A Privacy-Sensitive Collaborative Approach to Business Process Development

The objective of this paper is to enable organizations to generate an executable business process from high level design specifications. The basic idea is to exploit the knowledge of the existing business processes of related organizations to generate an executable business process for the given organization based on its requirements. However, this requires organizations with existing business processes to share their process execution sequences. Since the execution sequences (even after data sanitization) still include sensitive business information which organizations may not want to share with their competitors, this needs to be done in a privacy-sensitive way.

[1]  Radu Calinescu,et al.  Dynamic QoS Management and Optimization in Service-Based Systems , 2011, IEEE Transactions on Software Engineering.

[2]  Ashwin Machanavajjhala,et al.  No free lunch in data privacy , 2011, SIGMOD '11.

[3]  Tao Yu,et al.  Efficient algorithms for Web services selection with end-to-end QoS constraints , 2007, TWEB.

[4]  Vijayalakshmi Atluri,et al.  Dynamic Composition of Workflows for Customized eGovernment Service Delivery , 2002, DG.O.

[5]  Wil M. P. van der Aalst,et al.  Beyond Process Mining: From the Past to Present and Future , 2010, CAiSE.

[6]  Benjamin C. M. Fung,et al.  Differentially private transit data publication: a case study on the montreal transportation system , 2012, KDD.

[7]  Mikhail J. Atallah,et al.  Anonyfrag: an anonymization-based approach for privacy-preserving BPaaS , 2012, Cloud-I '12.

[8]  Frank McSherry,et al.  Privacy integrated queries: an extensible platform for privacy-preserving data analysis , 2009, SIGMOD Conference.

[9]  Wil M. P. van der Aalst,et al.  Workflow mining: discovering process models from event logs , 2004, IEEE Transactions on Knowledge and Data Engineering.

[10]  Huayu Zhang,et al.  Social Software for Coordination of Collaborative Process Activities , 2010, Business Process Management Workshops.

[11]  Cynthia Dwork,et al.  Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.

[12]  Luciano Baresi,et al.  Self-Supervising BPEL Processes , 2011, IEEE Transactions on Software Engineering.

[13]  Michael Prilla,et al.  Key challenges for enabling agile BPM with social software , 2011, J. Softw. Maintenance Res. Pract..

[14]  Francisco Curbera,et al.  Web Services Business Process Execution Language Version 2.0 , 2007 .

[15]  Hui Xiong,et al.  Semantics-Based Automated Service Discovery , 2012, IEEE Transactions on Services Computing.

[16]  Ricardo Bezerra de Andrade e Silva,et al.  Probabilistic workflow mining , 2005, KDD '05.

[17]  Mikhail J. Atallah,et al.  Privacy-Preserving Business Process Outsourcing , 2012, 2012 IEEE 19th International Conference on Web Services.

[18]  Sherif Sakr,et al.  Design by Selection: A Reuse-Based Approach for Business Process Modeling , 2011, ER.

[19]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.

[20]  Marco Brambilla,et al.  BPMN and Design Patterns for Engineering Social BPM Solutions , 2011, Business Process Management Workshops.

[21]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[22]  Hajo A. Reijers,et al.  Social software for business process modeling , 2010, J. Inf. Technol..

[23]  Vijayalakshmi Atluri,et al.  Using Semantics for Policy-Based Web Service Composition , 2005, Distributed and Parallel Databases.

[24]  Jianmin Wang,et al.  A novel approach for process mining based on event types , 2007, IEEE International Conference on Services Computing (SCC 2007).

[25]  Vijayalakshmi Atluri,et al.  Domain Knowledge-Based Automatic Workflow Generation , 2002, DEXA.

[26]  Florian Kerschbaum,et al.  Security against the business partner , 2008, SWS '08.

[27]  J. Ross Quinlan,et al.  Induction of Decision Trees , 1986, Machine Learning.

[28]  Schahram Dustdar,et al.  Non-intrusive monitoring and service adaptation for WS-BPEL , 2008, WWW.