Open AccessBook
Business Process Management: Concepts, Languages, Architectures
Reads0
Chats0
TLDR
Matthias Weske argues that all communities involved need to have a common understanding of the different aspects of business process management, and details the complete business process lifecycle from the modeling phase to process enactment and improvement, taking into account all different stakeholders involved.Abstract:
Business process management is usually treated from two different perspectives: business administration and computer science. While business administration professionals tend to consider information technology as a subordinate aspect in business process management for experts to handle, by contrast computer science professionals often consider business goals and organizational regulations as terms that do not deserve much thought but require the appropriate level of abstraction. Matthias Weske argues that all communities involved need to have a common understanding of the different aspects of business process management. To this end, he details the complete business process lifecycle from the modeling phase to process enactment and improvement, taking into account all different stakeholders involved. After starting with a presentation of general foundations and abstraction models, he explains concepts like process orchestrations and choreographies, as well as process properties and data dependencies. Finally, he presents both traditional and advanced business process management architectures, covering, for example, workflow management systems, service-oriented architectures, and data-driven approaches. In addition, he shows how standards like WfMC, SOAP, WSDL, and BPEL fit into the picture. This textbook is ideally suited for classes on business process management, information systems architecture, and workflow management. This 2nd edition contains major updates on BPMN Version 2 process orchestration and process choreographies, and the chapter on BPM methodologies has been completely rewritten. The accompanying website www.bpm-book.com contains further information and additional teaching material.read more
Citations
More filters
Proceedings ArticleDOI
Formal Verification of Temporal Constraints and Allocated Cloud Resources in Business Processes
TL;DR: An automatic generation of timed automata from this BPMN extensions to check the matching between both temporal constraints: activities and Cloud resources to help the designer to allocate correctly the required Cloud resources.
Journal ArticleDOI
Supporting business process analysis via data warehousing
TL;DR: A method for constructing data warehouse schemata from business process specifications to facilitate the off‐line analysis of the business process execution and to identify potential improvements by querying thebusiness process performance is proposed.
Journal ArticleDOI
Automatically finding execution scenarios to deploy security-sensitive workflows
Daniel Ricardo dos Santos,Daniel Ricardo dos Santos,Silvio Ranise,Luca Compagna,Serena Elisa Ponta +4 more
TL;DR: This work introduces a new class of analysis problems, called Scenario Finding Problems (SFPs), for security-sensitive business processes that—besides execution constraints on tasks—define access control policies and authorization constraints.
Proceedings ArticleDOI
Model While You Work: Towards Effective and Playful Acquisition of Stakeholder Processes
Harald Lerchner,Christian Stary +1 more
TL;DR: Experiences with the corresponding tool UeberModel indicate that the perceived disadvantages associated with externally moderated mechanisms can be largely overcome due to its adjacency to actual work procedures, qualifying this approach for distributed process capturing and processing.
Proceedings ArticleDOI
Apprehensive QoS monitoring of Service choreographies
TL;DR: This paper proposes a monitor enhanced with the capability to detect potential deviations from a choreography-prescribed QoS level, based on the observed non-functional behaviour of the contributing services, which can contribute to predict SLA violations in due time for taking useful counter-measures.