View-based collaborative business process modeling method for privacy protection

被引:0
作者
Xiang J. [1 ]
Mo Q. [1 ,2 ]
Xie Z. [2 ,3 ]
Wang Y. [1 ]
Wang J. [1 ]
机构
[1] School of Software, Yunnan University, Kunming
[2] Key Laboratory of Software Engineering in Yunnan Province, Yunnan University, Kunming
[3] Smart Culture and Tourism Industry College, Taishan University, Taian
来源
Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS | 2022年 / 28卷 / 10期
关键词
collaborative business process; migration technology; privacy protection; private view; public view;
D O I
10.13196/j.cims.2022.10.015
中图分类号
O144 [集合论]; O157 [组合数学(组合学)];
学科分类号
070104 ;
摘要
For the complex modeling problem caused by the complex communication, interaction and collaboration between multiple organizations in the collaborative business process, a view-basedapproachforcollaborative business processes was proposed. The private view was defined, and the control flow of private view was maped into a tree structure. Based on the tree structure, the migration technology for each of the four relational nodes was proposed. On this basis,the private view was migrated to the public view,and then a modeling method for constructing a collaborative business process was proposed, by which the collaborative business process constructed was theoretically proved to be correct. By modeling actual case and comparing them with existing typical methods, the analysis results showed that the proposed method could improve the privacy protection under the premise that the correctness of the collaborative business process before and after the migration was consistent and the modeling efficiency was not affected. © 2022 CIMS. All rights reserved.
引用
收藏
页码:3187 / 3201
页数:14
相关论文
共 44 条
  • [1] LU Yahui, MING Zhong, ZHANG Li, Collaboration patterns of business process [ J ], Computer Integrated Manufacturer Systems, 17, 8, pp. 1570-1579, (2011)
  • [2] SILL A., Cloud, data, and business process standards for man-ufacturing[J], IEEE Cloud Computing, 3, 4, pp. 74-80, (2016)
  • [3] YOUSFI A, DE FREITAS A, DEY A K, Et al., The use of u-biquitous computing for business process improvement, IEEE Transactions on Services Computing, 9, 4, pp. 621-632, (2015)
  • [4] CANCIAN M H, RABELO R, WANGENHEIM C G V., Col¬laborative business processes for enhancing partnerships a-mong software services providers, Enterprise Information Systems, 9, 5-6, pp. 634-659, (2015)
  • [5] ZENG Q T, LU F M, LIU C, Et al., Modeling and verification for cross-department collaborative business processes using ex¬tended Petri nets[J], IEEE Transactions on Systems, Man, and Cybernetics:Systems, 45, 2, pp. 349-362, (2015)
  • [6] YU W Y, YAN C G, DING Z J, Et al., Modeling and verifica¬tion of online shopping business processes by considering mali¬cious behavior patterns, IEEE Transactions on Automation Science and Engineering, 13, 2, pp. 647-662, (2016)
  • [7] FLORA A, VALENTINA C, GIOVANNI C, Et al., Exploi¬ting workflow languages and semantics for validation of securi¬ty policies in loT composite services [J], IEEE Internet of Things Journal, 7, 5, pp. 4655-4665, (2020)
  • [8] DIAMANTOPOULOU V, ARGYROPOULOS N, KALLO-NIATIS C, Et al., Supporting the design of privacy-aware bus¬iness processes via privacy process patterns, Proceedings of the 11th International Conference on Research Challenges in Information Science, pp. 187-198, (2017)
  • [9] MO Qi, DAI Fei, ZHU Rui, Et al., An approach to extract public process from private process for building business col-laboration, Journal of Computer Research and Develop¬ment, 54, 9, pp. 1892-1908, (2017)
  • [10] VAN DER AALST W M P., Modeling and analyzing interor-ganizational workflows, Proceedings of the 1st Interna¬tional Conference on Application of Concurrency to System Design, pp. 262-272, (1998)