<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>SeaFlows Toolset Compliance Verication Made Easy</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Linh Thao Ly</string-name>
          <email>thao.ly@uni-ulm.de</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>David Knuplesch</string-name>
          <email>david.knuplesch@uni-ulm.de</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stefanie Rinderle-Ma</string-name>
          <email>stefanie.rinderle-ma@univie.ac.at</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kevin Gser</string-name>
          <email>kevin.goeser@aristaflow.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Manfred Reichert</string-name>
          <email>manfred.reichert@uni-ulm.de</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Peter Dadam</string-name>
          <email>peter.dadam@uni-ulm.de</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>AristaFlow GmbH</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Faculty of Computer Science University of Vienna</institution>
          ,
          <country country="AT">Austria</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Institute of Databases and Information Systems Ulm University</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>In the light of an increasing demand on business process compliance, the verication of process models against compliance rules has become essential in enterprise computing. The SeaFlows Toolset featured in this tool demonstration extends process-aware information system by compliance checking functionality. It provides a user-friendly environment for modeling compliance rules using a graph-based formalism. Modeled compliance rules can be used to enrich process models. To address a multitude of verication settings, SeaFlows Toolset provides two compliance checking components: The structural compliance checker derives structural criteria from compliance rules and applies them to detect incompliance. The data-aware compliance checker addresses the state explosion problem that can occur when the data dimension is explored during compliance checking. It performs context-sensitive automatic abstraction to derive an abstract process model which is more compact with regard to the data dimension enabling more ecient compliance checking. Altogether, SeaFlows Toolset constitutes a comprehensive and extensible framework for compliance checking of process models.</p>
      </abstract>
      <kwd-group>
        <kwd>Compliance rules</kwd>
        <kwd>Process verication</kwd>
        <kwd>Tool support</kwd>
        <kwd>Data-awareness</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <sec id="sec-1-1">
        <title>In the light of an increasing demand on business process compliance [1], the</title>
        <p>
          verication of process models within process-aware information systems against
? This work was done in the research project SeaFlows which is partially funded by
the German Research Foundation (DFG).
compliance rules has become essential in enterprise computing. To ensure
compliance with imposed rules and policies, compliance audits for process models
are necessary. Due to increasing complexity of process models [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] manual
compliance verication is hardly feasible. Tool support is particularly needed in order
to deal with changes at dierent levels. On the one hand, changes and evolution
of regulatories and policies may occur, leading to changes in implemented
compliance rules. On the other hand, changes to business processes may take place,
resulting in changes of implemented process models. This further necessitates
tool support for (semi-)automatic compliance verication.
        </p>
      </sec>
      <sec id="sec-1-2">
        <title>The toolset featured in this tool demonstration resulted from our research</title>
        <p>
          in the SeaFlows project. In this project, we aim at providing techniques to
enable compliance with imposed regulatories throughout the process lifecycle.
This inludes compliance cheking of business process models at buildtime but
also compliance monitoring of process instances at runtime [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. With the
implementation of SeaFlows Toolset, so far, we have realized concepts addressing
compliance checking of process models at buildtime. The particular components
shown in this tool demonstration enable modeling compliance rules as visual
compliance rule graphs as well as verifying process models against imposed
compliance rules [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. To support a variety of verication scenarios and to exploit
their specic properties, SeaFlows Toolset comprises several verication
components: a structural compliance checker , enabling ecient compliance verication
for block-structured process models and a data-aware compliance checker ,
enabling data-aware compliance checking using model checking techniques.
        </p>
      </sec>
      <sec id="sec-1-3">
        <title>In the following, the particular components of SeaFlows Toolset are introduced. Related work is discussed in Sect. 3 before we close the paper with an outlook on future developments in Sect. 4</title>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2 SeaFlows Toolset</title>
      <sec id="sec-2-1">
        <title>SeaFlows Toolset extends process-aware information system (PAIS) by compli</title>
        <p>ance checking functionality. Fig. 1 depicts the interplay between existing
infrastructure stemming from PAIS (e.g., activity repository, process modeling tool,
and process model repository) and components introduced by SeaFlows Toolset 2.</p>
      </sec>
      <sec id="sec-2-2">
        <title>The SeaFlows Graphical Compliance Rule Editor (cf. Fig. 1) allows to</title>
        <p>
          model compliance rules over process artifacts as compliance rule graphs [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] (cf.
Sect. 2.1). By interacting with the activity repository responsible for organizing
and managing process artifacts relevant within a business domain, the
Graphical Compliance Rule Editor enables compliance rule modeling over exactly the
process artifacts available in the domain. Thus, we can enrich process models by
compliance rules that are imposed on the corresponding business process. This
can be done at an early stage, when the process is modeled to enable compliance
by design. Compliance rules may be also assigned to a completed or released
process model to perform compliance audits.
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>2 The Rule Graph Execution Engine for executing compliance rule graphs is currently</title>
        <p>under implementation
Seaflows Graphical
Compliance Rule</p>
        <p>Editor
Compliance
rule graphs</p>
        <p>Activity
Repository</p>
        <p>SeaFlows
Compliance Rule</p>
        <p>Repository</p>
        <p>Process</p>
        <p>Modeling Tool
Process model
enriched by
compliance
rule graphs
Process Model
Repository</p>
        <p>Process
Execution</p>
        <p>Engine</p>
        <p>Seaflows Compliance Checkers
Structural
Compliance
Checker</p>
        <p>Data-Aware
Compliance
Checker</p>
        <p>Rule Graph
Execution
Engine</p>
        <p>SeaFlows Toolset currently comprises two compliance checking components
to verify process models (cf. Fig. 1), namely the Structural Compliance Checker
and the Data-aware Compliance Checker. By interacting with the process
modeling tool of PAIS, the SeaFlows compliance checkers enable the process designer to
verify process models already during process design. Meaningful compliance
reports help the process designer to identify incompliant process behaviour. Based
on them, the process designer may further modify the process model until
incompliance is resolved.</p>
      </sec>
      <sec id="sec-2-4">
        <title>To transfer our concepts into a comprehensive prototype, we opted to base</title>
        <p>our implementation on the commercial process management system AristaFlow</p>
      </sec>
      <sec id="sec-2-5">
        <title>BPM Suite orginated from research activities in the ADEPT project [5].</title>
        <p>AristaFlow BPM Suite provides a powerful API which enables us to extend
existing PAIS functionality by compliance checking mechanisms in an elegant
manner. Thus, SeaFlows compliance checking components are smoothly
integrated into the process modeling environment of AristaFlow BPM Suite. In the
following, the components of SeaFlows Toolset (cf. Fig. 1) and underlying
concepts are discussed in more detail.</p>
      </sec>
      <sec id="sec-2-6">
        <title>2.1 Graphical Compliance Rule Editor and Compliance Rule</title>
      </sec>
      <sec id="sec-2-7">
        <title>Repository</title>
        <p>
          We developed a graph-based compliance rule specication language that enables
modeling compliance rules in a manner similar to process modeling. Designed to
support intuitive compliance rules modeling, compliance rule graphs are modeled
by linking nodes representing absence and occurrence of activity executions of
certain types [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. In particular, (sub-)graphs are used to respresent an antecedent
pattern that activates the compliance rule and corresponding required
consequence patterns. This enables modeling frequent compliance rule patterns [
          <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
          ]
in a straightforward manner. Further, compliance rule graphs can be enriched
with annotations of temporal constraints (e.g., minimal temporal distance) as
well as data conditions.
        </p>
      </sec>
      <sec id="sec-2-8">
        <title>The Graphical Compliance Rule Editor provides a user-friendly environment</title>
        <p>for modeling compliance rule graphs (cf. Fig. 2). Nodes of compliance rule graphs
are assigned to activity types available in the activity repository (cf. Fig. 1).
Modeled compliance rule graphs are exported as separate XML-les which enables
their organization within rule sets in the Compliance Rule Repository. In
addition, versioning of compliance rules is also supported by the repository. Being
implemented based on Eclipse Modeling Framework, modeled compliance rule
graphs are based on a dened data object model that facilitates their import
and processing in compliance checking tools.</p>
      </sec>
      <sec id="sec-2-9">
        <title>2.2 Structural Compliance Checker</title>
        <p>
          The basic idea underlying the Structural Compliance Checker is to eciently
verify process models by automatically deriving criteria on the process
structure from compliance rules [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]. Following the dynamic programming paradigm,
for each compliance rule a set of simple binary structural criteria (such as A
excludes B) whose satisfaction ensure compliance with the corresponding rule
is derived. By checking the process model for compliance with these derived
criteria, we can identify the criteria not fullled by the process model. This is
useful information to generate intelligible textual feedback in case incompliance
is detected. Based on the results of checking the structural criteria, the
Structural Compliance Checker is able to provide detailed diagnosis that is helpful to
locate incompliance (cf. Fig. 3). For example, the feedback Fig. 3 indicates that
shipping insurance is optional to production in the process model. This detailed
diagnosis can further be applied to resolve incompliance.
        </p>
      </sec>
      <sec id="sec-2-10">
        <title>By making assumptions on the verication setting (e.g., unique label as</title>
        <p>sumption) and exploiting the block-structure of process models the Structural</p>
      </sec>
      <sec id="sec-2-11">
        <title>Compliance Checker identies incompliance in an ecient manner.</title>
      </sec>
      <sec id="sec-2-12">
        <title>The Structural Compliance Checker is implemented as Eclipse-plug-in for</title>
      </sec>
      <sec id="sec-2-13">
        <title>AristaFlow Process Template Editor and thus, is smoothly integrated into the</title>
        <p>process modeling environment. Therefore, compliance checks on the y during
process modeling can be carried out to support compliance by design.</p>
      </sec>
      <sec id="sec-2-14">
        <title>2.3 Data-aware Compliance Checker</title>
      </sec>
      <sec id="sec-2-15">
        <title>The Data-aware Compliance Checker is able to deal with data-aware compliance</title>
        <p>rules and data conditions in process control ow. The challenge with data-aware
compliance checking is that the exploration of the data dimension during
compliance checking can lead to state explosion and thus, to intractable complexity.</p>
      </sec>
      <sec id="sec-2-16">
        <title>To tackle this, we developed a process-meta-model-independent approach for</title>
        <p>automatic context-sensitive (i.e., rule-specic) abstraction (cf. Fig. 4 B). By
analyzing the data conditions contained in the compliance rule and in the process
model, it reduces the state space of the data dimension to be explored during
verication. The obtained abstract process model and abstract compliance rule
are given as input to the actual compliance checking procedure (cf. Fig. 4 A).</p>
      </sec>
      <sec id="sec-2-17">
        <title>For compliance checking we used a model checker. In case of violation, the counterexample obtained from the model checker is conretized to yield not only the incompliant execution but also the its data conditions.</title>
      </sec>
      <sec id="sec-2-18">
        <title>The Data-aware Compliance Checker rst performs automatic abstraction,</title>
        <p>then transforms the abstract process model into a state space representation.
process
model
data-aware
compliance
rules</p>
        <p>B
automatic
abstraction to
reduce complexity abstract
dataaware
compliance rules
abstract
process model</p>
        <p>A
compliance
checking
processing
compliance
report
automatic
concretization
for user
feedback</p>
      </sec>
      <sec id="sec-2-19">
        <title>The latter is then passed to the model checker SAL [9], which carries out the ex</title>
        <p>ploration of the abstract process model. In case compliance violation is detected,
the Data-aware Compliance Checker retransforms the counterexample output of
the model checker and visualizes it as an execution trace and as process graph.</p>
      </sec>
      <sec id="sec-2-20">
        <title>Similar to the Structural Compliance Checker, the Data-aware Compliance</title>
        <p>Checker is directly integrated into the process modeling environment. 17.000
lines of code and the class hierarchy comprising about 70 interfaces and 210
classes indicate its complexity. Automatic abstraction is supported for domains
of numbers and for large domains of object references.</p>
        <p>original
process graph
counterexample as
process graph
visualization of the
counterexample’s steps
counterexample
as process log
data-aware
compliance rules</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3 Related Work</title>
      <p>
        Three major challenges arise from compliance verication of process models:
compliance rule modeling, verication techniques, and feedback generation. The
concepts implemented in SeaFlows Toolset address all three issues. Existing
approaches for modeling compliance rules range from rather informal annotations
of process models with compliance rules, over formal languages [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], to visual
patterns and languages [
        <xref ref-type="bibr" rid="ref11 ref12 ref13">11, 12, 13</xref>
        ]. With the compliance rule graphs, we opted
for a compositional graph-based modeling formalism that supports the typical
antecedent-consequence-structure of rules.
      </p>
      <p>
        For compliance verication, model checking is often applied in literature [
        <xref ref-type="bibr" rid="ref10 ref12 ref13">12,
13, 10</xref>
        ]. As advantage we obtain an approach that is not specic to a
particular process meta-model or process modeling notation. One challenge of model
checking, however, is the generation of meaningful feedback from the report (e.g.,
counterexample) provided by the model checker. SeaFlows Toolset implements
two compliance checking approaches, one based on model checking and another
based on structural criteria, that complement each other.
      </p>
      <p>
        Some approaches address the verication of data-aware compliance rules [
        <xref ref-type="bibr" rid="ref11 ref12">11,
12</xref>
        ]. However, the state explosion problem arising from exploration of the data
dimension is not addressed by these approaches. In SeaFlows Toolset we
implemented an abstraction approach that serves as preprocessing step to the actual
data-aware compliance checking to limit state explosion.
      </p>
      <p>
        [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] addresses visualization of incompliance by querying the process model
for anti-patterns that are dened for each compliance rule pattern. In our
approach, structural criteria are automatically derived from the compliance rule
by the Structural Compliance Checker. Checking the structural criteria allows
for identifying precisely the structural reason for incompliance.
      </p>
      <sec id="sec-3-1">
        <title>Similar to DECLARE [14], the declarative process management system,</title>
      </sec>
      <sec id="sec-3-2">
        <title>SeaFlows enables to model graphical compliance rules. In DECLARE constraints are mapped onto formula in temporal logic and then to nite automata in order to execute constraint-based workows. In contrast, SeaFlows compliance rule graphs are used to verify process models.</title>
      </sec>
      <sec id="sec-3-3">
        <title>SeaFlows Toolset can be further complemented by other process analysis</title>
        <p>
          tools, such as the process mining framework ProM [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ] to provide comprehensive
support of compliance checking a priori as well as a posteriori.
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4 Summary and Outlook</title>
      <p>SeaFlows Toolset featured in this tool demonstration extends process-aware
information system by compliance checking functionality. It enables modeling
compliance rule as graphs independently from specic process models by making
use of an activity repository. Process models can be enriched by compliance
rules for documentation purposes and for compliance verication. Two
compliance checkers, the Structural Compliance Checker and the Data-aware
Compliance Checker, addressing specic compliance verication scenarios (e.g.,
dataawareness) complement each other and thus, ensure broad applicability.</p>
      <sec id="sec-4-1">
        <title>In our future work, we will further extend SeaFlows Toolset to provide sup</title>
        <p>port for compliance checking during process execution (cf. the SeaFlows Rule</p>
      </sec>
      <sec id="sec-4-2">
        <title>Graph Execution Engine in Fig. 1). In addition, SeaFlows Toolset will be extended by a visualization and explanation component to provide advanced user feedback.</title>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Sadiq</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Governatori</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Naimiri</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Modeling control objectives for business process compliance</article-title>
          .
          <source>In: Proc. BPM '07</source>
          . (
          <year>2007</year>
          )
          <fpage>149164</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Bobrik</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reichert</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bauer</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>View-based process visualization</article-title>
          .
          <source>In: Proc. of the 5th Int'l Conf. on Business Process Management (BPM'07)</source>
          . Volume 4714 of LNCS. (
          <year>2007</year>
          )
          <fpage>8895</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Ly</surname>
            ,
            <given-names>L.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rinderle-Ma</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dadam</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>On enabling integrated process compliance with semantic constraints in process management systems</article-title>
          .
          <source>Information Systems Frontiers</source>
          , accepted for publication.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Ly</surname>
            ,
            <given-names>L.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rinderle-Ma</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dadam</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Design and verication of instantiable compliance rule graphs in process-aware information systems</article-title>
          .
          <source>In: The 22nd Int'l Conf. on Advanced Information Systems Engineering (CAiSE'10)</source>
          .
          <article-title>(2010) accepted for publication.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Dadam</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reichert</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>The ADEPT project: a decade of research and development for robust and exible process support</article-title>
          .
          <source>Computer Science-Research and Development</source>
          <volume>23</volume>
          (
          <issue>2</issue>
          ) (
          <year>2009</year>
          )
          <fpage>8197</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Dwyer</surname>
            ,
            <given-names>M.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Avrunin</surname>
            ,
            <given-names>G.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Corbett</surname>
            ,
            <given-names>J.C.</given-names>
          </string-name>
          :
          <article-title>Patterns in property specications for nite-state verication</article-title>
          .
          <source>In: Proc. ICSE'99</source>
          . (
          <year>1999</year>
          )
          <fpage>411</fpage>
          <lpage>420</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Awad</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weske</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Visualization of compliance violation in business process models</article-title>
          .
          <source>In: Proc. BPM Workshops</source>
          .
          <article-title>(</article-title>
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Ly</surname>
            ,
            <given-names>L.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rinderle-Ma</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dadam</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Integration and verication of semantic constraints in adaptive process management systems</article-title>
          .
          <source>Data &amp; Knowledge Engineering</source>
          <volume>64</volume>
          (
          <year>2007</year>
          )
          <fpage>323</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Bensalem</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , et al.:
          <article-title>An overview of SAL</article-title>
          .
          <source>In: Proc. of the Fifth NASA Langley Formal Methods Workshop</source>
          , NASA Langley Research Center (
          <year>2000</year>
          )
          <fpage>187196</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Ghose</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koliadis</surname>
          </string-name>
          , G.:
          <article-title>Auditing business process compliance</article-title>
          .
          <source>In: ICSOC '07</source>
          . Volume 4749 of LNCS., Springer (
          <year>2007</year>
          )
          <fpage>169180</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Awad</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weidlich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weske</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Specication, verication and explanation of violation for data aware compliance rules</article-title>
          .
          <source>In: Proc. ICSOC/ServiceWave'09</source>
          . (
          <year>2009</year>
          )
          <fpage>500515</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mller</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>A static compliance-checking framework for business process models</article-title>
          .
          <source>IBM Systems Journal</source>
          <volume>46</volume>
          (
          <issue>2</issue>
          ) (
          <year>2007</year>
          )
          <fpage>335261</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Frster</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , et al.:
          <article-title>Verication of business process quality constraints based on visual process patterns</article-title>
          .
          <source>In: Proc. 1st Joint IEEE/IFIP Symposium on Theoretical Aspects of Sofware Engineering</source>
          . (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Pesic</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schonenberg</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sidorova</surname>
          </string-name>
          , N.,
          <string-name>
            <surname>van der Aalst</surname>
          </string-name>
          , W.:
          <article-title>Constraint-based workow models: Change made easy</article-title>
          .
          <source>In: OTM</source>
          <year>2007</year>
          ,
          <string-name>
            <surname>Part</surname>
            <given-names>I</given-names>
          </string-name>
          . Number 4803 in LNCS, Springer-Verlag (
          <year>2007</year>
          )
          <fpage>7794</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>van der Aalst</surname>
          </string-name>
          , W., et al.:
          <article-title>ProM 4.0: Comprehensive support for real process analysis</article-title>
          .
          <source>In: Proc. ICATPN'07</source>
          . Volume 4546 of LNCS., Springer (
          <year>2007</year>
          )
          <fpage>484494</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>