with the best results or all possible solutions and
extra information about value of the parameters. In
this case, we have selected a type of search in order
to obtain all possible solutions since it is more
interesting observe different cases with assignation
of variables and values. In the
Table 1, we show two examples of solutions
found by the resolution of the constraint model using
a constraint solver. One with positive results where
all constraints are satisfied and the other with
negative results where at least one constraint is not
satisfied.
Table 1: Results of the evaluation of constraint model.
CASE 1 CASE 2
Constraints
RC1 = false; RC2 = true
RC3 = true; RC4 = true
RC1 = true; RC2 = true
RC3 = true; RC4 = true
Acceptable Risk
Acceptable Risk = 200 Acceptable Risk = 200
Risk Variables
Risk
store
903
Riskplaceorder=270
Riskreceiveinvoice=240
Riskreceiveproducts=330
Risksettleinvoice=330
Risk_store = (188)[9..196]
Riskplaceorder=270
Riskreceiveinvoice=240
Riskreceiveproducts=330
Risksettleinvoice=330
Treatment Variables
t1_riskreduction = 3 t1_riskreduction=
(21)[79..99]
Cost Variables
Cost=(101)[2100..2200]
Total Cost = 3000
Cost_treatment=(101)
[100..200]
Cost=(101)[2100..2200]
Total Cost = 3000
Cost_treatment=(101)
[100..200]
4 RELATED WORK
There exist different proposals of extensions of business
processes with risk information and non-functional
requirements (Korherr, 2007) (Lambert, 2006), (Jakoubi,
2009), (Menzel, 2009), (Muhelen, 2005), (Cope, 2010).
Most of them only pay attention in the modelling of risk
information or requirements but do not include mechanism
for the automatic evaluation of the risk assessment and the
diagnosis of the conformance of the objectives of the
business process. Moreover these proposals do not
consider the transformation of the requirements to specific
artefacts in the implementation level. Other works
(Menzel, 2009), (Wolter, 2009) consider the introduction
of new elements in order to annotate BPMN diagrams
with parameters which are transformed into a specific
security configuration of a server.
5 CONCLUSIONS
In this work, an overview of the OPBUS architecture
has been presented. OPBUS has been extended with
a MDA approach that provides an extension of
BPMN models with risk information. We propose to
include constraint programming techniques in order
to automate the checking of conformance of the risk
assessment of business processes. For this reason we
have presented a mapping to constraint models.
Once business process are validated the
countermeasures identified in design stage of
business processes can be aligned with specific
control in next layers, for instance with specific fault
tolerance mechanism already included in OPBUS
framework.
ACKNOWLEDGEMENTS
This work has been partially funded by Consejería de
Economía, Innovación y Ciencia of the Regional
Government of Andalusia project under grant P08-TIC-
04095, and by Spanish Ministerio de Ciencia e Innovación
project under grant TIN2009-13714, and by FEDER
(under ERDF Program).
REFERENCES
Cope E. W., Kuster J. M., Etzweiler, D., Deleris , L. A.,
and Ray B., “Incorporating risk into business process
models,” IBM Journal of Research and Development,
vol. 54, no. 3, pp. 4:1 –4:13, 2010.
ENISE, “Integration of Risk Management with Business
processes”. Available at: http://www.enisa.europa.eu/
act/rm/cr/business-process-integration. 2010.
Gartner Inc., “Gartner CIO report,” Available at:
http://www.gartner.com/it/page.jsp?id=1283413, 2010.
Model-Driven Architecture, Available at: http://www.
omg.org/mda/
S. Huang, Y. Chu, Shing-Han Li, D. C. Yen, Enhancing
conflict detecting mechanism for Web Services
composition: A business process flow model
transformation approach, Information and Software
Technology, Vol. 50, pp. 1069-1087, 2008.
Jakoubi, S. and Tjoa, S., “A reference model for risk-
aware business process management,” 4th Internatio-
nal Conference on Risks and Security of Internet and
Systems (CRiSIS), 2009, pp. 82 –89, 2009.
Korherr B. and Beate List, “Extending the EPC and the
BPMN with Business Process Goals and Performance
Measures”, International Conference on Enterprise
Information Systems, 2007.
Lambert, J. H., Jennings, R. K., and Joshi N. N.,
“Integration of risk identification with business
process models,” Syst. Eng., vol. 9, no. 3, pp. 187–
198, 2006.
Menzel, M.; Thomas, I.; Meinel, C., "Security
Requirements Specification in Service-Oriented
Business Process Management," ARES '09, pp.41-48,
16-19 2009.
OPBUS: RISK-AWARE FRAMEWORK FOR THE CONFORMANCE OF SECURITY-QUALITY REQUIREMENTS
IN BUSINESS PROCESSES
373