scholarly journals From a High Level Business Process Model to Service Model Artifacts - A Model-Driven Approach

2012 ◽  
Vol 21 (01) ◽  
pp. 55-83 ◽  
Author(s):  
SERGEY SMIRNOV ◽  
MATTHIAS WEIDLICH ◽  
JAN MENDLING

There are several motives for creating process models ranging from technical scenarios in workflow automation to business scenarios in which management decisions are taken. As a consequence, companies typically have different process models for the same process, which differ in terms of granularity. In this context, business process model abstraction serves as a technique that takes a process model as an input and derives a high-level model with coarse-grained activities and the corresponding control flow between them. In this way, business process model abstraction reduces the number of models capturing the same business process on different abstraction levels. In this article, we provide a solution to the problem of deriving the control flow of an abstract process model for the case that an arbitrary grouping of activities is permitted. To this end, we use behavioral profiles and prove that the soundness of the synthesized process model requires a notion of well-structuredness of the abstract model behavioral profile. Furthermore, we demonstrate that the activities can be grouped according to the data flow of the model in a meaningful way, and that this grouping does not directly coincides with a structural decomposition of the process, which is generally assumed by other abstraction approaches. This finding emphasizes the need for handling arbitrary activity groupings in business process model abstraction.


Author(s):  
Alfonso Rodríguez ◽  
Eduardo Fernández-Medina ◽  
Mario Piattini

Business processes are valuable resources for enterprises to maintain their competitiveness. They are characterized by describing the set of activities that enterprises perform to reach their objectives. On the other hand, security is also an essential element in current competitiveness. Enterprises invest resources in keeping their assets protected and worry about maintaining their customers’ trust. In this way, aspects such as confidentiality, integrity, and availability are important in relation to enterprise activities. In this work, we will define business processes that incorporate the viewpoint of the business analyst regarding security. The result is a secure business process model that is used for software creation under a model-driven approach. In this work, we will show the main aspects of this proposal, taking into consideration a case study that allows us to show its applicability.


2019 ◽  
Vol 16 (2) ◽  
pp. 657-688 ◽  
Author(s):  
Drazen Brdjanin ◽  
Danijela Banjac ◽  
Goran Banjac ◽  
Slavko Maric

Existing approaches to business process model-driven synthesis of data models are characterized by a direct synthesis of a target model based on source models represented by concrete notations, where the synthesis is supported by monolithic (semi)automatic transformation programs. This article presents an approach to automated two-phase business process model-driven synthesis of conceptual database models. It is based on the introduction of a domain specific language (DSL) as an intermediate layer between different source notations and the target notation, which splits the synthesis into two phases: (i) automatic extraction of specific concepts from the source model and their DSL-based representation, and (ii) automated generation of the target model based on the DSL-based representation of the extracted concepts. The proposed approach enables development of modular transformation tools for automatic synthesis of the target model based on business process models represented by different concrete notations. In this article we present an online generator, which implements the proposed approach. The generator is implemented as a web-based, service-oriented tool, which enables automatic generation of the initial conceptual database model represented by the UML class diagram, based on business models represented by two concrete notations.


Sign in / Sign up

Export Citation Format

Share Document