<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>BP-MaaS: A Runtime Compliance-Monitoring System for Business Processes</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ahmed Barnawi</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ahmed Awad</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Amal Elgammal</string-name>
          <email>a.elgammalg@fci-cu.edu.eg</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Radwa Elshawi</string-name>
          <email>rmelshawi@pnu.edu.sa</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Abduallah Almalaise</string-name>
          <email>aalmalaiseg@kau.edu.sa</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sherif Sakr</string-name>
          <email>ssakr@cse.unsw.edu.au</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Cairo University</institution>
          ,
          <country country="EG">Egypt</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>King Abdulaziz University</institution>
          ,
          <country country="SA">Saudi Arabia</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>King Saud bin Abdulaziz University for Health Sciences, Saudi Arabia University of New South Wales</institution>
          ,
          <country country="AU">Australia</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Princess Nourah Bint Abdulrahman University</institution>
          ,
          <country country="SA">Saudi Arabia</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Today's enterprises demand a high degree of compliance in their business processes to meet diverse regulations and legislations. Several industrial studies have shown that compliance management is a daunting task, and organizations are still struggling and spending billions of dollars annually to ensure and prove their compliance. In this demonstration, we present, BP-MaaS (Business Process Monitoring-as-a-Service), a runtime business process compliance-monitoring framework which incorporates a wide range of expressive high-level compliance patterns for the abstract speci cation of runtime constraints. The framework provides the end-users with a friendly interface for modeling their compliance monitoring rules. Compliance monitoring is achieved by means of anti-patterns, a novel evaluation approach that is independent of any underlying technology. The applicability, feasibility and utility of BP-MaaS is validated by applying the approach on two real-life large-scale case studies in the banking domain.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Compliance monitoring at process execution time is of crucial importance and
it complements the design-time checking with techniques to detect violations
that are hard or even infeasible to address at the earlier stages of the process
lifecycle. For example, time span constraints between tasks can only be checked
at runtime, as time-related information is usually not available during prior
phases. In this demonstration, we present, BP-MaaS, a runtime business process
compliance-monitoring framework which adopts a rich and wide set of
compliance patterns for the abstract speci cation of monitoring requirements, spanning
the four structural facets of BPs; i.e. control ow, data, employed resources and
Copyright c 2015 for this paper by its authors. Copying permitted for private and
academic purposes
timing constraints [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. The monitoring evaluation approach is based on the
notion of anti-patterns [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], a novel evaluation technique that operates by
continuously monitoring process execution events and looking for sequences of events
or lack of events that may indicate that a violation has occurred or possible to
occur in the future. These violation scenarios are denoted as anti-patterns. The
main features/functionalities provided by BP-MaaS are:
{ a graphical compliance requirements builder that implements the compliance
patterns in an intuitive and user-freindly manner, and enables process
designers to build pattern-based expressions in a drag-and-drop fashion
{ a mapping scheme that automatically maps graphical pattern-based
expressions, stored as XML, into the underlying formalisms of the complex event
processing backend engine
{ a novel monitoring evaluation approach based on the notion of anti-patterns
{ a monitoring dashboard, which provides updated information about
violations in process instances, the rule/pattern that has been violated and
contextual information of the sequence of events that yields to the violation to
facilitate its prevention/resolution
      </p>
      <p>
        As a proof-of-concept of one possible realization of the anti-patterns
monitoring approach, we have implemented BP-MaaS by using Complex Event
Processing (CEP) technology [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], and applied the approach on two large-scale case
studies in the banking domain. The rst case study is borrowed from the
EUfunded project COMPAS, which has been provided by COMPAS industrial
partners, and addresses the loan approval business scenario. While the second case
study is concerned with anti-money laundering, which has been developed in
the Governance, Risk and Compliance Technology Centre (GRCTC) as a part
of a large-scale project which is funded by the Irish government. The evaluation
study [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ] has revealed that our approach is su ciently expressive to capture a
wide range of real-life compliance requirements with full support of 70% of the
requirements being considered [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Architecture and Implementation</title>
      <p>
        COMPAS: http://www.compas-ict.eu
PriceWaterHouseCoopers the Netherlands (http://www.pwc.nl/) and Thales Service
France (https://www.thalesgroup.com/)
GRCTC: http://www.grctc.com/
Fig. 2 illustrates the set of compliance patterns which are supported by the
BP-MaaS framework. For a detailed description of the compliance patterns,
we refer the reader to [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The visual editor component has been implemented
as a plugin on top of the Oryx editor. The lower-most layer of Fig. 3
represents a screenshot of the visual rule editor representing the typical
segregation of duties compliance constraint [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] which mandates that two activities
cannot be performed by the same roles or actors in order to minimize the
possibility of fraud.
      </p>
      <p>
        Statement Manager. This module is responsible for automatically compiling
the visually modelled compliance rule into a set of statements/queries based
on the de ned mapping scheme. For BP-MaaS, we are considering Event
Processing Language (EPL) queries of the ESPER framework [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. In this
context, streams replace tables as the source of data with events replacing
rows as the basic unit of data. Listing 1 shows an example of automatically
generated EPL statement for the absence anti-pattern. The absence pattern
requires that a speci c activity not to be executed within a speci c scope of
the process execution [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Generated EPL queries are sent to the compliance
monitoring component.
      </p>
      <p>INSERT into RuleViolationEvent ( processID , Message , RuleID , RuleType )
SELECT s . ProcessID , ' Event f Antecedent g(fTaskNameg) occurred l e s s than
fMinOccursg within f ScopeStart g(f s t g) and fScopeEnd g(f se g) in the
p r o c e s s i n s t a n c e ' , ' fRuleIDg ' , ' f RulePattern g '
FROM PATTERN [
every ( s = f ScopeStart g( cast ( s . Task , s t r i n g )= ' f s t g ' )
&gt;(e = fScopeEnd g( cast ( e . Task , s t r i n g )= ' f se g ' , ProcessID=s . ProcessID )
) ) ] as scope
WHERE fMinOccursg&gt;( select count ( ) fromf Antecedent g . win : k e e p a l l ( ) as T
WHERE cast (T. Task , s t r i n g )= ' fTaskNameg ' and
(T. TimeStamp between scope . s . TimeStamp and scope . e . TimeStamp ) )
Listing 1 . EPL statement to detect below-min-occurrences absence
antipattern
https://code.google.com/p/oryx-editor/
http://esper.codehaus.org/esper-4.2.0/doc/reference/en/html/epl_
clauses.html</p>
      <p>Atomic</p>
      <p>Patterns
Order Patterns
With Absence
Time Span
Alert Time Span
isBefore</p>
      <p>Antecendent
0..1 Consequent</p>
      <p>Composite
Patterns
Occurrence</p>
      <p>Patterns</p>
      <p>Sequence
isNext</p>
      <p>Precedence
isOneToOne</p>
      <p>Response
isOneToOne</p>
      <p>Absence</p>
      <p>Existence
Multiplicity</p>
      <p>Resource
Patterns</p>
      <p>PerformedBy
SegOrfeDguattyion</p>
      <p>Binding
OfDuty
Business Process Editor and Execution Engine. Provides the end users
with a user-friendly modelling environment where the users can model their
business process using the standard BPMN 2.0 language. We employ the
open source BPM platform Activiti as a realization of this component where
the user can model and enact business processes. We also did an extension
of the Activiti engine to allow emitting process execution events to our
compliance monitoring engine.</p>
      <p>
        Compliance Monitoring Engine. The open source complex event processing
platform ESPER is responsible for continuously evaluating the generated
statements from the 'Statement Manager` over the stream of events, which
is received from the BP execution engine. The engine triggers the
execution of the compliance actions for any detected violations of the compliance
rules. Compliance recovery actions are de ned as meta-data for each de ned
rule. Our choice of Esper is mainly because it provides an environment for
developing applications that can process large volumes of incoming
messages or events, regardless of whether the incoming messages are historical
or real-time in nature. It also supports ltering and analyzing of events in
various ways, and responds to conditions of interest. In addition, ESPER
shows acceptable performance as it is able to handle about 120; 000 events
per second [
        <xref ref-type="bibr" rid="ref4 ref5">4,5</xref>
        ] making it scalable to handle process execution environments
with numerous process instances.
      </p>
      <p>Monitoring Dashboard. The dashboard is a user-friendly interface that
enables the end-user to monitor the stream of events and manipulate (e.g.,
adding, removing, activating, deactivating) the set of registered compliance
rules in addition to being able to receive the noti cations about the detected
non-compliance instances. Fig. 3 shows screenshots of the developed
dashboard, which has been implemented using Microsoft C# .Net technology.
http://activiti.org/</p>
    </sec>
    <sec id="sec-3">
      <title>3 Demonstration Scenario</title>
      <p>In our demo, we are presenting the implementation of the BP-Maas System.
In particular, we are showing the scenario where we model a compliance rule
using the graphical rule editor (Fig. 3). Then, the modeled rule is registered
to the compliance monitoring component. This is followed by showing how the
dashboard is updated with information about the newly registered rule. The loan
approval BP from the EU COMPAS project is used for monitoring its execution
steps. When the execution events start to arrive at the monitoring component
and a violation scenario is detected, we show how the dashboard is updated with
information about the instance(s) violating a speci c rule.</p>
    </sec>
    <sec id="sec-4">
      <title>Acknowledgment</title>
      <p>This work was supported by King Abdulaziz City for Science and Technology
(KACST) project 11-INF1991-03.</p>
    </sec>
    <sec id="sec-5">
      <title>References</title>
      <p>Video demonstration of BP-MaaS is available on https://www.youtube.com/watch?v=wRdZKsOi5x4</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>A.</given-names>
            <surname>Awad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Barnawi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Algammal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Almalaise</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Elshawi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Sakr</surname>
          </string-name>
          .
          <article-title>Runtime Detection of Business Process Compliance Violations: An Approach based on Anti Patterns</article-title>
          .
          <source>In SAC</source>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>A.</given-names>
            <surname>Elgammal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Turetken</surname>
          </string-name>
          , W.-J. van den Heuvel, and
          <string-name>
            <given-names>M.</given-names>
            <surname>Papazoglou</surname>
          </string-name>
          .
          <article-title>Formalizing and applying compliance patterns for business process compliance</article-title>
          .
          <source>Software and Systems Modeling</source>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>O.</given-names>
            <surname>Etzion</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Niblett</surname>
          </string-name>
          .
          <source>Event processing in action. Manning</source>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>A.</given-names>
            <surname>Mathew</surname>
          </string-name>
          .
          <source>Benchmarking of complex event processing engine- esper</source>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>V.</given-names>
            <surname>Mijovic</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Vranes</surname>
          </string-name>
          .
          <article-title>A survey and Evaluation of CEP Tools</article-title>
          . In YUINFO,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>