Specification, Verification and Explanation of Violation for Data Aware Compliance Rules
نویسندگان
چکیده
Compliance checking is becoming an inevitable step in the business processes management life cycle. Languages for expressing compliance requirements should address the fundamental aspects of process modeling, i.e. control flow, data handling, and resources. Most of compliance checking approaches focus on verifying aspects related to control flow. Moreover, giving useful feedback in case of violation is almost neglected. In this paper, we demonstrate how data can be incorporated into the specification of compliance rules. We call these rules data aware. Building upon our previous work, we extend BPMN-Q,a query language we developed, to express these rules as queries and formalize these rules by mapping into PLTL. In addition, whenever a compliance rule is violated, execution paths causing violations are visualized to the user. To achieve this, temporal logic querying is used.
منابع مشابه
Web Service Choreography Verification Using Z Formal Specification
Web Service Choreography Description Language (WS-CDL) describes and orchestrates the services interactions among multiple participants. WS-CDL verification is essential since the interactions would lead to mismatches. Existing works verify the messages ordering, the flow of messages, and the expected results from collaborations. In this paper, we present a Z specification of WS-CDL. Besides ve...
متن کاملA model for specification, composition and verification of access control policies and its application to web services
Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...
متن کاملSpecification and Verification of Interaction Protocols: a Computational Logic Approach Based on Abduction
In this paper we propose a logic-based approach for the specification and verification of interaction protocols. We give the syntax of the proposed language, declarative and operational semantics of an abductive proof procedure for compliance verification. The proof procedure uses constraints for efficiently dealing with large-scale problems, and is implemented in Constraint Handling Rules. We ...
متن کاملSeaFlows Toolset - Compliance Verification Made Easy for Process-Aware Information Systems
In the light of an increasing demand on business process compliance, the veri cation of process models against compliance rules has become essential in enterprise computing. The SeaFlows Toolset featured in this paper extends process-aware information systems with compliance checking functionality. It provides a user-friendly environment for modeling compliance rules using a graph-based formali...
متن کاملSeaFlows Toolset - Compliance Verification Made Easy
In the light of an increasing demand on business process compliance, the veri cation of process models against compliance rules has become essential in enterprise computing. The SeaFlows Toolset featured in this tool demonstration extends process-aware information system by compliance checking functionality. It provides a user-friendly environment for modeling compliance rules using a graph-bas...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009