<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Policy-Based Semantic Compliance Checking for Business Process Management</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Marwane</forename><forename type="middle">El</forename><surname>Kharbili</surname></persName>
							<email>marwane.elkharbili@ids-scheer.com</email>
							<affiliation key="aff0">
								<orgName type="department">IDS Scheer AG</orgName>
								<orgName type="institution">ARIS Research</orgName>
								<address>
									<addrLine>Altenkesseler Str. 17</addrLine>
									<postCode>D-66115</postCode>
									<settlement>Saarbrücken</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Sebastian</forename><surname>Stein</surname></persName>
							<email>sebastian.stein@ids-scheer.com</email>
							<affiliation key="aff0">
								<orgName type="department">IDS Scheer AG</orgName>
								<orgName type="institution">ARIS Research</orgName>
								<address>
									<addrLine>Altenkesseler Str. 17</addrLine>
									<postCode>D-66115</postCode>
									<settlement>Saarbrücken</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Elke</forename><surname>Pulvermüller</surname></persName>
							<affiliation key="aff1">
								<orgName type="department">Institute of Computer Science</orgName>
								<orgName type="institution">University of Osnabrück</orgName>
								<address>
									<addrLine>Albrechtstr. 28</addrLine>
									<postCode>49076</postCode>
									<settlement>Osnabrück</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Policy-Based Semantic Compliance Checking for Business Process Management</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">DEBE9B72313FAEC33AE26E4CB5CA3608</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T03:58+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Compliance management, risk analysis, and auditing are disciplines that are critical for large scale distributed enterprise systems. The way these complex systems are developed and deployed makes the management and enforcement of enterprise goals or policies a hard task. This is also true for compliance management of business processes (BPs). Such an observation is emphasized if we give compliance management the scope of the whole enterprise model. In this paper we explain our approach to modeling compliance measures based on policies and present a framework for managing and enforcing compliance policies on enterprise models and BPs. We discuss our ideas in the context of a semantically-enabled environment and discuss why leveraging compliance checking to a semantic level enhances compliance management.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>In past years, an intense public discussion took place dealing with financial scandals happening at major companies and corporations like Enron, WorldCom, Roche, Siemens, and Volkswagen. Based on those events, the importance of compliance management as a critical responsibility at the highest management levels to prevent such scandals has drastically increased. For instance, in 2002 the US government created the "Public Company Accounting Reform and Investor Protection Act" <ref type="bibr" target="#b26">[otUS02]</ref>, also known as the Sarbanes-Oxley Act, to define mandatory policies for public companies and public accounting companies. Complying with regulations of all sorts is usually needed for purposes ranging from ensuring that specific norms are met (e.g. quality standards such as ISO9000:2005 <ref type="bibr">[fS05]</ref>) to proving correct implementation of internal controls imposed by active legislations (e.g. SOX Sec.404 <ref type="bibr" target="#b26">[otUS02]</ref>) <ref type="bibr" target="#b20">[KSMP08]</ref>. Examples of regulations are the HIPAA 1 (Health sector), FDA regulations 2 (food/drug sector), BASEL-II 3 (Banking sector), ISO27002:2008 4 (IT security) and KonTraG 5 (cor-porate governance). A given company is likely to be under jurisdiction of several regulations concurrently <ref type="bibr" target="#b19">[KMS07]</ref>.</p><p>The following sections of this paper give a short definition of compliance management and then discuss the problems related in order to grasp the challenges ahead. Section 3 discusses the idea of model-driven compliance checking using policies is and makes a realization proposal. Section 4 introduces a framework for integrated policy-based compliance checking as well as the accompanying ontological framework. Finally, related and future work are outlined before we conclude our contribution.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Compliance Management: a definition</head><p>Compliance management is a broad term covering all activities and methods to ensure that a company follows all policies required by an external or internal regulation. These regulations are usually described in a natural language document (e.g. as is the case for laws), which can be hardly understood by non-experts of the field the regulation acts on. In the prominent example of the Sarbanes-Oxley Act, if a company follows all guidance defined in such a regulation document, the company is said to be in compliance with the given regulation. Otherwise, the company is said to be violating this regulation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Regulatory Compliance</head><p>These regulations can be structured and documented in compliance frameworks and complying with the framework is thus regarded as equivalent to complying with the regulation. If no such frameworks exist, then companies have neither guidance nor support for implementing regulations, apart from that of auditors. The examination performed to validate whether a company actually implements a given compliance framework is called audit and the person or organization doing such an audit is called auditor. Besides legal requirements, in order to use a certain compliance framework, companies often decide to do this for reasons ranging from certification, risk assessment, to the implementation of quality standard implementation, etc. The latter are strategic reasons and do not result from legal pressure exercized by governmental bodies. As an example, practically all companies that reach a certain size decide to endorse quality standards like ISO 9000:2000 <ref type="bibr">[fS05]</ref> to publicly demonstrate the company's quality commitment and customer focus.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Compliance Audits</head><p>In order to be successfully audited, a company must in advance ensure that it follows all guidelines defined by the compliance framework. A possible approach for this is to check the degree to which these guidelines are fulfilled by the company's enterprise model. Theoretically, this would have to be done by identifying all relevant aspects of the company's activities on which parts of the compliance Framework apply, and checking this compliance. This task is one of experts who need to either have deep knowledge of the activities, processes, architectures and other enterprise model artifacts of the company (e.g. internal compliance controls), or who are provided tight cooperation with enterprise insiders who dispose of the necessary knowledge about the activities of the company. Today, compliance audits are manual and error-prone tasks requiring significant effort. To make the auditing of enterprise models an easier and more efficient task, automation and full-coverage are key goals. Moreover, in order to increase quality (in terms of accuracy and credibility of checking reports) and reduce the cost (in terms of human capacities and time) of compliance checking, the idea of using semantic technologies has been proposed <ref type="bibr" target="#b3">[EKSMP08]</ref>. Semantic compliance checking relies on a semantically defined compliance framework and uses semantic technologies such as inference engines to evaluate the compliance of a given semantic enterprise model. Our research focuses on the use of these technologies for designing a policy-based framework for regulatory enterprise compliance management.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Enterprise Regulatory Compliance: The Problem</head><p>Compliance frameworks consist of a set of guidance elements and measures that have to be taken in order to follow the latter. These compliance measures are often represented as guidelines, policies or controls, depending on the level of abstraction from the concrete implementation of compliance measures (See figure <ref type="figure" target="#fig_0">1</ref>). For instance, the authors of [F.Y07] use the example of an ISO 17799:2002 (IT security standard) access control requirement being further refined into a set of policies. The adherence of a company to these policies has to be evaluated by humans. The Sarbanes-Oxley Act defines the rule that a financial auditor of a company is not allowed to also be involved in the bookkeeping or accounting of the audited company ([otUS02], Sec. 201 (g) (1)). Such a rule is part of a more complex set of rules specifying which concrete roles/responsibilities can be concurrently carried out by an individual. This set of rule is regrouped under the term SSegregation of Duty (SoD)ppolicy. In concrete cases, SoD policies are two-dimensional matrixes of available roles where SoD violations can be visualized in the cells where two roles cross each other. This is shown in the following simple example in figure <ref type="figure" target="#fig_1">2</ref> by specifying which tasks can be concurrently realized by the same individual.</p><p>In this example, the auditor must examine who did the bookkeeping and the financial audit and that both roles are not shared by one person or organization. Given the fact that a compliance framework usually consists of many policies, it is a significant effort for an auditor to check all of them and for all concerned employees. Therefore, an auditor picks (based on experience or randomly) a set of business artifacts upon which policies have to be checked. This helps to reduce the auditing effort, but this strategy cannot be applied by a company to ensure compliance before the actual audit takes place, neither does it guarantee the benefits of being a highly compliant company with target regulations (i.e. this is particularly relevant in case of quality standards audit). The consequences of a failed audit can be significant. For example, if a public company finds itself forced to delay its annual balance because of a failed financial audit, it might loose significant market capitalization (e.g. falling stock price resulting from loss of confidence in the market). Consequently, complying with all policies defined by a specific compliance framework becomes a precondition for realistic preparation to an audit. One of the challenges identified here is: how to structure compliance and how to model it?</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Enterprise Compliance Management and Enterprise Models</head><p>Compliance is all about control, and it is hard to control what is not thoroughly known. Companies create enterprise models to represent their structure and dynamics. Various guidelines to structure such a model exist like the Zachman [JAZ92], the TOGAF <ref type="bibr">[Gro]</ref> or ARIS <ref type="bibr" target="#b28">[Sch00]</ref> frameworks. An enterprise model is used to document the as-is reality of a company as well as a planning tool for to-be scenarios. Another dimension in enterprise models is capture full semantics of the latter and thus allowing for machine processability of the information available about these models. There are various research efforts made to formalize the underlying meta-models of enterprise models using Ontologies [HLD + 05, UKMZ98]. Enterprise models span the whole vertical structure of a company and contain among others BP models and internal governance policies. On the other hand, regulations, which guide the development of compliance frameworks, are usually available as text documents, often requiring juristic skills to interpret them correctly. Not surprisingly, checking a given enterprise model for compliance is therefore a manual task carried out by certified domain experts. Furthermore, efficient compliance management requires good knowledge of the enterprise model of a company by the auditors, and a good knowledge of the compliance framework by the management. This makes close collaboration of auditors with management boards a necessity. The challenge of automated compliance checking can be seen as extending an enterprise model to include aspects defined by the compliance framework and enabling the needed automation in checking an enterprise model against the policies defined in a compliance framework. We argue that measures defined in order to ensure regulatory compliance can be repre-sented using policies (See figure <ref type="figure" target="#fig_0">1</ref>). Thus, enforcing these policies guarantees a state of compliance. Putting policies to use for this purpose allows profiting from policy management formalisms and frameworks. We also argue that making use of semantic technologies for representing compliance policies is necessary to deal with semantically lifted process models. It also helps making compliance checking more precise by allowing to model compliance policies at higher abstraction levels in order to cope with the ambiguity inherent to regulations. Policies have to be structured and expressed using formal means making their automatic processing possible. The authors of [LGRM + 08] see modeling compliance constraints in declarative fashion, while respecting a trade-off between expressiveness of the formal language used and the cost of inference and analysis. Declarative languages are supported as the preferred approach to modeling compliance as a number of works show [LGRM + 08, IWH, ZM06, GG06]. This has the advantage of separating between compliance models and targeted enterprise models. In comparison to approaches such as the one presented in <ref type="bibr" target="#b1">[DF06]</ref>, it also has the advantage of better scaling with regulation change and complexity of the targeted enterprise models. Policies can also be expressed using formalisms such as rules. Rules are one classical and very intuitive way of expressing/implementing policies. In <ref type="bibr">[OMG]</ref>, the SBVR<ref type="foot" target="#foot_5">6</ref> standard is defined for expressing rules and vocabularies on a business level. While providing a natural-language-like syntax that is very easy to use for business users, an underlying formalization of used rule constructs is provided. However, rule interpretation and execution is not enabled because of a missing mapping to an executable rules language. The PRR<ref type="foot" target="#foot_6">7</ref>  <ref type="bibr" target="#b25">[OMG07]</ref> standard could fill this gap as it is designed to transport production rule logic and a mapping to SBVR would create the link for rules from the business level to a rule engine (execution) level. Enterprise models describe architectures, processes and architectures at different degrees of detail and under various perspectives. They usually deal with high heterogeneity on both business and technical levels[JAZ92, Sch00] (strategic, tactical, business, operational and technical levels as distinguished in <ref type="bibr">[vl01]</ref>. Ontologies allow Achieving interoperability between multiple representations of reality[...]and between such representations and reality, namely human users and their perception of reality. <ref type="bibr" target="#b8">[Hep07]</ref>. As compliance is a vertical concern, a compliance framework needs to handle the different perspectives on the various layers. These layers and perspectives can be integrated on a semantic level giving meaning to the relationships between them. The work realized in the SUPER <ref type="foot" target="#foot_7">8</ref> Research project seek to build a stack of ontologies for BPM doing just this. In <ref type="bibr" target="#b14">[Jab96,</ref><ref type="bibr" target="#b0">Cur92]</ref>, the functional, behavioral, organizational, and informational perspectives are considered for the BP ontology. In <ref type="bibr" target="#b12">[IM07]</ref>, a formal model is proposed for describing BPs taking the previous four dimensions into account. A compliance framework should then support handling this integrated these ontologies and support automated checking/enforcement of policies on instances of these ontologies.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">An Approach to Compliance Management</head><p>Figure <ref type="figure">3</ref>: An approach for compliance formalization using policies Our proposal for handling the aspects we just cited is semantic compliance checking (SCC). SCC extends enterprise models semantically to integrate semantically described policies with semantic enterprise models. The initial Input are, as is the case for auditors, the actual regulations, laws or norms that define the policies to be compliant with. These can be structured and represented using dedicated domain policy ontologies (e.g. IT security, food regulation etc.). These policies are then made available in a policy repository for integration into enterprise models. A compliance engine specifically implemented on the basis of an inference engine for the policy ontology language embodies the necessary compliance checking algorithms. This approach is shown in figure <ref type="figure">3</ref>. Existing works follow a aimilar idea, as in <ref type="bibr" target="#b29">[SN07,</ref><ref type="bibr" target="#b23">NS07b]</ref>, although concentrating on risk management approaches to compliance checking. Other works already started formalizing regulations such as the Sarbanes-Oxley-Act <ref type="bibr" target="#b19">[KMS07]</ref> and BASEL II <ref type="bibr" target="#b27">[RF06]</ref>. Due to the organization or regulations in separate domains of enactability, it is possible to separate policy ontologies per domain, making an additional level or super-policies ontolgy necessary in order to link domain policy ontologies together. This allows e.g. combining policies and enacting them concurrently on the same enterprise model.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">An Architecture for Compliance Management</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1">Enterprise Models: A Layered View</head><p>An enterprise's structure can be seen as the set of layers distinguished in 4. On the top layers are business goals which are fulfilled by defining corporate strategies. These strategies are supported by policies and governance guidelines. Policies constrain and control business artifacts: BPs, business rules, business data (vocabularies), etc. On an inferior layer are operational artifacts such as operational rules and executable processes. The lowest layer in this view contains the applications, components, systems and deployment environments that host the concrete carriage of IT activities.</p><p>This view of the enterprise can be mapped to a paradigm that we call Decision-Action-Information (DAI) as shown in 4. In this paradigm, the enterprise is seen as composed of Figure <ref type="figure">4</ref>: A layered view on the enterprise for compliance three basic classes of artifacts. The decision class contains all artifacts supporting decision management such as business rules. The action class contains logical and operational artifacts that actually carry out business activities. Finally, the Information class contains all data artifacts such as execution logs or database tables, on the basis of which decision are partly taken and which are needed by action class artifacts in order to realize their functionality. Our work hypothesis is that compliance is defined for action artifacts and needs to be modelled as decision class artifacts.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2">A Framework for Compliance Management</head><p>In the following, we focus on designing a framework for compliance management shown in figure <ref type="figure" target="#fig_3">5</ref>. This framework does not yet define a detailed technical architecture, it rather defines requirements. We have distinguished five axes on which efforts will concentrate: (i) architecture, (ii) compliance management process, (iii) ontologies, (iv) compliance checking algorithms, and (v) policy management lifecycle. The following points have been retained: • regulations need to be formalized in order to be machine-processable. We have to provide mechanisms to structure and then formalize regulations as semantic policies.</p><p>• semantic policies have to be modelled into BPs. In the case of semantic business process management (SBPM), this means extending the ontology for modeling BPs with an ontology for modeling policies.</p><p>• Rules are an intuitive way of implementing policies. Policies have to be transformed into sets of semantic business rules. It implies defining a business rules ontology and selecting an ontology language supporting expressing rules. No assumptions about the expressiveness and the kind of logic supported by this rule ontology language have been made yet. These business rules can then be integrated into process modeling frameworks and interpreted by an adapted inference engine.</p><p>• BPs are represented in languages adapted to BP execution. On this level, it is necessary to further transform business rules into operative rules that can be integrated into semantic executable BP models.</p><p>• A compliance checking engine has to be implemented by building on an inference engine. This compliance checking engine implements generic compliance checking algorithms.</p><p>• Monitoring components are needed to control the consistency of policies, but also to monitor the checking and enforcement operations on BPs.</p><p>Three main layers have been identified and need to be regarded separately. The policy layer is the management layer where policies are expressed, and functionalities such as conflict resolution, speech acts, delegation, policy priorities, meta-policies and the definition of jurisdictions are available. Policy consistency checks also take place on this layer.</p><p>The second layer contains design-time artifacts such as BP models and business rules. Just as BP models need to be transformed into executable process models that can be run on several execution engines, business rules need to be transformed into operative rules which can be run on the same layer as BP execution engines. The prefix ßemanticmmeans that policies, BP models, executable BP models, business rules and operational rules are all defined using dedicated ontologies. Additionally to these layers, there are two vertical components: the monitoring components and the inference engine. Monitoring is needed both for the operations taken on policy models and for monitoring design-time and run-time decisions taken by policies which closes the lifecycle for one compliance management iteration.. This requirement has also been identified in <ref type="bibr" target="#b18">[KD06]</ref>. The inference engine operates on both business rules and operational rules (which implement the decision-making logic behind policies) in order to check for regulation policy violation. The policy layer disposes of its own engine for inferring on policy management aspects such as inconsistency or conflict detection.</p><p>This framework requires the definition of a set of transformations. Figure <ref type="figure" target="#fig_4">6</ref> shows how policy layers map to semantic layers. The semantic policy layer contains ontologies for definition and management of policies as well as domain policy layers. A first transformation is needed in order to generate business rule models out of the policy definitions. A second transformation is needed in order to generate operational rule models out of business rules models. Our goal is to define languages (in the form of ontologies) for each of these layers and to complete these with generic transformations between the ontologies. We are currently concentrating on the definition of an ontology for policies and rules. Future work will include the definition of mappings to the SBVR <ref type="bibr">[OMG]</ref> and PRR [OMG07] standards. A lifecycle needs to be defined for the management of semantic policies. Figure <ref type="figure" target="#fig_5">7</ref> makes use of the components identified in the architecture for this lifecycle. After being defined (as a policy ontology instance), a policy must be verified for formal consistency and conflicts with other ontologies. The next steps will then be to generate design-level and execution-level models of these policies and to enforce them on BPs. Furthermore, analyzing the execution of policies and the decisions takes by the latter completes the lifecycle and provides insights into how tight do the designed policies match the initial regulations. The analysis phase outputs also serve as audit artifacts that can show that the right policies have been defined and that these are working correctly.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">An Ontology for Policies and Rules</head><p>The business policy and Rule ontology (BPRO) we introduce has been modelled to fulfill the requirements we already identified. In the following, we will shortly introduce its main concepts and relationships. Because of space restrictions, the ontology components won't be introduced in detail (i.e. information to cardinalities and examples are not included).</p><p>Figure <ref type="figure" target="#fig_6">8</ref> shows the core policy ontology. The central concept is the policy concept. A policy is a meta-policy if it is enacted on other policies. A policy belongs to a strategy and is part of the implementation of one or many regulations. A policy fulfills a business goal. A constraint is one kind of policy, next to Decision, functional and core policies. A constraint policy decides on how to constrain a resource in showing some behavior. It delivers one or many of several discrete allowed business artifact behaviors/states and does not provide a binary yes/no answer as a decision policy does. A core policy is a policy which takes no decision that has to be enforced on business artifacts, it can only be invoked by other policies and delivers intermediary decisions. A functional policy applies for business functions that are able to execute differently depending on the parameters given to them. A functional policy decides on which concrete action these business function as can take by setting these parameters.</p><p>A policy has a subject, which is the entity(ies) on which it can apply. This subject can be a process model for example or any business artifact part of the enterprise model (e.g. role, resource, business function etc.). A process is composed of process fragments and the latter are composed of process constructs such as activities. The concepts related to BP modeling have to be mapped to the used BPM ontologies.</p><p>A policy has a jurisdiction and a scope. A jurisdiction is the domain in which a policy has the right to take decisions. Outside its jurisdiction, a policy cannot take any decisions, cannot be solicited, and cannot communicate with other policies about subjects not belonging to its jurisdiction. A Jurisdiction is a set of subjects. These sets of subjects can be defined in a declarative way, such as using assertions on properties of subjects: all roles of type==[ engineer | manager ] where role.budget&gt;= 1000 units. We do not take into account jurisdiction management (which would require a dedicated algebra) in order to define these inter-policy relations unambiguously. Scopes are different from a jurisdiction in that scopes are always strictly included in jurisdictions and define the set of subjects inside a given jurisdiction upon which a policy can take a decision. Scopes introduce additional flexibility in managing policies, by allowing to mmoveä policy's scope inside a A rule belongs to one or many policies. That means rules can be composed in order to implement a certain policy. A rule is also attached to a business goal and has a scope. A rule has input and output data it processes and an input and output event. Input events can trigger the execution of a rule and output events are generated by a rule to trigger other rules or actions. A rule has configuration data which makes a rule able to execute different logic depending on its configuration. A rule makes a decision. A rule contains rule logic which is expressed in a certain formalism. Formalisms are many and in the figure above, the Event-Condition-Action (ECA) formalism has been used as an example. An ECA rule has a condition and an action which can be a complex expression of actions. It is also triggered by one of the input events of the rule. The action taken by the ECA rule is done on a subject.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Related Work</head><p>There has been ongoing work on semantic compliance management, as shown in <ref type="bibr" target="#b22">[NS07a]</ref>, where an approach for semantic compliance management for BPM is presented. However, the approach used concentrates on implementing internal controls. Such an approach is adapted to compliance management but is restrictive because it relies on the necessary definition of risks. Another approach is presented in <ref type="bibr" target="#b29">[SN07]</ref> where the authors introduce the modeling of internal control objectives in BPs as a mean to integrate compliance requirements in BP design. The authors also relate their work to risk analysis and internal control modeling. Policies are meant to be generic and do not depend on a previous definition of risks in processes.</p><p>In our approach, policies are meant to be directly extracted from regulations, either in automated fahion, by relying on natural language processing techniques, or semi-automated fashion, by generating policy templates out of regulatory documents for the policy expert to complete. This introduces a layer between the modeling of regulatory compliance requirements and actual regulatory compliance enforcement. Such a layer would allow for example to exchange policies or discover policy conflicts between BPs existing in different departments or organizations. Moreover, policies can themselves be used to implement internal controls. Policies also allow for profiting from inference mechanisms in order to take decisions through the use of specifically designed policy inference engines such as in <ref type="bibr" target="#b16">[Kag04]</ref>.</p><p>In <ref type="bibr" target="#b10">[Hua05]</ref>, a framework is introduced for semantic security management in BPs. However, the presented approach focuses only on security concerns and does not seek to define its own ontologies. It relies on previous work ([ <ref type="bibr" target="#b16">Kag04,</ref><ref type="bibr" target="#b2">ea04]</ref>). In <ref type="bibr" target="#b19">[KMS07]</ref> and <ref type="bibr">[Kar]</ref>, another approach for BP compliance management is presented. It defines an extension for a BP meta-model for regulatory compliance. However, the approach does not incorporate ontologies and thus, does not profit from the power of semantic technologies. In <ref type="bibr" target="#b7">[GV06]</ref> and <ref type="bibr" target="#b5">[GG06]</ref>, deontic (obligations and permissions) constraints expressible for BPs are modelled using temporal deontic assignments. The latter can also be used in BP design and in expressing BP contracts.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8">Conclusion and Future Work</head><p>In this paper we have thoroughly introduced the business problem of compliance checking and motivated the need for a comprehensive compliance management framework. We proposed and justified the use of policies for this purpose, which decision is also supported by existing works. Enterprise models are defined semantically and enriched with compliance measures modelled as elements of a policy ontology. This requires an integration of enterprise models and compliance management models. Specifically implemented inference engines can be used to reason over the resulting models and decide on or enforce compliance. An architecture has been presented in order to illustrate our approach. The different layers, components and interactions between these components as well as necessary model transformations were introduced. The first steps towards implementing this framework have been taken and an ontology proposed. While we go further in realizing a reference implementation of the proposed architecture, new requirements will appear and can push us to slightly modify the architecture. As a next step, we will design tools to allow editing and building compliance policy ontologies. We also will define and implement the necessary ontology transformations discussed above. As a proof-of-concept, we will seek to define realistic use cases for a specific domain (e.g. quality management) and shocase the use of the compliance framework. Ultimately, the goal of this work is to showcase how using semantics, policy management and rule management can make compliance checking automatable 9 .</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: High-Level Compliance Model</figDesc><graphic coords="3,175.26,414.34,244.92,63.06" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Segregation of Duty (SOD) policy example</figDesc><graphic coords="4,216.48,148.47,162.48,65.64" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>4</head><label></label><figDesc>Semantic Policy-Based Compliance Checking 4.1 Formal, Declarative, Semantic &amp; Domain-Dependent Policies</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: An Architecture for a compliance checking framework</figDesc><graphic coords="7,182.42,500.06,230.59,137.47" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: Policy layers and transformations in the framework</figDesc><graphic coords="9,188.66,148.47,218.11,71.62" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 7 :</head><label>7</label><figDesc>Figure 7: Managing policies</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 8 :</head><label>8</label><figDesc>Figure 8: Policy Ontology</figDesc><graphic coords="10,153.97,148.48,287.50,260.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Figure 9 :</head><label>9</label><figDesc>Figure 9: Rule Ontology</figDesc><graphic coords="11,173.22,148.48,249.00,260.50" type="bitmap" /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">Health Insurance Portability and Accountability Act: http://www.hipaa.org/.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">US Food and Drug Administration: http://www.fda.gov/opacom/laws/.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_2">Basel II Revised International Capital Framework.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_3">The ISO 27002:2005 IT security standard: http://www.iso.org.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="5" xml:id="foot_4">German law for Control and Transparency in the private sector.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="6" xml:id="foot_5">Semantics of Business Vocabulary and Rules</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="7" xml:id="foot_6">Production Rule representation</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="8" xml:id="foot_7">Semantics Used for Process management within and between EnteRprises. www.ip-super.org.</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Process Modeling</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">I</forename><surname>Kellner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Over</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Curtis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Comm. of the ACM</title>
		<imprint>
			<biblScope unit="volume">35</biblScope>
			<biblScope unit="issue">9</biblScope>
			<biblScope unit="page">75</biblScope>
			<date type="published" when="1992-09">September 1992</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Modeling and Verifying Workflow-based Regulations</title>
		<author>
			<persName><forename type="first">Wilhelm</forename><surname>Rossak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Daniel</forename><surname>Foetsch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Elke</forename><surname>Pulvermueller</surname></persName>
		</author>
		<ptr target="CEUR-WS.org/" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the international workshop on regulations modeling and their validation and verification. REMO2V06</title>
				<meeting>the international workshop on regulations modeling and their validation and verification. REMO2V06<address><addrLine>Luxemburg</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2006-06">June 2006</date>
			<biblScope unit="volume">241</biblScope>
			<biblScope unit="page" from="825" to="830" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">SWRL: A Semantic Web Rule Language Combining OWL and RuleML</title>
		<author>
			<persName><forename type="first">S</forename><surname>Tabet</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">W3C Member Submission</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<date type="published" when="2004-05">May 2004 2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Towards Policy-Powered Semantic Enterprise Compliance Management -Discussion Paper</title>
		<author>
			<persName><forename type="first">Marwane</forename><forename type="middle">El</forename><surname>Kharbili</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sebastian</forename><surname>Stein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ivan</forename><surname>Markovic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Elke</forename><surname>Pulvermüller</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">3rd International Workshop on Semantic Business Process Management (SBPM), CEUR Workshop Proceedings</title>
				<meeting><address><addrLine>Tenerife, Spain</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2008-06-02">June 2 2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Rules and Ontology in Compliance Management</title>
		<author>
			<persName><forename type="first">&amp;</forename><forename type="middle">P</forename><surname>Parameswaran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Ray</surname></persName>
		</author>
		<author>
			<persName><surname>Yip</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ISO International Organization for Standardization. ISO9000:2005 -Quality management systems, Fundamentals and vocabulary</title>
				<meeting><address><addrLine>Washington, DC, USA; Washington, DC, USA</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2007">20.09.2005 2005. 2007</date>
			<biblScope unit="page">435</biblScope>
		</imprint>
	</monogr>
	<note>Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Compliance checking between business processes and business contracts</title>
		<author>
			<persName><forename type="first">Shazia</forename><surname>Sadiq</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Guido</forename><surname>Governatori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Zoran</forename><surname>Milosevic</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 10th IEEE International Enterprise Distributed Object Computing Conference (EDOC&apos;06)</title>
				<meeting>the 10th IEEE International Enterprise Distributed Object Computing Conference (EDOC&apos;06)</meeting>
		<imprint>
			<date type="published" when="2006">2006</date>
			<biblScope unit="page" from="221" to="232" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m">The Open Group Architectural Framework (TOGAF)</title>
				<imprint/>
	</monogr>
	<note>The Open Group</note>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Designing Compliant Business Processes with Obligations and Permissions</title>
		<author>
			<persName><forename type="first">Stijn</forename><surname>Goedertier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jan</forename><surname>Vanthienen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">LNCS, chapter BPM 2006 Workshops</title>
				<imprint>
			<publisher>Springer Verlag</publisher>
			<date type="published" when="2006">2006</date>
			<biblScope unit="volume">4103</biblScope>
			<biblScope unit="page" from="5" to="14" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Ontologies: State of the art, business potential, and grand challenges</title>
		<author>
			<persName><forename type="first">Martin</forename><surname>Hepp</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Ontology Management: Semantic Web, Semantic Web Services, and Business Application</title>
				<editor>
			<persName><forename type="first">Martin</forename><surname>Hepp</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Pieter</forename><forename type="middle">De</forename><surname>Leenheer</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Aldo</forename><surname>De Moor</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">York</forename><surname>Sure</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="3" to="22" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Semantic Business Process Management: A Vision Towards Using Semantic Web Services for Business Process Management</title>
		<author>
			<persName><forename type="first">;</forename><forename type="middle">M</forename><surname>Hld</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Hepp</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Leymann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Domingue</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Wahler</surname></persName>
		</author>
		<author>
			<persName><surname>Fensel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ICEBE</title>
		<editor>Francis C. M. Lau, Hui Lei, Xiaofeng Meng, and Min Wang</editor>
		<imprint>
			<biblScope unit="page" from="535" to="540" />
			<date type="published" when="2005">2005</date>
			<publisher>IEEE Computer Society</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Semantic policy-based security framework for business processes</title>
		<author>
			<persName><forename type="first">Dong</forename><surname>Huang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Semantic Web and Policy Workshop -csee.umbc</title>
				<meeting>the Semantic Web and Policy Workshop -csee.umbc<address><addrLine>Galway, Ireland</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2005-11-07">7 November 2005</date>
		</imprint>
	</monogr>
	<note>November 2005. 4th International Semantic Web Conference</note>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<ptr target="www.ip-super.org" />
		<title level="m">We thank the EU commission for supporting our research within the SUPER project</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Towards a Formal Framework for Reuse in Business Process Modeling</title>
		<author>
			<persName><forename type="first">Alessandro</forename><forename type="middle">Costa</forename><surname>Pereira</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ivan</forename><surname>Markovic</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Workshop on Advances in Semantics for Web services (semantics4ws), in conjunction with BPM &apos;07</title>
				<meeting><address><addrLine>Brisbane, Australia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2007-09">September 2007 2007. September 2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Compliance Checking for Process Repositories</title>
		<author>
			<persName><forename type="first">Guido</forename><surname>Governatori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ingo</forename><surname>Weber</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Joerg</forename><surname>Hoffmann</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Workshop on the Impact of Governance, Risk, and Compliance on Information Systems (GRCIS)</title>
				<editor>
			<persName><forename type="first">Dr</forename><surname>Michael Zur Muehlen Dr</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Shazia</forename><surname>Sadiq</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Marta</forename><surname>Dr</surname></persName>
		</editor>
		<editor>
			<persName><surname>Indulska</surname></persName>
		</editor>
		<meeting>the Workshop on the Impact of Governance, Risk, and Compliance on Information Systems (GRCIS)<address><addrLine>Montpellier, France</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2008-06">June 2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">Workflow Management: Modeling Concepts. Architecture, and Implementation</title>
		<author>
			<persName><forename type="first">S</forename><surname>Bussler C Jablonski</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1996">1996</date>
			<publisher>International Thomson Computer Press</publisher>
			<pubPlace>London, UK</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Extending and Formalizing the Framework for Information Systems Architecture</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">F</forename><surname>Sowa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Zachman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IBM Systems Journal</title>
		<imprint>
			<biblScope unit="volume">31</biblScope>
			<biblScope unit="issue">3</biblScope>
			<date type="published" when="1992">1992</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">A Policy-Based Approach to Governing Autonomous Behavior in Distributed Environments</title>
		<author>
			<persName><forename type="first">Lalana</forename><surname>Kagal</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
		<respStmt>
			<orgName>Faculty of the Graduate School of the University of Maryland</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Phd thesis</note>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">A Business process Based Modelling Extension for Regulatory Compliance</title>
		<author>
			<persName><forename type="first">D</forename><surname>Karagiannis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Multikonferenz Wirtschaftsinformatik 2008</title>
				<meeting><address><addrLine>Munich</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Dashboards for Monitoring Compliance to Regulations -A SOX-based Scenario</title>
		<author>
			<persName><forename type="first">M</forename><surname>Schwab</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Karagiannis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Nemetz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of IGO&apos;06 -International Conference on Integrating Global Organizations</title>
				<meeting>IGO&apos;06 -International Conference on Integrating Global Organizations<address><addrLine>Siena</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2006">2006. 2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Business Process-Based Regulation Compliance: The Case of the Sarbanes-Oxley Act</title>
		<author>
			<persName><forename type="first">Dimitris</forename><surname>Karagiannis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">John</forename><surname>Mylopoulos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Margit</forename><surname>Schwab</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Requirements Engineering Conference</title>
				<imprint>
			<date type="published" when="2007">2007. 2007</date>
			<biblScope unit="page" from="315" to="321" />
		</imprint>
	</monogr>
	<note>RE &apos;07. 15th IEEE International</note>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Towards a Framework for Semantic Business Process Compliance Management</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">El</forename><surname>Kharbili</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Stein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Markovic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Pulvermüller</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">GRCIS Workshop -CAISE Conference</title>
				<editor>
			<persName><forename type="first">S</forename><surname>Sadiq</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Indulska</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Zur Muehlen</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Compliance of Semantic Constraints A Requirements Analysis for Process Management Systems</title>
		<author>
			<persName><forename type="first">Thao</forename><surname>Lgrm + ; Linh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Kevin</forename><surname>Ly</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Stefanie</forename><surname>Göser</surname></persName>
		</author>
		<author>
			<persName><forename type="first">,</forename><surname>Rinderle-Ma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Peter</forename><surname>Dadam</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the GRCIS08: International Workshop on Governance, Risk and Compliance -Applications in Information Systems</title>
				<editor>
			<persName><forename type="first">S</forename><surname>Sadiq</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Indulska</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Zur Muehlen</surname></persName>
		</editor>
		<meeting>the GRCIS08: International Workshop on Governance, Risk and Compliance -Applications in Information Systems</meeting>
		<imprint>
			<date type="published" when="2008-06">June 2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">A Formal Approach for Internal Controls Compliance in Business Processes</title>
		<author>
			<persName><forename type="first">Kioumars</forename><surname>Namiri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Nenad</forename><surname>Stojanovic</surname></persName>
		</author>
		<idno>BP- MDS07</idno>
	</analytic>
	<monogr>
		<title level="m">8th Workshop on Business Process Modeling, Development, and Support (BPMDS07)</title>
				<meeting><address><addrLine>Trondheim, Norway</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<title level="m" type="main">Using Control Patterns in Business Processes Compliance</title>
		<author>
			<persName><forename type="first">Kioumars</forename><surname>Namiri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Nenad</forename><surname>Stojanovic</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2007">2007. 2007</date>
			<biblScope unit="volume">4832</biblScope>
			<biblScope unit="page" from="178" to="190" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<monogr>
		<title level="m" type="main">OMG Business Modeling Specifications -Semantics of Business Vocabulary and Rules</title>
		<author>
			<persName><surname>Omg</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<author>
			<persName><surname>Omg</surname></persName>
		</author>
		<ptr target="http://www.omg.org/docs/dtc/07-11-04.pdf" />
		<title level="m">Production Rule Representation (PRR) -Beta -OMG adopted specification</title>
				<imprint>
			<date type="published" when="2007-11">November 2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Congress of the United States</title>
	</analytic>
	<monogr>
		<title level="j">Public Company Accounting Reform and Investor Protection Act (Sarbanes-Oxley Act). Pub. L. No</title>
		<imprint>
			<biblScope unit="page">745</biblScope>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Improving Operational Risk Management Systems by formalizing the BASEL II Regulation with Goal Models and the ISO/IEC 15504 Approach</title>
		<author>
			<persName><forename type="first">Andre</forename><surname>Rifaut</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Christophe</forename><surname>Feltus</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the REMO2V06</title>
				<meeting>the REMO2V06</meeting>
		<imprint>
			<date type="published" when="2006">2006</date>
			<biblScope unit="page">831</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<monogr>
		<title level="m" type="main">ARIS -Business Process Frameworks</title>
		<author>
			<persName><forename type="first">August-Wilhelm</forename><surname>Scheer</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2000-04">April 2000</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
	<note>3rd ed. edition</note>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Modeling Control Objectives for Business Process Compliance</title>
		<author>
			<persName><forename type="first">G</forename><surname>Governatori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sadiq</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Namiri</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="page" from="149" to="164" />
			<date type="published" when="2007">2007</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">The Enterprise Ontology</title>
		<author>
			<persName><forename type="first">Mike</forename><surname>Uschold</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Martin</forename><surname>King</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Stuart</forename><surname>Moralee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yannis</forename><surname>Zorgios</surname></persName>
		</author>
		<ptr target="http://www.aiai.ed.ac.uk/project/enterprise/enterprise/ontology.html" />
	</analytic>
	<monogr>
		<title level="m">The Knowledge Engineering Review</title>
				<imprint>
			<date type="published" when="1998">1998</date>
			<biblScope unit="volume">13</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Goal-Oriented Requirements Engineering: A guided tour</title>
		<author>
			<persName><forename type="first">A</forename><surname>Van Lamsweerde</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Joint Conference on Requirements Engineering</title>
				<imprint>
			<publisher>Toronto IEEE</publisher>
			<date type="published" when="2001-08">August 2001</date>
			<biblScope unit="page" from="249" to="263" />
		</imprint>
	</monogr>
	<note>Invited minitutorial, proceedings of the RE01</note>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">Translating business contract into compliant business processes</title>
		<author>
			<persName><forename type="first">M</forename><surname>Orlowska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Milosevic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sadiq</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 10th IEEE International Enterprise Distributed Object Computing Conference (EDOC&apos;06)</title>
				<meeting>the 10th IEEE International Enterprise Distributed Object Computing Conference (EDOC&apos;06)</meeting>
		<imprint>
			<date type="published" when="2006">2006</date>
			<biblScope unit="page" from="211" to="220" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
