Verifying for Compliance to Data Constraints in Collaborative Business Processes
Authors: Kasse, J.P., Xu, L., deVrieze, P. and Bai, Y.
Journal: IFIP Advances in Information and Communication Technology
Volume: 568
Pages: 259-270
eISSN: 1868-422X
ISSN: 1868-4238
DOI: 10.1007/978-3-030-28464-0_23
Abstract:Production processes are nowadays fragmented across different companies and organized in global collaborative networks. This is the result of the first wave of globalization that, among the various factors, was enabled by the diffusion of Internet-based Information and Communication Technologies (ICTs) at the beginning of the years 2000. The recent wave of new technologies possibly leading to the fourth industrial revolution – the so-called Industry 4.0 – is further multiplying opportunities. Accessing global customers opens great opportunities for organizations, including small and medium enterprises (SMEs), but it requires the ability to adapt to different requirements and conditions, volatile demand patterns and fast-changing technologies. Regardless of the industrial sector, the processes used in an organization must be compliant to rules, standards, laws and regulations. Non-compliance subjects enterprises to litigation and financial fines. Thus, compliance verification is a major concern, not only to keep pace with changing regulations but also to address the rising concerns of security, product and service quality and data privacy. The software, in particular process automation, used must be designed accordingly. In relation to process management, we propose a new way to pro-actively check the compliance of current running business processes using Descriptive Logic and Linear Temporal Logic to describe the constraints related to data. Related algorithms are presented to detect the potential violations.
https://eprints.bournemouth.ac.uk/32967/
Source: Scopus
Verifying for Compliance to Data Constraints in Collaborative Business Processes
Authors: Kasse, J.P., Xu, L., deVrieze, P. and Bai, Y.
Journal: COLLABORATIVE NETWORKS AND DIGITAL TRANSFORMATION
Pages: 259-270
eISSN: 1868-422X
ISBN: 978-3-030-28463-3
ISSN: 1868-4238
DOI: 10.1007/978-3-030-28464-0_23
https://eprints.bournemouth.ac.uk/32967/
Source: Web of Science (Lite)
Verifying for Compliance to Data Constraints in Collaborative Business Processes.
Authors: Kasse, J., Xu, L., deVrieze, P. and Bai, Y.
Editors: Camarinha-Matos, L., Afsarmanesh, H. and Antonelli, D.
Conference: PRO-VE 2019: 20th Working Conference on Virtual Enterprises
Pages: 259-270
Publisher: Springer
ISBN: 9783030284633
ISSN: 1868-4238
Abstract:Production processes are nowadays fragmented across different companies and organized in global collaborative networks. This is the result of the first wave of globalization that, among the various factors, was enabled by the diffusion of Internet-based Information and Communication Technologies (ICTs) at the beginning of the years 2000. The recent wave of new technologies possibly leading to the fourth industrial revolution – the so-called Industry 4.0 – is further multiplying opportunities. Accessing global customers opens great opportunities for organizations, including small and medium enterprises (SMEs), but it requires the ability to adapt to different requirements and conditions, volatile demand patterns and fast-changing technologies. Regardless of the industrial sector, the processes used in an organization must be compliant to rules, standards, laws and regulations. Non-compliance subjects enterprises to litigation and financial fines. Thus, compliance verification is a major concern, not only to keep pace with changing regulations but also to address the rising concerns of security, product and service quality and data privacy. The software, in particular process automation, used must be designed accordingly. In relation to process management, we propose a new way to pro-actively check the compliance of current running business processes using Descriptive Logic and Linear Temporal Logic to describe the constraints related to data. Related algorithms are presented to detect the potential violations.
https://eprints.bournemouth.ac.uk/32967/
Source: BURO EPrints