메뉴 건너뛰기




Volumn 36, Issue 7, 2011, Pages 1009-1025

Process compliance analysis based on behavioural profiles

Author keywords

Compliance measurement; Log conformance; Process compliance; Root cause analysis

Indexed keywords

BUSINESS PROCESSING; COMPLIANCE ANALYSIS; COMPLIANCE MEASUREMENT; DIAGNOSTIC INFORMATION; EXECUTION SEQUENCES; IMPACT OF NOISE; IN-PROCESS; INTERNATIONAL SERVICES; LEGAL REQUIREMENTS; LOG CONFORMANCE; MARKET PRESSURE; NON-COMPLIANCE; OPERATIONAL EXCELLENCE; PROCESS COMPLIANCE; PROCESS MODEL; ROOT CAUSE ANALYSIS; STATE EXPLOSION PROBLEMS; STATE-BASED; TRACE EQUIVALENCE;

EID: 79958113699     PISSN: 03064379     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.is.2011.04.002     Document Type: Article
Times cited : (133)

References (59)
  • 3
    • 84890470685 scopus 로고    scopus 로고
    • Mining Process Models from Workflow Logs
    • Advances in Database Technology - EDDT'98
    • R. Agrawal, D. Gunopulos, and F. Leymann Mining process models from workflow logs H.-J. Schek, F. Saltor, I. Ramos, G. Alonso, EDBT, Lecture Notes in Computer Science vol. 1377 1998 Springer 469 483 (Pubitemid 128044768)
    • (1998) Lecture Notes in Computer Science , Issue.1377 , pp. 469-483
    • Agrawal, R.1    Gunopulos, D.2    Leymann, F.3
  • 5
    • 0032328790 scopus 로고    scopus 로고
    • Automating the discovery of as-is business process models: Probabilistic and algorithmic approaches
    • A. Datta Automating the discovery of as-is business process models: probabilistic and algorithmic approaches Inf. Syst. Res. 9 3 1998 275 301
    • (1998) Inf. Syst. Res. , vol.9 , Issue.3 , pp. 275-301
    • Datta, A.1
  • 9
    • 35748949584 scopus 로고    scopus 로고
    • Conformance checking of processes based on monitoring real behavior
    • DOI 10.1016/j.is.2007.07.001, PII S030643790700049X
    • A. Rozinat, and W.M.P. van der Aalst Conformance checking of processes based on monitoring real behavior Inf. Syst. 33 1 2008 64 95 (Pubitemid 350051578)
    • (2008) Information Systems , vol.33 , Issue.1 , pp. 64-95
    • Rozinat, A.1    Van Der Aalst, W.M.P.2
  • 10
    • 36049031472 scopus 로고    scopus 로고
    • Quantifying process equivalence based on observed behavior
    • DOI 10.1016/j.datak.2007.06.010, PII S0169023X07001206, Fourth International Conference on Business Process Management (BPM 2006) Four selected and extended papers
    • A.K.A. de Medeiros, W.M.P. van der Aalst, and A.J.M.M. Weijters Quantifying process equivalence based on observed behavior Data Knowl. Eng. 64 1 2008 55 74 (Pubitemid 350087285)
    • (2008) Data and Knowledge Engineering , vol.64 , Issue.1 , pp. 55-74
    • Alves De Medeiros, A.K.1    Van Der Aalst, W.M.P.2    Weijters, A.J.M.M.3
  • 18
    • 79957803658 scopus 로고    scopus 로고
    • Efficient consistency measurement based on behavioural profiles of process models
    • 18 October 2010. IEEE computer Society Digital Library, IEEE Computer Society
    • M. Weidlich, J. Mendling, M. Weske, Efficient consistency measurement based on behavioural profiles of process models, IEEE Transactions on Software Engineering, 18 October 2010. IEEE computer Society Digital Library, IEEE Computer Society, 〈 http://doi.ieeecomputersociety.org/10.1109/TSE.2010.96 〉
    • IEEE Transactions on Software Engineering
    • Weidlich, M.1    Mendling, J.2    Weske, M.3
  • 22
    • 0028396177 scopus 로고
    • Understanding quality in conceptual modeling
    • O.I. Lindland, G. Sindre, and A. Sølvberg Understanding quality in conceptual modeling IEEE Software 11 2 1994 42 49
    • (1994) IEEE Software , vol.11 , Issue.2 , pp. 42-49
    • Lindland, O.I.1    Sindre, G.2    Sølvberg, A.3
  • 24
    • 0002307971 scopus 로고    scopus 로고
    • Workflow verification: Finding control-flow errors using petri-net-based techniques
    • W.M.P. van der Aalst Workflow verification: finding control-flow errors using petri-net-based techniques W.M.P. van der Aalst, J. Desel, A. Oberweis, Business Process Management, Lecture Notes in Computer Science vol. 1806 2000 Springer 161 183
    • (2000) Business Process Management, Lecture Notes in Computer Science , vol.1806 , pp. 161-183
    • Van Der Aalst, W.M.P.1
  • 27
    • 0038002768 scopus 로고    scopus 로고
    • Rediscovering workflow models from event-based data using little thumb
    • A. Weijters, and W. van der Aalst Rediscovering workflow models from event-based data using little thumb Integrated Comput. Aided Eng. 10 2 2003 151 162
    • (2003) Integrated Comput. Aided Eng. , vol.10 , Issue.2 , pp. 151-162
    • Weijters, A.1    Van Der Aalst, W.2
  • 29
    • 0027621699 scopus 로고
    • Mining association rules between sets of items in large databases
    • R. Agrawal, T. Imielinski, and A.N. Swami Mining association rules between sets of items in large databases P. Buneman, S. Jajodia, SIGMOD Conference 1993 ACM Press 207 216
    • (1993) SIGMOD Conference , pp. 207-216
    • Agrawal, R.1    Imielinski, T.2    Swami, A.N.3
  • 30
    • 0002221136 scopus 로고
    • Fast algorithms for mining association rules in large databases
    • R. Agrawal, and R. Srikant Fast algorithms for mining association rules in large databases J.B. Bocca, M. Jarke, C. Zaniolo, VLDB 1994 Morgan Kaufmann 487 499
    • (1994) VLDB , pp. 487-499
    • Agrawal, R.1    Srikant, R.2
  • 33
    • 78049275801 scopus 로고    scopus 로고
    • Trace alignment in process mining: Opportunities for process diagnostics
    • R.P.J.C. Bose, and W.M.P. van der Aalst Trace alignment in process mining: opportunities for process diagnostics R. Hull, J. Mendling, S. Tai, BPM, Lecture Notes in Computer Science vol. 6336 2010 Springer 227 242
    • (2010) BPM, Lecture Notes in Computer Science , vol.6336 , pp. 227-242
    • Bose, R.P.J.C.1    Van Der Aalst, W.M.P.2
  • 34
    • 57049146832 scopus 로고    scopus 로고
    • Detecting and resolving process model differences in the absence of a change log
    • M. Dumas, M. Reichert, M.-C. Shan (Eds.) Milan, Italy, September 2-4, 2008, Lecture Notes in Computer Science, vol. 5240, Springer, 2008
    • J.M. Küster, C. Gerth, A. Förster, G. Engels, Detecting and resolving process model differences in the absence of a change log, in: M. Dumas, M. Reichert, M.-C. Shan (Eds.), Business Process Management, Proceedings of the 6th International Conference, BPM 2008, Milan, Italy, September 24, 2008, Lecture Notes in Computer Science, vol. 5240, Springer, 2008, pp. 244260.
    • Business Process Management, Proceedings of the 6th International Conference, BPM 2008 , pp. 244-260
    • Küster, J.M.1
  • 35
    • 57049179525 scopus 로고    scopus 로고
    • Diagnosing differences between business process models
    • M. Dumas, M. Reichert, M.-C. Shan (Eds.) Milan, Italy, September 2-4, 2008, Lecture Notes in Computer Science, vol. 5240, Springer, 2008
    • R.M. Dijkman, Diagnosing differences between business process models, in: M. Dumas, M. Reichert, M.-C. Shan (Eds.), Business Process Management, Proceedings of the 6th International Conference, BPM 2008, Milan, Italy, September 24, 2008, Lecture Notes in Computer Science, vol. 5240, Springer, 2008, pp. 261277.
    • Business Process Management, Proceedings of the 6th International Conference, BPM 2008 , pp. 261-277
    • Dijkman, R.M.1
  • 36
    • 0035584844 scopus 로고    scopus 로고
    • Refinement of actions and equivalence notions for concurrent systems
    • DOI 10.1007/s002360000041
    • R. Glabbeek, and U. Goltz Refinement of actions and equivalence notions for concurrent systems Acta Inf. 37 4/5 2001 229 327 (Pubitemid 33588635)
    • (2001) Acta Informatica , vol.37 , Issue.4-5 , pp. 229-327
    • Van Glabbeek, R.1    Goltz, U.2
  • 37
    • 84864009698 scopus 로고    scopus 로고
    • When are two workflows the same?
    • J. Hidders, M. Dumas, W. Aalst, A. Hofstede, and J. Verelst When are two workflows the same? M.D. Atkinson, F.K.H.A. Dehne, CATS, CRPIT vol. 41 2005 Australian Computer Society 3 11
    • (2005) CATS, CRPIT , vol.41 , pp. 3-11
    • Hidders, J.1    Dumas, M.2    Aalst, W.3    Hofstede, A.4    Verelst, J.5
  • 40
    • 1542430430 scopus 로고    scopus 로고
    • Behavior-consistent specialization of object life cycles
    • M. Schrefl, and M. Stumptner Behavior-consistent specialization of object life cycles ACM Trans. Software Eng. Methodol. 11 1 2002 92 148
    • (2002) ACM Trans. Software Eng. Methodol. , vol.11 , Issue.1 , pp. 92-148
    • Schrefl, M.1    Stumptner, M.2
  • 42
    • 44449176510 scopus 로고    scopus 로고
    • Evaluation of workflow similarity measures in service discovery
    • A. Wombacher, and M. Rozie Evaluation of workflow similarity measures in service discovery M. Schoop, C. Huemer, M. Rebstock, M. Bichler, Service Oriented Electronic Commerce, LNI, GI vol. 80 2006 51 71
    • (2006) Service Oriented Electronic Commerce, LNI, GI , vol.80 , pp. 51-71
    • Wombacher, A.1    Rozie, M.2
  • 43
    • 57049164878 scopus 로고    scopus 로고
    • On measuring process model similarity based on high-level change operations
    • C. Li, M. Reichert, and A. Wombacher On measuring process model similarity based on high-level change operations Q. Li, S. Spaccapietra, E.S.K. Yu, A. Olivé, ER, Lecture Notes in Computer Science vol. 5231 2008 Springer 248 264
    • (2008) ER, Lecture Notes in Computer Science , vol.5231 , pp. 248-264
    • Li, C.1    Reichert, M.2    Wombacher, A.3
  • 46
    • 84956993736 scopus 로고    scopus 로고
    • Role-based authorization constraints specification
    • G. Ahn, R. Sandhu, Role-based authorization constraints specification, ACM Trans. Inf. Syst. Secur. 3 (4) (2000).
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.4
    • Ahn, G.1    Sandhu, R.2
  • 48
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • E. Bertino, E. Ferrari, V. Atluri, The specification and enforcement of authorization constraints in workflow management systems, ACM Trans. Inf. Syst. Secur. 2 (1) (1999).
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.1
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 49
    • 0002422823 scopus 로고    scopus 로고
    • A role-based access control model and reference implementation within a corporate Intranet
    • D. Ferraiolo, J. Barkley, D. Kuhn, A role-based access control model and reference implementation within a corporate Intranet, ACM Trans. Inf. Syst. Secur. 2 (1) (1999).
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.1
    • Ferraiolo, D.1    Barkley, J.2    Kuhn, D.3
  • 50
    • 33748319570 scopus 로고    scopus 로고
    • An effective role administration model using organization structure
    • DOI 10.1145/1151414.1151415
    • S. Oh, R.S. Sandhu, and X. Zhang An effective role administration model using organization structure ACM Trans. Inf. Syst. Secur. 9 2 2006 113 137 (Pubitemid 44329971)
    • (2006) ACM Transactions on Information and System Security , vol.9 , Issue.2 , pp. 113-137
    • Oh, S.1    Sandhu, R.2    Zhang, X.3
  • 53
    • 4444246080 scopus 로고    scopus 로고
    • An integrated approach to engineer and enforce context constraints in RBAC environments
    • M. Strembeck, G. Neumann, An integrated approach to engineer and enforce context constraints in RBAC environments, ACM Trans. Inf. Syst. Secur. 7 (3) (2004).
    • (2004) ACM Trans. Inf. Syst. Secur. , vol.7 , Issue.3
    • Strembeck, M.1    Neumann, G.2
  • 57
    • 58549097732 scopus 로고    scopus 로고
    • Authorization and obligation policies in dynamic systems
    • M. Gelfond, and J. Lobo Authorization and obligation policies in dynamic systems Logic Program. 2009 22 36
    • (2009) Logic Program. , pp. 22-36
    • Gelfond, M.1    Lobo, J.2
  • 58
    • 84876359591 scopus 로고    scopus 로고
    • Auditing workflow executions against dataflow policies
    • Springer
    • R. Accorsi, and C. Wonnemann Auditing workflow executions against dataflow policies Business Information Systems 2010 Springer 207 217
    • (2010) Business Information Systems , pp. 207-217
    • Accorsi, R.1    Wonnemann, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.