2010
DOI: 10.1007/978-3-642-17358-5_2
|View full text |Cite
|
Sign up to set email alerts
|

Root-Cause Analysis of Design-Time Compliance Violations on the Basis of Property Patterns

Abstract: Root-cause analysis of design-time compliance violations on the basis of property patterns Elgammal, Amal; Türetken, O.; van den Heuvel, Willem-Jan; Papazoglou, Mike

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
45
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 38 publications
(45 citation statements)
references
References 21 publications
(42 reference statements)
0
45
0
Order By: Relevance
“…For example, OPAL [2] applies model-checking algorithms to check business process compliance and, in case of violations, it returns counterexamples to demonstrate the existence of such problems. Root-cause analyses can be used to explain compliance violations as well [16]. -Corrective advising.…”
Section: Discussionmentioning
confidence: 99%
“…For example, OPAL [2] applies model-checking algorithms to check business process compliance and, in case of violations, it returns counterexamples to demonstrate the existence of such problems. Root-cause analyses can be used to explain compliance violations as well [16]. -Corrective advising.…”
Section: Discussionmentioning
confidence: 99%
“…In case of violations, the root cause analysis approach that we have proposed in [52] and [53] may be conducted to analyse and reason about the root causes of design-time compliance violations and provide the user with suggestive guidelines of how to resolve the compliance anomalies. The business experts then alter the process specifications taking these guidelines into consideration, which is followed by the automated re-mapping of the BPEL specification into their formal forms (GA and Promela) and re-verifying against the set of applicable formal compliance rules.…”
Section: Design-time Business Process Compliance Managementmentioning
confidence: 99%
“…Invoke, Receive, and Reply) via the 'partnerLink' attribute. approach we previously proposed in [52], [53]. SPIN implements exhaustive state search as well as multiple optimized evaluation algorithms, e.g.…”
Section: Web Service Analysis Tool (Wsat)mentioning
confidence: 99%
“…Smith et al [10] extended this set into templates, allowing them to be customized according to cardinality and other fine-grained options. Elgammal et al [11] produced an expanded pattern set with a framework that enables atomic patterns to be composed together, and includes a set of basic composite patterns. Since our focus is on transactional requirements instead of general compliance, we produce a set of temporal logic templates highly specialized and more appropriate towards that use.…”
Section: Related Workmentioning
confidence: 99%
“…These approaches offer significant improvements towards the verification of transactional requirements, but tend to lead to state space explosion when verified [8] or restrict the transactional requirements that can be verified. A method to specify transactional requirements that, to the best of our knowledge, is yet to be explored, is the adaptation of temporal logic patterns [9][10][11]. These are frequently used structures of temporal logic properties [12], that can be implemented to specify sophisticated requirements.…”
Section: Introductionmentioning
confidence: 99%