Abstract
Traditional role-oriented process modeling seems to be subjective in identifying roles. To solve the problem, the similarity of activities is used in this paper. Sub-processes with high similarity are recognized as the process undertaken by a certain role. In this way, a relatively objective role identification approach is proposed, which determines the interaction between roles and establishes the role-activity diagram. Furthermore, by analyzing the interaction between roles, genetic algorithm is used to introduce multiple factors to optimize the identification. Therefore, an optimized role-oriented process modeling approach is established and an example is presented to show the feasibility of this approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Johnathan, E.C., Alexander, L.W.: Discovering Models of Software Processes from Event-Based Data. ACM Transactions on Software Engineering and Methodology 7, 215–249 (1998)
van der Aalst, W.M.P., Weijters, A.J.M.M.: Process mining a research agenda. Computers in Industry 53, 231–244 (2003)
Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (1994)
van der Aalst, W.M.P., Song, M.: Mining Social Networks: Uncovering Interaction Patterns in Business Processes. In: Desel, J., Pernici, B., Weske, M. (eds.) BPM 2004. LNCS, vol. 3080, pp. 244–260. Springer, Heidelberg (2004)
van der Aalst, W.M.P., Reijers, H.A., Song, M.: Discovering Social Networks from Event Logs. Computer Supported Cooperative Work 14, 549–593 (2005)
Kuhlmann, M., Shohat, D., Schimpf, G.: Role mining - revealing business roles for security administration using data mining technology. In: Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, pp. 179–186. IEEE Press, New York (2003)
Schlegelmilch, J., Steffens, U.: Role mining with ORCA. In: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, pp. 168–176. IEEE Press, New York (2005)
Phalp, K.T., Henderson, P., Walters, R.J., Abeysinghe, G.: RolEnact: role-based enactable models of business processes. Information and Software Technology 40(3), 123–133 (1998)
Zhao, W., Dai, W., Wang, A., Fang, X.: Role-activity Diagrams Modeling Based on Workflow Mining. In: 2009 World Congress on Computer Science and Information Engineering, pp. 301–305. IEEE Press, New York (2009)
van der Aalst, W.M.P., Weijters, T., Maruster, L.: Workflow Mining: Discovering Process Models from Event Logs. IEEE Transactions on Knowledge and Data Engineering 16(9), 1128–1142 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhao, W., Lin, Q., Shi, Y., Fang, X. (2012). Mining the Role-Oriented Process Models Based on Genetic Algorithm. In: Tan, Y., Shi, Y., Ji, Z. (eds) Advances in Swarm Intelligence. ICSI 2012. Lecture Notes in Computer Science, vol 7331. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30976-2_48
Download citation
DOI: https://doi.org/10.1007/978-3-642-30976-2_48
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30975-5
Online ISBN: 978-3-642-30976-2
eBook Packages: Computer ScienceComputer Science (R0)