skip to main content
10.4108/ICST.MOBIMEDIA2009.8002guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article
Free access

An UML profile for the modelling of mobile business processes and workflows

Published: 07 September 2009 Publication History

Abstract

Thanks to the progress in the field of mobile computing hardware (e.g. PDAs, smartphones, notebooks) and wireless data communication standards (e.g. UMTS, WLAN) in the recent years it is possible to provide access to information systems to mobile employees while they are working in the field or are on journeys. Further there are several technologies available to determine a mobile computer's location, e.g. the satellite-based Global Positioning System (GPS). In this article we look at mobile technologies from a process-centric viewpoint: we provide an extension to UML activity diagramms that enables the modeller to express statements concerning the locations where individual activities must or mustn't be performed. These statements are called location constraints. We discuss several classes of location constraints, e.g. static or dynamic location constraints and show that location constraints can also be used for UML usecase diagrams.
Location constraints are motivated by several considerations: Since mobile computers have only a small display and restricted means for data input (e.g. no full keyboard) the user will appreciate it if only relevant data is provided by a mobile information system. But location constraints help also to mitigate specific security issues that are associated with the employment of mobile technologies: e.g. devices could get lost or stolen, so it is of advantage if there are location constraints that forbid the access to confidential data at locations where it is not necessary or plausible to access that data.

References

[1]
G. Alonso, R. Günthör, M. Kamath, D. Agrawal, A. E. Abbadi, and C. Mohan. Exotica/FMDC: A Workflow Management System for Mobile and Disconnected Clients. Distributed and Parallel Databases, 4(3):229--247, 1996.
[2]
H. Baumeister, N. Koch, P. Kosiuczenko, and M. Wirsing. Extending Activity Diagrams to Model Mobile Systems. In Proceedings of NetObjectDays (NOD), pages 278--293, Erfurt, Germany, 2002.
[3]
D. E. Bell and L. J. LaPadula. Secure Computer System: Unified Exposition and Multics Interpretation. Technical Report MTR-2997, The MITRE Corporation, Bredford, MA, USA, 1976.
[4]
T. H. Davenport. Process Innovation. Reengineering Work through Information Technology. Ernst&Young, 1993.
[5]
M. Decker. A Security Model for Mobile Processes. In Proceedings of the International Conference on Mobile Business (ICMB 08), Barcelona, Spain, July 2008. IEEE.
[6]
M. Decker. A Location-Aware Access Control Model for Mobile Workflow Systems. International Journal of Information Technology and Web Engineering (IJITWE), 4(1):50--66, January--March 2009.
[7]
M. Decker. Location-Aware Access Control: An Overview. In Proceedings of Informatics 2009 -- Special Session on Wireless Applications and Computing (WAC '09), pages 75--82, Carvoeiro, Portugal, 2009.
[8]
M. Decker. Prevention of Location-Spoofing. A Survey on Different methods to Prevent the Manipulation of Locating-Technologies. In Proceedings of the International Conference on e-Business (ICE-B), pages 109--114, Milano, Italy, 2009.
[9]
A. Köhler and V. Gruhn. Analysis of mobile business processes for the design of mobile information systems. In EC-WEB 2004, pages 238--247, Zaragoza, Spain, 2004.
[10]
P. Kosiuczenko. Sequence diagrams for mobility. In ER/IFIP8.1 Workshop on Conceptual Modelling Approaches to Mobile Information Systems Development (MobIMod 2002), Lecture Notes in Computer Science, Volume 2784, pages 147--155. Springer, 2003.
[11]
A. Küpper. Location-based Services -- Fundamentals and Operation. John Wiley&Sons, Chichester, U.K., 2007. Reprint.
[12]
R. Lake, D. S. Burggraf, M. Trninic, and L. Rae. GML. Geography Mark-Up Language. Foundation for the Geo-Web. John Wiley&Sons, Chichester, England, 2004.
[13]
Object Management Group. Unified Modeling Language (OMG UML), Infrastructure, V2.1.2, 2007.
[14]
Object Management Group. Unified Modeling Language (OMG UML), Superstructure, V2.1.2, 2007.
[15]
I. Ray and M. Kumar. Towards a Location-based Mandatory Access Control Model. Computers&Security, 25(1):36--44, 2006.
[16]
V. Stefanov, B. List, and B. Korherr. Extending UML 2 Activity Diagrams with Business Intelligence Objects. In Proceedings of Data Warehosuing and Knowledge Discovery (DaWaK 2005), pages 53--63, Copenhagen, Denmark, 2005.
[17]
M. Stender and T. Ritz. Modeling of B2B mobile commerce processes. International Journal of Production Economics, 101(1):128--139, 2006.
[18]
J. Wainer, P. Barthelmess, and A. Kumar. W-RABC -- A Workflow Security Model Incorporating Controlled Overriding of Constraints. International Journal of Cooperative Information Systems, 12(4):455--485, 2003.

Cited By

View all
  • (2014)A systematic review on security in Process-Aware Information Systems - Constitution, challenges, and future directionsInformation and Software Technology10.1016/j.infsof.2013.12.00456:3(273-293)Online publication date: 1-Mar-2014

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
Mobimedia '09: Proceedings of the 5th International ICST Mobile Multimedia Communications Conference
September 2009
360 pages
ISBN:9789639799622

Sponsors

  • ICST

Publisher

ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)

Brussels, Belgium

Publication History

Published: 07 September 2009

Author Tags

  1. UML
  2. activity diagrams
  3. location-based services
  4. mobile business processes/workflows
  5. modelling
  6. usecase diagrams

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)18
  • Downloads (Last 6 weeks)4
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2014)A systematic review on security in Process-Aware Information Systems - Constitution, challenges, and future directionsInformation and Software Technology10.1016/j.infsof.2013.12.00456:3(273-293)Online publication date: 1-Mar-2014

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media