计算机科学 ›› 2023, Vol. 50 ›› Issue (11A): 221000118-12.doi: 10.11896/jsjkx.221000118
刘振宇, 董慧, 李华, 王璐
LIU Zhenyu, DONG Hui, LI Hua, WANG Lu
摘要: 随着社会制度的不断完善和法律法规的不断健全,企业的经营管理流程面临越来越多的合规性检测要求。利用带标签的时间约束Petri网(LTCPN)模型描述数据流通过程中所遵循的法律法规及行业规则。为了支持更多维度的规则表达,首先需要基于LTCPN可达图构造扩展可达图GNR,然后根据含时间戳的事件日志自动生成实际数据流通模型GNP。通过检测GNP|=GNR是否成立来判断基于含时间戳的事件日志的数据流通过程是否符合LTCPN描述的规则规范。针对语义信息不明的流程模型合规性检测问题,利用图的点与边连接结构是否相同来检测事件语义无关的功能性属性是否合规。对于语义信息明确的流程模型,可以通过节点或边的语义信息有效减少检测过程中探索的状态空间数量,同时可以进一步丰富合规性检测的非功能性属性检测。通过实验验证了该方法在进行合规性检测方面的可行性。
中图分类号:
[1]SOX.Sarbanes-Oxley Act[EB/OL]https://www.soxlaw.com/. [2]Basel Committee on Banking Supervision Basel III[M].ChinaFinancial Publishing House,2014. [3]General Data Protection Regulation[EB/OL].https://gdpr.eu/. [4]Network Security Law of the People’s Republic of China[EB/OL].[2017-02-20].http://www.npc.gov.cn/wxzl/gongbao/2017-02/20/content_2007531.htm. [5]Civil Code of the People’s Republic of China[EB/OL].[2020-06-02].http://www.npc.gov.cn/npc/c30834/202006/75ba6483b8344591abd07917e1d25cc8.shtml. [6]Data Security Law of the People’s Republic of China[M].Law Press,2021. [7]Personal Information Protection Law of the People’s Republicof China[EB/OL].[2021-08-20].http://www.npc.gov.cn/npc/c30834/202108/a8c4e3672c74491a80b53a172bb753fe.shtml. [8]VAN DER AALST W.Process Mining:Discovery,Conformance and Enhancement of Business Processes[M].Berlin Heidelberg:Springer-Verlag,2011. [9]VAN DER AALST W.Process mining[M].Tsinghua University Press,2014. [10]RAMEZANI T E,FAHLAND D,AALST V D W M.Where did I misbehave? Diagnostic information in compliance checking[J].Lecture Notes in Computer Science,2012,7481:262-278. [11]GHEZZI C,GUINEA S.Run-time monitoring in service-orien-ted architectures[M].Heidelberg:Springer Berlin,2007:237-264. [12]EL GAMMAL A F S A.Towards a comprehensive framework for business process compliance[D].Tilburg University,School of Economics and Management,2012. [13]WU Z H.Introduction to Petri Nets[M].China Machine Press,2006. [14]PETRI C A.Kommunikation mit Automaten(Communication with Automata)[D].University of Bonn,1962. [15]LI H,ZHAO Y L,ZHOU Y L.Time Petri-net models of timeralated system[J].Journal of Inner Mongolia University(Natural Science Edition),2000,31(1):125-131. [16]LIU B.Software Verification and Validation[M].National Defense Industry Press,2011. [17]TSAI J J P,JENNHWA Y S,CHANG Y.Timing constraint Petri nets and their application to schedulability analysis of real-time system specifications[J].IEEE Transactions on Software Engineering,1995,21(1):32-49. [18]SONG W,DOU W C,LIU X P.Time Constrained Petri Nets and Its Schedulability Analysis and Verification[J].Journal of Software,2007(1):11-21. [19]LIU X M,LI S X,LI W J,et al.A Time Petri Net with Extended Price Information[J].Journal of Software,2007,18(1):1-10. [20]BONHOMME P.A symbolic schedulability technique of real-time systems modeled by P-Time Petri nets[C]//IEEE.2011:582-587. [21]BONHOMME P,BERTHELOT G,AYGALINC P,et al.Verification Technique for Time Petri Nets[C]//2004 IEEE International Conference on Systems,Man and Cybernetics(IEEE Cat.No.04CH37583).2004:4278-4283. [22]BONHOMME P,HOVSEPIAN A.Towards a new schedulability technique of real-time systems based on difference of constraints system[C]//IEEE.2012.599-604. [23]ZHOU J T,YE X M.Comparison between reachable graph and reachable tree of Petri nets[J].Journal of Inner Mongolia University(Natural Science Edition),2000(1):117-120. [24]ZHOU J T,YE X M.A Method for Constructing Reachability Graphs of Petri Nets[J].Journal of Inner Mongolia University(Natural Science Edition),1999(3):127-130. [25]BOUCHENEB H,BERTHELOT G.Towards a simplified buil-ding of time Petri Nets reachability graph[C]//Proceedings of 5th International Workshop on Petri Nets and Performance Models.1993:46-47. [26]ISO/IEC 15909-1-2019,Systems and software engineering-High-level Petri nets-Part 1:Concepts,definitions and graphical notation(Second edition)[S].ISO/IEC,2019. [27]ZHANG Y R,LI H,XING Y,et al.Test case generation combi-ning CPN modeling and on the fly method[J].Journal of Software,2017,28(10):2564-2582. [28]CPN Tools(Version 4.0)[EB/OL].http://cpntools.org/. [29]ROSEN K H.Discrete Mathematics and Its Applications(the7th edition of the original book)[M].China Machine Press,2015. [30]CORDELLA L P,FOGGIA P,SANSONE C,et al.A(sub)graph isomorphism algorithm for matching large graphs[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2004,26(10):1367-1372. [31]CARLETTI V,FOGGIA P,SAGGESE A,et al.Challenging the Time Complexity of Exact Subgraph Isomorphism for Huge and Dense Graphs with VF3[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2018,40(4):804-818. [32]AALST V D W M.Decomposing Petri nets for process mining:a generic approach[J].Distributed and Parallel Databases:an International Journal,2013,31(4):471-507. [33]TANG C J,CHEN P,XIANG Y,et al Introduction to Computational Theory(2nd Edition)[M].China Machine Press,2006. [34]WANG J,ZHAN N J,FENG X Y,et al.Overview of formalmethods[J].Journal of Software,2019,30(1):33-61. [35]AALST W,BEER H,DONGEN B.Process Mining and Verification of Properties:An Approach Based on Temporal Logic[C]//On the Move to Meaningful Internet Systems 2005:CoopIS,DOA,and ODBASE pt.1.Lecture Notes in Computer Science.2005. [36]MONTALI M,PESIC M,AALST W M P V,et al.Declarative specification and verification of service choreographiess[J].ACM Transactions on the Web,2010,4(1):1-62. [37]RAMEZANI T E,FAHLAND D,AALST V D W M.Diagnostic information in compliance checking[R].BPM Center Report BPM-12-11,BPMcenter.org,2012. [38]VAN DER AALST W M P,PESIC M,SONG M.BeyondProcess Mining:From the Past to Present and Future[C]//CAiSE 2010:Advanced Information Systems Engineering.2010:38-52. [39]VAN DER AALST W M P,SCHONENBERG M H,SONG M.Time prediction based on process mining[J].Information Systems,2011,36(2):450-475. [40]HAN D,TIAN Y H,DU Y Y,et al.Service alignment method based on Petri net reachability graph[J].Computer Integrated Manufacturing Systems,2020,26(6):1589-1606. [41]ADRIANSYAH A,VAN DONGEN B F,VAN DER AALST W M P.Cost-Based Conformance Checking using the A* Algorithm[R].Technical Report,BPM Center Report BPM-11-11,BPMcenter.org,2011. [42]WANG Y Q,WEN L J,YAN Z Q.Alignment based confor-mance checking algorithm for BPMN 2.0 model[J].Journal of Computer Research and Development,2017,54(9):1920-1930. [43]VAN DER AALST W,ADRIANSYAH A,VAN DONGEN B.Replaying history on process models for conformance checking and performance analysis[J].WIREs Data Mining and Know-ledge Discovery,2012,2(2):182-192. [44]AGOSTINELLI S,MAGGI F M,MARRELLA A,et al.Achieving GDPR Compliance of BPMN Process Models[M].Cham:Springer International Publishing,2019:10-22. [45]CAPODIECI A,MAINETTI L.A Structured Approach to GDPR Compliance[M].Digital Transformation of Collaboration,2020. [46]YANG L Q,KANG G S,CAI W G,et al.Research on Business Process Mining Algorithm[J].Computer Applications and Software,2016,33(4):44-50. |
|