An Iterative Approach for Business Process Template Synthesis from Compliance Rules

  • Ahmed Awad
  • Rajeev Goré
  • James Thomson
  • Matthias Weidlich
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6741)


Companies have to adhere to compliance requirements. Typically, both, business experts and compliance experts, are involved in compliance analysis of business operations. Hence, these experts need a common understanding of the business processes for effective compliance management. In this paper, we argue that process templates generated out of compliance requirements can be used as a basis for negotiation among business and compliance experts. We introduce a semi automated approach to synthesize process templates out of compliance requirements expressed in Linear Temporal Logic (LTL). As part of that, we show how general constraints related to business process execution are incorporated. Building upon existing work on process mining algorithms, our approach to synthesize process templates considers not only control-flow, but also data-flow dependencies. Finally, we elaborate on the application of the derived process templates and present an implementation of our approach.


Process synthesis Analysis of business process compliance specification Process mining 


  1. 1.
    Sarbanes-Oxley Act of 2002. US Public Law 107–204 (2002)Google Scholar
  2. 2.
    van der Aalst, W.M.P., Pesic, M., Song, M.: Beyond process mining: From the past to present and future. In: Pernici, B. (ed.) CAiSE 2010. LNCS, vol. 6051, pp. 38–52. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  3. 3.
    van der Aalst, W.M.P., Reijers, H.A., Weijters, A.J.M.M., van Dongen, B.F., de Medeiros, A.K.A., Song, M., Verbeek, H.M.W.E.: Business process mining: An industrial application. Inf. Syst. 32(5), 713–732 (2007)CrossRefGoogle Scholar
  4. 4.
    van der Aalst, W.M.P., Weijters, T., Maruster, L.: Workflow mining: Discovering process models from event logs. IEEE Trans. Knowl. Data Eng. 16(9), 1128–1142 (2004)CrossRefGoogle Scholar
  5. 5.
    Agrawal, R., Gunopulos, D., Leymann, F.: Mining process models from workflow logs. In: Schek, H.-J., Saltor, F., Ramos, I., Alonso, G. (eds.) EDBT 1998. LNCS, vol. 1377, pp. 469–483. Springer, Heidelberg (1998)Google Scholar
  6. 6.
    Awad, A., Weidlich, M., Weske, M.: Visually specifying compliance rules and explaining their violations for business processes. J. Vis. Lang. Comput. 22(1), 30–55 (2011)CrossRefGoogle Scholar
  7. 7.
    Clarke, E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press, Cambridge (1999)Google Scholar
  8. 8.
    Commission, F.S.: Guidelines on anti-money laundering & counter-financing of terrorism (2007)Google Scholar
  9. 9.
    Ellson, J., Gansner, E.R., Koutsofios, E., North, S.C., Woodhull, G.: Graphviz - open source graph drawing tools. In: Graph Drawing, pp. 483–484 (2001)Google Scholar
  10. 10.
    Förster, A., Engels, G., Schattkowsky, T., Van Der Straeten, R.: Verification of Business Process Quality Constraints Based on VisualProcess Patterns. In: TASE, pp. 197–208. IEEE Computer Society Press, Los Alamitos (2007)Google Scholar
  11. 11.
    Goedertier, S., Vanthienen, J.: Compliant and Flexible Business Processes with Business Rules. In: BPMDS. CEUR Workshop Proceedings., vol. 236 (2006)Google Scholar
  12. 12.
    Goedertier, S., Vanthienen, J.: Designing Compliant Business Processes with Obligations and Permissions. In: Eder, J., Dustdar, S. (eds.) BPM Workshops 2006. LNCS, vol. 4103, pp. 5–14. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  13. 13.
    Lu, R., Sadiq, S.K., Governatori, G.: Compliance Aware Business Process Design. In: ter Hofstede, A.H.M., Benatallah, B., Paik, H.-Y. (eds.) BPM Workshops 2007. LNCS, vol. 4928, pp. 120–131. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  14. 14.
    Lui, Y., Müller, S., Xu, K.: A Static Compliance-checking Framework for Business Process Models. IBM Systems Journal 46(2), 335–362 (2007)CrossRefGoogle Scholar
  15. 15.
    Milosevic, Z., Sadiq, S., Orlowska, M.: Translating Business Contract into Compliant Business Processes. In: EDOC, pp. 211–220. IEEE Computer Society, Los Alamitos (2006)Google Scholar
  16. 16.
    Namiri, K., Stojanovic, N.: Pattern-Based Design and Validation of Business Process Compliance. In: Chung, S. (ed.) OTM 2007, Part I. LNCS, vol. 4803, pp. 59–76. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  17. 17.
    Pesic, M., van der Aalst, W.M.P.: A Declarative Approach for Flexible Business Processes Management. In: Eder, J., Dustdar, S. (eds.) BPM Workshops 2006. LNCS, vol. 4103, pp. 169–180. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  18. 18.
    Pesic, M., Bosnacki, D., van der Aalst, W.M.P.: Enacting declarative languages using ltl: Avoiding errors and improving performance. In: SPIN 2010. LNCS, vol. 6349, pp. 146–161. Springer (2010)Google Scholar
  19. 19.
    Pesic, M., Schonenberg, H., van der Aalst, W.M.P.: DECLARE: Full Support for Loosely-Structured Processes. In: EDOC, pp. 287–300. IEEE Computer Society, Los Alamitos (2007)Google Scholar
  20. 20.
    Pnueli, A.: The temporal logic of programs. In: SFCS, pp. 46–57. IEEE Computer Society, Washington, DC, USA (1977)Google Scholar
  21. 21.
    Schonenberg, H., Jian, J., Sidorova, N., van der Aalst, W.M.P.: Business trend analysis by simulation. In: Pernici, B. (ed.) CAiSE 2010. LNCS, vol. 6051, pp. 515–529. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  22. 22.
    Vanhatalo, J., Völzer, H., Leymann, F., Moser, S.: Automatic workflow graph refactoring and completion. In: Bouguettaya, A., Krueger, I., Margaria, T. (eds.) ICSOC 2008. LNCS, vol. 5364, pp. 100–115. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  23. 23.
    Wolper, P.: Temporal logic can be more expressive. Information and Control 56, 72–99 (1983)MathSciNetCrossRefzbMATHGoogle Scholar
  24. 24.
    Wolper, P.: The tableau method for temporal logic: an overview. Logique et Analyse 110-111, 119–136 (1985)MathSciNetzbMATHGoogle Scholar
  25. 25.
    Yu, J., Han, Y., Han, J., Jin, Y., Falcarin, P., Morisio, M.: Synthesizing service composition models on the basis of temporal business rules. J. Comput. Sci. Technol. 23(6), 885–894 (2008)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Ahmed Awad
    • 1
  • Rajeev Goré
    • 2
  • James Thomson
    • 2
  • Matthias Weidlich
    • 1
  1. 1.Hasso Plattner InstituteUniversity of PotsdamGermany
  2. 2.School of Computer ScienceThe Australian National UniversityAustralia

Personalised recommendations