A Logic-Based Methodology for Business Process Analysis and Design: Linking Business Policies to Workflow Models

Today, organizations often need to modify their business processes to cope with changes in the environment, such as mergers/acquisitions, new government regulations, and new customer demand. Most organizations also have a set of business policies defining the way they conduct their business. Although there has been extensive research on process analysis and design, how to systematically extract workflow models from business policies has not been studied, resulting in a missing link between the specification of business policies and the modeling of business processes. Given that process changes are often determined by executives and managers at the policy level, the aforementioned missing link often leads to inefficient and inaccurate implementation of process changes by business analysts and process designers. We refer to this problem as the policy mismatch problem in business process management. For organizations with large-scale business processes and a large number of business policies, solving the policy mismatch problem is very difficult and challenging. In this dissertation, we attempt to provide a formal link between business policies and workflow models by proposing a logic-based methodology for process analysis and design. In particular, we first propose a Policy-driven Process Design (PPD) methodology to formalize the procedure of extracting workflow models from business policies. In PPD, narrative process policies are parsed into precise information on various workflow components, and a set of process design rules and algorithms are applied to generate workflow models from that information. We also develop a logic-based process modeling language named Unified Predicate

[1]  Sudha Ram,et al.  SEAM: A State-Entity-Activity-Model for a Well-Defined Workflow Development Methodology , 2002, IEEE Trans. Knowl. Data Eng..

[2]  Thomas Peltier Information Security: Policies and Procedures: A Practitioner's Reference , 1998 .

[3]  Mark Klein,et al.  Introduction to the Special Issue on Adaptive Workflow Systems , 2000, Computer Supported Cooperative Work (CSCW).

[4]  M. Hammer,et al.  Reengineering the Corporation , 1993 .

[5]  Roshan K. Thomas,et al.  Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments , 1997, RBAC '97.

[6]  Ritu Agarwal,et al.  Formal validation of a knowledge-based system using a variation of the Turing test , 1993 .

[7]  Akhil Kumar,et al.  Organizational modeling in UML and XML in the context of workflow systems , 2003, SAC '03.

[8]  Robin J. Wilson Introduction to Graph Theory , 1974 .

[9]  David Geer,et al.  Taking Steps to Secure Web Services , 2003, Computer.

[10]  Charles G. Cobb Enterprise Process Mapping: Integrating Systems For Compliance And Business Excellence , 2004 .

[11]  Maria E. Orlowska,et al.  Data Flow and Validation in Workflow Modelling , 2004, ADC.

[12]  Jay F. Nunamaker A methodology for the design and optimization of information processing systems , 1899 .

[13]  Maria E. Orlowska,et al.  Modeling and Verification of Workflow Graphs , 1996 .

[14]  Robert W. Blanning,et al.  Metagraphs: a tool for modeling decision support systems , 1994 .

[15]  Vijayalakshmi Atluri,et al.  An Extended Petri Net Model for Supporting Workflows in a Multilevel Secure Environment , 1996, DBSec.

[16]  Daniel Teichroew Problem Statement Languages in MIS , 1971 .

[17]  J. Bloem,et al.  Making IT Governance Work in a Sarbanes-Oxley World , 2005 .

[18]  Vijayalakshmi Atluri,et al.  Enforcing Mandatory and Discretionary Security in Workflow Management Systems , 1997, J. Comput. Secur..

[19]  Benjamin N. Grosof,et al.  SweetDeal : Represen with Exceptions using and Process , 2003 .

[20]  William J. Kettinger,et al.  Business Process Change: A Study of Methodologies, Techniques, and Tools , 1997, MIS Q..

[21]  Silvana Castano,et al.  Managing Workflow Authorization Constraints through Active Database Technology , 2001, Inf. Syst. Frontiers.

[22]  P. R. Balasubramanian,et al.  Adding workflow analysis techniques to the IS development toolkit , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.

[23]  Wil M. P. van der Aalst,et al.  Verification of Workflow Nets , 1997, ICATPN.

[24]  M. Z. Muehlen Evaluation of Workflow Management Systems using Meta Models , 1999, HICSS.

[25]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[26]  Vijayalakshmi Atluri,et al.  An Authorization Model for Workflows , 1996, ESORICS.

[27]  Jae Kyu Lee,et al.  The eXtensible Rule Markup Language , 2003, CACM.

[28]  Fabio Casati,et al.  Specification and implementation of exceptions in workflow management systems , 1999, TODS.

[29]  Michael zur Muehlen,et al.  Organizational Management in Workflow Applications - Issues and Perspectives , 2004, Inf. Technol. Manag..

[30]  Mathias Weske,et al.  A reference model for workflow application development processes , 1999, WACC '99.

[31]  Wil M. P. van der Aalst,et al.  Workflow Patterns , 2004, Distributed and Parallel Databases.

[32]  Robert W. Blanning,et al.  A Formal Approach to Workflow Analysis , 2000, Inf. Syst. Res..

[33]  Wil M. P. van der Aalst,et al.  Workflow Resource Patterns: Identification, Representation and Tool Support , 2005, CAiSE.

[34]  Wil M. P. van der Aalst,et al.  Verification Of Workflow Task Structures: A Petri-net-baset Approach , 2000, Inf. Syst..

[35]  Elisa Bertino,et al.  The specification and enforcement of authorization constraints in workflow management systems , 1999, TSEC.

[36]  Akhil Kumar,et al.  Research Commentary: Workflow Management Issues in e-Business , 2002, Inf. Syst. Res..

[37]  Vijayalakshmi Atluri,et al.  Analysing the Safety of Workflow Authorization Models , 1998, DBSec.

[38]  Richard J. Mayer,et al.  Information Integration for Concurrent Engineering (IICE) IDEF3 Process Description Capture Method Report , 1992 .

[39]  Maria E. Orlowska,et al.  Managing Change and Time in Dynamic Workflow Processes , 2000, Int. J. Cooperative Inf. Syst..

[40]  Benjamin N. Grosof,et al.  Representing E-Business Rules for the Semantic Web: Situated Courteous Logic Programs in RuleML , 2001 .

[41]  Robert W. Blanning,et al.  Synthesis and Decomposition of Processes in Organizations , 2003, Inf. Syst. Res..

[42]  Henry H. Bi,et al.  Mending the Lag between Commercial Needs and Research Prototypes: A Logic-Based Workflow Verification Approach , 2003 .

[43]  F. Caeldries Reengineering the Corporation: A Manifesto for Business Revolution , 1994 .

[44]  Henry H. Bi,et al.  Applying Propositional Logic to Workflow Verification , 2004, Inf. Technol. Manag..

[45]  Hajo A. Reijers,et al.  Product-Based Workflow Design , 2003, J. Manag. Inf. Syst..

[46]  Leon Sterling,et al.  The art of Prolog (2nd ed.): advanced programming techniques , 1994 .

[47]  Silvana Castano,et al.  Using Patterns to Design Rules in Workflows , 2000, IEEE Trans. Software Eng..

[48]  C. R. Ramakrishnan,et al.  Logic based modeling and analysis of workflows , 1998, PODS '98.

[49]  Elisa Bertino,et al.  A Semantic-Based Execution Model for Multilevel Secure Workflows , 2000, J. Comput. Secur..

[50]  Peter Dadam,et al.  Evaluation of Correctness Criteria for Dynamic Workflow Changes , 2003, Business Process Management.

[51]  August-Wilhelm Scheer,et al.  ARIS - Business Process Modeling , 1998 .

[52]  V. Daniel Hunt,et al.  Process Mapping: How to Reengineer Your Business Processes , 1996 .

[53]  Silvana Castano,et al.  Enforcing Workflow Authorization Constraints Using Triggers , 1998, J. Comput. Secur..

[54]  Michael zur Muehlen,et al.  Resource Modeling in Workflow Applications , 1999 .

[55]  Frank Leymann,et al.  Web services and business process management , 2002, IBM Syst. J..

[56]  Wil M. P. van der Aalst,et al.  The Application of Petri Nets to Workflow Management , 1998, J. Circuits Syst. Comput..

[57]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[58]  Mohan Tanniru,et al.  Information System Verification and Validation during Requirement Analysis Using Petri Nets , 1989, J. Manag. Inf. Syst..

[59]  Manfred Reichert,et al.  Adeptflex—Supporting Dynamic Changes of Workflows Without Losing Control , 1998, Journal of Intelligent Information Systems.

[60]  C. Peltz Web Ser Vices Orchestration a Review of Emerging Technologies, Tools, and Standards , 2003 .

[61]  Vijayalakshmi Atluri,et al.  Modeling and Analysis of Workflows Using Petri Nets , 1998, Journal of Intelligent Information Systems.

[62]  Mark Klein,et al.  A Knowledge-based Approach to Handling Exceptions in Workflow Systems , 2011, Computer Supported Cooperative Work (CSCW).

[63]  Rudolf Vetschera,et al.  Algorithmical approaches to business process design , 2001, Comput. Oper. Res..

[64]  Anindya Datta,et al.  Automating the Discovery of AS-IS Business Process Models: Probabilistic and Algorithmic Approaches , 1998, Inf. Syst. Res..

[65]  Ravi S. Sandhu,et al.  Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management , 1997, DBSec.

[66]  August-Wilhelm Scheer,et al.  ARIS - Business Process Frameworks , 1998 .

[67]  Christoph Bussler,et al.  Workflow Management: Modeling Concepts, Architecture and Implementation , 1996 .

[68]  Bill Curtis,et al.  Process modeling , 1992, CACM.

[69]  Wil M. P. van der Aalst,et al.  Exterminating the Dynamic Change Bug: A Concrete Approach to Support Workflow Change , 2001, Inf. Syst. Frontiers.

[70]  Ernest A. Hershey,et al.  PSL/PSA: A Computer-Aided Technique for Structured Documentation and Analysis of Information Processing Systems , 1976, IEEE Transactions on Software Engineering.

[71]  Tariq Aldowaisan,et al.  Business process reengineering: an approach for process mapping , 1999 .

[72]  Olivia R. Liu Sheng,et al.  Data Flow Modeling and Verification in Business Process Management , 2004, AMCIS.

[73]  J. Leon Zhao,et al.  Workflow Automation: Overview and Research Issues , 2001, Inf. Syst. Frontiers.

[74]  Ernest Friedman Jess in action: rule-based systems in java , 2003 .

[75]  D. West Introduction to Graph Theory , 1995 .

[76]  Tony Andrews Business Process Execution Language for Web Services Version 1.1 , 2003 .

[77]  Clarence A. Ellis,et al.  ML-DEWS: Modeling Language to Support Dynamic Evolution within Workflow Systems , 2000, Computer Supported Cooperative Work (CSCW).

[78]  Robert W. Blanning,et al.  Metagraphs in workflow support systems , 1999, Decis. Support Syst..

[79]  Dickson K. W. Chiu,et al.  A Meta Modeling Approach to Workflow Management Systems Supporting Exception Handling , 1999, Inf. Syst..

[80]  Martin Naedele Standards for XML and Web Services Security , 2003, Computer.

[81]  William L. Oellermann Architecting Web Services , 2001, Apress.

[82]  Wil M. P. van der Aalst,et al.  Workflow Verification: Finding Control-Flow Errors Using Petri-Net-Based Techniques , 2000, Business Process Management.

[83]  Ritu Agarwal,et al.  Knowledge-based approach to structural integrity verification in requirements analysis and logical system specification , 1993, Knowl. Based Syst..

[84]  Richard N. Taylor,et al.  Techniques for Supporting Dynamic and Adaptive Workflow , 2000, Computer Supported Cooperative Work (CSCW).

[85]  Wil M. P. van der Aalst,et al.  Re-engineering knock-out processes , 2001, Decis. Support Syst..

[86]  Saikat Mukherjee,et al.  Logic Based Approaches to Workflow Modeling and Verification , 2003, Logics for Emerging Applications of Databases.

[87]  Shengli Wu,et al.  Authorization and Access Control of Application Data in Workflow Systems , 2004, Journal of Intelligent Information Systems.

[88]  Tadao Murata,et al.  Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.

[89]  Grzegorz Rozenberg,et al.  Dynamic change within workflow systems , 1995, COCS '95.

[90]  Marlon Dumas,et al.  Pattern Based Analysis of BPEL4WS , 2002 .

[91]  Henry H. Bi,et al.  Process Logic for Verifying the Correctness of Business Process Models , 2004, ICIS.

[92]  Padhraic Smyth,et al.  Analysis and Visualization of Network Data using JUNG , 2005 .