skip to main content
10.1145/952532.952652acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Organizational modeling in UML and XML in the context of workflow systems

Published:09 March 2003Publication History

ABSTRACT

Workflow technology plays a key role as an enabler in E-Commerce applications, such as supply chains. Until recently the major share of the attention of workflow systems researchers has gone to the exchange of information in cross-organizational processes. Increasingly the focus is shifting from the exchange of data to support for interorganizational workflow processes. One of the initiatives in this direction has been XRL (eXchangeable Routing Language), an extendible instance-based language having an XML syntax and Petri-net semantics. In this paper, we move to the next level by extending XRL with organizational entities, structures, and rules. Hence, we describe an organizational model first in UML and then convert it into an XML DTD. Our organizational model allows for the specification of non-human resources, collections of resources (e.g., departments, teams, etc.), availability of resources, delegation, and role inheritance. Additional features of our proposal are the tight integration of organizational concepts and routing concepts. An important goal of this work is to create standard for organizational modeling much like the X. 500 standard for directories.

References

  1. Aalst, W. M. P. van der, A. H. M. ter Hofstede, B. Kiepuszewski, en A. P. Barros. "Advanced Workflow Patterns," In O. Etzion en P. Scheuermann, editors, 7th International Conference on Cooperative Information Systems (CoopIS 2000), volume 1901 of Lecture Notes in Computer Science, pages 18--29. Springer - Verlag, Berlin, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. W. M. P. van der Aalst and A. Kumar. XML Based Schema Definition for Support of Interorganizational Workflow. Information Systems Research, 2002 (to appear). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. W. M. P. van der Aalst, H. M. W. Verbeek, and A. Kumar. XRL/Woflan: Verification of an XML/Petri-net based language for inter -organizational workflows (Best paper award). In K. Altinkemer and K. Chari, editors, Proceedings of the 6th Informs Conference on Inform ation Systems and Technology (CIST -2001), pages 30--45. Informs, Linthicum, MD, 2001.Google ScholarGoogle Scholar
  4. Atluri, V.; and Huang W. K. An extended Petri net model for supporting workflows in a multilevel secure environment. Proceedings of the 10th IFIP WG 11.3 Workshop on Database Security (1996), 199--216. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bertino, E.; Ferrari, E.; and Atluri, V. Specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security, 2, 1 (February 1999), 65--104. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Bussler, C.; and Jablonski, S. Policy resolution for workflow management. Proceedings 28th Hawaii International Conference on System Sciences Conference (January 1995). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Castano, S.; and Fugini, M. Rules and patterns for security in workflow systems. Proceedings of the IFIP WG 11.3 Working Conference on Database Security (August 1998), 59--74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Chadwick, D. W., Understanding X.500 - The Directory, © 1994, 1996. Available at http://www.isi.salford.ac.uk/staff/dwc/Version.Web/Contents.htm Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Chamberlin, D. Florescu, J. Robie, J. Simeon, and M. Stefanescu. XQuery: A Query Language for XML. W3C Working Draft. Available at http://www.w3.org/TR/xquery/, 2000.Google ScholarGoogle Scholar
  10. J. Clark, S. DeRose (ed.) "XML Path Language (XPath) Version 1.0", W3C, November 1999. (http://www.w3.org/TR/xpath)Google ScholarGoogle Scholar
  11. Ferraiolo, D. F.; and Kuhn, D. R. Role-Based Access Control. In 15th National Computer Security Conference. NIST/NSA, 554--563, 1992.Google ScholarGoogle Scholar
  12. Ferraiolo, D. F.; Cugini, J.; and Kuhn, D. R. Role-based access control: features and motivation. Proceedings of the 11th Annual Computer Security Applications Conference (1995). IEEE Computer Society Press, 241--248.Google ScholarGoogle Scholar
  13. Nyanchama, M.; and Osborn, S. L. The role graph model and conflict of interest. ACM Transaction on Information and System Security, 1 (1999), 3--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Sandhu, R. S.; Coyne, E. J.; Feinstein, H. L.; and Youman, C. E. Role-based access control models. IEEE Computer, 29, 2 (1996), 38--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Sandhu, R. S.; Bhamidipati V.; and Manuawer, Q. The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and System Security, 2, 1 (February 1999), 105--135. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Simon, R. and Zurko, M. E. Separation of duty in role-based environments. Proceedings of the 10th Computer Security Foundations Workshop (1997), 183--194. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. H. S. Thompson, D. Beech, M. Maloney, and N. Mendelsohn. XML Schema Part 1: Structures. W3C Working Draft, Apr. 2000. http://www.w3.org/TR/xmlschema-1/.Google ScholarGoogle Scholar
  18. Zur Mühlen, M. Resource modeling in workflow applications. Proceedings of the 1999 Workflow Management Conference (November 1999), 137--153.Google ScholarGoogle Scholar
  19. Zur Mühlen, M. Evaluation of workflow management systems using meta models. Proceedings of the 32nd Hawaii International Conference on System Sciences (1999). Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    SAC '03: Proceedings of the 2003 ACM symposium on Applied computing
    March 2003
    1268 pages
    ISBN:1581136242
    DOI:10.1145/952532

    Copyright © 2003 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 9 March 2003

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • Article

    Acceptance Rates

    Overall Acceptance Rate1,650of6,669submissions,25%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader