| The change region analysis of business process model is an important content of business process management; the purpose is to adapt the changing business needs flexibly. Due to the demand for the computer system which is increasing, the modeler needs to face all kinds of change region (security) problems. The traditional computer system has been unable to meet the increasing complex and changeable operating environment. With the development of our science, the openness of modern computer system is much stronger, which makes some business process models fragile, vulnerable to be attacked. Therefore, analyzing the vulnerability of business process model becomes very important for the reliability of the system.At present, the business process model research focuses on the consistency and change region of the business process model. Also, the existing method analysis the business process is from the whole system, the calculation and the complexity is difficult to satisfy. When we analyze the consistency of models, it is often from the perspective of the single transition, so there are some limitations to study the whole model. For the similarity analysis of the models, it isn’t from the angle of behavior and structure, also we seldom analyze the change propagation problems from the angle of behavior inclusion and inheritance.This paper is based on the Petri nets theory, the relevant theory of behavioral profiles as well as behavior include; under the condition of existing the source model and the target model to analysis the change region and the consistency of the business process models. The main research contents are as follows:(1)For the detection of source and target models whether or not consistent, we put forward a method to consider the behavior and structure consistency from the angle of a single transition and the modules. Through the investigation into the behavior and structure, the consistency of a single transition and the modules can be calculated out. The experimental results show that based on the module for the analysis of the source and target model is consistent, then we can know that there exists suspicious module. Also, based on the weak behavioral profiles, we can determine the final change region of the target model. This method analyzes models from various angles and overcomes the existing methods of oneness.(2) For the change region of business process system, a method named dynamic slice of Petri nets was put forwarded. Through the comparative analysis of the source and target models’ structure figure, we can derive the suspicious areas of the target model. Then the thought of behavioral profiles is used to derive the change region of the suspicious areas in the target model. At last, the method named dynamic slice of Petri nets is used to obtain the smallest change region of the target model. The method can determine the change region with the help of the suspicious areas; it can reduce the complexity of the business process system.(3) For the similarity of business process system, we put forward the behavior and structural similarity degree basing on the existing methods. According to the theory of the occupancy of the predecessor transition and the behavioral profile as well as the simulated behavioral profile, then we consider the behavior and structure similarity of the source and target models, use certain theoretical to analysis the change region of the target model. The method considers the degree of similarity between models from the perspective of behavior and structure; avoid the independence and oneness of the existing method.(4) For the change region propagation problem in business process system, based on the trace equivalence and behavior inclusion in the source and target model, we give the change region of the source model and put forward the method to find the change region of a target model based on the behavior inheritance. This method can find out some models’change region effectively and reduce the time complexity. |