<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Flexibility and Compliance in Workflow Systems - The KitCom Prototype</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Kai Kittel</string-name>
          <email>kai.kittel@wiwi.uni-halle.de</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stefan Sackmann</string-name>
          <email>stefan.sackmann@wiwi.uni-halle.de</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kevin Göser</string-name>
          <email>kevin.goeser@aristaflow.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>AristaFlow GmbH</institution>
          ,
          <addr-line>Neu-Ulm</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Martin-Luther-University, Faculty of Law and Economics, Chair of Information Management</institution>
          ,
          <addr-line>Halle-Wittenberg</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Managing workflows is becoming increasingly flexible on both the conceptual and the technical level. However, workflow flexibility has to be accompanied by comprehensive access to information and the processing of it. Validating compliance is a still disregarded but crucial aspect though in flexible workflows where a lot of information is processed. In this contribution, a novel prototype named “KitCom” is presented, aiming at an automated adaptation of controls to realize flexible and compliant workflows.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>three, a novel prototype called “KitCom” is presented, which is an implementation of
the summarized model-based method of chapter two. This contribution then ends with
a short conclusion.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Flexibility and Compliance in Workflow Systems</title>
      <p>
        The main challenge to satisfy both the need for flexibility and the compliance to
policy rules is the integration of control activities into workflows during execution
without disturbing them. The development of new methods and tools for changing
workflows “on the fly” according to actual environmental conditions and without violating
compliance requirements is an emerging field of research [
        <xref ref-type="bibr" rid="ref10 ref11 ref7 ref9">7, 9-11</xref>
        ]. The basic idea of
our approach is to provide a methodic basis for identifying and adapting effective
control activities on the level of individual instances of processes (For more details
see [
        <xref ref-type="bibr" rid="ref12 ref13 ref14 ref8">8, 12-14</xref>
        ]).
      </p>
      <p>The model-based “FlexCom” approach that is briefly presented in the following
includes two main areas: firstly, the definition of reference controls that shows a way of
how control activities can be executed. It basically separates workflows and controls
at the construction time of the model. Secondly, an approach is presented for
integrating control activities into workflows “on the fly” at run time.
2.1</p>
      <sec id="sec-2-1">
        <title>Definition of Reference Controls</title>
        <p>
          The generic starting point for a methodic integration of control activities into
workflows is the definition of (formal) compliance requirements. For each
compliance requirement, at least one or a set of general reference controls has to be defined.
Such reference controls can be seen as a template where activities and objects
involved as well as the general structure of the controls are already designed [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. For
instance, the “second set of eyes” principle (compliance requirement) can be
performed in several ways: it can be realized as a sequential execution of control
activities or with two control activities in parallel. Furthermore, it can be performed
executing two control activities successively or with other workflow activities in between.
This template has to be substantiated at the moment when the reference control is
instantiated. Thus, reference controls are similar to the schema of workflows which
can produce several instances if executed [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ] and can be modeled with the same
tools [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. When all relevant reference controls are defined, the selection of
appropriate controls and their integration into the workflow is the next consecutive step.
2.2
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>Integrating Controls into Workflows “on the fly”</title>
        <p>
          A flexible integration of reference controls in the form of concrete control
activities into workflow instances during their execution has a significant advantage: there
is more information available than at design time. Such information can be used for
adapting a workflow and control activities to the actual process context, for instance
to implement control activities. Furthermore, the integration “on the fly” allows
control activities to be integrated only if they are actually needed in a specific
instance and, consequently, can reduce the complexity of business process execution.
For realizing such an integration “on the fly”, information such as inputs, outputs, or
the timeframe, which define the setting for the control activities, have to be taken into
account [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]: validity period, activities as precondition, and/or activities as
postcondition have to be defined. This additional information is saved as part of the reference
controls and called control parameters. Using all these pieces of information makes it
possible to identify points for integrating concrete control activities into workflows by
the help of automated search algorithms. Therefore, the control parameters saved for
each reference control have to be checked against the workflow instance information.
Since there might be many points in a workflow where integration is theoretically
possible, a reduction to efficient control points can be achieved by known methods
already used by companies for many years: for instance by path analytics calculating
the so-called critical path [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. In a first step, we integrate the controls as early as
possible following a prudence principle, while identifying the optimal integration
point is part of current research.
3
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>The KitCom Prototype</title>
      <p>A prototype called KitCom was created to integrate reference controls “on the fly”
into ongoing workflow instances. Following the FlexCom approach, the prototype
requires two parts: first, reference controls, including the definition of situations in the
workflow instance where an injection of reference controls is necessary, have to be
modeled, e.g., by a compliance officer. Secondly, the execution engine of a workflow
management system needs to be extended to automatically perform the modeled
actions and integrate the modeled reference controls (see Fig. 1).</p>
      <p>Business Process</p>
      <p>Design</p>
      <p>KitCom Plug-In
- Modelling Reference Controls
- Control Processes</p>
      <p>Business Process</p>
      <p>Execution</p>
      <p>
        KitCom Plug-In
- Execution monitoring
- Matching reference controls
- Injection of reference controls
Therefore, we extend the Aristaflow BPM Platform [
        <xref ref-type="bibr" rid="ref18 ref19">18, 19</xref>
        ]: On the client side, the
Process Template Editor is extended for modeling reference controls. On the server
side, the so-called LogManager is extended for intercepting execution events.
To easily follow the working of KitCom, an exemplary workflow (activities if an
invoice is received) will be presented and a control (orders above 5,000€ which are
captured by the user “Meyer13” must be checked) will explain the working of the
method. In a first step, a process designer has to create and develop the workflow in
the Process Template Editor as shown in Fig. 2.
In a second step, a compliance officer has to create and define a reference control. In
the simple example, only one control activity is defined: An accounts clerk has to
compare the invoice amount with the condition of the contract (see Fig. 3). Since the
AristaFlow Process Template Editor is implemented using Eclipse RCP, it can be
easily extended with additional plug-ins (Reference Control Editor, Control Process
Repository, Control Parameter). Therefore, a separate view in the AristaFlow Process
Template Editor was created.
Subsequently, the definitions of the control parameters have to be made in the
extended Process Template Editor (see Fig. 4).
Defining all three parts (Figs. 2, 3, and 4) then allows the execution of the workflow
and should ensure compliance throughout its execution. Therefore, all events
concerning the execution and adaptations of the ongoing workflow instance need to be
monitored by KitCom. Within the AristaFlow Platform, all these events, e.g. start of a
new workflow instance, finishing a workflow step, etc., are centrally logged in the
Execution History, using the Log Manager Service of the platform. The Execution
History is updated synchronously and the Log Manager Service is extensible.
Therefore, the ideal place for KitCom is on the execution/server side. The information of
execution events in the extended Log Manager is used for identifying relevant
reference controls. If the requirement of a control is detected, the execution of the
workflow instance is suspended. Using the API for adhoc-deviations [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], the control is
injected into the workflow instance. Fig. 5 shows an overview of the architecture of
our KitCom prototype (white/blue fields are the original components of AristaFlow,
grey/yellow fields are the extensions characterizing KitCom).
      </p>
      <p>AristaFlow Process</p>
      <p>Template Editor
KitCom Plug-In
Control
Process
Repository</p>
      <p>Reference
Control</p>
      <p>Editing
Process
Repository</p>
      <p>Control
Conditions</p>
      <p>AristaFlow BPM Server</p>
      <p>KitCom Plug-In</p>
      <p>Event Analysis</p>
      <p>Control
Processes</p>
      <p>Control Injection</p>
      <p>Workflow Client
Execution
History</p>
      <p>Process</p>
      <p>Execution
After the injection of the control activities, the execution of the workflow instance is
resumed. The prototype works as follows: Firstly, the workflow without control is
started (see Fig. 5).
Secondly, if the user “Meyer13” captures an invoice with an amount above 5,000€,
the reference control will automatically be integrated as a sub-process called
“Kontrolle” shown in Fig. 6, following the definition of reference controls and control
parameters (Figs. 3 and 4).</p>
      <p>Fig. 7. Automatic Integration of the Reference Control</p>
      <p>
        into the Workflow Instance through KitCom
While only one demonstration example is shown in this chapter, a lot of other
information can already be integrated with KitCom. Known approaches on business
process compliance provide several criteria for modeling controls, such as the COMPAS
project [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], which identifies generic criteria on the basis of a comprehensive
compliance legislation review. Other authors, such as [
        <xref ref-type="bibr" rid="ref10 ref22 ref23">10, 22, 23</xref>
        ] identify generic criteria,
too. As aggregated in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], all these control parameters can be defined as control
parameters in KitCom.
      </p>
      <p>Although the underlying control model of the approach presented is very general and
obviously requires a more dedicated analysis, the prototype has the general
functionality for integrating control activities into workflows during execution to satisfy both
the need for flexibility and the compliance to policy rules.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Summary and Outlook</title>
      <p>The aim of this contribution was to present the novel KitCom prototype, which is
based on a method to flexibly integrate controls into workflows in an automatic
manner. While the working of the prototype was only shown with one demonstration
example in this contribution, KitCom is a promising application for integrating any kind
of control activities into workflows during execution. The solution is independent of
the implementation of a Workflow Client, since it integrates directly into the process
engine. The screenshots show the AristaFlow Workflow Client. However, the
prototype implementation also works for any custom Workflow Client implementation.
Future research has obviously to be carried out with regard to a more dedicated
control model, e.g. by adapting our approach to existing control taxonomies. Further
extensions of the prototype are also required to meet more realistic and complex
compliance goals, for instance by aiming to include control actions such as limitation of
the users, who may execute a process step only in a special timeframe or when a
process step may be delegated, etc. In conclusion, KitCom is seen as a promising next
step in automating compliance that helps to react in an automatic manner – if business
processes need to remain flexible.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Sackmann</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Strüker</surname>
          </string-name>
          , J.:
          <source>Electronic Commerce Enquete</source>
          <year>2005</year>
          : 10 Jahre E-Commerce:
          <article-title>Eine stille Revolution in deutschen Unternehmen</article-title>
          . Konradin-IT-Verlag, Leinfelden (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Buchwald</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bauer</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reichert</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Flexible Prozessapplikationen in Serviceorientierten Architekturen-Ein Überblick</article-title>
          . (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Müller</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Zukunftsthema Geschäftsprozessmanagement</article-title>
          .
          <source>PricewaterhouseCoopers AG</source>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fingar</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Business process management: the third wave</article-title>
          . Meghan-Kiffer Press Tampa, FL (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weske</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grünbauer</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Case handling: a new paradigm for business process support</article-title>
          .
          <source>Data Knowl Eng</source>
          <volume>53</volume>
          ,
          <fpage>129</fpage>
          -
          <lpage>162</lpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Cannon</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Byers</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Compliance deconstructed</article-title>
          .
          <source>Queue</source>
          <volume>4</volume>
          ,
          <fpage>30</fpage>
          -
          <lpage>37</lpage>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Sackmann</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          : Economics of Controls.
          <source>In: Proceedings of the International Workshop on Information Systems for Social Innovation</source>
          <year>2011</year>
          (ISSI
          <year>2011</year>
          ), pp.
          <fpage>230</fpage>
          -
          <lpage>236</lpage>
          . (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Kittel</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Agilität von Geschäftsprozessen trotz Compliance</article-title>
          .
          <source>In: Proceedings of the 11. International Conference on Wirtschaftsinformatik</source>
          , pp.
          <fpage>967</fpage>
          -
          <lpage>981</lpage>
          . (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Ly</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rinderle-Ma</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Knuplesch</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dadam</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Monitoring business process compliance using compliance rule graphs</article-title>
          .
          <source>On the Move to Meaningful Internet Systems: OTM</source>
          <year>2011</year>
          82-
          <fpage>99</fpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Sadiq</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Governatori</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Namiri</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Modeling control objectives for business process compliance</article-title>
          .
          <source>Business Process Management</source>
          <volume>149</volume>
          -
          <fpage>164</fpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Namiri</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Model-driven management of internal controls for business process compliance</article-title>
          .
          <source>PhD thesis</source>
          , Universität Fridericiana zu Karlsruhe (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Kittel</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sackmann</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Gaining Flexibility and Compliance in Rescue Processes with BPM</article-title>
          .
          <source>ARES Conference - Workshop on "Resilience and IT-Risk in Social Infrastructures" (RISI</source>
          <year>2011</year>
          ), Vienna, Austria (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Kittel</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sackmann</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Flexible Controls for Compliance in Catastrophe Management Processes</article-title>
          .
          <source>In: Proceedings of the Multikonferenz Wirtschaftsinformatik (MKWI'12)</source>
          , pp.
          <fpage>1675</fpage>
          -
          <lpage>1687</lpage>
          . GITO-Verlag Berlin (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Kittel</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sackmann</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Betke</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hofmann</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Achieving Flexible and Compliant Processes in Disaster Management</article-title>
          .
          <source>In: Proceedings of the HICSS</source>
          <year>2013</year>
          , pp.
          <fpage>4687</fpage>
          -
          <lpage>4696</lpage>
          . (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>van der Aalst</surname>
            , W., van Hee,
            <given-names>K.M.:</given-names>
          </string-name>
          <article-title>Workflow management: models, methods, and systems</article-title>
          . The MIT press (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Betke</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kittel</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sackmann</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Modeling Controls for Compliance - An Analysis of Business Process Modeling Languages</article-title>
          .
          <source>In: Proceedings of the 9th International Symposium on Frontiers of Information Systems and Network Applications</source>
          . (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Verworn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Projektplanung während der frühen Phasen</article-title>
          . In: Herstatt,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Verwom</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B</given-names>
            . (eds.) Management der frühen Innovationsphasen: Grundlagen - Methoden - neue
            <surname>Ansätze</surname>
          </string-name>
          , pp.
          <fpage>234</fpage>
          -
          <lpage>250</lpage>
          . Gabler,
          <string-name>
            <surname>Wiesbaden</surname>
          </string-name>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>18.AristaFlow GmbH, http://www.aristaflow.com/</mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Dadam</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reichert</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rinderle-Ma</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lanz</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pryss</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Predeschly</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kolb</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ly</surname>
            ,
            <given-names>L.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jurisch</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kreher</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goeser</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>From ADEPT to AristaFlow BPM Suite: A Research Vision has become Reality</article-title>
          .
          <source>In: Proceedings Business Process Management (BPM'09) Workshops, 1st Int'l. Workshop on Empirical Research in Business Process Management (ER-BPM '09)</source>
          , pp.
          <fpage>529</fpage>
          -
          <lpage>531</lpage>
          . (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Rinderle</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Schema Evolution in Process Management Systems</article-title>
          .
          <source>PhD thesis</source>
          , University Ulm (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.Tilburg University, http://www.compas-ict.eu/compas_results/deliverables/m06/ D2.
          <article-title>1_State-of-the-art-for-compliance-languages</article-title>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Goedertier</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vanthienen</surname>
          </string-name>
          , J.:
          <article-title>Designing Compliant Business Processes with Obligations and Permissions</article-title>
          .
          <source>Business Process Management Workshops</source>
          <volume>4103</volume>
          ,
          <fpage>5</fpage>
          -
          <lpage>14</lpage>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Pitthan</surname>
            ,
            <given-names>D.K.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Philipp</surname>
            ,
            <given-names>D.W.I.M.:</given-names>
          </string-name>
          <article-title>Einsatz von Petri-Netzen für die Aufnahme, Dokumentation und Analyse Interner Kontrollsysteme im Rahmen der Jahresabschlußprüfung</article-title>
          .
          <article-title>PetriNetze zur Modellierung verteilter DV-Systeme-Erfahrungen im Rahmen des DFGSchwerpunktprogramms “Verteilte DV-Systeme in der Betriebswirtschaft"</article-title>
          87-
          <fpage>104</fpage>
          (
          <year>1997</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>