<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">SeaFlows Toolset Compliance Verication Made Easy</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Linh</forename><forename type="middle">Thao</forename><surname>Ly</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Institute of Databases and Information Systems</orgName>
								<orgName type="institution">Ulm University</orgName>
								<address>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">David</forename><surname>Knuplesch</surname></persName>
							<email>david.knuplesch@uni-ulm.de</email>
							<affiliation key="aff0">
								<orgName type="department">Institute of Databases and Information Systems</orgName>
								<orgName type="institution">Ulm University</orgName>
								<address>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Stefanie</forename><surname>Rinderle-Ma</surname></persName>
							<email>stefanie.rinderle-ma@univie.ac.at</email>
							<affiliation key="aff1">
								<orgName type="department">Faculty of Computer Science</orgName>
								<orgName type="institution">University of Vienna</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Kevin</forename><surname>Göser</surname></persName>
							<email>kevin.goeser@aristaflow.com</email>
							<affiliation key="aff2">
								<orgName type="institution">AristaFlow GmbH</orgName>
								<address>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Manfred</forename><surname>Reichert</surname></persName>
							<email>manfred.reichert@uni-ulm.de</email>
							<affiliation key="aff0">
								<orgName type="department">Institute of Databases and Information Systems</orgName>
								<orgName type="institution">Ulm University</orgName>
								<address>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Peter</forename><surname>Dadam</surname></persName>
							<email>peter.dadam@uni-ulm.de</email>
							<affiliation key="aff0">
								<orgName type="department">Institute of Databases and Information Systems</orgName>
								<orgName type="institution">Ulm University</orgName>
								<address>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">SeaFlows Toolset Compliance Verication Made Easy</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">A3B330B1494D25E27FC096009700563F</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T21:54+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Compliance rules</term>
					<term>Process verication</term>
					<term>Tool support</term>
					<term>Data-awareness</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In the light of an increasing demand on business process compliance, the verication of process models against compliance rules has become essential in enterprise computing. The SeaFlows Toolset featured in this tool demonstration extends process-aware information system by compliance checking functionality. It provides a user-friendly environment for modeling compliance rules using a graph-based formalism. Modeled compliance rules can be used to enrich process models. To address a multitude of verication settings, SeaFlows Toolset provides two compliance checking components: The structural compliance checker derives structural criteria from compliance rules and applies them to detect incompliance. The data-aware compliance checker addresses the state explosion problem that can occur when the data dimension is explored during compliance checking. It performs context-sensitive automatic abstraction to derive an abstract process model which is more compact with regard to the data dimension enabling more ecient compliance checking. Altogether, SeaFlows Toolset constitutes a comprehensive and extensible framework for compliance checking of process models.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>In the light of an increasing demand on business process compliance <ref type="bibr" target="#b0">[1]</ref>, the verication of process models within process-aware information systems against This work was done in the research project SeaFlows which is partially funded by the German Research Foundation (DFG).</p><p>compliance rules has become essential in enterprise computing. To ensure compliance with imposed rules and policies, compliance audits for process models are necessary. Due to increasing complexity of process models <ref type="bibr" target="#b1">[2]</ref> manual compliance verication is hardly feasible. Tool support is particularly needed in order to deal with changes at dierent levels. On the one hand, changes and evolution of regulatories and policies may occur, leading to changes in implemented compliance rules. On the other hand, changes to business processes may take place, resulting in changes of implemented process models. This further necessitates tool support for (semi-)automatic compliance verication.</p><p>The toolset featured in this tool demonstration resulted from our research in the SeaFlows project. In this project, we aim at providing techniques to enable compliance with imposed regulatories throughout the process lifecycle.</p><p>This inludes compliance cheking of business process models at buildtime but also compliance monitoring of process instances at runtime <ref type="bibr" target="#b2">[3]</ref>. With the implementation of SeaFlows Toolset, so far, we have realized concepts addressing compliance checking of process models at buildtime. The particular components shown in this tool demonstration enable modeling compliance rules as visual compliance rule graphs as well as verifying process models against imposed compliance rules <ref type="bibr" target="#b3">[4]</ref>. To support a variety of verication scenarios and to exploit their specic properties, SeaFlows Toolset comprises several verication components: a structural compliance checker, enabling ecient compliance verication for block-structured process models and a data-aware compliance checker, enabling data-aware compliance checking using model checking techniques.</p><p>In the following, the particular components of SeaFlows Toolset are introduced. Related work is discussed in Sect. 3 before we close the paper with an outlook on future developments in Sect. <ref type="bibr" target="#b3">4</ref> 2 SeaFlows Toolset SeaFlows Toolset extends process-aware information system (PAIS) by compliance checking functionality. Fig. <ref type="figure" target="#fig_0">1</ref> depicts the interplay between existing infrastructure stemming from PAIS (e.g., activity repository, process modeling tool, and process model repository) and components introduced by SeaFlows Toolset 2 .</p><p>The SeaFlows Graphical Compliance Rule Editor (cf. Fig. <ref type="figure" target="#fig_0">1</ref>) allows to model compliance rules over process artifacts as compliance rule graphs <ref type="bibr" target="#b3">[4]</ref> (cf. Sect. 2.1). By interacting with the activity repository responsible for organizing and managing process artifacts relevant within a business domain, the Graphical Compliance Rule Editor enables compliance rule modeling over exactly the process artifacts available in the domain. Thus, we can enrich process models by compliance rules that are imposed on the corresponding business process. This can be done at an early stage, when the process is modeled to enable compliance by design. Compliance rules may be also assigned to a completed or released process model to perform compliance audits.  To transfer our concepts into a comprehensive prototype, we opted to base our implementation on the commercial process management system AristaFlow BPM Suite orginated from research activities in the ADEPT project <ref type="bibr" target="#b4">[5]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Process</head><p>AristaFlow BPM Suite provides a powerful API which enables us to extend existing PAIS functionality by compliance checking mechanisms in an elegant manner. Thus, SeaFlows compliance checking components are smoothly integrated into the process modeling environment of AristaFlow BPM Suite. In the following, the components of SeaFlows Toolset (cf. Fig. <ref type="figure" target="#fig_0">1</ref>) and underlying concepts are discussed in more detail.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Graphical Compliance Rule Editor and Compliance Rule</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Repository</head><p>We developed a graph-based compliance rule specication language that enables modeling compliance rules in a manner similar to process modeling. Designed to support intuitive compliance rules modeling, compliance rule graphs are modeled by linking nodes representing absence and occurrence of activity executions of certain types <ref type="bibr" target="#b3">[4]</ref>. In particular, (sub-)graphs are used to respresent an antecedent pattern that activates the compliance rule and corresponding required consequence patterns. This enables modeling frequent compliance rule patterns <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b6">7]</ref> in a straightforward manner. Further, compliance rule graphs can be enriched with annotations of temporal constraints (e.g., minimal temporal distance) as well as data conditions.</p><p>The Graphical Compliance Rule Editor provides a user-friendly environment for modeling compliance rule graphs (cf. Fig. <ref type="figure" target="#fig_1">2</ref>). Nodes of compliance rule graphs </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Structural Compliance Checker</head><p>The basic idea underlying the Structural Compliance Checker is to eciently verify process models by automatically deriving criteria on the process structure from compliance rules <ref type="bibr" target="#b7">[8]</ref>. Following the dynamic programming paradigm, for each compliance rule a set of simple binary structural criteria (such as A excludes B) whose satisfaction ensure compliance with the corresponding rule is derived. By checking the process model for compliance with these derived criteria, we can identify the criteria not fullled by the process model. This is useful information to generate intelligible textual feedback in case incompliance is detected. Based on the results of checking the structural criteria, the Structural Compliance Checker is able to provide detailed diagnosis that is helpful to locate incompliance (cf. Fig. <ref type="figure" target="#fig_2">3</ref>). For example, the feedback Fig. <ref type="figure" target="#fig_2">3</ref> indicates that shipping insurance is optional to production in the process model. This detailed diagnosis can further be applied to resolve incompliance.</p><p>By making assumptions on the verication setting (e.g., unique label assumption) and exploiting the block-structure of process models the Structural Compliance Checker identies incompliance in an ecient manner. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Data-aware Compliance Checker</head><p>The Data-aware Compliance Checker is able to deal with data-aware compliance rules and data conditions in process control ow. The challenge with data-aware compliance checking is that the exploration of the data dimension during compliance checking can lead to state explosion and thus, to intractable complexity.</p><p>To tackle this, we developed a process-meta-model-independent approach for automatic context-sensitive (i.e., rule-specic) abstraction (cf. Fig. <ref type="figure">4 B</ref>). By analyzing the data conditions contained in the compliance rule and in the process model, it reduces the state space of the data dimension to be explored during verication. The obtained abstract process model and abstract compliance rule are given as input to the actual compliance checking procedure (cf. Fig. <ref type="figure">4 A</ref>).</p><p>For compliance checking we used a model checker. In case of violation, the counterexample obtained from the model checker is conretized to yield not only the incompliant execution but also the its data conditions.</p><p>The Data-aware Compliance Checker rst performs automatic abstraction, then transforms the abstract process model into a state space representation. proaches for modeling compliance rules range from rather informal annotations of process models with compliance rules, over formal languages <ref type="bibr" target="#b9">[10]</ref>, to visual patterns and languages <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b11">12,</ref><ref type="bibr" target="#b12">13]</ref>. With the compliance rule graphs, we opted for a compositional graph-based modeling formalism that supports the typical antecedent-consequence-structure of rules.</p><p>For compliance verication, model checking is often applied in literature <ref type="bibr" target="#b11">[12,</ref><ref type="bibr" target="#b12">13,</ref><ref type="bibr" target="#b9">10]</ref>. As advantage we obtain an approach that is not specic to a particular process meta-model or process modeling notation. One challenge of model checking, however, is the generation of meaningful feedback from the report (e.g., counterexample) provided by the model checker. SeaFlows Toolset implements two compliance checking approaches, one based on model checking and another based on structural criteria, that complement each other. Some approaches address the verication of data-aware compliance rules <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b11">12]</ref>. However, the state explosion problem arising from exploration of the data dimension is not addressed by these approaches. In SeaFlows Toolset we implemented an abstraction approach that serves as preprocessing step to the actual data-aware compliance checking to limit state explosion. <ref type="bibr" target="#b6">[7]</ref> addresses visualization of incompliance by querying the process model for anti-patterns that are dened for each compliance rule pattern. In our approach, structural criteria are automatically derived from the compliance rule by the Structural Compliance Checker. Checking the structural criteria allows for identifying precisely the structural reason for incompliance. Similar to DECLARE <ref type="bibr" target="#b13">[14]</ref>, the declarative process management system, SeaFlows enables to model graphical compliance rules. In DECLARE constraints are mapped onto formula in temporal logic and then to nite automata in order to execute constraint-based workows. In contrast, SeaFlows compliance rule graphs are used to verify process models.</p><p>SeaFlows Toolset can be further complemented by other process analysis tools, such as the process mining framework ProM <ref type="bibr" target="#b14">[15]</ref> to provide comprehensive support of compliance checking a priori as well as a posteriori.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Summary and Outlook</head><p>SeaFlows Toolset featured in this tool demonstration extends process-aware information system by compliance checking functionality. It enables modeling compliance rule as graphs independently from specic process models by making use of an activity repository. Process models can be enriched by compliance rules for documentation purposes and for compliance verication. Two compliance checkers, the Structural Compliance Checker and the Data-aware Compli-ance Checker, addressing specic compliance verication scenarios (e.g., dataawareness) complement each other and thus, ensure broad applicability.</p><p>In our future work, we will further extend SeaFlows Toolset to provide support for compliance checking during process execution (cf. the SeaFlows Rule Graph Execution Engine in Fig. <ref type="figure" target="#fig_0">1</ref>). In addition, SeaFlows Toolset will be extended by a visualization and explanation component to provide advanced user feedback.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Overall infrastructure around the SeaFlows Toolset</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. The SeaFlows Graphical Compliance Rule Editor</figDesc><graphic coords="4,134.77,95.91,349.30,197.40" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. The SeaFlows Structural Compliance Checker integrated into AristaFlow Process Template Editor</figDesc><graphic coords="5,147.73,95.91,319.90,240.10" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Fig. 4 .Fig. 5 .</head><label>45</label><figDesc>Fig. 4. Abstraction and concretization as pre-and postprocessing steps to the actual data-aware compliance checking</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Modeling Tool Process Model Repository Activity Repository SeaFlows Compliance Rule Repository Process Execution Engine Seaflows Graphical Compliance Rule Editor</head><label></label><figDesc></figDesc><table><row><cell></cell><cell></cell><cell cols="3">Seaflows Compliance Checkers</cell></row><row><cell>Compliance rule graphs</cell><cell>Process model enriched by</cell><cell>Structural Compliance</cell><cell>Data-Aware Compliance</cell><cell>Rule Graph Execution</cell></row><row><cell></cell><cell>compliance</cell><cell>Checker</cell><cell>Checker</cell><cell>Engine</cell></row><row><cell></cell><cell>rule graphs</cell><cell></cell><cell></cell><cell></cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_0">The Rule Graph Execution Engine for executing compliance rule graphs is currently under implementation</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Modeling control objectives for business process compliance</title>
		<author>
			<persName><forename type="first">S</forename><surname>Sadiq</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Governatori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Naimiri</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. BPM &apos;07</title>
				<meeting>BPM &apos;07</meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page">149164</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">View-based process visualization</title>
		<author>
			<persName><forename type="first">R</forename><surname>Bobrik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Reichert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Bauer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 5th Int&apos;l Conf. on Business Process Management (BPM&apos;07)</title>
				<meeting>of the 5th Int&apos;l Conf. on Business ess Management (BPM&apos;07)</meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="volume">4714</biblScope>
			<biblScope unit="page">8895</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">On enabling integrated process compliance with semantic constraints in process management systems</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">T</forename><surname>Ly</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Rinderle-Ma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Dadam</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Systems Frontiers</title>
		<imprint/>
	</monogr>
	<note>accepted for publication</note>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Design and verication of instantiable compliance rule graphs in process-aware information systems</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">T</forename><surname>Ly</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Rinderle-Ma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Dadam</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The 22nd Int&apos;l Conf. on Advanced Information Systems Engineering (CAiSE&apos;10)</title>
				<imprint>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
	<note>accepted for publication</note>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">The ADEPT project: a decade of research and development for robust and exible process support</title>
		<author>
			<persName><forename type="first">P</forename><surname>Dadam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Reichert</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Science-Research and Development</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page">8197</biblScope>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Patterns in property specications for nite-state verication</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">B</forename><surname>Dwyer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">S</forename><surname>Avrunin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">C</forename><surname>Corbett</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. ICSE&apos;99</title>
				<meeting>ICSE&apos;99</meeting>
		<imprint>
			<date type="published" when="1999">1999</date>
			<biblScope unit="page" from="411" to="420" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Visualization of compliance violation in business process models</title>
		<author>
			<persName><forename type="first">A</forename><surname>Awad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Weske</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. BPM Workshops</title>
				<meeting>BPM Workshops</meeting>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Integration and verication of semantic constraints in adaptive process management systems</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">T</forename><surname>Ly</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Rinderle-Ma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Dadam</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Data &amp; Knowledge Engineering</title>
		<imprint>
			<biblScope unit="volume">64</biblScope>
			<biblScope unit="page">323</biblScope>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">An overview of SAL</title>
		<author>
			<persName><forename type="first">S</forename><surname>Bensalem</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the Fifth NASA Langley Formal Methods Workshop</title>
				<meeting>of the Fifth NASA Langley Formal Methods Workshop</meeting>
		<imprint>
			<publisher>NASA Langley Research Center</publisher>
			<date type="published" when="2000">2000</date>
			<biblScope unit="page">187196</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Auditing business process compliance</title>
		<author>
			<persName><forename type="first">A</forename><surname>Ghose</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Koliadis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICSOC &apos;07</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="volume">4749</biblScope>
			<biblScope unit="page">169180</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Specication, verication and explanation of violation for data aware compliance rules</title>
		<author>
			<persName><forename type="first">A</forename><surname>Awad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Weidlich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Weske</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. ICSOC/ServiceWave&apos;09</title>
				<meeting>ICSOC/ServiceWave&apos;09</meeting>
		<imprint>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page">500515</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">A static compliance-checking framework for business process models</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Müller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Xu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IBM Systems Journal</title>
		<imprint>
			<biblScope unit="volume">46</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page">335261</biblScope>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Verication of business process quality constraints based on visual process patterns</title>
		<author>
			<persName><forename type="first">A</forename><surname>Förster</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. 1st Joint IEEE/IFIP Symposium on Theoretical Aspects of Sofware Engineering</title>
				<meeting>1st Joint IEEE/IFIP Symposium on Theoretical Aspects of Sofware Engineering</meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Constraint-based workow models: Change made easy</title>
		<author>
			<persName><forename type="first">M</forename><surname>Pesic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Schonenberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Sidorova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">OTM 2007</title>
				<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page">7794</biblScope>
		</imprint>
	</monogr>
	<note>Part I. Number 4803</note>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">ProM 4.0: Comprehensive support for real process analysis</title>
		<author>
			<persName><forename type="first">W</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. ICATPN&apos;07</title>
				<meeting>ICATPN&apos;07</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="volume">4546</biblScope>
			<biblScope unit="page">484494</biblScope>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
