IoT-Based Compliance Checking of Multi-party Business Processes Modeled with Commitments

  • Marco Montali
  • Pierluigi PlebaniEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10465)


In a multi-party business process, the choreography defines the conversational protocol among the parties, so that the visibility of the parties’ private processes is limited to the set of operations required to respect such a protocol. Especially in scenarios where physical resources are exchanged, knowing how a resource owned by a party is managed in the premises of another party is not possible. Thus, possible misalignments can be detected too late. At the same time, IoT is increasingly adopted to enact business processes in many domains: e.g., logistics, manufacturing, healthcare. As, with IoT, smart devices can physically flow through the different parties involved in a process, their sensing capabilities can be exploited to improve the process compliance checking. With this work we propose an approach for compliance checking that mixes commitments and smart devices. Commitments, declaratively defining mutual contractual relationships between parties, drive the configuration of smart devices that, flowing along with the process flow, check their satisfaction and, in case of misalignment, timely inform the involved parties.


Multi-party process compliance Timed commitments BPMN choreography model IoT 



This work has been partially funded by the Italian Project ITS Italy 2020 under the Technological National Clusters program and by the UNIBZ CRC Project Planning for WORkflow Management (PWORM).


  1. 1.
    van der Aalst, W.M.P., de Beer, H.T., van Dongen, B.F.: Process mining and verification of properties: an approach based on temporal logic. In: Meersman, R., Tari, Z. (eds.) OTM 2005. LNCS, vol. 3760, pp. 130–147. Springer, Heidelberg (2005). doi: 10.1007/11575771_11 CrossRefGoogle Scholar
  2. 2.
    Baumgraß, A., Herzberg, N., Meyer, A., Weske, M.: BPMN extension for business process monitoring. In: Proceedings of International Workshop on Evolution of Information Systems and their Design Methods (EMISA 2014) (2014)Google Scholar
  3. 3.
    Bragaglia, S., Chesani, F., Mello, P., Montali, M., Torroni, P.: Reactive event calculus for monitoring global computing applications. In: Artikis, A., Craven, R., Kesim Çiçekli, N., Sadighi, B., Stathis, K. (eds.) Logic Programs, Norms and Action. LNCS, vol. 7360, pp. 123–146. Springer, Heidelberg (2012). doi: 10.1007/978-3-642-29414-3_8 CrossRefGoogle Scholar
  4. 4.
    Chesani, F., Mello, P., Montali, M., Torroni, P.: Representing and monitoring social commitments using the event calculus. J. Auton. Agents Multi-agent Syst. 27(1), 85–130 (2013)CrossRefGoogle Scholar
  5. 5.
    Chopra, A.K., Singh, M.P.: Generalized commitment alignment. In: Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2015)Google Scholar
  6. 6.
    Chopra, A.K., Singh, M.P.: Cupid: commitments in relational algebra. In: Proceedings of the 29th AAAI Conference on Artificial Intelligence. AAAI Press (2015)Google Scholar
  7. 7.
    Ferrario, R., Guarino, N.: Commitment-based modeling of service systems. In: Snene, M. (ed.) IESS 2012. LNBIP, vol. 103, pp. 170–185. Springer, Heidelberg (2012). doi: 10.1007/978-3-642-28227-0_13 CrossRefGoogle Scholar
  8. 8.
    Knuplesch, D., Reichert, M., Fdhila, W., Rinderle-Ma, S.: On enabling compliance of cross-organizational business processes. In: Proceedings of the International Conference on Business Process Management (BPM 2013) (2013)Google Scholar
  9. 9.
    Knuplesch, D., Reichert, M., Mangler, J., Rinderle-Ma, S., Fdhila, W.: Towards compliance of cross-organizational processes and their changes. In: La Rosa, M., Soffer, P. (eds.) BPM 2012. LNBIP, vol. 132, pp. 649–661. Springer, Heidelberg (2013). doi: 10.1007/978-3-642-36285-9_65 CrossRefGoogle Scholar
  10. 10.
    Ly, L.T., Maggi, F.M., Montali, M., Rinderle-Ma, S., van der Aalst, W.M.: Compliance monitoring in business processes: functionalities, application, and tool-support. Inf. Syst. 54, 209–234 (2015)CrossRefGoogle Scholar
  11. 11.
    Maggi, F.M., Montali, M., Westergaard, M., van der Aalst, W.M.P.: Monitoring business constraints with linear temporal logic: an approach based on colored automata. In: Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. LNCS, vol. 6896, pp. 132–147. Springer, Heidelberg (2011). doi: 10.1007/978-3-642-23059-2_13 CrossRefGoogle Scholar
  12. 12.
    Montali, M., Calvanese, D., De Giacomo, G.: Verification of data-aware commitment-based multiagent systems. In: Proceedings of the 13th International Conference on Autonomous Agents and Multiagent Systems (AAMAS) (2014)Google Scholar
  13. 13.
    Montali, M., Maggi, F.M., Chesani, F., Mello, P., van der Aalst, W.M.P.: Monitoring business constraints with the event calculus. ACM TIST 5(1), 17 (2013)Google Scholar
  14. 14.
    Sahai, A., Machiraju, V., Sayal, M., van Moorsel, A., Casati, F.: Automated SLA monitoring for web services. In: Feridun, M., Kropf, P., Babin, G. (eds.) DSOM 2002. LNCS, vol. 2506, pp. 28–41. Springer, Heidelberg (2002). doi: 10.1007/3-540-36110-3_6 CrossRefGoogle Scholar
  15. 15.
    Singh, M.P.: Commitments in multiagent systems: some history, some confusions, some controversies, some prospects. In: The Goals of Cognition: Essays in Honor of Cristiano Castelfranchi, pp. 601–626. College Publications (2012)Google Scholar
  16. 16.
    Telang, P.R., Singh, M.P.: Specifying and verifying cross-organizational business models: an agent-oriented approach. IEEE Trans. Serv. Comput. 5(3), 305–318 (2012)CrossRefGoogle Scholar
  17. 17.
    Thoma, M., Meyer, S., Sperner, K., Meissner, S., Braun, T.: On IoT-services: survey, classification and enterprise integration. In: 2012 IEEE International Conference on Green Computing and Communications (2012)Google Scholar
  18. 18.
    Tranquillini, S., Spieß, P., Daniel, F., Karnouskos, S., Casati, F., Oertel, N., Mottola, L., Oppermann, F.J., Picco, G.P., Römer, K., Voigt, T.: Process-based design and integration of wireless sensor network applications. In: Barros, A., Gal, A., Kindler, E. (eds.) BPM 2012. LNCS, vol. 7481, pp. 134–149. Springer, Heidelberg (2012). doi: 10.1007/978-3-642-32885-5_10 CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2017

Authors and Affiliations

  1. 1.Free University of Bozen-BolzanoBolzanoItaly
  2. 2.Politecnico di MilanoMilanItaly

Personalised recommendations