Proceedings Fourth International Enterprise Distributed Objects Computing Conference. EDOC2000
DOI: 10.1109/edoc.2000.882357
|View full text |Cite
|
Sign up to set email alerts
|

Model checking of workflow schemas

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 42 publications
(28 citation statements)
references
References 13 publications
0
26
0
Order By: Relevance
“…Detecting and repairing errors at run time, when the workflow is deployed, is very expensive and time consuming. Therefore, a critical challenge in workflow modeling lies in the design-time verification of workflow models [1,5,6,11,15,19,24,32,33,36].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Detecting and repairing errors at run time, when the workflow is deployed, is very expensive and time consuming. Therefore, a critical challenge in workflow modeling lies in the design-time verification of workflow models [1,5,6,11,15,19,24,32,33,36].…”
Section: Introductionmentioning
confidence: 99%
“…Several authors have recognized this problem, and, starting with Sadiq and Orlowska [33], have defined approaches for analyzing workflow models [1,5,6,11,15,19,24,32,36]. The approaches typically detect two types of errors [33].…”
Section: Introductionmentioning
confidence: 99%
“…Even Dynamic DLs [13], which are capable of modeling transition systems with states corresponding to DL knowledge bases, are not flexible enough to express rich constraints on the data level. Some other verification formalisms, of a more suitable, data-oriented flavor, have been proposed for verification of data-driven systems [14], knowledge base programs [15], or workflow schemas [16]. However, the central motivation behind their design is to enable representation of all permissable data-altering operations over a fixed data language, with the aim of studying general properties of programs composed of such operations.…”
Section: Related Workmentioning
confidence: 99%
“…Specifically, model checking has been applied to models for software process [28], requirements [9], architecture [21,22], detailed design [1,25], and implementation [26,12,24].…”
Section: Formal Security Architecturesmentioning
confidence: 99%