skip to main content
10.1145/2902251.2902275acmconferencesArticle/Chapter ViewAbstractPublication PagespodsConference Proceedingsconference-collections
research-article

Verification of Hierarchical Artifact Systems

Published:15 June 2016Publication History

ABSTRACT

Data-driven workflows, of which IBM's Business Artifacts are a prime exponent, have been successfully deployed in practice, adopted in industrial standards, and have spawned a rich body of research in academia, focused primarily on static analysis. The present work represents a significant advance on the problem of artifact verification, by considering a much richer and more realistic model than in previous work, incorporating core elements of IBM's successful Guard-Stage-Milestone model. In particular, the model features task hierarchy, concurrency, and richer artifact data. It also allows database key and foreign key dependencies, as well as arithmetic constraints. The results show decidability of verification and establish its complexity, making use of novel techniques including a hierarchy of Vector Addition Systems and a variant of quantifier elimination tailored to our context.

References

  1. Expedia. www.expedia.com. Accessed: 2014--12--10.Google ScholarGoogle Scholar
  2. S. Abiteboul, V. Vianu, B. Fordham, and Y. Yesha. Relational transducers for electronic commerce. JCSS, 61(2):236--269, 2000. Extended abstract in PODS 98. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Basu, R. Pollak, and M.-F. Roy. On the number of cells defined by a family of polynomials on a variety. Mathematika, 43(1):120--126, 1996.Google ScholarGoogle ScholarCross RefCross Ref
  4. F. Belardinelli, A. Lomuscio, and F. Patrizi. A computationally-grounded semantics for artifact-centric systems and abstraction results. In IJCAI 2011, Proceedings of the 22nd International Joint Conference on Artificial Intelligence, Barcelona, Catalonia, Spain, July 16--22, 2011, pages 738--743, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. F. Belardinelli, A. Lomuscio, and F. Patrizi. Verification of deployed artifact systems via data abstraction. In Service-Oriented Computing - 9th International Conference, ICSOC 2011, Paphos, Cyprus, December 5--8, 2011 Proceedings, pages 142--156, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. F. Belardinelli, A. Lomuscio, and F. Patrizi. An abstraction technique for the verification of artifact-centric systems. In Principles of Knowledge Representation and Reasoning: Proceedings of the Thirteenth International Conference, KR 2012, Rome, Italy, June 10--14, 2012, 2012.Google ScholarGoogle Scholar
  7. F. Belardinelli, A. Lomuscio, and F. Patrizi. Verification of GSM-based artifact-centric systems through finite abstraction. In Service-Oriented Computing - 10th International Conference, ICSOC 2012, Shanghai, China, November 12--15, 2012. Proceedings, pages 17--31, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. F. Belardinelli, A. Lomuscio, and F. Patrizi. Verification of agent-based artifact systems. J. Artif. Intell. Res. (JAIR), 51:333--376, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. K. Bhattacharya, N. S. Caswell, S. Kumaran, A. Nigam, and F. Y. Wu. Artifact-centered operational modeling: Lessons from customer engagements. IBM Systems Journal, 46(4):703--721, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. K. Bhattacharya et al. A model-driven approach to industrializing discovery processes in pharmaceutical research. IBM Systems Journal, 44(1):145--162, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. K. Bhattacharya, C. E. Gerede, R. Hull, R. Liu, and J. Su. Towards formal analysis of artifact-centric business process models. In Proc. Int. Conf. on Business Process Management (BPM), pages 288--304, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. BizAgi and Cordys and IBM and Oracle and SAP AG and Singularity (OMG Submitters) and Agile Enterprise Design and Stiftelsen SINTEF and TIBCO and Trisotech (Co-Authors). Case Management Model and Notation (CMMN), FTF Beta 1, Jan. 2013. OMG Document Number dtc/2013-01-01, Object Management Group.Google ScholarGoogle Scholar
  13. M. Blockelet and S. Schmitz. Model checking coverability graphs of vector addition systems. In Mathematical Foundations of Computer Science 2011, pages 108--119. Springer, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. D. Calvanese, G. De Giacomo, and M. Montali. Foundations of data-aware process analysis: a database theory perspective. In PODS, pages 1--12, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. D. Calvanese, G. Delzanno, and M. Montali. Verification of relational multiagent systems with data types. In Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, January 25--30, 2015, Austin, Texas, USA., pages 2031--2037, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. D. Calvanese, G. D. Giacomo, R. Hull, and J. Su. Artifact-centric workflow dominance. In ICSOC/ServiceWave, pages 130--143, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. T. Chao et al. Artifact-based transformation of IBM Global Financing: A case study. In BPM, 2009.Google ScholarGoogle Scholar
  18. E. Damaggio, A. Deutsch, and V. Vianu. Artifact systems with data dependencies and arithmetic. ACM Trans. Database Syst., 37(3):22, 2012. Also in ICDT 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. E. Damaggio, R. Hull, and R. Vaculín. On the equivalence of incremental and fixpoint semantics for business artifacts with guard-stage-milestone lifecycles. Information Systems, 38:561--584, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. G. De Giacomo, R. D. Masellis, and R. Rosati. Verification of conjunctive artifact-centric services. Int. J. Cooperative Inf. Syst., 21(2):111--140, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  21. G. De Giacomo and M. Y. Vardi. Linear temporal logic and linear dynamic logic on finite traces. In Proceedings of the Twenty-Third international joint conference on Artificial Intelligence, pages 854--860. AAAI Press, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. H. de Man. Case management: Cordys approach. BP Trends (small www.bptrends.com), 2009.Google ScholarGoogle Scholar
  23. A. Deutsch, R. Hull, F. Patrizi, and V. Vianu. Automatic verification of data-centric business processes. In ICDT, pages 252--267, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. A. Deutsch, R. Hull, and V. Vianu. Automatic verification of database-centric systems. SIGMOD Record, 43(3):5--17, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. A. Deutsch, Y. Li, and V. Vianu. Verification of hierarchical artifact systems. arXiv preprint, arXiv:1604.00967v1, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. A. Deutsch, L. Sui, and V. Vianu. Specification and verification of data-driven web applications. JCSS, 73(3):442--474, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. V. Diekert and P. Gastin. Pure future local temporal logics are expressively complete for Mazurkiewicz traces. In LATIN 2004: Theoretical Informatics, 6th Latin American Symposium, Buenos Aires, Argentina, April 5--8, 2004, Proceedings, pages 232--241, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  28. V. Diekert and P. Gastin. Pure future local temporal logics are expressively complete for Mazurkiewicz traces. Inf. Comput., 204(11):1597--1619, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. E. A. Emerson. Temporal and modal logic. In J. V. Leeuwen, editor, Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics, pages 995--1072. North-Holland Pub. Co./MIT Press, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. C. E. Gerede, K. Bhattacharya, and J. Su. Static analysis of business artifact-centric operational models. In IEEE International Conference on Service-Oriented Computing and Applications, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. C. E. Gerede and J. Su. Specification and verification of artifact behaviors in business process models. In Proceedings of 5th International Conference on Service-Oriented Computing (ICSOC), Vienna, Austria, September 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. P. Habermehl. On the complexity of the linear-time μ-calculus for petri nets. In Application and Theory of Petri Nets 1997, pages 102--116. Springer, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. B. B. Hariri, D. Calvanese, G. De Giacomo, A. Deutsch, and M. Montali. Verification of relational data-centric dynamic systems with external services. In Proceedings of the 32nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2013, New York, NY, USA - June 22 - 27, 2013, pages 163--174, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. R. Hull, E. Damaggio, R. D. Masellis, F. Fournier, M. Gupta, F. H. III, S. Hobson, M. Linehan, S. Maradugu, A. Nigam, P. Sukaviriya, and R. Vaculín. Business artifacts with guard-stage-milestone lifecycles: Managing artifact interactions with conditions and events. In ACM DEBS, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. R. Kimball and M. Ross. The data warehouse toolkit: the complete guide to dimensional modeling. John Wiley & Sons, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. R. Lipton. The reachability problem requires exponential space. Research Report 62, Department of Computer Science, Yale University, New Haven, Connecticut, 1976.Google ScholarGoogle Scholar
  37. M. Marin, R. Hull, and R. Vaculın. Data centric bpm and the emerging case management standard: A short survey. In BPM Workshops, 2012.Google ScholarGoogle Scholar
  38. R. Mayr. Undecidable problems in unreliable computations. Theoretical Computer Science, 297(1):337--354, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. S. Narayanan and S. McIlraith. Simulation, verification and automated composition of web services. In Intl. World Wide Web Conf. (WWW2002), 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. A. Nigam and N. S. Caswell. Business artifacts: An approach to operational specification. IBM Systems Journal, 42(3):428--445, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. D. Peled. Combining partial order reductions with on-the-fly model-checking. In Computer aided verification, pages 377--390. Springer, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. E. L. Post. Recursive unsolvability of a problem of Thue. J. of Symbolic Logic, 12:1--11, 1947.Google ScholarGoogle ScholarCross RefCross Ref
  43. C. Rackoff. The covering and boundedness problems for vector addition systems. Theoretical Computer Science, 6(2):223--231, 1978.Google ScholarGoogle ScholarCross RefCross Ref
  44. M. Sipser. Introduction to the theory of computation. PWS Publishing Company, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. A. P. Sistla, M. Y. Vardi, and P. Wolper. The complementation problem for Büchi automata with applications to temporal logic. Theoretical Computer Science, 49:217--237, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. D. Solomakhin, M. Montali, S. Tessaris, and R. D. Masellis. Verification of artifact-centric systems: Decidability and modeling issues. In Service-Oriented Computing - 11th International Conference, ICSOC 2013, Berlin, Germany, December 2--5, 2013, Proceedings, pages 252--266, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. M. Spielmann. Verification of relational transducers for electronic commerce. JCSS., 66(1):40--65, 2003. Extended abstract in PODS 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. A. Tarski. A decision method for elementary algebra and geometry. 1948, 1951.Google ScholarGoogle Scholar
  49. M. Y. Vardi and P. Wolper. An automata-theoretic approach to automatic program verification. In LICS, 1986.Google ScholarGoogle Scholar
  50. P. Vassiliadis and T. Sellis. A survey of logical models for olap databases. ACM Sigmod Record, 28(4):64--69, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. X. Zhao, J. Su, H. Yang, and Z. Qiu. Enforcing constraints on life cycles of business artifacts. In TASE, pages 111--118, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. W.-D. Zhu et al. Advanced Case Management with IBM Case Manager. Available at: http://www.redbooks.ibm.com/abstracts/sg247929.html?Open.Google ScholarGoogle Scholar

Index Terms

  1. Verification of Hierarchical Artifact Systems

                              Recommendations

                              Comments

                              Login options

                              Check if you have access through your login credentials or your institution to get full access on this article.

                              Sign in
                              • Published in

                                cover image ACM Conferences
                                PODS '16: Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems
                                June 2016
                                504 pages
                                ISBN:9781450341912
                                DOI:10.1145/2902251
                                • General Chair:
                                • Tova Milo,
                                • Program Chair:
                                • Wang-Chiew Tan

                                Copyright © 2016 ACM

                                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                                Publisher

                                Association for Computing Machinery

                                New York, NY, United States

                                Publication History

                                • Published: 15 June 2016

                                Permissions

                                Request permissions about this article.

                                Request Permissions

                                Check for updates

                                Qualifiers

                                • research-article

                                Acceptance Rates

                                PODS '16 Paper Acceptance Rate31of94submissions,33%Overall Acceptance Rate642of2,707submissions,24%

                              PDF Format

                              View or Download as a PDF file.

                              PDF

                              eReader

                              View online with eReader.

                              eReader