Niels Lohmann’s research while affiliated with University of Rostock and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (68)


Fig. 4: Workflow graph with deadlock and lack of synchronization errors.  
Table 5 . Reduced paths from the checks for lack of synchronization
Where Did I Go Wrong? Explaining Errors in Business Process Models
  • Conference Paper
  • Full-text available

September 2014

·

269 Reads

·

14 Citations

Lecture Notes in Computer Science

Niels Lohmann

·

Business process modeling is still a challenging task — especially since more and more aspects are added to the models, such as data lifecycles, security constraints, or compliance rules. At the same time, formal methods allow for a detection of errors in the early modeling phase. Detected errors are usually explained with a path from the initial to the error state. These paths can grow unmanageably and make the understanding and fixing of errors very time consuming. This paper addresses this issue and proposes a novel explanation of errors: Instead of listing the actions on the path to the error, only the decisions that lead to it are reported and highlighted in the original model. Furthermore, we exploit concurrency to create a compact artifact to explain errors.

Download


Information leak detection in business process models: Theory, application, and tool support

January 2014

·

94 Reads

·

41 Citations

Information Systems

Despite the correct deployment of access control mechanisms, information leaks can persist and threaten the reliability of business process execution. This paper presents an automated and effective approach for the verification of information flow control for business process models. Building on the concept of place-based non-interference and declassification, the core contribution of this paper is the application of Petri net reachability to detect places in which information leaks occur. Such a feature allows for the use of state-of-the-art tool support to model-check business process models and detect leaks. We show that the approach is sound and complete, and present the Anica tool to identify leaks. An extensive evaluation comprising over 550 industrial process models is carried out and shows that information flow analysis of process models can be done in milliseconds. This motivates a tight integration of business process modeling and non-interference checking.


From Artifacts to Activities

October 2013

·

22 Reads

·

3 Citations

We consider services as units in interorganizational business processes. Following trends in the business process management community, we switch from an activity-centric description of processes to artifact-centric descriptions. In the interorganizational setting, unique problems arise. For instance, an artifact hub that is crucial for present-day enactment of artifact-centric processes, can hardly be shared between different organizations since the stored information may be subject to trade secrets. We propose a solution that involves the translation of an artifact-centric model into an activity-centric model. In this course, we consider artifacts as entities that may be sent around between organizations. The location of an artifact may imply access restrictions for one or the other organization. We propose both a formal model and algorithms to show the effectiveness of our approach. © 2014 Springer Science+Business Media New York. All rights are reserved.


Model Checking Contest @ Petri Nets, Report on the 2013 edition

September 2013

·

130 Reads

·

7 Citations

This document presents the results of the Model Checking Contest held at Petri Nets 2013 in Milano. This contest aimed at a fair and experimental evaluation of the performances of model checking techniques applied to Petri nets. This is the third edition after two successful editions in 2011 and 2012. The participating tools were compared on several examinations (state space generation and evaluation of several types of formul{\ae} -- reachability, LTL, CTL for various classes of atomic propositions) run on a set of common models (Place/Transition and Symmetric Petri nets). After a short overview of the contest, this paper provides the raw results from the contest, model per model and examination per examination. An HTML version of this report is also provided (http://mcc.lip6.fr).



Modeling Wizard for Confidential Business Processes

January 2013

·

19 Reads

·

3 Citations

Lecture Notes in Business Information Processing

One driver of business process management is the opportunity to reduce costs by outsourcing certain tasks to third-party organizations. At the same time, it is undesirable that delicate information (e.,g., trade secrets) "leak" to the involved third parties, be it for legal or economic reasons. The absence of such leaks - called noninterference - can be checked automatically. Such a check requires an assignment of each task of the business process as either confidential or public. Drawbacks of this method are that (1) this assignment of every task is cumbersome, (2) an unsuccessful check requires a corrected confidentiality assignment although (3) the diagnosis and correction of information leaks is a nontrivial task. This paper presents a modeling prototype that integrates the noninterference check into the early design phase of an interorganizational business process. It not only allows for instant feedback on confidentiality assignments, but also for an automated completion of partial assignments toward guaranteed noninterference.


Web Services and Formal Methods: 9th International Workshop, WS-FM 2012, Tallinn, Estonia, September 6-7, 2012, Revised Selected Papers

January 2013

·

10 Reads

Lecture Notes in Computer Science

This book constitutes the thoroughly refereed post-workshop proceedings of the 9th International Workshop on Web Services and Formal Methods, WS-FM 2012, held in Tallinn, Estonia, in September 2012. The 9 papers presented were carefully reviewed and selected from 19 submissions. They cover aspects such as the modeling and analysis of web services, service discovery, and service coordination with formal methods like BPEL, CSP, Maude, and Petri nets.



Fig. 2. Handled parameters for each tool, in state space generation 16  
Fig. 4. Handled parameters for each tool, in structural formulae evaluation 66  
Fig. 6. Handled parameters for each tool, in reachability formulae evaluation 72  
Raw Report on the Model Checking Contest at Petri Nets 2012

September 2012

·

158 Reads

·

46 Citations

Lecture Notes in Computer Science

This article presents the results of the Model Checking Contest held at Petri Nets 2012 in Hambourg. This contest aimed at a fair and experimental evaluation of the performances of model checking techniques applied to Petri nets. This is the second edition after a successful one in 2011. The participating tools were compared on several examinations (state space generation and evaluation of several types of formulae - structural, reachability, LTL, CTL) run on a set of common models (Place/Transition and Symmetric Petri nets). After a short overview of the contest, this paper provides the raw results from the context, model per model and examination per examination.


Citations (51)


... Most recently, van der Aalst et al. [47] proposed a novel approach for verifying configurable process models. The approach is inspired by the Operating Guidelines (OGs) used for partner synthesis [24,25] by viewing the configuration process as an external service and computing a characterization of all such services which meet particular requirements via the notion of configuration guideline. This work was motivated from the problem that the verification of the models can be difficult because the number of possible configurations, which can be achieved by restriction (i.e., hiding and blocking on tasks), grows exponentially from the number of configurable elements. ...

Reference:

Reusing artifact-centric business process models: a behavioral consistent specialization approach
Operating Guidelines for Finite-State Services
  • Citing Book
  • January 2006

... For example, "bank regulations change every 12 minutes". 2 Regulatory frameworks comprise application-independent frameworks such as the GDPR on "data processing boundaries of the personal data of European UnionâĂŹs citizens" (65) and the ISO 27001 security standard 3 as well as application-specific ones, e.g., the WHO regulations defined in the context of COVID19 4 . As a consequence, in our globalized world, regulations and their changes affect process collaborations (54) and lead to an increased need for compliance verification in process choreographies. ...

From public views to private views - Correctness-by-design for services
  • Citing Article
  • January 2007

... LoLA 2.0) peuvent être utilisés pour vérifier plusieurs propriétés (exprimées en LTL et CTL). De plus, le rapport du model-checking contest de 2014 [16] montre que les model-checkers donnent de meilleurs résultats sur les réseaux de Pétri classiques (pour l'exploration de l'espace d'état, l'accessibilité et les propriétés exprimées en CTL). ...

HTML results from the Model Checking Contest @ Petri Net (2014 edition)
  • Citing Article
  • June 2014

... Although noninterference properties are defined structurally they require verification on the process behavior. Potential interferences can be identified on the net structure, the decision whether a potential interference is an active one is a verification problem on the behavior of the net; see [2,11] for details. ...

Modeling Wizard for Confidential Business Processes
  • Citing Article
  • January 2013

Lecture Notes in Business Information Processing

... In particular we were able to build state spaces for both infinite and finitestate systems sized up to 4.060 × 10 8 (abstract) states and 3.051×10 9 transitions for a total dimension of 110GB of data (reached by the model representing a simple load balancing system composed of 10 clients, 2 servers, and between these, a load balancer process). It is worth noting that most of the tools belonging to the current state-of-the-art were not able to verify temporal logic formulas on this model [20]. Our experiments point out a clear trend: the more is the complexity of the model to be analyzed, the more is the scalability of our distributed algorithm. ...

Web Report on the Model Checking Contest @ Petri Net 2013
  • Citing Article
  • January 2013

... Note that repairing a model can be regarded as ensuring soundness of the model (see, e.g., Gambini et al. (2011);Lohmann and Fahland (2014)), which is a relevant, yet orthogonal problem. ...

Where Did I Go Wrong? Explaining Errors in Business Process Models

Lecture Notes in Computer Science

... • The development of algorithmics, like operational research, heuristics,… • The standardisation of modelling, like business process modelling that has roots in mathematical models; rationalization of processes which in turn have roots in Petri nets (Lohmann, 2007;Salimifard & Wright, 2001;Gravemeijer, Lehrer, van Oers & Verschaffel, 2002 This implies that there is a need for a holistic perspective for the BTP that can base its architecture and design on an underlying mathematical model that is founded CSAs and CSFs (Goikoetxea, 2004;Cardona, 2004). ...

A Feature-Complete Petri Net Semantics for WS-BPEL 2.0 and its Compiler BPEL2oWFN
  • Citing Article

... Currently, multiple stubborn sets for verifying different properties have been proposed, such as the stubborn set for simple linear time logic [25]. In general, the construction of the stubborn set is depended on the properties to be verified [26]. ...

Stubborn Sets for Simple Linear Time Properties
  • Citing Conference Paper
  • June 2012

Lecture Notes in Computer Science

... However, while PE-BPMN allows analysts to specify privacy-enhancing technologies (PETs) and do some analysis, some techniques are still missing to verify that the resulting privacy-enhanced process specifications fulfil the intended privacy properties. In particular, methods and tools are missing for detecting data leakages in privacy-enhanced collaborative processes [1], i.e. states where a peer in the collaborative process may unduly gain access to confidential information. ...

Information leak detection in business process models: Theory, application, and tool support
  • Citing Article
  • January 2014

Information Systems

... Artifact-centric approaches to BPM specify processes as data objects (called artifacts) that are manipulated throughout the course of the process [28]. According to this paradigm, BPM takes place in two main phases: the designer must first of all focus on artifact modelling; i.e. he must provide data structures capable of storing and logically conveying the information produced during the execution of workflows; then, these artifacts models will be introduced into a WfMS supporting artifact-centric execution of workflows for the enactment. ...

Artifact-centric modeling using BPMN
  • Citing Conference Paper
  • January 2012

Lecture Notes in Computer Science