Show simple item record

dc.contributor.authorSimon, Carlo
dc.contributor.authorMendling, Jan
dc.contributor.editorMayr, Heinrich C.
dc.contributor.editorBreu, Ruth
dc.date.accessioned2019-08-12T13:25:09Z
dc.date.available2019-08-12T13:25:09Z
dc.date.issued2006
dc.identifier.isbn3-88579-175-7
dc.identifier.issn1617-5468
dc.identifier.urihttp://dl.gi.de/handle/20.500.12116/24230
dc.description.abstractEvent-driven process chains (EPCs) are frequently used as a modeling language for the representation of business processes. As such, business analysts are familiar with using EPC models in the context of business process management. Up to now, there is no verification technique available that allows business analysts to express forbidden behavior in an intuitive manner. In this paper, we discuss the specification of such forbidden behavior with the aid of EPCs and demonstrate the verification of this behavior against models of the desired behavior, also formulated as EPC diagrams. For this purpose, a novel approach to join EPC models and to interpret the result is discussed. It is based on a transformation of both EPC models to Module nets, a specific kind of Petri nets, and the application of verification methods already defined for this net class. The findings are illustrated with a running example that picks up an EPC process model from the SAP reference model.en
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofModellierung 2006
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-82
dc.titleVerification of forbidden behavior in EPCsen
dc.typeText/Conference Paper
dc.pubPlaceBonn
mci.reference.pages233-242
mci.conference.sessiontitleRegular Research Papers
mci.conference.locationInnsbruck, Austria
mci.conference.date22.-24. März 2006


Files in this item

Thumbnail

Show simple item record