Process Mining Approaches to Detect Organizational Properties in Cyber-Physical Systems

Cyber-physical systems (CPS) are service systems that connect physical and cyber elements through global networks. CPS put upon sensors and actuators as well as omnipresent status data of smart products in order to facilitate the design of innovative service offerings. CPS typically require the cooperation of several actors such as manufacturers of smart products and service providers. Organizational mining uses event log data produced by information systems to explore organizational structures and to analyze social networks representing communication structures. Hence, organizational mining is a promising approach for changing the organization of several actors in a CPS for the better and for improving the delivery of innovative CPS service offerings. However, approaches of this kind so far have not been discussed with regard to CPS. From a review of the literature on organizational mining this article therefore identifies 18 different approaches, and it discusses their requirements and possible challenges and obstacles of using them in a CPS. The main results from the analysis include that organizational mining may generally be well applicable to CPS while some serious challenges related to CPS characteristics such as distribution in space, different levels of granularity, and time issues require for further research.

[1]  Anne Baumgraß,et al.  Deriving Current State RBAC Models from Event Logs , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[2]  Wil M. P. van der Aalst,et al.  Process mining: a research agenda , 2004, Comput. Ind..

[3]  Yair Levy,et al.  A Systems Approach to Conduct an Effective Literature Review in Support of Information Systems Research , 2006, Informing Sci. Int. J. an Emerg. Transdiscipl..

[4]  Hermann Kopetz Temporal Uncertainties in Cyber-Physical Systems , 2012, Advances in Real-Time Systems.

[5]  Michael Eckert,et al.  Complex Event Processing (CEP) , 2009, Informatik-Spektrum.

[6]  David R. Kuhn,et al.  Role-Based Access Control (RBAC): Features and Motivations | NIST , 1995 .

[7]  Weidong Zhao,et al.  Mining the Role-Oriented Process Models Based on Genetic Algorithm , 2012, ICSI.

[8]  Ariane Hellinger,et al.  > Cyber-physical Systems Driving Force for Innovation in Mobility, Health, Energy and Production Acatech (ed.) , .

[9]  Peter Dadam,et al.  Mining Staff Assignment Rules from Event-Based Data , 2005, Business Process Management Workshops.

[10]  Weihui Dai,et al.  Role-Activity Diagrams Modeling Based on Workflow Mining , 2009, 2009 WRI World Congress on Computer Science and Information Engineering.

[11]  Wil M. P. van der Aalst,et al.  Towards comprehensive support for organizational mining , 2008, Decis. Support Syst..

[12]  Zhiwei Ni,et al.  Mining organizational structure from workflow logs , 2011, Proceeding of the International Conference on e-Education, Entertainment and e-Management.

[13]  Ming Li,et al.  A process mining based approach to knowledge maintenance , 2011, Inf. Syst. Frontiers.

[14]  Richard T. Watson,et al.  Analyzing the Past to Prepare for the Future: Writing a Literature Review , 2002, MIS Q..

[15]  Jorge Lobo,et al.  Mining roles with semantic meanings , 2008, SACMAT '08.

[16]  Wil M. P. van der Aalst,et al.  Process Mining - Discovery, Conformance and Enhancement of Business Processes , 2011 .

[17]  Ken Barker,et al.  Role Mining in Access History Logs , 2009 .

[18]  Ehud Gudes,et al.  Mining Roles from Web Application Usage Patterns , 2011, TrustBus.

[19]  David Broman,et al.  Temporal Issues in Cyber-Physical Systems , 2013 .

[20]  Hajo A. Reijers,et al.  Discovering Social Networks from Event Logs , 2005, Computer Supported Cooperative Work (CSCW).

[21]  Bart Baesens,et al.  A multi-dimensional quality assessment of state-of-the-art process discovery algorithms using real-life event logs , 2012, Inf. Syst..

[22]  Jiafu Wan,et al.  A survey of Cyber-Physical Systems , 2011, 2011 International Conference on Wireless Communications and Signal Processing (WCSP).

[23]  Stefan Rilling,et al.  Using complex event processing for modelling and simulation of cyber-physical systems , 2013, Int. J. Crit. Infrastructures.

[24]  Asok Ray,et al.  Autonomous perception and decision-making in cyber-physical systems , 2013, ICCSE 2013.

[25]  Ying Tan,et al.  Spatio-Temporal Event Model for Cyber-Physical Systems , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems Workshops.

[26]  Edward J. Coyne Role engineering , 1996, RBAC '95.

[27]  D. Richard Kuhn,et al.  Role-Based Access Control ( RBAC ) : Features and Motivations , 2014 .

[28]  Walid Gaaloul,et al.  Performative-Based Mining of Workflow Organizational Structures , 2012, EC-Web.

[29]  Mark Strembeck,et al.  Deriving Process-Related RBAC Models from Process Execution Histories , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops.

[30]  Tao Jin,et al.  Organizational Modeling from Event logs , 2007, Sixth International Conference on Grid and Cooperative Computing (GCC 2007).

[31]  Wil M. P. van der Aalst,et al.  Analyzing Resource Behavior Using Process Mining , 2009, Business Process Management Workshops.

[32]  Martin Matzner,et al.  Statistical Sequence Analysis For Business Process Mining And Organizational Routines , 2013, ECIS.