A New Framework for Reusing Business Processes Via Mashup

2017 ◽  
Vol 8 (4) ◽  
pp. 52-70
Author(s):  
Zenak Fethia ◽  
Zaoui Lynda

This article describes how in the last decade, business process repositories have grown significantly and the need for new processes to answer increasing market demands, has become a central interest of modern enterprises. However, developing open source business processes (BP) from scratch is one of the most time-consuming and high-cost tasks. Therefore, reusing mechanisms becomes a priority to deal with this issue. In this article, it is proposed that an open source user-friendly framework that mixes parts of existing process components to build a new process, in order to respond to a particular goal. This is known as business process mashup (BP_Mashup). The BP_mashup framework presented in this article allows users to perform a mixture of process fragments using a simple interface with a set of graphical and temporal events operators based on a formal model.

2021 ◽  
Vol 14 (1) ◽  
pp. 281-295
Author(s):  
Irene Tangkawarow ◽  
◽  
Riyanarto Sarno ◽  
Daniel Siahaan ◽  
◽  
...  

The Semantics of Business Vocabulary and Rules (SBVR) standard was developed by the Object Management Group (OMG) for business purposes. SBVR is used for transformation of business vocabulary and business rules into business processes. Gateways are used for regulating the divergence and convergence of flow objects in the business process. The existing business rules in SVBR do not support all gateways in BPMN, whereas there are conditions where branching situations in business rules occur. This article introduces parallelism rules (OR rules) and complex rules to increase 50.6% usage of the existing AND rules and XOR rules in SBVR. The main contribution of this research is to introduce new formal model of inclusive gateway (OR) and complex gateway that allow parallelism and branching to be modeled using SBVR. Thus, this study increases coverage of the usage gateway in SBVR achieved 66.7%. The authors provide branching cases with various levels of complexity, i.e. nested conditions and non-free choice conditions, using the formal description of SBVR.


Author(s):  
Yuhong Yan ◽  
Philippe Dague ◽  
Yannick Pencolé ◽  
Marie-Odile Cordier

Web services based on a service-oriented architecture framework provide a suitable technical foundation for business process management and integration. A business process can be composed of a set of Web services that belong to different companies and interact with each other by sending messages. Web service orchestration languages are defined by standard organizations to describe business processes composed of Web services. A business process can fail for many reasons, such as faulty Web services or mismatching messages. It is important to find out which Web services are responsible for a failed business process because we could penalize these Web services and exclude them from the business process in the future. In this paper, we propose a model-based approach to diagnose the faults in a Web service-composed business process. We convert a Web service orchestration language, more specifically BPEL4WS, into synchronized automata, so that we have a formal description of the topology and variable dependency of the business process. After an exception is thrown, the diagnoser can calculate the business process execution trajectory based on the formal model and the observed evolution of the business process. The faulty Web services are deduced from the variable dependency on the execution trajectory. We demonstrate our diagnosis technique with an example.


2018 ◽  
Vol 14 (3) ◽  
pp. 372-398
Author(s):  
Dipty Tripathi ◽  
Shreya Banerjee ◽  
Anirban Sarkar

Purpose Business process workflow is a design conceptualization to automate the sequence of activities to achieve a business goal with involved participants and a predefined set of rules. Regarding this, a formal business workflow model is a prime requisite to implement a consistent and rigorous business process. In this context, majority of the existing research works are formalized structural features and have not focused on functional and behavioral design aspects of business processes. To address this problem, this paper aims to propose a formal model of business process workflow called as business process workflow using typed attributed graph (BPWATG) enriched with structural, functional and behavioral characteristics of business processes. Design/methodology/approach Typed attributed graph (ATG) and first-order logic have been used to formalize proposed BPWATG to provide rigorous syntax and semantics towards business process workflows. This is an effort to execute a business workflow on an automated machine. Further, the proposed BPWATG is illustrated using a case study to show the expressiveness of proposed model. Besides, the proposed graph is initially validated using generic modelling environment (GME) case tool. Moreover, a comparative study is performed with existing formal approaches based on several crucial features to exhibit the effectiveness of proposed BPWATG. Findings The proposed model is capable of facilitating structural, functional and behavioral aspects of business process workflows using several crucial features such as dependency conceptualization, timer concepts, exception handling and deadlock detection. These features are used to handle real-world problems and ensure the consistency and correctness of business workflows. Originality/value BPWATG is proposed to formalize a business workflow that is required to make a model of business process machine-readable. Besides, formalizations of dependency conceptualization, exception handling, deadlock detection and time-out concepts are specified. Moreover, several non-functional properties (reusability, scalability, flexibility, dynamicity, reliability and robustness) are supported by the proposed model.


2011 ◽  
pp. 1970-1993 ◽  
Author(s):  
Yuhong Yan ◽  
Philippe Dague ◽  
Yannick Pencolé ◽  
Marie-Odile Cordier

Web service orchestration languages are defined to describe business processes composed of Web services. A business process can fail for many reasons, such as faulty Web services or mismatching messages. It is important to find out which Web services are responsible for a failed business process because we could penalize these Web services and exclude them from the business process in the future. In this paper, we propose a model-based approach to diagnose the faults in a Web service-composed business process. We convert a Web service orchestration language, BPEL4WS, into synchronized automata, so that we have a formal description of the topology and variable dependency of the business process. After an exception is thrown, the diagnoser can calculate the business process execution trajectory based on the formal model and the observed evolution of the business process. The faulty Web services are deduced from the variable dependency on the execution trajectory.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Sohei Ito ◽  
Dominik Vymětal ◽  
Roman Šperka

Purpose The need for assuring correctness of business processes in enterprises is widely recognised in terms of business process re-engineering and improvement. Formal methods are a promising approach to this issue. The challenge in business process verification is to create a formal model that is well-aligned to the reality. Process mining is a well-known technique to discover a model of a process based on facts. However, no studies exist that apply it to formal verification. This study aims to propose a methodology for formal business process verification by means of process mining, and attempts to clarify the challenges and necessary technologies in this approach using a case study. Design/methodology/approach A trading company simulation model is used as a case study. A workflow model is discovered from an event log produced by a simulation tool and manually complemented to a formal model. Correctness requirements of both domain-dependent and domain-independent types of the model are checked by means of model-checking. Findings For business process verification with both domain-dependent and domain-independent correctness requirements, more advanced process mining techniques that discover data-related aspects of processes are desirable. The choice of a formal modelling language is also crucial. It depends on the correctness requirements and the characteristics of the business process. Originality/value Formal verification of business processes starting with creating its formal model is quite new. Furthermore, domain-dependent and domain-independent correctness properties are considered in the same framework, which is also new. This study revealed necessary technologies for this approach with process mining.


Author(s):  
Bibit - Sudarsono ◽  
Umi - Faddillah

Printing service order information systems sometimes experience problems in completing running business processes including, frequent loss and inaccuracy in registering orders from customers, often also losing order data from customers, recording orders often experience errors, resulting inaccurate reporting of order data. A computerized ordering service information system will greatly help improve performance and accuracy in making reports on business processes running at a company. The existence of enterprise modeling of information systems ordering printing services with the TOGAF framework will be a method that greatly helps management make a decision that will synergize with the business process activities at the company. So that the objectives of the system can be achieved properly. The TOGAF framework can be a solution and will help to produce a system architecture design, a business process architecture, a technology architecture, a number of proposed business opportunity strategy proposals and an ongoing system change proposal.


2020 ◽  
Vol 23 (11) ◽  
pp. 1269-1290
Author(s):  
A.A. Turgaeva

Subject. This article analyzes the business processes in the insurance company, using the method of their operation with the selection of key areas of activity. Objectives. The article aims to describe certain business processes in insurance, highlighting participants, lines of activity, and the sequence of procedures. It analyzes the business process Settlement of Losses, which is one of the significant business processes in the insurance company. Methods. For the study, I used the methods of induction and deduction, analogy, and the systems approach. Results. Based on the analysis and description of business processes in the insurance company and the identification of key elements and steps in terms of the effectiveness of decisions, the article identifies the checkpoints of Entry and Exit, activity direction, and resources of the Settlement of Losses process. Conclusions. The application of the categories that split business processes makes it possible to develop step regulation for all processes and acceptable control procedures for different operations. The presented checkpoints at different steps of the business process will help identify weaknesses and eliminate them by re-checking the point.


Author(s):  
T.B. Aldongar ◽  
◽  
F.U. Malikova ◽  
G.B. Issayeva ◽  
B.R. Absatarova ◽  
...  

The creation of information models requires the use of known methods and the development of new methods of formalizing the pre-design research process. The modeling process consists of four stages: data collection on the object of management - pre-project research; creation of a graphical model of business processes taking place in the enterprise; development of a formal model of business processes; business research by optimizing the formal model. To support the creation of workflow management services and systems, the complex offers methodologies, standards and specialized software that make up the developer's tools. This can be ensured only by modern automated methods based on information systems. It is important that the information collected is structured to meet the needs of potential users and stored in a form that allows the use of modern access technologies. Before discussing the effectiveness of FIM, it should be noted that the basic concept of information itself is still not the same. In a pragmatic way, it is a set of messages in the form of an important document for the system. Information can be evaluated not only by volume, but also by various parameters, the most important of which are: timeliness, relevance, value, aging, accuracy, etc. in addition, the information may be clear, probable and accurate. The methods of its reception and processing are different in each case.


Author(s):  
Maaz Sirkhot ◽  
Ekta Sirwani ◽  
Aishwarya Kourani ◽  
Akshit Batheja ◽  
Kajal Jethanand Jewani

In this technological world, smartphones can be considered as one of the most far-reaching inventions. It plays a vital role in connecting people socially. The number of mobile users using an Android based smartphone has increased rapidly since last few years resulting in organizations, cyber cell departments, government authorities feeling the need to monitor the activities on certain targeted devices in order to maintain proper functionality of their respective jobs. Also with the advent of smartphones, Android became one of the most popular and widely used Operating System. Its highlighting features are that it is user friendly, smartly designed, flexible, highly customizable and supports latest technologies like IoT. One of the features that makes it exclusive is that it is based on Linux and is Open Source for all the developers. This is the reason why our project Mackdroid is an Android based application that collects data from the remote device, stores it and displays on a PHP based web page. It is primarily a monitoring service that analyzes the contents and distributes it in various categories like Call Logs, Chats, Key logs, etc. Our project aims at developing an Android application that can be used to track, monitor, store and grab data from the device and store it on a server which can be accessed by the handler of the application.


Author(s):  
Matteo Zavatteri ◽  
Carlo Combi ◽  
Luca Viganò

AbstractA current research problem in the area of business process management deals with the specification and checking of constraints on resources (e.g., users, agents, autonomous systems, etc.) allowed to be committed for the execution of specific tasks. Indeed, in many real-world situations, role assignments are not enough to assign tasks to the suitable resources. It could be the case that further requirements need to be specified and satisfied. As an example, one would like to avoid that employees that are relatives are assigned to a set of critical tasks in the same process in order to prevent fraud. The formal specification of a business process and its related access control constraints is obtained through a decoration of a classic business process with roles, users, and constraints on their commitment. As a result, such a process specifies a set of tasks that need to be executed by authorized users with respect to some partial order in a way that all authorization constraints are satisfied. Controllability refers in this case to the capability of executing the process satisfying all these constraints, even when some process components, e.g., gateway conditions, can only be observed, but not decided, by the process engine responsible of the execution. In this paper, we propose conditional constraint networks with decisions (CCNDs) as a model to encode business processes that involve access control and conditional branches that may be both controllable and uncontrollable. We define weak, strong, and dynamic controllability of CCNDs as two-player games, classify their computational complexity, and discuss strategy synthesis algorithms. We provide an encoding from the business processes we consider here into CCNDs to exploit off-the-shelf their strategy synthesis algorithms. We introduce $$\textsc {Zeta}$$ Z E T A , a tool for checking controllability of CCNDs, synthesizing execution strategies, and executing controllable CCNDs, by also supporting user interactivity. We use $$\textsc {Zeta}$$ Z E T A to compare with the previous research, provide a new experimental evaluation for CCNDs, and discuss limitations.


Sign in / Sign up

Export Citation Format

Share Document