Semantic Normalization and Matching of Business Dependency Models

Assessing potential threats and impacts relevant for a company, requires a detailed analysis of a company's business processes and functions down to a level of infrastructure resources, in the form of one business dependency model. Required information is frequently encapsulated in BPMN models per process, but pose an eminent problem of fusing and merging multiple sources into one model. Experts defining BPMN models possibly use different nomenclature, descriptions, and references towards common entities, leading to semantically overlapping partial dependency models. Merging multiple partial dependency models is a novel problem related to the business process matching problem, but origins from an orthogonal perspective. In this paper we propose a business dependency model normalization and matching approach by exploiting structures and dependencies of business resources, which neither requires linguistic processing nor "fuzzy" matching processes.

[1]  Julian R. Ullmann,et al.  An Algorithm for Subgraph Isomorphism , 1976, J. ACM.

[2]  S. Musman,et al.  Evaluating the Impact of Cyber Attacks on Missions , 2010 .

[3]  Kevin Crowston,et al.  Organizing Business Knowledge: The MIT Process Handbook , 2003 .

[4]  Jérôme Euzenat,et al.  Ten Challenges for Ontology Matching , 2008, OTM Conferences.

[5]  John R. Goodall,et al.  Camus: Automatically mapping Cyber Assets to Missions and Users , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[6]  Uros Cibej,et al.  Improvements to Ullmann's Algorithm for the Subgraph Isomorphism Problem , 2015, Int. J. Pattern Recognit. Artif. Intell..

[7]  John R. Goodall,et al.  Mission Impact of Cyber Events: Scenarios and Ontology to Express the Relationships between Cyber Assets, Missions, and Users , 2009 .

[8]  Sushil Jajodia,et al.  Reliable mission deployment in vulnerable distributed systems , 2013, 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W).

[9]  Paulo Cesar G. da Costa,et al.  Using a Semantic Approach to Cyber Impact Assessment , 2013, STIDS.

[10]  Remco M. Dijkman,et al.  Graph Matching Algorithms for Business Process Model Similarity Search , 2009, BPM.

[11]  Jérôme Euzenat,et al.  Ontology Matching: State of the Art and Future Challenges , 2013, IEEE Transactions on Knowledge and Data Engineering.

[12]  Kevin Crowston,et al.  Coordination Theory: A Ten-Year Retrospective , 2004, Computer Supported Acitivity Coordination.

[13]  Ralf Möller,et al.  Probabilistic Mission Impact Assessment based on Widespread Local Events , 2015 .

[14]  Kevin Crowston,et al.  Tools for inventing organizations: toward a handbook of organizational processes , 1993, [1993] Proceedings Second Workshop on Enabling Technologies@m_Infrastructure for Collaborative Enterprises.

[15]  Gabriel Jakobson,et al.  Mission cyber security situation assessment using impact dependency graphs , 2011, 14th International Conference on Information Fusion.