Marcos Tong, Harald Bender, Mikko Kolehmainen, J. Parantainen, Gerald Lehmann
The present is a report of an exploratory case study about using an Enterprise Architecture method for addressing the business transformation challenges of embedded mobile provisioning in the telecommunications industry. The study focused on the analysis of the provisioning process for gathering transformation requirements, translating them into business objectives and deriving a set of strategic initiatives. In addition, it explored the construction and usefulness of visual representations of the vision and strategy. The results show that such formal method is perceived useful for defining the transformation strategy.
{"title":"Enterprise Architecture for Addressing Business Transformation Challenges: The Case of Embedded Mobile Provisioning Process in the Telecommunications Industry","authors":"Marcos Tong, Harald Bender, Mikko Kolehmainen, J. Parantainen, Gerald Lehmann","doi":"10.1109/EDOC.2011.14","DOIUrl":"https://doi.org/10.1109/EDOC.2011.14","url":null,"abstract":"The present is a report of an exploratory case study about using an Enterprise Architecture method for addressing the business transformation challenges of embedded mobile provisioning in the telecommunications industry. The study focused on the analysis of the provisioning process for gathering transformation requirements, translating them into business objectives and deriving a set of strategic initiatives. In addition, it explored the construction and usefulness of visual representations of the vision and strategy. The results show that such formal method is perceived useful for defining the transformation strategy.","PeriodicalId":147466,"journal":{"name":"2011 IEEE 15th International Enterprise Distributed Object Computing Conference","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131703975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Standardization is an important aspect of building interoperable service-oriented e-Business solutions. XML-based standards have become increasingly popular to address some of the interoperability challenges, both in commercial and governmental organizations. However, the number of available XML-based standards has created a situation, where users have difficulties in choosing the most suitable standard, or are forced to support multiple standards at the same time. Therefore, it is important to provide tools for analyzing and comparing different standards. Existing qualitative studies have created tools that can highlight general features by manual analysis. However, in this paper, we argue that additional insights could be obtained by extracting relevant quantitative metrics of the actual XML Schema documents that the standards contain. This study analyzes three prominent e-Business document standards in terms of their quantitative metrics. Based on our results we claim that quantitative studies can enhance the use of the qualitative analysis frameworks and bring attention to useful details when comparing different standards.
{"title":"Comparing Information Models in XML-based e-Business Standards -- A Quantitative Analysis","authors":"Ilkka Melleri, Kari Hiekkanen, J. Mykkänen","doi":"10.1109/EDOC.2011.11","DOIUrl":"https://doi.org/10.1109/EDOC.2011.11","url":null,"abstract":"Standardization is an important aspect of building interoperable service-oriented e-Business solutions. XML-based standards have become increasingly popular to address some of the interoperability challenges, both in commercial and governmental organizations. However, the number of available XML-based standards has created a situation, where users have difficulties in choosing the most suitable standard, or are forced to support multiple standards at the same time. Therefore, it is important to provide tools for analyzing and comparing different standards. Existing qualitative studies have created tools that can highlight general features by manual analysis. However, in this paper, we argue that additional insights could be obtained by extracting relevant quantitative metrics of the actual XML Schema documents that the standards contain. This study analyzes three prominent e-Business document standards in terms of their quantitative metrics. Based on our results we claim that quantitative studies can enhance the use of the qualitative analysis frameworks and bring attention to useful details when comparing different standards.","PeriodicalId":147466,"journal":{"name":"2011 IEEE 15th International Enterprise Distributed Object Computing Conference","volume":"326 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122438292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jacob Bellamy-McIntyre, C. Lutteroth, Gerald Weber
Single sign-on (SSO) protocols allow one person to use the same login credentials for several organizations. Enterprises face increasing competitive pressure to position themselves with regard to SSO, yet the ramifications of a move to SSO are not fully understood. In this paper we discuss OpenID, a relatively new SSO protocol that is gaining traction on the web. We apply enterprise application modelling techniques to OpenID in order to obtain well-founded decision aids for enterprises: we show how published modelling approaches can be used to analyse risks in OpenID, and show that these can identify security problems with common OpenID practice. Finally, we propose analysis principles that condense important general insights of authentication modelling.
{"title":"OpenID and the Enterprise: A Model-Based Analysis of Single Sign-On Authentication","authors":"Jacob Bellamy-McIntyre, C. Lutteroth, Gerald Weber","doi":"10.1109/EDOC.2011.26","DOIUrl":"https://doi.org/10.1109/EDOC.2011.26","url":null,"abstract":"Single sign-on (SSO) protocols allow one person to use the same login credentials for several organizations. Enterprises face increasing competitive pressure to position themselves with regard to SSO, yet the ramifications of a move to SSO are not fully understood. In this paper we discuss OpenID, a relatively new SSO protocol that is gaining traction on the web. We apply enterprise application modelling techniques to OpenID in order to obtain well-founded decision aids for enterprises: we show how published modelling approaches can be used to analyse risks in OpenID, and show that these can identify security problems with common OpenID practice. Finally, we propose analysis principles that condense important general insights of authentication modelling.","PeriodicalId":147466,"journal":{"name":"2011 IEEE 15th International Enterprise Distributed Object Computing Conference","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122769059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Compliance regulations require enterprises to review their SOA applications to ensure that they satisfy the set of relevant compliance requirements. Despite an increasing number of methods and tools, organizations have a pressing need for a comprehensive compliance framework to help them ensure that their business processes comply with requirements set forth by regulations, laws, and standards. In this paper we explain how to cope with business process compliance requirements and present a framework to capture and manage compliance requirements. We introduce a declarative Compliance Request Language for specifying compliance requirements. We also examine a set of compliance patterns to support the definition of frequently recurring compliance requirements in association with business processes. This approach enables the application of automated tools for compliance analysis and verification.
{"title":"Making Business Processes Compliant to Standards and Regulations","authors":"M. Papazoglou","doi":"10.1109/EDOC.2011.37","DOIUrl":"https://doi.org/10.1109/EDOC.2011.37","url":null,"abstract":"Compliance regulations require enterprises to review their SOA applications to ensure that they satisfy the set of relevant compliance requirements. Despite an increasing number of methods and tools, organizations have a pressing need for a comprehensive compliance framework to help them ensure that their business processes comply with requirements set forth by regulations, laws, and standards. In this paper we explain how to cope with business process compliance requirements and present a framework to capture and manage compliance requirements. We introduce a declarative Compliance Request Language for specifying compliance requirements. We also examine a set of compliance patterns to support the definition of frequently recurring compliance requirements in association with business processes. This approach enables the application of automated tools for compliance analysis and verification.","PeriodicalId":147466,"journal":{"name":"2011 IEEE 15th International Enterprise Distributed Object Computing Conference","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115946475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Harald Psaier, Florian Skopik, D. Schall, S. Dustdar
Open Web-based and social platforms dramatically influence models of work. Today, there is an increasing interest in outsourcing tasks to crowd sourcing environments that guarantee professional processing. The challenge is to gain the customer's confidence by organizing the crowd's mixture of capabilities and structure to become reliable. This work outlines the requirements for a reliable management in crowd computing environments. For that purpose, distinguished crowd members act as responsible points of reference. These members mediate the crowd's workforce, settle agreements, organize activities, schedule tasks, and monitor behavior. At the center of this work we provide a hard/soft constraints scheduling algorithm that integrates existing agreement models for service-oriented systems with crowd computing environments. We outline an architecture that monitors the capabilities of crowd members, triggers agreement violations, and deploys counteractions to compensate service quality degradation.
{"title":"Resource and Agreement Management in Dynamic Crowdcomputing Environments","authors":"Harald Psaier, Florian Skopik, D. Schall, S. Dustdar","doi":"10.1109/EDOC.2011.9","DOIUrl":"https://doi.org/10.1109/EDOC.2011.9","url":null,"abstract":"Open Web-based and social platforms dramatically influence models of work. Today, there is an increasing interest in outsourcing tasks to crowd sourcing environments that guarantee professional processing. The challenge is to gain the customer's confidence by organizing the crowd's mixture of capabilities and structure to become reliable. This work outlines the requirements for a reliable management in crowd computing environments. For that purpose, distinguished crowd members act as responsible points of reference. These members mediate the crowd's workforce, settle agreements, organize activities, schedule tasks, and monitor behavior. At the center of this work we provide a hard/soft constraints scheduling algorithm that integrates existing agreement models for service-oriented systems with crowd computing environments. We outline an architecture that monitors the capabilities of crowd members, triggers agreement violations, and deploys counteractions to compensate service quality degradation.","PeriodicalId":147466,"journal":{"name":"2011 IEEE 15th International Enterprise Distributed Object Computing Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129707084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Adriansyah, B. V. Dongen, Wil M.P. van der Aalst
The growing complexity of processes in many organizations stimulates the adoption of business process analysis techniques. Typically, such techniques are based on process models and assume that the operational processes in reality conform to these models. However, experience shows that reality often deviates from hand-made models. Therefore, the problem of checking to what extent the operational process conforms to the process model is important for process management, process improvement, and compliance. In this paper, we present a robust replay analysis technique that is able to measure the conformance of an event log for a given process model. The approach quantifies conformance and provides intuitive diagnostics (skipped and inserted activities). Our technique has been implemented in the ProM 6framework. Comparative evaluations show that the approach overcomes many of the limitations of existing conformance checking techniques.
{"title":"Conformance Checking Using Cost-Based Fitness Analysis","authors":"A. Adriansyah, B. V. Dongen, Wil M.P. van der Aalst","doi":"10.1109/EDOC.2011.12","DOIUrl":"https://doi.org/10.1109/EDOC.2011.12","url":null,"abstract":"The growing complexity of processes in many organizations stimulates the adoption of business process analysis techniques. Typically, such techniques are based on process models and assume that the operational processes in reality conform to these models. However, experience shows that reality often deviates from hand-made models. Therefore, the problem of checking to what extent the operational process conforms to the process model is important for process management, process improvement, and compliance. In this paper, we present a robust replay analysis technique that is able to measure the conformance of an event log for a given process model. The approach quantifies conformance and provides intuitive diagnostics (skipped and inserted activities). Our technique has been implemented in the ProM 6framework. Comparative evaluations show that the approach overcomes many of the limitations of existing conformance checking techniques.","PeriodicalId":147466,"journal":{"name":"2011 IEEE 15th International Enterprise Distributed Object Computing Conference","volume":"38 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114043128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We present a case study of the use of Dynamic Condition Response (DCR) Graphs, a recently introduced declarative business process model, in the design of a cross-organizational case management system being developed by Exformatics A/S, a Danish provider of knowledge and workflow management systems. We show how DCR Graphs allow to capture directly both the behavioral constraints identified during meetings with the customer and the operational execution as markings of the graph. In comparison, imperative models such as BPMN, Petri Net, UML Sequence or Activity diagrams are only good at describing the operational way to fulfill the constraints, leaving the constraints implicit. In particular, we point out that the BPMN ad-hoc sub process activity, intended to support more loosely structured goal driven ad-hoc processes, is inconsistently described in the final version of the BPMN 2.0 standard. The case study motivated an extension of the DCR Graphs model to nested graphs and the development of graphical design and simulation tools to increase the understanding of the models. The study also revealed a number of challenges for future research in techniques for model-driven design of cross-organizational process-aware information systems combining declarative and imperative models.
我们提出了一个使用动态条件响应(DCR)图的案例研究,这是最近引入的声明性业务流程模型,用于设计由丹麦知识和工作流管理系统提供商Exformatics a /S开发的跨组织案例管理系统。我们展示了DCR图如何允许直接捕获与客户会面期间确定的行为约束,以及作为图标记的操作执行。相比之下,命令式模型,如BPMN、Petri网、UML序列或活动图,只擅长描述实现约束的操作方式,而将约束隐式地留下。我们特别指出,BPMN特设子流程活动旨在支持更松散的结构目标驱动的特设流程,但在BPMN 2.0标准的最终版本中描述不一致。案例研究促使DCR图形模型扩展到嵌套图形,并开发图形设计和仿真工具,以增加对模型的理解。该研究还揭示了在结合声明式和命令式模型的跨组织过程感知信息系统的模型驱动设计技术的未来研究中存在的一些挑战。
{"title":"Designing a Cross-Organizational Case Management System Using Dynamic Condition Response Graphs","authors":"Thomas T. Hildebrandt, R. Mukkamala, Tijs Slaats","doi":"10.1109/EDOC.2011.35","DOIUrl":"https://doi.org/10.1109/EDOC.2011.35","url":null,"abstract":"We present a case study of the use of Dynamic Condition Response (DCR) Graphs, a recently introduced declarative business process model, in the design of a cross-organizational case management system being developed by Exformatics A/S, a Danish provider of knowledge and workflow management systems. We show how DCR Graphs allow to capture directly both the behavioral constraints identified during meetings with the customer and the operational execution as markings of the graph. In comparison, imperative models such as BPMN, Petri Net, UML Sequence or Activity diagrams are only good at describing the operational way to fulfill the constraints, leaving the constraints implicit. In particular, we point out that the BPMN ad-hoc sub process activity, intended to support more loosely structured goal driven ad-hoc processes, is inconsistently described in the final version of the BPMN 2.0 standard. The case study motivated an extension of the DCR Graphs model to nested graphs and the development of graphical design and simulation tools to increase the understanding of the models. The study also revealed a number of challenges for future research in techniques for model-driven design of cross-organizational process-aware information systems combining declarative and imperative models.","PeriodicalId":147466,"journal":{"name":"2011 IEEE 15th International Enterprise Distributed Object Computing Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131050705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}