By Topic

Enterprise Distributed Object Computing Conference (EDOC), 2011 15th IEEE International

Date Aug. 29 2011-Sept. 2 2011

Filter Results

Displaying Results 1 - 25 of 40
  • [Front cover]

    Publication Year: 2011 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (300 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (178 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (140 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (113 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011 , Page(s): v - vii
    Save to Project icon | Request Permissions | PDF file iconPDF (151 KB)  
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2011 , Page(s): viii
    Save to Project icon | Request Permissions | PDF file iconPDF (89 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Message from the Program Co-Chairs

    Publication Year: 2011 , Page(s): ix - x
    Save to Project icon | Request Permissions | PDF file iconPDF (86 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Conference Committees

    Publication Year: 2011 , Page(s): xi
    Save to Project icon | Request Permissions | PDF file iconPDF (100 KB)  
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2011 , Page(s): xii - xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (108 KB)  
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2011 , Page(s): xv - xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (92 KB)  
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2011 , Page(s): xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (267 KB)  
    Freely Available from IEEE
  • Making Business Processes Compliant to Standards and Regulations

    Publication Year: 2011 , Page(s): 3 - 13
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (652 KB) |  | HTML iconHTML  

    Compliance regulations require enterprises to review their SOA applications to ensure that they satisfy the set of relevant compliance requirements. Despite an increasing number of methods and tools, organizations have a pressing need for a comprehensive compliance framework to help them ensure that their business processes comply with requirements set forth by regulations, laws, and standards. In this paper we explain how to cope with business process compliance requirements and present a framework to capture and manage compliance requirements. We introduce a declarative Compliance Request Language for specifying compliance requirements. We also examine a set of compliance patterns to support the definition of frequently recurring compliance requirements in association with business processes. This approach enables the application of automated tools for compliance analysis and verification. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fact-Orientation and Conceptual Logic

    Publication Year: 2011 , Page(s): 14 - 19
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (249 KB) |  | HTML iconHTML  

    Fact-orientation is a conceptual approach to modeling information systems that captures the facts of interest in natural sentence structures without forcing some aspects to be modeled as attributes of other structures. Its graphical notation for data modeling enables a vast variety of business constraints to be depicted visually, while its formal basis in logic enables models to be transformed into implementation targets for execution. This paper provides a state-of-the-art overview of fact-orientation in general and second-generation Object-Role Modeling (ORM) in particular, highlighting its conceptual and visual support for logic-based modeling, and contrasting it with other data modeling approaches. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Flexible Service Interoperation Using Business Artifacts

    Publication Year: 2011 , Page(s): 20 - 21
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (120 KB) |  | HTML iconHTML  

    This short survey describes recent and on-going work in the area of "business artifacts", an approach to business process modeling centered around a holistic combination of data and process. This includes research aiming to enable support for service interoperation that is much more flexible than current SOA-based approaches. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Ontology-Based Semantics for the Motivation Extension to ArchiMate

    Publication Year: 2011 , Page(s): 25 - 34
    Cited by:  Papers (8)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (365 KB) |  | HTML iconHTML  

    The "motivation domain" of an Enterprise Architecture addresses objectives in a broad scope ranging from high-level statements expressing the goals of an enterprise to declarations of requirements on business processes, services and systems. An important development regarding the incorporation of the motivation domain in a comprehensive Enterprise Architecture modeling language is the upcoming Motivational Extension to ArchiMate (based on the ARMOR language). The extension proposes the inclusion of concepts such as concerns, assessments, goals, principles and requirements to ArchiMate. We believe that careful definition of the semantics of these concepts is required, especially when considering that the motivation domain addresses subjective aspects of the enterprise. To address that, this paper focuses on an ontology-based semantics for the Motivation Extension. We interpret the concepts by using the Unified Foundational Ontology (UFO) as a semantic domain, and, as a result, propose well-founded recommendations for improvements of the extension. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enterprise Architecture for Addressing Business Transformation Challenges: The Case of Embedded Mobile Provisioning Process in the Telecommunications Industry

    Publication Year: 2011 , Page(s): 35 - 43
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (525 KB) |  | HTML iconHTML  

    The present is a report of an exploratory case study about using an Enterprise Architecture method for addressing the business transformation challenges of embedded mobile provisioning in the telecommunications industry. The study focused on the analysis of the provisioning process for gathering transformation requirements, translating them into business objectives and deriving a set of strategic initiatives. In addition, it explored the construction and usefulness of visual representations of the vision and strategy. The results show that such formal method is perceived useful for defining the transformation strategy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling the Supply and Demand of Architectural Information on Enterprise Level

    Publication Year: 2011 , Page(s): 44 - 51
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (222 KB) |  | HTML iconHTML  

    Enterprise architecture (EA) management aims at analyzing and improving the enterprise as a whole. A correct and consistent analysis is based on reliable EA data. However, current industrial practice shows that many persons need to collect, prepare, and disseminate EA relevant data while only a small group of persons actually benefits from this information. This state of affairs has a negative impact on the motivation of those who are in charge of gathering EA information. Additionally, the monetary value of this information is often implicit. To overcome this situation, this paper presents an approach to model the supply and demand situation for EA information. The resulting model helps to understand, explain, and ease EA-related information gathering. The applicability of the resulting model is demonstrated with the help of a real world case study from the German federal government. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conformance Checking Using Cost-Based Fitness Analysis

    Publication Year: 2011 , Page(s): 55 - 64
    Cited by:  Papers (10)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (526 KB) |  | HTML iconHTML  

    The growing complexity of processes in many organizations stimulates the adoption of business process analysis techniques. Typically, such techniques are based on process models and assume that the operational processes in reality conform to these models. However, experience shows that reality often deviates from hand-made models. Therefore, the problem of checking to what extent the operational process conforms to the process model is important for process management, process improvement, and compliance. In this paper, we present a robust replay analysis technique that is able to measure the conformance of an event log for a given process model. The approach quantifies conformance and provides intuitive diagnostics (skipped and inserted activities). Our technique has been implemented in the ProM 6 framework. Comparative evaluations show that the approach overcomes many of the limitations of existing conformance checking techniques. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Flexible Business Processes with Business Rule Patterns

    Publication Year: 2011 , Page(s): 65 - 74
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1152 KB) |  | HTML iconHTML  

    In the paper, we investigate principles for modeling flexible business processes enhanced by business rules. In our work, we start from a set of rule patterns, which are identified in the literature as a mean for increasing flexibility of business processes. The previous work on these patterns only considered the implementation level, but not the implications on the modeling level. Moreover, the potential for business process flexibility have not been fully leveraged due to some limitations in externalization of business logic into business rules. In this work, we report on the experience in modeling the set of rule patterns by using a rule-enhanced business process modeling language (rBPMN), and demonstrate the applicability of our findings on a business process case study. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Engine-Independent Framework for Business Rules Development

    Publication Year: 2011 , Page(s): 75 - 84
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (517 KB) |  | HTML iconHTML  

    There is a compelling need for highly customized Domain Specific Languages and Business Vocabulary in certain industries such as insurance, mortgage, and finance to enable Knowledge Workers to articulate and to automate complex rules pertinent to their areas of function within their companies. Rule Engine vendors attempt to provide a solution to the problem by selling an integrated Rules Engine and Business Rules Management System. Usually, the BRMS's provided by vendors need to be customized and integrated into the overall Enterprise Architecture. This results in the Enterprise Architecture to be tightly coupled with the vendor's rule offering. Moreover, it poses a significant risk to the Enterprise as vendor solutions change between releases. The Enterprise Architecture needs a way to insulate itself from such impacts. This paper describes a framework that delivers the core BRMS functions of authoring and representation in a vendor neutral fashion. In addition, the paper sheds light on specific areas of the framework that can be standardized. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Project Alignment: A Configurable Model and Tool for Managing Critical Shared Processes in Collaborative Projects

    Publication Year: 2011 , Page(s): 87 - 96
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (340 KB) |  | HTML iconHTML  

    Management of large scale distributed collaborative projects requires unified and aligned working methods and practices. Project alignment is the process to ensure that all key stakeholders share a common understanding of the project mission, goals, objectives, tactics, work processes and plans, and have the required competences and skills to perform in the project. Grounding on the recent advancements in the areas of collaborative networks, project management and Internet technologies, we have identified needs and opportunities for further development in the area of collaborative project management. We are presenting a methodology, model and a set of tools, called Project Alignment Booster, for promoting collaborative project management, introducing the concept of collaborative project alignment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • UML Metamodel-based Workflow Modeling and Execution

    Publication Year: 2011 , Page(s): 97 - 106
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (292 KB) |  | HTML iconHTML  

    In this paper, we present a UML metamodel-based approach for creating and executing workflow models. The workflow modeling language is introduced through its abstract syntax, and an evaluation shows how this language supports known workflow patterns. Some patterns can be expressed easier compared to established languages like EPCs or BPMN. Organizational and data aspects in workflow models can be described on the basis of the presented metamodel. The workflow models can be instantiated and executed with a tool realizing parts of the UML action semantics. At an early stage of design, our workflow models can be evaluated by testing scenarios with the used tool in combination with the developed workflow plug in. Employing the tool, dynamic aspects of the workflow process models together with data and organizational aspects can be evaluated. During execution of the workflow scenarios, the workflow models can be adaptively changed, and data can be captured and evaluated by formulating process mining queries with UML's OCL (Object Constraint Language). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using the IT Capability Maturity Framework to Improve IT Capability and Value Creation: An Intel IT Case Study

    Publication Year: 2011 , Page(s): 107 - 115
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1656 KB) |  | HTML iconHTML  

    This paper gives a short overview of the IT Capability Maturity Framework (IT-CMF) and describes how it was used between 2007-2009 to help Intel IT navigate and track progress on IT capability improvement and value contribution from IT, whilst negotiating a strategic transition for the IT organization which involved significant downsizing and budget reduction. The case study illustrates how the IT-CMF was used to measure capability improvements, provide business intelligence information and prioritized improvement recommendations. The paper also discusses how practices contained within the IT-CMF helped articulate a business value improvement whilst more traditional metrics of IT performance indicated a degradation in performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trust and Business Webs

    Publication Year: 2011 , Page(s): 119 - 128
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1036 KB) |  | HTML iconHTML  

    A business web is a collection of enterprises designed to jointly satisfy a consumer need. A model that shows the creation, distribution, and consumption of goods or services of economic value in a business web is called value model. The goal of a value model is to help the stakeholders build a shared understanding of the business case and assess the potential profitability of collaboration in the business web. The participating stakeholders in a business web are assumed to act trustfully in the collaboration and therefore trust is left entirely outside the picture. However the assumption that stakeholders act trustfully is often not useful in practice (since there are malicious actors). In this paper we consider business webs from a trust perspective and introduce an approach for measuring the trustworthiness of the stakeholders participating in a business web. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OpenID and the Enterprise: A Model-Based Analysis of Single Sign-On Authentication

    Publication Year: 2011 , Page(s): 129 - 138
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (247 KB) |  | HTML iconHTML  

    Single sign-on (SSO) protocols allow one person to use the same login credentials for several organizations. Enterprises face increasing competitive pressure to position themselves with regard to SSO, yet the ramifications of a move to SSO are not fully understood. In this paper we discuss OpenID, a relatively new SSO protocol that is gaining traction on the web. We apply enterprise application modelling techniques to OpenID in order to obtain well-founded decision aids for enterprises: we show how published modelling approaches can be used to analyse risks in OpenID, and show that these can identify security problems with common OpenID practice. Finally, we propose analysis principles that condense important general insights of authentication modelling. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.