DOI: 10.2298/CSIS100411031F

The Trustworthiness Analyzing of Interacting Business Process Based on the Induction Information

Xianwen Fang1,2, Changjun Jiang1, Zhixiang Yin2 and Xiaoqin Fan1

  1. Key Lab of Embedded System and Service Computing, Ministry of Education, Tongji University
    Shanghai 201804, China
    {fangxianwen, cjjiang,xqfan}@hotmail.com
  2. Department of Information and Computing Science, Anhui University of Science and Technology
    Huainan 232001, China
    {fangxianwen, zxyin62}@hotmail.com

Abstract

Under the open environments, it is very difficult to guarantee the trustworthiness of interacting business process using traditional software engineering methods, at the same time, for dealing with the influence of external factors, some proposed business process mining methods are only effective 1-bounded business process, and some behavior dependent relationships are ignore. A behavior trustworthiness analysis method of business process based on induction information is presented in the paper. Firstly, aimed to the internal factors, we analyze the consistent behavior relativity to guarantee the predictable function. Then, for the external factors, in order to analyze the behavior change of business process, we propose a process mining methods based on induction information. Finally, experiment simulation is given out, and compares our method with genetic process mining methods. Theoretical analysis and experimental results indicate that our method is better than the genetic process mining method.

Key words

trustworthiness, consistent behavior relativity, business process, process mining.

Digital Object Identifier (DOI)

https://doi.org/10.2298/CSIS100411031F

Publication information

Volume 8, Issue 3 (June 2011)
Year of Publication: 2011
ISSN: 2406-1018 (Online)
Publisher: ComSIS Consortium

Full text

DownloadAvailable in PDF
Portable Document Format

How to cite

Fang, X., Jiang, C., Yin, Z., Fan, X.: The Trustworthiness Analyzing of Interacting Business Process Based on the Induction Information. Computer Science and Information Systems, Vol. 8, No. 3, 843-867. (2011), https://doi.org/10.2298/CSIS100411031F