1 / 17

A Framework for Dynamic Routing and Operational Integrity Controls in a Workflow Management System

A Framework for Dynamic Routing and Operational Integrity Controls in a Workflow Management System. Workflow Management System :.

tara-kelley
Download Presentation

A Framework for Dynamic Routing and Operational Integrity Controls in a Workflow Management System

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Framework for Dynamic Routing and Operational IntegrityControls in a Workflow Management System

  2. Workflow Management System : WMS systems manage and coordinate several independent subtasks. The coordination problems get even more serious when the subtasks are performed on separate systems. SYSTEM ARCHITECTURE FOR WMS : .

  3. 1)The flow of information in an organization occurs by means of documents (e.g., purchase order request, travel authorization request, etc.), which are passed through various individuals. Each individual performs operations on the document such as: fill in some fields, modify fields, etc. 2) This form then goes to a secretary who reviews it, and enters information on previous business travel by the employee. 3) Next, the form is sent to the manager who approves or disapproves the requested amount. Alternatively, the manager may approve a smaller amount than requested. Finally, the form is returned to the individual concerned and the secretary to notify them of the decision. PROBLEMS : CONTROL AUTHORIZATION

  4. Three techniques for handling workflow control & authorization: 1) workflow control matrices : defines the relationship between two operations that can be performed in a temporal sense. 2) sequence constraints : consists of techniques for imposing and enforcing constraints on the routing sequence of the workflow, i.e., the sequence in which a document is sent to various employees 3) event-based constraints : event-based constraints which can be used to specify unusual routing needs and other special actions. These techniques can : can exploit parallelism, lead to more efficient processes Do better workflow systems can handle various kinds of exception situations that arise in workflow applications.

  5. Workflow Management System Framework : The objective of our framework is to complete a list of tasks with respect to each document subject to a set of sequence constraints while providing support for dynamic routing and operational integrity control. Dynamic routing : routing a document in a dynamic manner subject to certain constraints. There is no predefined order as in static routing. Operational integrity control : refers to imposing restrictions on the permissibility of various operations that may be performed on various fields of a document by different individuals as the document travels through the organization. The WMS routes the documents to work baskets while workers interact with the documents through the work baskets assigned them.

  6. Three types of work baskets: document-based : each basket contains a particular type of document, and every worker accesses the same document in the same basket & are hard to use for routing documents. worker-based : contain all documents assigned to the same worker. Routing of documents can be done after a document is processed by moving documents from the basket of one worker to the basket of another. inflexible as modification to the routing mechanism is needed when a worker is absent or leaves the company. rolebased: contains similar documents that must be worked upon by workers performing a specific role. Any worker belonging to that role can process the documents in the basket. When a worker starts processing a document, the document is locked so that no one else can access it. Role-based baskets are most suitable for supporting dynamic routing because no change to the routing mechanism is needed when a worker leaves the system or is reassigned.

  7. The following terms to describe the workflow process and to develop the control and authorization mechanisms. document (d): A statement or form that is needed for a business transaction, e.g., a billing statement or a travel authorization form. 2) field (f): Any data element contained in a document that has a numerical or symbolic value. worker (w): Any person who performs operations on documents using the workflow management system. roLe (r): A generic identifier for a group of workers, any one of whom may perform a task assigned to the “role”. work basket (b): A unique, logical box associated with a role. Each work basket contains a stack (or queue) of documents waiting to be processed by a worker in the corresponding role. operation (0): The smallest unit of work, e.g.,enter a data value into the amount field on a form.

  8. 7) Tusk (t): A collection of operations that corresponds to a step in a common business process, e.g., fill in the customer request form. 8) sequence dependency (s): Two tasks that must be performed by different roles in a given sequence create a sequence dependency. Proper routing of documents to various workers is by far the most important function of the workflow management system & is achieved by means of sequence constraints that impose dependencies between tasks on a document. The proper routing of a document is achieved by controlling the sequence in which a document is accessed by various roles.

  9. The operational integrity is maintained by placing restrictions on the kinds of operations (e.g., read, enter, modify, etc.) that a worker in a given role is allowed to perform on fields of a document. This is done by keeping a workflow control matrix that specifies the permissible operations that can be performed by a given role. Once a document is accessed by a worker, he or she will be notified of the permissible operations by the system. Eventbased constraints can be used to trigger special actions to take place especially when an unusual event Occurs. The workflow manager moves the documents among the baskets after each task is completed by consulting the control matrices, the sequence constraints, and the event-based constraints. This is how the system does automatic authorization and control of access and operations.

  10. WORKFLOW CONTROL MATRIX The workflow control matrix restricts the operations that a worker in a certain role may perform on a document. This matrix is sequence independent but it is possible to enforce a sequence of operations between a pair of employees.

  11. An alternative, and possibly more concise, way of specifying the permissions is by means of explicit statements such as: Permission([ROLE].DOC[.FIELD].[OP] )=y /n. The default value of all permissions would be “n”, unless explicitly overridden by a permission statement. If the role entry (in the above syntax) is missing, then the statement would apply to all roles. Similarly, if the field or operation entry is missing, the statement would apply to all fields or operations.

  12. Workflow Sequence Maintenance When a document moves within the organization, the sequence in which changes (or updates) are made to it is recorded, and is called the document history. If the exact sequence that a document must take each time is known before hand, it can be specified as a complete ordering; however, in general, the sequence can change because alternative paths might be acceptable, certain steps might not be essential, or an employee might be absent, etc. Therefore, the goal of sequence maintenance is to provide a mechanism whereby a set of constraints can be used to define a partial ordering on the document history and the workflow management system would enforce those constraints. A document history is considered legitimute or admisszble if none of the constraints is violated.

  13. Event-Based Operational Constraints Classified as : time-based condition based on elapsed time eg : IF AGE(doc1D) > 10 THEN SEND(doclD,*,blO) (2) access pattern of a document eg : IF REWORK(w5,docID) = 5 THEN NOTIFY(docID, “rework 5 times” ,w5, bll) (3) combination of access pattern and elapsed time eg : IF AGE(doc1D) > 10 AND SEND( docID ,*,b10). REWORK(w5,docID) >2 THEN

  14. (4) special conditions that depend upon field values eg : IF VALUE(docID.fl) > 10000 THEN ROUTE( docID ,b 10) (5) special conditions that depend upon changes made to field values eg IF INC(docID.fl) > 5000 THEN ROUT E (do CID, b 10).

  15. THANK YOU !!

More Related