Modeling and Verifying Business Processes with Monterey Phoenix

被引:7
作者
Auguston, Mikhail [1 ]
Giammarco, Kristin [1 ]
Baldwin, W. Clifton [2 ]
Crump, Ji'on [2 ]
Farah-Stapleton, Monica [1 ]
机构
[1] Naval Postgrad Sch, Monterey, CA USA
[2] FAA, Pomona, NJ USA
来源
2015 CONFERENCE ON SYSTEMS ENGINEERING RESEARCH | 2015年 / 44卷
关键词
Monterey Phoenix; behavior modeling; business process modeling; architecture; formal methods; scenario generation;
D O I
10.1016/j.procs.2015.03.055
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Monterey Phoenix (MP) has been designed as a framework for system and software architecture modeling and verification with focus on modeling the system's and the environment's behaviors. With the development of more case studies, advantages in using MP for business process modeling and analysis applications are beginning to emerge. Models of business processes aim to capture high level operational activities and decision points of an organization, describing processes ranging from product lifecycle to government operations. Businesses and governments seeking to make improvements to their processes may model them for the purpose of seeking improvements in schedule and task execution, product quality, risk reduction, and lifecycle / operating costs. MP enables activities to be modeled as events with two basic relations: precedence and inclusion, making it a candidate modeling language for business process analysis. By offering high level abstractions for interaction behavior modeling and separating component behaviors from the component interactions, MP supports a multidimensional picture of concurrent behaviors, with overlapping threads of process phases and participating actors, including environment behaviors. MP models are executable and may be used to generate an exhaustive set of possible business process scenarios up to a given scope limit. (C) 2015 Published by Elsevier B.V.
引用
收藏
页码:345 / 353
页数:9
相关论文
共 21 条
[1]  
[Anonymous], OMG UNIFIED MODELING
[2]  
[Anonymous], 2007, NASASP20076105
[3]  
Auguston M., 2012, P 24 ICSSEA C INT C
[4]  
Auguston M., 2009, ACM SIGSOFT SOFTWARE, V34, P5
[5]  
Auguston M., 2010, P 15 ICCRTS C INT CO
[6]  
Cass A. G., 2000, Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium, P754, DOI 10.1109/ICSE.2000.870488
[7]  
Department of Homeland Security Office of the Inspector General, 2010, OIG1052 DEP HOM SEC
[8]  
Farah-Stapleton M., 2013, COMPL AD SYST C BALT
[9]  
Fazar W., 1959, The American Statistician, V13, P10
[10]  
Giammarco K., 2013, COMPL AD SYST C BALT