2008
DOI: 10.1016/j.entcs.2008.04.044
|View full text |Cite
|
Sign up to set email alerts
|

Simulation and Formal Analysis of Workflow Models

Abstract: We present a framework for the simulation and formal analysis of workflow models. We discuss (i) how a workflow model, implemented in the BPEL language, can be transformed into a dataflow network model, (ii) how potentially incorrect execution paths can be incorporated, and (iii) how the properties of a workflow can be formally verified using the SPIN model checker. For the several model transformation steps from workflow to analysis models, we use graph transformations.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2008
2008
2015
2015

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(12 citation statements)
references
References 6 publications
(6 reference statements)
0
12
0
Order By: Relevance
“…The page with the activity binding appears to accept the variables passed from the URL, the user operates on this page, notifies the workflow engine after the operation completed, this activity completes, the task flows to the next activity. (7) According to the definition of process model, the workflow engine carries out the follow-up activity of flow instance. In concrete processing, the pages such as applying page, examining and approving page etc.…”
Section: Design Of Business System Web-basedmentioning
confidence: 99%
See 1 more Smart Citation
“…The page with the activity binding appears to accept the variables passed from the URL, the user operates on this page, notifies the workflow engine after the operation completed, this activity completes, the task flows to the next activity. (7) According to the definition of process model, the workflow engine carries out the follow-up activity of flow instance. In concrete processing, the pages such as applying page, examining and approving page etc.…”
Section: Design Of Business System Web-basedmentioning
confidence: 99%
“…A common workflow model is based on state diagram or network activity diagram, more intuitive, easy to understand, but it can not handle the complex process logic, lacks flexible [4,7]. Petri net has a great advantage to descript phenomena of concurrency, conflict, synchronous and asynchronous etc., takes formal steps and a strict theory as the foundation for system analysis, and is a good modeling tool, which is applied in workflow net.…”
Section: A Workflow Modelmentioning
confidence: 99%
“…A first step towards a framework for modelling and analysing security and trust for services includes trust management and static analysis techniques for cryptoprotocols [26,36], security issues on shared space coordination languages [20], secure service composition [1], techniques for ensuring constraints on interfaces between services [29], and autonomic security mechanisms [23]. The results for control resource usage by services range from a flow logic for resource access control [20] and model checking properties of workflow processes [24] to type systems for confining movements of data and processes [13] and for composing incomplete software components [2].…”
Section: Discussionmentioning
confidence: 99%
“…An automated approach supported by a ProM framework allows detecting violations from workflow event logs using Linear Temporal Logic (LTL) checkers is proposed in [5]. The authors in [6] propose a method to check correctness properties of workflows implemented in Business Process Execution Language (BPEL). It maps the BPEL to dataflow network and the dataflow network is mapped to a ProMeLa model.…”
Section: Introductionmentioning
confidence: 99%
“…The increasing frequency of changing rules requires business processes to adopt an automatic compliance checking. Different approaches have been proposed for the verification of some properties in different models [5][6][7][8][9][10][11][12][13]. An automated approach supported by a ProM framework allows detecting violations from workflow event logs using Linear Temporal Logic (LTL) checkers is proposed in [5].…”
Section: Introductionmentioning
confidence: 99%