From EPC Standard

EPC extensions in literature

There are several EPC exentions that refine the baseline EPC with additional elements or domain specific constructs. Each EPC extension adheres to syntax, semantics, pragmatics and a meta model of its own.

EPC extensions

EPC extension Reference Desc. Specification Type
EPC [1] EPC prototype, consisting only of functions, events and connectors enumerative -
eEPC [2][3][4] Enriched EPC, including organizational units, information objects, IT systems and process refinements enumerative element
rEPC [5] Includes a state machine, which is modelled in parallel to the EPC formal semantics execution
EPC* [6] Information objects can be connected to model data flow and conditions can be added to the control flow - workflow
oEPC [7][8] Uses an object-oriented process definition enumerative element
Risk-EPC [9] Adds a risk element to the EPC, which can be linked to functions enumarative element
Fuzzy EPC [10][11][12] A fuzzy connector allows modelling fuzzy decision-making in business processes formal semantics; meta model element
yEPC [13] Extends the EPC to support state-based workflow patterns, multi-instantiation and cancellation enumerative workflow; element
Risk EPC extended [21][22] Adds risk events, which are triggered when an exception occurs enumerative; meta-model element
C-EPC [14][15] Functions, events and connectors are configurable formal semantics; enumerative reference modelling
Semantic EPC [16][17] EPC elements are linked to ontologies enumerative semantic annotation
N-EPC [18] Allows modelling of several events between two functions, trivial events can e be followed by XOR or OR formal semantics simplification
Service EPC [19] Functions are replaced by services enumerative element
C-iEPC [20] Extends the configuration introduced in the C-EPC to information objects, IT systems and organizational objects formal semantics extended configuration


  • [1] ^G. Keller, M. Nüttgens, and A.-W. Scheer, “Semantische Prozeßmodellierung auf der Grundlage ‘Ereignisgesteuerter Prozeßketten (EPK),’” Universität des Saarlandes, 89, 1992
  • [2] ^W. Hoffmann, J. Kirsch, and A.-W. Scheer, “Modellierung mit Ereignisgesteuerten Prozeßketten,” Universität des Saarlandes, 101, 1993
  • [3] ^J. Galler and A.-W. Scheer, “Workflow-Management - Die ARIS-Architektur als Basis eines multimedialen Workflow-Systems,” Universität des Saarlandes, 108, 1994
  • [4] ^G. Keller and T. Teufel, SAP R/3 prozeßorientiert anwenden. Bonn: Addison-Wesley, 1997
  • [5] ^W. Hoffmann, R. Wein, and A.-W. Scheer, “Konzeption eines Steuerungsmodells für Informationssysteme–Basis für die Real-Time-Erweiterung der EPK (rEPK),” Universität des Saarlandes, 106, 1993
  • [6] ^O. Zukunft and F. Rump, “From Business Process Modelling to Workflow Management - An Integrated Approach,” in Business Process Modelling, B. Scholz-Reiter and E. Stickel, Eds. Berlin: Springer, 1996, pp. 3–22
  • [7] ^A.-W. Scheer, M. Nüttgens, and V. Zimmermann, “Objektorientierte Ergenisgesteuerte Prozeßkette (oEPK) - Methode und Anwendung,” Universität des Saarlandes, 141, 1997
  • [8] ^M. Nüttgens and V. Zimmermann, “Geschäftsprozeßmodellierung mit der objektorientierten Ereignisgesteuerten Prozeßkette (oEPK),” in Informationsmodellierung - Referenzmodelle und Werkzeuge, M. Maicher and H.-J. Scheruhn, Eds. Wiesbaden, Germany: Gabler, 1998, pp. 23–35
  • [9] ^E. Brabänder and H. Ochs, “Analyse und Gestaltung prozessorientierter Risikomanagementsysteme mit Ereignisgesteuerten Prozessketten,” in EPK 2002 - Geschäftsprozessmanagement mit Ereignisgesteuerten Prozessketten, Proceedings des GI-Workshops und Arbeitskreistreffens, 2002, pp. 1–5
  • [10] ^O. Thomas, C. Hüsselmann, and O. Adam, “Fuzzy-Ereignisgesteuerte Prozessketten - Geschäftsprozessmodellierung unter Berücksichtigung unscharfer Daten,” EPK 2002 - Geschäftsprozessmanagement mit Ereignisgesteuerten Prozessketten, Proc. des GI-Workshops und Arbeitskreistreffens, pp. 7–16, 2002
  • [11] ^O. Thomas and T. Dollmann, “Attributierung und Regelintegration,” Proc. 5th GI Work. Event-Driven Process Chain. (EPK 2006), pp. 49–68, 2006
  • [12] ^O. Thomas, Fuzzy Process Engineering, 1st editio. Wiesbaden: Gabler Verlag, 2009
  • [13] ^J. Mendling, G. Neumann, and M. Nüttgens, “Yet another event-driven process chain,” in Lecture Notes in Computer Science, 2005, vol. 3649, p. 428
  • [14] ^M. Rosemann and W. M. P. van der Aalst, “A configurable reference modelling language,” Inf. Syst., vol. 32, no. 1, pp. 1–23, 2007
  • [15] ^J. C. Recker, M. Rosemann, W. M. P. van der Aalst, and J. Mendling, “On the Syntax of Reference Model Configuration – Transforming the C-EPC into Lawful EPC Models,” in Business Process Management Workshops: BPM 2005 International Workshops, BPI, BPD, ENEI, BPRM, WSCOBPM, BPS, 2005, pp. 60–75
  • [16] ^O. Thomas and M. Fellmann, “Semantische Ereignisgesteuerte Prozessketten.,” Data Warehous., pp. 205–224, 2006
  • [17] ^A. Filipowska, M. Kaczmarek, and S. Stein, “Semantically annotated EPC within semantic business process management,” in Lecture Notes in Business Information Processing, 2009, vol. 17, pp. 486–497
  • [18] ^O. Kopp, T. Unger, and F. Leymann, “Nautilus Event-driven Process Chains: Syntax, Semantics, and their mapping to BPEL,” in Proceedings of the 5th GI Workshop on Event-Driven Process Chains (EPK 2006), 2006, pp. 85–104
  • [19] ^S. Huth and T. Wieland, “Geschäftsprozessmodellierung mittels Software-Services auf Basis der EPK,” in Service-orientierte Architekturen, 1st ed., V. Nissen, M. Petsch, and H. Schorcht, Eds. Wiesbaden: Deutscher Universitäts-Verlag, 2007, pp. 61–76
  • [20] ^M. La Rosa, M. Dumas, A. H. M. ter Hofstede, J. Mendling, and F. Gottschalk, “Beyond Control-Flow: Extending Business Process Configuration to Roles and Objects,” vol. 5231, pp. 199–215, 2008
  • [21] ^M. Rosemann and M. zur Muehlen, “Integrating Risks in Business Process Models,” Australas. Conf. Inf. Syst., no. Figure 1, pp. 62–72, 2005
  • [22] ^T. Rieke and A. Winkelmann, “Modellierung und Management von Risiken. Ein prozessorientierter Risikomanagement-Ansatz zur Identifikation und Behandlung von Risiken in Geschäftsprozessen,” Wirtschaftsinformatik, vol. 50, no. 5, pp. 346–356, 2008