ABSTRACT
Data-driven workflows, of which IBM's Business Artifacts are a prime exponent, have been successfully deployed in practice, adopted in industrial standards, and have spawned a rich body of research in academia, focused primarily on static analysis. The present work represents a significant advance on the problem of artifact verification, by considering a much richer and more realistic model than in previous work, incorporating core elements of IBM's successful Guard-Stage-Milestone model. In particular, the model features task hierarchy, concurrency, and richer artifact data. It also allows database key and foreign key dependencies, as well as arithmetic constraints. The results show decidability of verification and establish its complexity, making use of novel techniques including a hierarchy of Vector Addition Systems and a variant of quantifier elimination tailored to our context.
- Expedia. www.expedia.com. Accessed: 2014--12--10.Google Scholar
- S. Abiteboul, V. Vianu, B. Fordham, and Y. Yesha. Relational transducers for electronic commerce. JCSS, 61(2):236--269, 2000. Extended abstract in PODS 98. Google ScholarDigital Library
- S. Basu, R. Pollak, and M.-F. Roy. On the number of cells defined by a family of polynomials on a variety. Mathematika, 43(1):120--126, 1996.Google ScholarCross Ref
- F. Belardinelli, A. Lomuscio, and F. Patrizi. A computationally-grounded semantics for artifact-centric systems and abstraction results. In IJCAI 2011, Proceedings of the 22nd International Joint Conference on Artificial Intelligence, Barcelona, Catalonia, Spain, July 16--22, 2011, pages 738--743, 2011. Google ScholarDigital Library
- F. Belardinelli, A. Lomuscio, and F. Patrizi. Verification of deployed artifact systems via data abstraction. In Service-Oriented Computing - 9th International Conference, ICSOC 2011, Paphos, Cyprus, December 5--8, 2011 Proceedings, pages 142--156, 2011. Google ScholarDigital Library
- F. Belardinelli, A. Lomuscio, and F. Patrizi. An abstraction technique for the verification of artifact-centric systems. In Principles of Knowledge Representation and Reasoning: Proceedings of the Thirteenth International Conference, KR 2012, Rome, Italy, June 10--14, 2012, 2012.Google Scholar
- F. Belardinelli, A. Lomuscio, and F. Patrizi. Verification of GSM-based artifact-centric systems through finite abstraction. In Service-Oriented Computing - 10th International Conference, ICSOC 2012, Shanghai, China, November 12--15, 2012. Proceedings, pages 17--31, 2012. Google ScholarDigital Library
- F. Belardinelli, A. Lomuscio, and F. Patrizi. Verification of agent-based artifact systems. J. Artif. Intell. Res. (JAIR), 51:333--376, 2014. Google ScholarDigital Library
- K. Bhattacharya, N. S. Caswell, S. Kumaran, A. Nigam, and F. Y. Wu. Artifact-centered operational modeling: Lessons from customer engagements. IBM Systems Journal, 46(4):703--721, 2007. Google ScholarDigital Library
- K. Bhattacharya et al. A model-driven approach to industrializing discovery processes in pharmaceutical research. IBM Systems Journal, 44(1):145--162, 2005. Google ScholarDigital Library
- K. Bhattacharya, C. E. Gerede, R. Hull, R. Liu, and J. Su. Towards formal analysis of artifact-centric business process models. In Proc. Int. Conf. on Business Process Management (BPM), pages 288--304, 2007. Google ScholarDigital Library
- BizAgi and Cordys and IBM and Oracle and SAP AG and Singularity (OMG Submitters) and Agile Enterprise Design and Stiftelsen SINTEF and TIBCO and Trisotech (Co-Authors). Case Management Model and Notation (CMMN), FTF Beta 1, Jan. 2013. OMG Document Number dtc/2013-01-01, Object Management Group.Google Scholar
- M. Blockelet and S. Schmitz. Model checking coverability graphs of vector addition systems. In Mathematical Foundations of Computer Science 2011, pages 108--119. Springer, 2011. Google ScholarDigital Library
- D. Calvanese, G. De Giacomo, and M. Montali. Foundations of data-aware process analysis: a database theory perspective. In PODS, pages 1--12, 2013. Google ScholarDigital Library
- D. Calvanese, G. Delzanno, and M. Montali. Verification of relational multiagent systems with data types. In Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, January 25--30, 2015, Austin, Texas, USA., pages 2031--2037, 2015. Google ScholarDigital Library
- D. Calvanese, G. D. Giacomo, R. Hull, and J. Su. Artifact-centric workflow dominance. In ICSOC/ServiceWave, pages 130--143, 2009. Google ScholarDigital Library
- T. Chao et al. Artifact-based transformation of IBM Global Financing: A case study. In BPM, 2009.Google Scholar
- E. Damaggio, A. Deutsch, and V. Vianu. Artifact systems with data dependencies and arithmetic. ACM Trans. Database Syst., 37(3):22, 2012. Also in ICDT 2011. Google ScholarDigital Library
- E. Damaggio, R. Hull, and R. Vaculín. On the equivalence of incremental and fixpoint semantics for business artifacts with guard-stage-milestone lifecycles. Information Systems, 38:561--584, 2013. Google ScholarDigital Library
- G. De Giacomo, R. D. Masellis, and R. Rosati. Verification of conjunctive artifact-centric services. Int. J. Cooperative Inf. Syst., 21(2):111--140, 2012.Google ScholarCross Ref
- G. De Giacomo and M. Y. Vardi. Linear temporal logic and linear dynamic logic on finite traces. In Proceedings of the Twenty-Third international joint conference on Artificial Intelligence, pages 854--860. AAAI Press, 2013. Google ScholarDigital Library
- H. de Man. Case management: Cordys approach. BP Trends (small www.bptrends.com), 2009.Google Scholar
- A. Deutsch, R. Hull, F. Patrizi, and V. Vianu. Automatic verification of data-centric business processes. In ICDT, pages 252--267, 2009. Google ScholarDigital Library
- A. Deutsch, R. Hull, and V. Vianu. Automatic verification of database-centric systems. SIGMOD Record, 43(3):5--17, 2014. Google ScholarDigital Library
- A. Deutsch, Y. Li, and V. Vianu. Verification of hierarchical artifact systems. arXiv preprint, arXiv:1604.00967v1, 2016. Google ScholarDigital Library
- A. Deutsch, L. Sui, and V. Vianu. Specification and verification of data-driven web applications. JCSS, 73(3):442--474, 2007. Google ScholarDigital Library
- V. Diekert and P. Gastin. Pure future local temporal logics are expressively complete for Mazurkiewicz traces. In LATIN 2004: Theoretical Informatics, 6th Latin American Symposium, Buenos Aires, Argentina, April 5--8, 2004, Proceedings, pages 232--241, 2004.Google ScholarCross Ref
- V. Diekert and P. Gastin. Pure future local temporal logics are expressively complete for Mazurkiewicz traces. Inf. Comput., 204(11):1597--1619, 2006. Google ScholarDigital Library
- E. A. Emerson. Temporal and modal logic. In J. V. Leeuwen, editor, Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics, pages 995--1072. North-Holland Pub. Co./MIT Press, 1990. Google ScholarDigital Library
- C. E. Gerede, K. Bhattacharya, and J. Su. Static analysis of business artifact-centric operational models. In IEEE International Conference on Service-Oriented Computing and Applications, 2007. Google ScholarDigital Library
- C. E. Gerede and J. Su. Specification and verification of artifact behaviors in business process models. In Proceedings of 5th International Conference on Service-Oriented Computing (ICSOC), Vienna, Austria, September 2007. Google ScholarDigital Library
- P. Habermehl. On the complexity of the linear-time μ-calculus for petri nets. In Application and Theory of Petri Nets 1997, pages 102--116. Springer, 1997. Google ScholarDigital Library
- B. B. Hariri, D. Calvanese, G. De Giacomo, A. Deutsch, and M. Montali. Verification of relational data-centric dynamic systems with external services. In Proceedings of the 32nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2013, New York, NY, USA - June 22 - 27, 2013, pages 163--174, 2013. Google ScholarDigital Library
- R. Hull, E. Damaggio, R. D. Masellis, F. Fournier, M. Gupta, F. H. III, S. Hobson, M. Linehan, S. Maradugu, A. Nigam, P. Sukaviriya, and R. Vaculín. Business artifacts with guard-stage-milestone lifecycles: Managing artifact interactions with conditions and events. In ACM DEBS, 2011. Google ScholarDigital Library
- R. Kimball and M. Ross. The data warehouse toolkit: the complete guide to dimensional modeling. John Wiley & Sons, 2011. Google ScholarDigital Library
- R. Lipton. The reachability problem requires exponential space. Research Report 62, Department of Computer Science, Yale University, New Haven, Connecticut, 1976.Google Scholar
- M. Marin, R. Hull, and R. Vaculın. Data centric bpm and the emerging case management standard: A short survey. In BPM Workshops, 2012.Google Scholar
- R. Mayr. Undecidable problems in unreliable computations. Theoretical Computer Science, 297(1):337--354, 2003. Google ScholarDigital Library
- S. Narayanan and S. McIlraith. Simulation, verification and automated composition of web services. In Intl. World Wide Web Conf. (WWW2002), 2002. Google ScholarDigital Library
- A. Nigam and N. S. Caswell. Business artifacts: An approach to operational specification. IBM Systems Journal, 42(3):428--445, 2003. Google ScholarDigital Library
- D. Peled. Combining partial order reductions with on-the-fly model-checking. In Computer aided verification, pages 377--390. Springer, 1994. Google ScholarDigital Library
- E. L. Post. Recursive unsolvability of a problem of Thue. J. of Symbolic Logic, 12:1--11, 1947.Google ScholarCross Ref
- C. Rackoff. The covering and boundedness problems for vector addition systems. Theoretical Computer Science, 6(2):223--231, 1978.Google ScholarCross Ref
- M. Sipser. Introduction to the theory of computation. PWS Publishing Company, 1997. Google ScholarDigital Library
- A. P. Sistla, M. Y. Vardi, and P. Wolper. The complementation problem for Büchi automata with applications to temporal logic. Theoretical Computer Science, 49:217--237, 1987. Google ScholarDigital Library
- D. Solomakhin, M. Montali, S. Tessaris, and R. D. Masellis. Verification of artifact-centric systems: Decidability and modeling issues. In Service-Oriented Computing - 11th International Conference, ICSOC 2013, Berlin, Germany, December 2--5, 2013, Proceedings, pages 252--266, 2013. Google ScholarDigital Library
- M. Spielmann. Verification of relational transducers for electronic commerce. JCSS., 66(1):40--65, 2003. Extended abstract in PODS 2000. Google ScholarDigital Library
- A. Tarski. A decision method for elementary algebra and geometry. 1948, 1951.Google Scholar
- M. Y. Vardi and P. Wolper. An automata-theoretic approach to automatic program verification. In LICS, 1986.Google Scholar
- P. Vassiliadis and T. Sellis. A survey of logical models for olap databases. ACM Sigmod Record, 28(4):64--69, 1999. Google ScholarDigital Library
- X. Zhao, J. Su, H. Yang, and Z. Qiu. Enforcing constraints on life cycles of business artifacts. In TASE, pages 111--118, 2009. Google ScholarDigital Library
- W.-D. Zhu et al. Advanced Case Management with IBM Case Manager. Available at: http://www.redbooks.ibm.com/abstracts/sg247929.html?Open.Google Scholar
Index Terms
- Verification of Hierarchical Artifact Systems
Recommendations
Verification of Hierarchical Artifact Systems
Best of EDBT 2017 and Regular PapersData-driven workflows, of which IBM’s Business Artifacts are a prime exponent, have been successfully deployed in practice, adopted in industrial standards, and have spawned a rich body of research in academia, focused primarily on static analysis. The ...
Artifact systems with data dependencies and arithmetic
ICDT '11: Proceedings of the 14th International Conference on Database TheoryWe revisit the static verification problem for data centric business processes, specified in a variant of IBM's "business artifact" model. Artifacts are records of variables that correspond to business-relevant objects and are updated by a set of ...
Verification of Artifact Lifecycle Model
CIS '14: Proceedings of the 2014 Tenth International Conference on Computational Intelligence and SecurityArtifact consists of information model and lifecycle. Artifact lifecycle defined by the business departments according to business rules and other relative constraints are used for business's compliance checks and process's real-time monitoring, so the ...
Comments