisco Sanchez-Cid, Antonio Maña Computer Science Department University of Malaga. Spain {cid, amg}@lcc.uma.es Abstract Most of current methodologies

More information

EDIminer: A Toolset for Process Mining from EDI Messages

EDIminer: A Toolset for Process Mining from EDI Messages EDIminer: A Toolset for Process Mining from EDI Messages Robert Engel 1, R. P. Jagadeesh Chandra Bose 2, Christian Pichler 1, Marco Zapletal 1, and Hannes Werthner 1 1 Vienna University of Technology,

More information

Understanding Web personalization with Web Usage Mining and its Application: Recommender System

Understanding Web personalization with Web Usage Mining and its Application: Recommender System Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,

More information

Mining Configurable Process Models from Collections of Event Logs

Mining Configurable Process Models from Collections of Event Logs Mining Configurable Models from Collections of Event Logs J.C.A.M. Buijs, B.F. van Dongen, and W.M.P. van der Aalst Eindhoven University of Technology, The Netherlands {j.c.a.m.buijs,b.f.v.dongen,w.m.p.v.d.aalst}@tue.nl

More information

ProM Framework Tutorial

ProM Framework Tutorial ProM Framework Tutorial Authors: Ana Karla Alves de Medeiros (a.k.medeiros@.tue.nl) A.J.M.M. (Ton) Weijters (a.j.m.m.weijters@tue.nl) Technische Universiteit Eindhoven Eindhoven, The Netherlands February

More information

Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts

Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts Marian Benner, Matthias Book, Tobias Brückmann, Volker Gruhn, Thomas Richter, Sema Seyhan paluno The Ruhr Institute

More information

Nr.: Fakultät für Informatik Otto-von-Guericke-Universität Magdeburg

Nr.: Fakultät für Informatik Otto-von-Guericke-Universität Magdeburg Nr.: Fakultät für Informatik Otto-von-Guericke-Universität Magdeburg Nr.: Fakultät für Informatik Otto-von-Guericke-Universität Magdeburg Impressum ( 5 TMG) Herausgeber: Otto-von-Guericke-Universität Magdeburg

More information

Process Mining in Big Data Scenario

Process Mining in Big Data Scenario Process Mining in Big Data Scenario Antonia Azzini, Ernesto Damiani SESAR Lab - Dipartimento di Informatica Università degli Studi di Milano, Italy antonia.azzini,ernesto.damiani@unimi.it Abstract. In

More information

10g versions followed on separate paths due to different approaches, but mainly due to differences in technology that were known to be huge.

10g versions followed on separate paths due to different approaches, but mainly due to differences in technology that were known to be huge. Oracle BPM 11g Platform Analysis May 2010 I was privileged to be invited to participate in "EMEA BPM 11g beta bootcamp" in April 2010, where I had close contact with the latest release of Oracle BPM 11g.

More information

Ensuring Business Process Compliance Along the Process Life Cycle

Ensuring Business Process Compliance Along the Process Life Cycle Ensuring Business Process Compliance Along the Process Life Cycle David Knuplesch and Manfred Reichert Abstract Business processes are subject to semantic constraints that stem from regulations, laws and

More information

Mercy Health System. St. Louis, MO. Process Mining of Clinical Workflows for Quality and Process Improvement

Mercy Health System. St. Louis, MO. Process Mining of Clinical Workflows for Quality and Process Improvement Mercy Health System St. Louis, MO Process Mining of Clinical Workflows for Quality and Process Improvement Paul Helmering, Executive Director, Enterprise Architecture Pete Harrison, Data Analyst, Mercy

More information

Relational XES: Data Management for Process Mining

Relational XES: Data Management for Process Mining Relational XES: Data Management for Process Mining B.F. van Dongen and Sh. Shabani Department of Mathematics and Computer Science, Eindhoven University of Technology, The Netherlands. B.F.v.Dongen, S.Shabaninejad@tue.nl

More information

Syllabus BT 416 Business Process Management

Syllabus BT 416 Business Process Management Stevens Institute of Technology Howe School of Technology Management Center of Excellence in Business Innovation Castle Point on the Hudson Hoboken, NJ 07030 Phone: +1.201.216.8293 Fax: +1.201.216.5385

More information

Supporting the Workflow Management System Development Process with YAWL

Supporting the Workflow Management System Development Process with YAWL Supporting the Workflow Management System Development Process with YAWL R.S. Mans 1, W.M.P. van der Aalst 1 Department of Mathematics and Computer Science, Eindhoven University of Technology, P.O. ox 513,

More information

Leading 20,000+ employees by a process-oriented management system

Leading 20,000+ employees by a process-oriented management system Leading 20,000+ employees by a process-oriented management system Insights to process management at Lufthansa Technik Group Mirko Kloppenburg 1, Janina Kettenbohrer 2, Daniel Beimborn 3, and Michael Bögle

More information

Analysis and Implementation of Workflowbased Supply Chain Management System

Analysis and Implementation of Workflowbased Supply Chain Management System Analysis and Implementation of Workflowbased Supply Chain Management System Yan Tu 1 and Baowen Sun 2 1 Information School, Central University of Finance and Economics, Beijing, 100081, P.R.China,Yolanda_tu@yahoo.com.cn

More information

Delta Analysis of Role-Based Access Control Models

Delta Analysis of Role-Based Access Control Models Delta Analysis of Role-Based Access Control Models Maria Leitner University of Vienna, Austria Faculty of Computer Science maria.leitner@univie.ac.at Abstract. Role-based Access Control (RBAC) is de facto

More information

Dotted Chart and Control-Flow Analysis for a Loan Application Process

Dotted Chart and Control-Flow Analysis for a Loan Application Process Dotted Chart and Control-Flow Analysis for a Loan Application Process Thomas Molka 1,2, Wasif Gilani 1 and Xiao-Jun Zeng 2 Business Intelligence Practice, SAP Research, Belfast, UK The University of Manchester,

More information

Computer Support for Agile Human-to-Human Interactions with Social Protocols

Computer Support for Agile Human-to-Human Interactions with Social Protocols Computer Support for Agile Human-to-Human Interactions with Social Protocols Willy Picard Poznań University of Economics, Department of Information Technologies, ul. Mansfelda 4, Poznań, Poland Willy.Picard@ue.poznan.pl,

More information

Analyzing Strategic Business Rules through Simulation Modeling

Analyzing Strategic Business Rules through Simulation Modeling Analyzing Strategic Business Rules through Simulation Modeling Elena Orta 1, Mercedes Ruiz 1 and Miguel Toro 2 1 Department of Computer Languages and Systems Escuela Superior de Ingeniería C/ Chile, 1

More information

Enabling Process Support for Advanced Applications with the AristaFlow BPM Suite

Enabling Process Support for Advanced Applications with the AristaFlow BPM Suite Enabling Process Support for Advanced Applications with the AristaFlow BPM Suite Andreas Lanz 1, Ulrich Kreher 2, Manfred Reichert 1, and Peter Dadam 1 1 Institute of Databases and Information Systems,

More information

Master Thesis September 2010 ALGORITHMS FOR PROCESS CONFORMANCE AND PROCESS REFINEMENT

Master Thesis September 2010 ALGORITHMS FOR PROCESS CONFORMANCE AND PROCESS REFINEMENT Master in Computing Llenguatges i Sistemes Informàtics Master Thesis September 2010 ALGORITHMS FOR PROCESS CONFORMANCE AND PROCESS REFINEMENT Student: Advisor/Director: Jorge Muñoz-Gama Josep Carmona Vargas

More information

Structural Detection of Deadlocks in Business Process Models

Structural Detection of Deadlocks in Business Process Models Structural Detection of Deadlocks in Business Process Models Ahmed Awad and Frank Puhlmann Business Process Technology Group Hasso Plattner Institut University of Potsdam, Germany (ahmed.awad,frank.puhlmann)@hpi.uni-potsdam.de

More information

Declaration of Conformity 21 CFR Part 11 SIMATIC WinCC flexible 2007

Declaration of Conformity 21 CFR Part 11 SIMATIC WinCC flexible 2007 Declaration of Conformity 21 CFR Part 11 SIMATIC WinCC flexible 2007 SIEMENS AG Industry Sector Industry Automation D-76181 Karlsruhe, Federal Republic of Germany E-mail: pharma.aud@siemens.com Fax: +49

More information

Business Process and Regulations Compliance Management Technology

Business Process and Regulations Compliance Management Technology Business Process and Regulations Compliance Management Technology Ilze Buksa Riga Technical University, Institute of Applied Computer Systems, Meza street 1/4, LV-1048, Riga, Latvia ilze.buksa@rtu.lv Supervisor

More information

Winery A Modeling Tool for TOSCA-based Cloud Applications

Winery A Modeling Tool for TOSCA-based Cloud Applications Institute of Architecture of Application Systems Winery A Modeling Tool for TOSCA-based Cloud Applications Oliver Kopp 1,2, Tobias Binz 2, Uwe Breitenbücher 2, and Frank Leymann 2 1 IPVS, 2 IAAS, University

More information

Towards Collaborative Requirements Engineering Tool for ERP product customization

Towards Collaborative Requirements Engineering Tool for ERP product customization Towards Collaborative Requirements Engineering Tool for ERP product customization Boban Celebic, Ruth Breu, Michael Felderer, Florian Häser Institute of Computer Science, University of Innsbruck 6020 Innsbruck,

More information

Analyzing a TCP/IP-Protocol with Process Mining Techniques

Analyzing a TCP/IP-Protocol with Process Mining Techniques Analyzing a TCP/IP-Protocol with Process Mining Techniques Christian Wakup 1 and Jörg Desel 2 1 rubecon information technologies GmbH, Germany 2 Fakultät für Mathematik und Informatik, FernUniversität

More information

ADAPTIVE SOA INFRASTRUCTURE BASED ON VARIABILITY MANAGEMENT. Peter Graubmann, Mikhail Roshchin

ADAPTIVE SOA INFRASTRUCTURE BASED ON VARIABILITY MANAGEMENT. Peter Graubmann, Mikhail Roshchin 70 ADAPTIVE SOA INFRASTRUCTURE BASED ON VARIABILITY MANAGEMENT Peter Graubmann, Mikhail Roshchin Abstract: In order to exploit the adaptability of a SOA infrastructure, it becomes necessary to provide

More information

BPM in Cloud Architectures: Business Process Management with SLAs and Events

BPM in Cloud Architectures: Business Process Management with SLAs and Events BPM in Cloud Architectures: Business Process Management with SLAs and Events Vinod Muthusamy and Hans-Arno Jacobsen University of Toronto 1 Introduction Applications are becoming increasingly distributed

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 1 CHAPTER 1 INTRODUCTION Exploration is a process of discovery. In the database exploration process, an analyst executes a sequence of transformations over a collection of data structures to discover useful

More information

Business Process Quality Metrics: Log-based Complexity of Workflow Patterns

Business Process Quality Metrics: Log-based Complexity of Workflow Patterns Business Process Quality Metrics: Log-based Complexity of Workflow Patterns Jorge Cardoso Department of Mathematics and Engineering, University of Madeira, Funchal, Portugal jcardoso@uma.pt Abstract. We

More information

Specification and Analysis of Contracts Lecture 1 Introduction

Specification and Analysis of Contracts Lecture 1 Introduction Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider gerardo@ifi.uio.no http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.

More information

Using Best Practice Models for Rapid Implementation of CRM on Demand

Using Best Practice Models for Rapid Implementation of CRM on Demand Using Best Practice Models for Rapid Implementation of CRM on Demand Thomas Karle PROMATIS software GmbH Ettlingen Keywords: Oracle CRM on Demand, Best Practice Reference Models, Business Process Management,

More information

Data Science. Research Theme: Process Mining

Data Science. Research Theme: Process Mining Data Science Research Theme: Process Mining Process mining is a relatively young research discipline that sits between computational intelligence and data mining on the one hand and process modeling and

More information

CS 565 Business Process & Workflow Management Systems

CS 565 Business Process & Workflow Management Systems CS 565 Business Process & Workflow Management Systems Professor & Researcher Department of Computer Science, University of Crete & ICS-FORTH E-mail: dp@csd.uoc.gr, kritikos@ics.forth.gr Office: K.307,

More information

Enterprise Integration: operational models of business processes and workflow systems *

Enterprise Integration: operational models of business processes and workflow systems * Enterprise Integration: operational models of business processes and workflow systems. 1 Enterprise Integration: operational models of business processes and workflow systems * G.Bruno 1, C.Reyneri 2 and

More information

Process-Family-Points

Process-Family-Points Process-Family-Points Sebastian Kiebusch 1, Bogdan Franczyk 1, and Andreas Speck 2 1 University of Leipzig, Faculty of Economics and Management, Information Systems Institute, Germany kiebusch@wifa.uni-leipzig.de,

More information

Semantic Analysis of Flow Patterns in Business Process Modeling

Semantic Analysis of Flow Patterns in Business Process Modeling Semantic Analysis of Flow Patterns in Business Process Modeling Pnina Soffer 1, Yair Wand 2, and Maya Kaner 3 1 University of Haifa, Carmel Mountain 31905, Haifa 31905, Israel 2 Sauder School of Business,

More information

A Business Process Services Portal

A Business Process Services Portal A Business Process Services Portal IBM Research Report RZ 3782 Cédric Favre 1, Zohar Feldman 3, Beat Gfeller 1, Thomas Gschwind 1, Jana Koehler 1, Jochen M. Küster 1, Oleksandr Maistrenko 1, Alexandru

More information

Decision Mining in Business Processes

Decision Mining in Business Processes Decision Mining in Business Processes A. Rozinat and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands {a.rozinat,w.m.p.v.d.aalst}@tm.tue.nl

More information

Change Pattern-Driven Traceability of Business Processes

Change Pattern-Driven Traceability of Business Processes Proceedings of the International MultiConference of Engineers and Computer Scientists 2014 Vol I,, March 12-14, 2014, Hong Kong Change Pattern-Driven Traceability of Business Processes Watcharin Uronkarn

More information

AMFIBIA: A Meta-Model for the Integration of Business Process Modelling Aspects

AMFIBIA: A Meta-Model for the Integration of Business Process Modelling Aspects AMFIBIA: A Meta-Model for the Integration of Business Process Modelling Aspects Björn Axenath, Ekkart Kindler, Vladimir Rubin Software Engineering Group, University of Paderborn, Warburger Str. 100, D-33098

More information

A METHOD FOR REWRITING LEGACY SYSTEMS USING BUSINESS PROCESS MANAGEMENT TECHNOLOGY

A METHOD FOR REWRITING LEGACY SYSTEMS USING BUSINESS PROCESS MANAGEMENT TECHNOLOGY A METHOD FOR REWRITING LEGACY SYSTEMS USING BUSINESS PROCESS MANAGEMENT TECHNOLOGY Gleison Samuel do Nascimento, Cirano Iochpe Institute of Informatics, Federal University of Rio Grande do Sul, Porto Alegre,

More information

Privacy-Aware Scheduling for Inter-Organizational Processes

Privacy-Aware Scheduling for Inter-Organizational Processes Privacy-Aware Scheduling for Inter-Organizational Processes Christoph Hochreiner Distributed Systems Group, Vienna University of Technology, Austria c.hochreiner@infosys.tuwien.ac.at Abstract Due to the

More information

Six Strategies for Building High Performance SOA Applications

Six Strategies for Building High Performance SOA Applications Six Strategies for Building High Performance SOA Applications Uwe Breitenbücher, Oliver Kopp, Frank Leymann, Michael Reiter, Dieter Roller, and Tobias Unger University of Stuttgart, Institute of Architecture

More information

Integrating the Internet of Things with Business Process Management: A Process-aware Framework for Smart Objects

Integrating the Internet of Things with Business Process Management: A Process-aware Framework for Smart Objects Integrating the Internet of Things with Business Process Management: A Process-aware Framework for Smart Objects Giovanni Meroni 1 Politecnico di Milano Dipartimento di Elettronica, Informazione e Bioingegneria

More information

Automatic Security Analysis of Business Processes

Automatic Security Analysis of Business Processes Automatic Security Analysis of Business Processes Daniel Ricardo dos Santos 1,2 Advisors: Silvio Ranise 1 Luca Compagna 2 Serena Ponta 2 1 Security and Trust - FBK 2 SAP Labs France October 21st, 2014

More information

Eventifier: Extracting Process Execution Logs from Operational Databases

Eventifier: Extracting Process Execution Logs from Operational Databases Eventifier: Extracting Process Execution Logs from Operational Databases Carlos Rodríguez 1, Robert Engel 2, Galena Kostoska 1, Florian Daniel 1, Fabio Casati 1, and Marco Aimar 3 1 University of Trento,

More information

SIMULATION STANDARD FOR BUSINESS PROCESS MANAGEMENT. 15 New England Executive Park The Oaks, Clews Road

SIMULATION STANDARD FOR BUSINESS PROCESS MANAGEMENT. 15 New England Executive Park The Oaks, Clews Road Proceedings of the 2011 Winter Simulation Conference S. Jain, R.R. Creasey, J. Himmelspach, K.P. White, and M. Fu, eds. SIMULATION STANDARD FOR BUSINESS PROCESS MANAGEMENT John Januszczak Geoff Hook Meta

More information

Bastian Koller HLRS High Performance Computing Center Stuttgart, University of Stuttgart Nobelstrasse 19 70550 Stuttgart +49-711-68565891

Bastian Koller HLRS High Performance Computing Center Stuttgart, University of Stuttgart Nobelstrasse 19 70550 Stuttgart +49-711-68565891 Negotiating SLAs with Dynamic Pricing Policies Peer Hasselmeyer NEC Laboratories Europe, IT Research Division, NEC Europe, Ltd. Rathausallee 10 53757 Sankt Augustin, Germany +49-2241-92520 hasselmeyer@it.neclab.eu

More information

Process Mining Tools: A Comparative Analysis

Process Mining Tools: A Comparative Analysis EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Process Mining Tools: A Comparative Analysis Irina-Maria Ailenei in partial fulfillment of the requirements for the degree

More information

Dr. Jana Koehler IBM Zurich Research Laboratory

Dr. Jana Koehler IBM Zurich Research Laboratory Precise Modeling of Business Processes with the Business Process Modeling Notation BPMN 2.0 Dr. Jana Koehler IBM Zurich Research Laboratory ZRL BIT at a Glance Computer Science at ZRL: Security/Cryptography

More information

Process Change Patterns: Recent Research, Use Cases, Research Directions

Process Change Patterns: Recent Research, Use Cases, Research Directions Process Change Patterns: Recent Research, Use Cases, Research Directions Manfred Reichert 1 and Barbara Weber 2 1 University of Ulm, Germany, manfred.reichert@uni-ulm.de 2 University of Innsbruck, Austria,

More information

Using BPMN for Modeling Manufacturing Processes

Using BPMN for Modeling Manufacturing Processes Using BPMN for Modeling Manufacturing Processes S. Zor 1, 2, K. Görlach 1,3, F. Leymann 1 1 Institute of Architecture of Application Systems, University of Stuttgart, Universitätsstraße 38, 70569 Stuttgart,

More information

Trace Clustering in Process Mining

Trace Clustering in Process Mining Trace Clustering in Process Mining M. Song, C.W. Günther, and W.M.P. van der Aalst Eindhoven University of Technology P.O.Box 513, NL-5600 MB, Eindhoven, The Netherlands. {m.s.song,c.w.gunther,w.m.p.v.d.aalst}@tue.nl

More information