<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Survey on Information Monitoring and Control in Cross- enterprise Collaborative Business Processes</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Erika Asnina</string-name>
          <email>Erika.Asnina@rtu.lv</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gundars Alksnis</string-name>
          <email>Gundars.Alksnis@rtu.lv</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Applied Computer Systems, Riga Technical University Meza iela 1 k-4</institution>
          ,
          <addr-line>Riga, LV-1048</addr-line>
          ,
          <country country="LV">Latvia</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The difference between Collaborative Business Processes (CBP) and ordinary sequential business processes (BP) is in the necessity for decentralized coordination, flexible backward recovery, participants notification about the current state, fast adaptability to changes in participants' work, multiple information systems, individual authorization settings of the participants, etc. The paper presents a literature survey of four CBP paradigms (namely oriented on activity flows, documents, cases, and business artifacts) conducted from the perspective of a vendor of the Enterprise Resource Planning (ERP) system. Restrictions of the case are implicit information flows in BPs, diversity of ERP integrations with customers' information systems (IS), a lack of mechanisms for BP monitoring, backward recovery and for user notification about the current state and tasks as well as inability to make changes in customers' ISs. The paradigms are reviewed and analyzed regarding these restrictions.</p>
      </abstract>
      <kwd-group>
        <kwd>cross-enterprise</kwd>
        <kwd>collaborative business process</kwd>
        <kwd>process monitoring</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        In order to create innovative business products, share knowledge between people and
business, or increase the control and quality of service, enterprises need to collaborate
with each other, thus delegating or providing some pieces of work to other
enterprises [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. First introduced in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], such processes are called Collaborative
Business Processes (CBP). The specifics of CBPs is that they are not coordinated by
one central workflow (WF) engine, but rather by multiple engines collaboratively.
Research on CBPs have two aspects. The first, personal, collaboration includes
support of personal negotiations, personal knowledge sharing as well as coordination
and planning of activities (e.g., in the so-called industrial clusters [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]) by using
networks, voice, video and audio IT solutions (e.g., [
        <xref ref-type="bibr" rid="ref3 ref4 ref5 ref6">3, 4, 5, 6</xref>
        ]). The second, let us
call it “computer system driven”, collaboration includes support by a
business-tobusiness (B2B) Workflow Management System (WMS) that “defines, creates and
manages the execution of workflows through the use of software, running on one or
more workflow engines (WE), which is able to interpret the process definition,
interact with workflow participants and, where required, invoke the use of IT tools
and applications” [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], like FITMAN [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. CBPs are more dynamic than sequential
processes without collaboration and involve more complex communications between
enterprises, especially in relation to non-functional aspects [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        CBPs among enterprises are called also cross-enterprise [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], cross-organizational
[
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], multipartner [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], and intra-enterprise [
        <xref ref-type="bibr" rid="ref12 ref2">2, 12</xref>
        ] processes. The main distinction
from inter-enterprise CPSs is that they involve several autonomous enterprises in the
business process (BP) execution. This requires decentralized coordination
(choreography) among enterprises’ BPs, since centralized coordination (orchestration)
usually cannot help here (because of loosely coupled collaborations). Choreography is
not trivial, since business independency and sometimes unwillingness/inability to
introduce changes into the already implemented IT solutions is at the fore also for our
business case [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        Among other IT implementations, Enterprise Resource Planning (ERP) systems
also support cross-enterprise CBPs [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. It might have specific restrictions (discussed
further) that make it hard to control and monitor such processes, e.g., private/public
and explicit/implicit information flows, diversity of ERP integrations with customers’
information systems (IS), a lack of mechanisms for collaborative process monitoring
and backward recovery, and inability to make changes in customers’ ISs. The goal of
our research is to find out an answer to the question: “What existing solutions and
techniques could be promising to solve issues caused by restrictions of the ERP
business case discussed in this paper?” In order to achieve this goal, we have carried
out a survey of techniques and mechanisms which are used for cross-enterprise CBPs.
The results of the survey will indicate techniques and mechanisms for deeper research
on BP monitoring and runtime user guidance during experimental modeling activities.
      </p>
      <p>The paper is organized as follows. Section 2 provides a brief discussion of the
cross-enterprise CBPs and their management. Section 3 illustrates the context of the
ERP business case as well as its restrictions. Section 4 presents a view on existing
solutions within the CBP management regarding the ERP business case. We conclude
with the summarization of main results.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Cross-enterprise Collaborative Business Processes</title>
      <p>
        Usually B2B collaboration systems are static. This means it is not possible to
create/adjust BPs dynamically according to the constantly changing needs and
constraints of the businesses. Instead processes are described in some hardcoded
notations, e.g., BPMN (Business Process Model and Notation). Some research try to
tackle this issue by applying semantic business process management (BPM)
approaches, e.g., hierarchical task networks and Web ontologies [
        <xref ref-type="bibr" rid="ref14 ref9">9, 14</xref>
        ]. However,
they are dealing rather with the task of generation of BPEL (Business Process
Execution Language) specifications, but not with the task of running and monitoring
execution processes thereafter.
      </p>
      <p>
        BP monitoring has been widely applied in ISs (e.g., [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]). It usually involves some
form of event-based processing, when it is possible to attach some action(s)
before/after an activity. Such events are mostly used for monitoring the compliance
within the enterprise, but they also can be used to send notifications to some external
endpoints, e.g., for informing other systems/enterprises. Such systems usually utilize
some form of a rule/condition engine, so that the events are fired only when the
condition is met. However, in order to make a decision for a particular
implementation, it is important to evaluate its appropriateness in the context of the
used WF engine, e.g., whether addition of event processing involves changes in the
BP definitions or can be applied transparently to it.
      </p>
      <p>As mentioned in the introduction, in the cross-enterprise processes non-functional
requirements, like privacy and confidentiality, might play even a more crucial role
than functional ones. For managing interests and protecting privacy of the involved
enterprises, CBP management system should provide different perspectives/views for
a particular party. However such adoption of views inevitable increases complexity
both in overall process representation and maintenance of ever changing BPs.</p>
      <p>
        We are mostly concerned to add event processing and data state identifying
capabilities to the legacy/non-process oriented systems. Namely we need to know
how to ensure monitoring and runtime user guidance without influencing legacy
applications and still be able to apply some form of BP modeling and integration with
third party workflows. Currently there exist at least four paradigms to BPM [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]:
 Activity-flow oriented, when the activities and their predefined sequences are used
at firsthand, but the data that must be processed is perceived as second-class
citizen [
        <xref ref-type="bibr" rid="ref1 ref17 ref2">1, 2, 17</xref>
        ];
 Document oriented, when it is important to finish some document using a strict
authorization mechanism, document partitioning and templates [18, 19, 20];
 Case handling, when it is important to resolve a case without necessarily
specifying the order of activities, obtaining some minimum amount of data or
making predefined number of decisions [21, 22];
 Business artifact-centered (a special case of data-centric paradigm), which
combines and models both data (information model) and process (lifecycle model)
aspects as a single unit [
        <xref ref-type="bibr" rid="ref16">16, 23, 24, 25, 26, 27, 28</xref>
        ].
      </p>
      <p>The first paradigm is quite mature already and implemented in many enterprise
information systems. Many WMSs offer general modeling and execution of structured
BPs. Besides pure WMSs, ERP systems such as SAP, Oracle, Baan, PeopleSoft have
also adopted this technology [21].</p>
      <p>The second and the third paradigms are dedicated for knowledge-intensive
applications, where decision making could be based on unspecified data and facts and
usually involves mental activities or where a WF highly depends on the runtime
context [21, 29]. The document-oriented paradigm provides a flexible decision
making mechanism and a strong authorization mechanism, whereas case handling
aims to provide rather full data than partial one, allow editing data before and after an
activity is executed, decide about availability of activities based rather on the current
information than on the previously executed activities.</p>
      <p>
        The last paradigm, originally proposed in [23], initiated many further studies and
applications because of “a natural modularity and componentization of business
operations and varying levels of abstraction” and the familiarity of the artifact concept
to the business people [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Business artifacts can be mapped onto a WF engine, thus
enabling attachment of other BPM capabilities, including specification and
monitoring of business rules and KPIs [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Artifact-centered research continues to be
actively developed, especially in the context of declarative style for lifecycle
specification and their tool support [24].
      </p>
      <p>WF monitoring starts with the execution of a BP instance in the WF engine.
Usually it is implemented in a form of event logging and logs more or less complete
information. Another form that must be mentioned is process mining from event logs
[30] or execution records [29]. Modern process mining tools use the control-flow
dimension of a WF by using, e.g., Workflow Petri Nets [29]. Within ERP, bi-partial
monitoring agents called probes can be used [31, 32]. They contain a memory for BP
allocation and a logic for BP monitoring. However, deployment of agents over a
business process may be hard to automate.
3</p>
    </sec>
    <sec id="sec-3">
      <title>The ERP Vendor’s Business Case</title>
      <p>
        ERP systems can be divided into two groups, namely ERP I and ERP II [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. While
ERP I systems focus on integration of back-office information systems, ERP II
systems (which we consider here) focus on collaboration among companies and their
customers, serve all sectors and have web-based open architectures. ERP II are
complex systems that have more difficulties in coordination among partners as well as
in management and assessment, and, thus, can lead to more frequent failures [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p>Let us illustrate the general features of our business case. An ERP vendor has
many customers, mostly, small and medium size enterprises. Each customer uses the
vendor’s ERP solution for his specific business needs, integrates it with its own and
third party ISs and ERPs, and collaborates with other enterprises. The complexity of
the case is that a single BP may have several participants from different enterprises,
which collaborate to get some business value, as well as may involve functions
provided by other vendors’ ISs. However, the ERP vendor has access and ability to
change/enhance functionality only in his own product.</p>
      <p>Let us look at the simplified example of the cross-enterprise CBP. Participant 1
initiates the business process, executes his own activities, and then requires
collaborative activities from other enterprises, e.g., agreement of Participant 2 and
approval of Participant 3. In the worse case, Participant 1 might not even know about
the necessity of approval by Participant 3, since this could be Participant’s 2
confidential information. Besides, Participant 1 cannot monitor other participants
activities and his own created documents until the final status of them will be
available for all allowed participants.</p>
      <p>From the ERP vendor’s viewpoint, this problem will look more complicated
(Fig. 1). User tasks may be automated in the ERP and other ISs. There is no automatic
coordination between tasks, i.e., only the experienced users might know about the
correct order of tasks and how to conduct them. The participant who initiated the WF
(e.g., Participant 1) does not even know what happens within the business process
until the last “link” in the task chain is completed (e.g., registering the completed
document in the database by Participant 3). Therefore, there is the necessity to know
how the collaborative business process is executed in reality. In our case, it could be
some external monitoring process that follows changes of data and BP states.
In the context of legacy systems, when a running WE might not exist, or when
knowledge about business processes are only in the users’ heads, or at best in some
decoupled description, knowing how a process is being used in reality becomes even
more crucial. If it would be possible to detect changes in the business objects or
obtain information about ongoing/completed activities, this information could be used
to generate some form of further user guidance. For example, by showing what
activities a particular user should perform next. We should note once more, that the
particular ERP vendor’s customers mostly are small and medium size enterprises, and
they are not able to make great financial investments into purchasing and introducing
expensive BPM products.</p>
      <p>To sum up, the main issues within the business case that we are analyzing in this
paper lie in the field of information logistics and are the following:
 Each participant has its own ERP solution, integrated with other ISs. The ERP
vendor has no access to these systems’ internals. It is not welcomed to change the
existing IT solution, and it is not possible to change other information systems.
 There is no mechanism to monitor the current state of the business process and
data, if they are under other participant’s or system’s control. Only the direct user
of the corresponding system is able to find out this information by querying data.</p>
      <p>Other participants don’t have such rights due to an access control restrictions.
 There is no notification mechanism about consequent participant’s tasks even when
the document or activity is completed by another participant, and the participant
has access to the database entries.
 Information flows are not transparent for participants. Experienced users do know
their own tasks and task execution order, but are not able to see the whole picture.
Thus, a participant who has initiated the business process might not know about all
other participants involved in the execution as well as about the results of
execution of their functions or tasks within the business process.
 There is no informational support regarding the required actions within the task
execution, only experienced users’ knowledge.</p>
      <p>Our idea is to introduce runtime user guidance to support participants' work with the
vendor’s ERP by monitoring the current state of BPs and data. One approach to tackle
this case is to employ some form of monitoring data changes in the data store (e.g.,
database). However, usual approaches that use trigger or transaction log analysis
mechanisms might not be sufficient, because it is not possible to detect all kind of
data usage with them. For example, selection queries are not logged in the transaction
logs. Instead we must use specialized database activity monitoring modules (e.g.,
Microsoft’s SQL Server database Change Tracking or Oracle’s Audit Vault and
Database Firewall).</p>
      <p>Next sections are devoted to analysis of existing solutions in the field of CBPs.
Since ERP systems are mostly process and data oriented, but quite often may require
backward recovery, only the first and the last paradigms are considered relevant to
our case and will be studied in the next section.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Existing Solutions in the CBP context</title>
      <p>Accordingly to the issues and corresponding constraints mentioned in the previous
section, we have defined criteria for paradigm/solution analysis that we will use
further: maturity of the implementation technique, specification languages, execution
principles, monitoring mechanisms (active or passive), easiness of current state and
task identification, flexibility of decision making mechanism, communication and BP
coordination/synchronization mechanisms, authorization and privacy, integration with
other ISs, and a compensation mechanism (transaction backward recovery).
4.1</p>
      <sec id="sec-4-1">
        <title>Activity-flow Oriented Paradigm</title>
        <p>
          The first technique is peer-to-peer collaborative business process management [
          <xref ref-type="bibr" rid="ref2">2,
33</xref>
          ], where a role [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] or an agent [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] can create an instance of the CBP, initiate his
own ”peer-side” instance, and then notify his peer to instantiate the peer’s side
instance. In case of roles, the workflow must be well-understood, specified and shared
by all participants. Holding privacy of enterprise activities within the workflow is the
challenge in this case. In agents-based processes, an agent must know its
communication paths with other agents and a corresponding part of the workflow
state space. For roles the workflow could be specified using CPDL (Collaborative
Process Definition Language) in an XML document, then compiled to DOM (Data
Object Model) tree of Java objects, then to a Java class. For agents it could be any
executable workflow specification. The process is executed as a set of peer process
instances (which share the same process definition and may have private data and
sub-processes) run by process management systems of the participants [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]. The
monitoring is realized as a collaboration among multiple engines which share one
common predefined workflow specification. Besides, each agent has its own engine
and querying server which collaborates with other agents’ querying servers, thus
getting data about the current process state and data statuses. Another way is
implementing monitoring agents within the ERP that collect metrics from the ERP
database and log files, make an analysis and inform the ERP users about analysis
results [31]. The decision making is decentralized and could be based on predefined
roles within the shared workflow [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] or on a set of predefined links to partners related
to the possible process states [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] which contain also data about requested and
suggested tasks. Communication is implemented as peer-to-peer messaging
mechanism [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ], however simple message interchange (at conversational level) is not
enough when a workflow is complex and includes intra- and inter-enterprise
collaborations. In this case process-level coordination is critical. Authorization can be
role-based [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ], when each participant has its own role within the shared workflow and
the rights to manage access permissions within his/her role. If the multipartner
collaboration uses the peer-to-peer messaging mechanism, then the solution could be
embedded as a set of separate external WMSs [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ], or completely implemented in the
single WMS [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] that controls and coordinates all process invocations.
        </p>
        <p>
          The second technique is workflow-view-based process collaboration [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ], where
processes are views on the workflow from the participant’s viewpoint, and their
instances may form a network. Still, the common synchronization means is defined by
the workflow specification. Specification could be written in BPMN, WS-BPEL
(Web Service BPEL), ebXML (Electronic Business using eXtensible Markup
Language), or RosettaNet, and then they can be run in some WMS [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. Unlike [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ], the
specification is implemented and executed by a single WMS engine, and
communication is controlled and managed by this engine. The open challenges are
analysis of visibility constraints between entities, process view coordination and
deployment of process views for partner organizations [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. The monitoring uses
tracking of a network of process instances that have multiple collaborative relations
with each other. Unlike [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ], in a variety of workflow views, each process has its own
view on the common workflow and may change authorization settings. Tracking in a
network of process instances could be a useful compensation mechanism for
backward recovery, notifying corresponding partners about failures.
        </p>
        <p>
          Another kind of views on the workflow are web services (WS). Their
implementation, monitoring and coordination is well elaborated during previous
years. However, currently service networks might not correspond to business services
and their combination requires good understanding of their business properties
(ontology based semantic services is the promising answer to this issue), and their
coordination is not flexible. Specifications, like WS-BPEL and WS-CDL, use
predefined processes or rules to solve questions on inputs/outputs, message
correlations, etc., but do not take into account dynamics of business processes in
collaboration. They require more transactional support because standards and
protocols like BPEL4WS, WS-Coordination, WS-Transaction, WSCI (Web Service
Choreography Interface) and WS-CDL have too fixed compensation mechanism [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ].
4.2
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>Business Artifact-centered Paradigm</title>
        <p>
          While activity-flow oriented business process modeling is oriented on the
activity/task flows and considers data flows as secondary, but document/case oriented
modeling – vice versa, another paradigm is centered around the data. A very
promising data-centric paradigm is the business artifact paradigm that uses a
combination of data and process flows as a single building block called (business)
artifact [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. “Artifacts are business-relevant objects that are created, evolved and
archived as they pass through a business” [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] (e.g., a deal).
        </p>
        <p>Artifacts are specified by two models (or schemas [26]), namely an
information/data model and a lifecycle model [25, 27]. The information model
specifies data about the business objects during their lifetime. The lifecycle model
specifies tasks and their order (way) in time, when they must be invoked on the
business objects in the state-based form. There are two notations for the lifecycle
specification [26]. The first one is Finite-State-Machines (FSM) for lifecycles without
multiple state paths. The second one is Guard-Stage-Milestones (GSM) for lifecycles
with complex branching. Decision making is implemented by rule definitions in form
of Event-Condition-Activity (ECA), where artifact data serve as business terms in the
rules. The current state and data statuses are kept in the artifact and business rule
instances and are available on demand. Thus, monitoring could be provided in a
simple way – by inspecting artifact instances directly [27].</p>
        <p>Participants might use only a part of artifact’s lifecycle, however they will be
familiar with other stakeholders needs and their own needs [25]. In this case
coordination could be implemented by using log files and controllers of processes,
artifacts, and business rules [27]. Artifact specifications may be mapped into
workflow designs and executed by a WE, but this leads to losing information about
business rules, since they are degraded to control flows and become hardly
manageable [27]. Some authors encourage to use special artifact-oriented
management systems [25, 26, 27]. In such systems business rules may be
modified/removed/added at run-time. Authors suggest using two kinds of
management systems: procedural and declarative. The imperative (Siena for FSM
models [28] and Barcelona for GSM models [24]) systems are similar to the WMS.
The declarative artifact system is under development. It is passive, since allows
querying and retrieving artifact information, invoking business events and notifying
about the pre-subscribed events [26]. Passive systems could be integrated easier than
imperative ones. However, currently artifact-centric management systems mostly
have prototype implementation. At the present realization of this paradigm in WMS is
faster and more mature, however requires additional efforts in monitoring and
business rule flexibility [27].</p>
        <p>
          The artifact model is represented as an XML document and interpreted directly
[
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. All these systems foresee participants’ access control over artifact data [
          <xref ref-type="bibr" rid="ref16">16, 26</xref>
          ]
using the CRUDAE (create, read, update, delete, add, edit) mechanism.
        </p>
        <p>The compensation mechanism could be implemented in the context of business
artifacts, since all states are known and historical data are logged.</p>
        <p>
          In overall, this paradigm is at the early stage of elaboration and its implementation
may require additional research on implementation, e.g., in the context of databases,
concurrency control of artifact instances, and data integrity [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ].
Summarizing all features (see, Table 1), we can conclude that conceptually the
business artifact paradigm has almost all features of the activity-flow oriented
paradigm and is more flexible. It has a different viewpoint in the flow of work
activities and data, but may be successfully mapped to the already matured
activityflow oriented paradigm and existing tools. However, in such case the implementation
will lose separate logic of business rules, since it will be distributed within control
flows. Another advantage of the business artifact-centered paradigm is in its potential
implementation as a passive (monitor) system that is one of our business case needs.
However, this paradigm is new and its realization in an artifact management systems
could have various technical challenges.
5
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>Small and medium businesses, which the ERP vendor targets, are not able to
introduce expensive WE solutions, as well as adaptation of legacy ERP for WF based
execution usually is not possible without completely redesigning the architecture. As
a compromise, BP monitoring and runtime user guidance during cross-enterprise CBP
execution could be introduced. However, there are various complex technological
issues to solve among other, e.g., state change detection in the process and data flows,
access control, determination and notification about subsequent tasks.</p>
      <p>Analysis of the available techniques for managing cross-enterprise CBPs
concluded that for the business case discussed we should focus on activity-flow
oriented and artifact-centric approaches. The former is mature and has developed tool
support, but is imperative and less flexible. The latter one might be more promising,
but its practical application and tool support are weak and are to be studied in more
detail.</p>
      <p>This research is ongoing and we continue elaborating on the selected approaches.
We plan to research technical implementation of their principles during experimental
modeling activities based on the real cross-enterprise CBP.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgment</title>
      <p>The research has been conducted within the framework of European Regional
Development Fund's project "Information and communication technologies
competence center" Nr. KC/2.1.2.1.1/10/01/001 (Contract No. L-KC-11-0003)
activity 1.2. “Technologies for managing services in workflows”.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhao</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          :
          <article-title>Challenges and opportunities in collaborative business process management: Overview of recent advances and introduction to the special issue</article-title>
          .
          <source>Information Systems Frontiers</source>
          <volume>11</volume>
          (
          <issue>3</issue>
          ),
          <fpage>201</fpage>
          --
          <lpage>209</lpage>
          ,
          <string-name>
            <surname>Springer</surname>
            <given-names>US</given-names>
          </string-name>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hsu</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Inter-enterprise collaborative business process management</article-title>
          .
          <source>Proceedings. In: 17th International Conference on Data Engineering</source>
          ,
          <year>2001</year>
          , pp.
          <fpage>253</fpage>
          --
          <lpage>260</lpage>
          . IEEE (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Pouly</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Huber</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Collaborative networks: Human aspects and corresponding IT support</article-title>
          .
          <source>In: 13th International Conference on Computer Supported Cooperative Work in Design</source>
          ,
          <year>2009</year>
          .
          <source>CSCWD</source>
          <year>2009</year>
          ,
          <volume>22</volume>
          -24
          <source>April</source>
          <year>2009</year>
          , pp.
          <fpage>576</fpage>
          --
          <lpage>581</lpage>
          . IEEE (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Feng</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peng</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xie</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yan</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>Role-Based Learning Path Discovery for Collaborative Business Environment</article-title>
          .
          <source>In: Automation and Systems Engineering (CASE)</source>
          ,
          <source>2011 International Conference on Control, 30-31 July</source>
          <year>2011</year>
          , pp.
          <fpage>1</fpage>
          --
          <lpage>4</lpage>
          . IEEE (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>5. GoToMeeting™, Citrix, http://www.citrix.com/products/gotomeeting/</mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barthes</surname>
            ,
            <given-names>J.-P.</given-names>
          </string-name>
          :
          <article-title>Sharing working experience: Using a model of Collaborative Traces</article-title>
          .
          <source>In: IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD)</source>
          ,
          <fpage>23</fpage>
          -25 May,
          <year>2012</year>
          , pp.
          <fpage>221</fpage>
          --
          <lpage>227</lpage>
          . IEEE (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7. Workflow Management Coalition: Terminology &amp;
          <string-name>
            <surname>Glossary. Document Number</surname>
          </string-name>
          WFMCTC-
          <volume>1011</volume>
          , Document Status - Issue 3.0,
          <string-name>
            <surname>Feb</surname>
            <given-names>99</given-names>
          </string-name>
          , http://www.wfmc.org/resource
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>Future</given-names>
            <surname>Internet</surname>
          </string-name>
          <article-title>Technologies for MANufacturing industries</article-title>
          , http://www.fitman-fi.eu/
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Hoang</surname>
            ,
            <given-names>V. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hoang</surname>
            ,
            <given-names>H. H.</given-names>
          </string-name>
          :
          <article-title>An Ontological Approach for Dynamic Cross-Enterprise Collaboration</article-title>
          .
          <source>In: 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA)</source>
          ,
          <fpage>26</fpage>
          -29
          <source>March</source>
          <year>2012</year>
          , pp.
          <fpage>1355</fpage>
          --
          <lpage>1360</lpage>
          . IEEE (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Walter</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Werth</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Loos</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Peer-to-Peer-Based Model-Management for CrossOrganizational Business</article-title>
          .
          <source>In: 15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises</source>
          ,
          <year>2006</year>
          , WETICE '
          <volume>06</volume>
          , pp.
          <fpage>255</fpage>
          --
          <lpage>260</lpage>
          . IEEE (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Khriss</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Levesque</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tremblay</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jacques</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Towards Adaptability Support in Collaborative Business Processes</article-title>
          .
          <source>In: International MCETECH Conference on eTechnologies,</source>
          ,
          <volume>23</volume>
          -
          <fpage>25</fpage>
          Jan.
          <year>2008</year>
          , pp.
          <fpage>34</fpage>
          --
          <lpage>45</lpage>
          . IEEE (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. de Laborda,
          <string-name>
            <given-names>C.P.</given-names>
            ,
            <surname>Popfinger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Conrad</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.</surname>
          </string-name>
          :
          <article-title>Dynamic intra- and inter-enterprise collaboration using an enhanced multidatabase architecture</article-title>
          .
          <source>In: Proceedings. Sixteenth International Workshop on Database and Expert Systems Applications</source>
          ,
          <fpage>22</fpage>
          -
          <lpage>26</lpage>
          Aug.
          <year>2005</year>
          , pp.
          <fpage>626</fpage>
          --
          <lpage>631</lpage>
          . IEEE (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Eckartz</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Daneva</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wieringa</surname>
            , R., van Hillegersberg,
            <given-names>J.</given-names>
          </string-name>
          :
          <article-title>Cross-organizational ERP management: how to create a successful business case?</article-title>
          <source>In: Proceedings of the ACM symposium on Applied Computing (SAC '09)</source>
          ,
          <year>2009</year>
          , pp.
          <fpage>1599</fpage>
          --
          <lpage>1604</lpage>
          . ACM, USA (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Ko</surname>
            ,
            <given-names>R.K.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>S.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>E.W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jusuf</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Dynamic Collaborative Business Process Formulation via Ontologised Hierarchical Task Network (HTN) Planning</article-title>
          .
          <source>In: ICWS 2009. IEEE International Conference on Web Services</source>
          ,
          <fpage>6</fpage>
          -
          <issue>10</issue>
          <year>July 2009</year>
          , pp.
          <fpage>959</fpage>
          --
          <lpage>967</lpage>
          . IEEE (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Thullner</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rozsnyai</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schiefer</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Obweger</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Suntinger</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Proactive Business Process Compliance Monitoring with Event-Based Systems</article-title>
          .
          <source>In: 15th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW)</source>
          ,
          <year>2011</year>
          , pp.
          <fpage>429</fpage>
          - -
          <lpage>437</lpage>
          . IEEE (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Cohn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hull</surname>
          </string-name>
          , R.:
          <article-title>Business Artifacts: A Data-centric Approach to Modeling Business Operations and Processes</article-title>
          .
          <source>IEEE Data Eng. Bull</source>
          .
          <volume>32</volume>
          (
          <issue>3</issue>
          ),
          <fpage>3</fpage>
          --
          <lpage>9</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Zheng</surname>
            ,
            <given-names>X.-Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yan</surname>
          </string-name>
          , J.-W.:
          <article-title>Design of the executable business state-model process based on finite state machine</article-title>
          .
          <source>In: IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD)</source>
          ,
          <fpage>23</fpage>
          -
          <lpage>25</lpage>
          May
          <year>2012</year>
          , pp.
          <fpage>207</fpage>
          --
          <lpage>213</lpage>
          . IEEE (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>