(frequently changing) implementation details utiliz-
ing description logics and ontologies. Thus, we are
developing a process security evaluation engine pro-
viding operators with insight concerning the current
security status of a process. The engine analyzes the
events consumed or generated by the dynamic busi-
ness process using the integrated security model and
the derived security policies. It is capable of simu-
lating possible execution paths and detecting poten-
tial security breaches in the near future. Trustworthi-
ness of the events to be processed is at the heart of
secure event processing. In ADiWa, we are develop-
ing methods to establish trusted relationships between
event processing components to avoid the overhead
of authenticating each event individually. Plausibility
checks are used to detect compromised components.
4 OUTLOOK
In this paper, we provide a very brief overview of
the motivation, progress, and goals of the ADiWa
project. In line with the overall concept, the differ-
ent facets of the research activities deliver a holistic
solution framework that covers the various challenges
in the field of event-based system implementations.
While the described event processing functionalities
increase the needed transparency, the enhanced busi-
ness model design and execution improve the flexibil-
ity of business process adaptations. By that, we aim to
close the gap between technical possibilities and their
business usage and, thus, to demonstrate the business
value of our overall concept. In this respect a deep and
thorough evaluation of the concept and the functional-
ities is our benchmark. Leveraged by our research ac-
tivities, we intend to raise the research field of event-
based system implementations one step higher and to
provide a fertile ground for future research projects.
ACKNOWLEDGEMENTS
The project was funded by means of the German Fed-
eral Ministry of Education and Research under the
promotional reference 01IA08006. The authors take
the responsibility for the contents.
REFERENCES
Basin, D., Doser, J., and Lodderstedt, T. (2006). Model
driven security: From uml models to access control
infrastructures. ACM Transactions on Software Engi-
neering and Methodology, 15(1):39–91.
Bezivin, J., Bouzitouna, S., Del Fabro, M., Gervais, M.,
Jouault, F., Kolovos, D., Kurtev, I., and Paige, R.
(2006). A canonical scheme for model composition.
Lecture Notes in Computer Science, 4066:346–360.
Dadam, P. and Reichert, M. (2009). The ADEPT project:
a decade of research and development for robust and
flexible process support. Computer Science-Research
and Development, 23(2):81–97.
Graessle, P., Schacher, M., Grc, P., et al. (2006). Agile Un-
ternehmen Durch Business Rules. Springer.
Hallerbach, A., Bauer, T., and Reichert, M. (2009). Config-
uration and management of process variants. Hand-
book on BPM.
Hapner, M., Burridge, R., Sharma, R., Fialli, J., and Stout,
K. (2002). Java Message Service Specification v1. 1.
Sun Microsystems, Inc.
Heusler, K., Stolzle, W., and Bachman, H. (2006). Sup-
ply Chain Event Management Grundlagen, Funk-
tionen und potenzielle Akteure. Wirtschaftswis-
senschaftliches Studium, 35(1):19.
Hinze, A., Sachs, K., and Buchmann, A. (2009). Event-
based applications and enabling technologies. In Pro-
ceedings of the Third ACM International Conference
on Distributed Event-Based Systems, page 1.
Kawamura, T., Fukuhara, T., Takeda, H., Kono, Y., and Ki-
dode, M. (2007). Ubiquitous memories: a memory ex-
ternalization system using physical objects. Personal
and Ubiquitous Computing, 11(4):287–298.
Keller, G., Nuettgens, M., and Scheer, A. (1992). Semantis-
che prozessmodellierung auf der grundlage ereignis-
gesteuerter prozessketten (epk). Veroeffentlichungen
des Instituts fuer Wirtschaftsinformatik, 89.
Luckham, D. (2002). The power of events: an introduction
to complex event processing in distributed enterprise
systems. Springer.
Muhl, G., Fiege, L., and Pietzuch, P. (2006). Distributed
Event-Based Systems. Springer.
Paschke, A. and Kozlenkov, A. (2009). Rule-Based Event
Processing and Reaction Rules. In Proceedings of the
2009 International Symposium on Rule Interchange
and Applications, pages 53–66. Springer.
Pesic, M. and van der Aalst, W. (2006). A declarative ap-
proach for flexible business processes management.
LNCS, 4103:169.
Riss, U., Rickayzen, A., Maus, H., and van der Aalst, W.
(2005). Challenges for Business Process and Task
Management. Journal of Universal Knowledge Man-
agement, 0(2):77–100.
Riss, U. V., Jarodzka, H. M., and Grebner, O. (2007).
Pattern-based task management & implicit knowl-
edge. In 4th Conference on Professional Knowledge
Management. GITO Verlag Berlin.
Rodriguez, A., Fernandez-Medina, E., and Piattini, M.
(2007). M-BPSec: A method for security requirement
elicitation from a UML 2.0 business process specifica-
tion. Lecture Notes in Computer Science, 4802:106.
ICEIS 2011 - 13th International Conference on Enterprise Information Systems
376