Process mining and verification of properties: An approach based on temporal logic

被引:0
作者
van der Aalst, WMP [1 ]
de Beer, HT [1 ]
van Dongen, BF [1 ]
机构
[1] Eindhoven Univ Technol, Dept Technol Management, NL-5600 MB Eindhoven, Netherlands
来源
ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2005: COOPIS, DOA, AND ODBASE, PT 1, PROCEEDINGS | 2005年 / 3760卷
关键词
process mining; temporal logic; business process management; workflow management; data mining; Petri nets;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information systems are facing conflicting requirements. On the one hand, systems need to be adaptive and self-managing to deal with rapidly changing circumstances. On the other hand, legislation such as the Sarbanes-Oxley Act, is putting increasing demands on monitoring activities and processes. As processes and systems become more flexible, both the need for, and the complexity of monitoring increases. Our earlier work on process mining has primarily focused on process discovery, i.e., automatically constructing models describing knowledge extracted from event logs. In this paper, we focus on a different problem complementing process discovery. Given an event log and some property, we want to verify whether the property holds. For this purpose we have developed a new language based on Linear Temporal Logic (LTL) and we combine this with a standard XML format to store event logs. Given an event log and an LTL property, our LTL Checker verifies whether the observed behavior matches the (un)expected/(un) desirable behavior.
引用
收藏
页码:130 / 147
页数:18
相关论文
共 34 条
[1]  
AGRAWAL R, 1998, 6 INT C EXT DAT TECH, P469
[2]  
Cook J. E., 1998, ACM Transactions on Software Engineering and Methodology, V7, P215, DOI 10.1145/287000.287001
[3]   Measuring behavioral correspondence to a timed concurrent model [J].
Cook, JE ;
He, C ;
Ma, CJ .
IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS: SYSTEMS AND SOFTWARE EVOLUTION IN THE ERA OF THE INTERNET, 2001, :332-341
[4]   Software process validation: Quantitatively measuring the correspondence of a process to a model [J].
Cook, JE ;
Wolf, AL .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 1999, 8 (02) :147-176
[5]  
De Beer HT, 2004, LTL CHECKER PLUGINS
[6]  
ELLIS C, 1995, P C ORG COMP SYST, P10
[7]   Monitoring requirements: A case study [J].
Fickas, S ;
Beauchamp, T ;
Mamy, NAR .
ASE 2002: 17TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, 2002, :299-304
[8]  
Giannakopoulou D, 2001, 16TH ANNUAL INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2001), PROCEEDINGS, P412, DOI 10.1109/ASE.2001.989841
[9]   Business process intelligence [J].
Grigori, D ;
Casati, F ;
Castellanos, M ;
Dayal, U ;
Sayal, M ;
Shan, MC .
COMPUTERS IN INDUSTRY, 2004, 53 (03) :321-343
[10]  
Grigori D., 2001, Proceedings of the 27th International Conference on Very Large Data Bases, P159