SLIDE 45 Evaluation
Grafting of new Regulations
1 start 4 5 verify_purpose !c2 7 check_accuracy !c1 6 check_accuracy verify_purpose 12 13 check_accuracy 15 verify_purpose !c5 16 check_accuracy !c4 verify_purpose 3 notify_owner !c2 8 verify_purpose !c2 10 check_accuracy !c1 notify_owner !c2 9 check_accuracy notify_owner !c1 verify_purpose notify_owner 2 refuse_data !c4 send_data !c2 11 verify_purpose 17 check_accuracy refuse_data !c5 send_data !c2 14 check_accuracy send_data refuse_data refuse_data !c4 send_data !c1 verify_purpose ask_data 18 periodically_verify_accuracy ask_data
Elisa Marengo (UNITO) 2CL Protocols October 19, 2012 27 / 41 · M. Baldoni, C. Baroglio, E. Marengo, and V. Patti. Grafting Regulations into Business Protocols: Supporting the Analysis of Risks of Violation. In Proc. of RELAW 2011. · M. Baldoni, C. Baroglio, V. Patti, and E. Marengo. Supporting the Analysis of Risks
- f Violation in Business Protocols: the MiFID Case Study. In Information Systems:
Crossroads for Organization, Management, Accounting and Engineering. Springer,
- 2012. Best Track Paper Award.