Proceedings of the 2019 Federated Conference on Computer Science and Information Systems 2019
DOI: 10.15439/2019f168
|View full text |Cite
|
Sign up to set email alerts
|

Towards Data Quality Runtime Verification

Abstract: This paper discusses data quality checking during business process execution by using runtime verification. While runtime verification verifies the correctness of business process execution, data quality checks assure that particular process did not negatively impact the stored data. Both, runtime verification and data quality checks run in parallel with the base processes affecting them insignificantly. The proposed idea allows verifying (a) if the process was ended correctly as well as (b) whether the result… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…These properties can be related to the system's control ŕow, data ŕow, or other aspects of its behavior. Runtime veriőcation can also be applied to check constraints concerning stored data such as data range and data type constraints [24], data consistency constraints, data transformation or manipulation constraints [13], data security constraints [12], and real-time data constraints. One approach to checking constraints over stored data is to use a runtime monitor [3,12] to observe the execution of the system and check for violations of the constraints.…”
Section: Hardware-assisted Techniquesmentioning
confidence: 99%
“…These properties can be related to the system's control ŕow, data ŕow, or other aspects of its behavior. Runtime veriőcation can also be applied to check constraints concerning stored data such as data range and data type constraints [24], data consistency constraints, data transformation or manipulation constraints [13], data security constraints [12], and real-time data constraints. One approach to checking constraints over stored data is to use a runtime monitor [3,12] to observe the execution of the system and check for violations of the constraints.…”
Section: Hardware-assisted Techniquesmentioning
confidence: 99%
“…Teixeira et al [34] studied the properties of a runtime verificationspecified API and wrote a minimalist specification language. Bicevskis et al [35] discuss data quality checking during the execution of a business process by using runtime verification. Lee et al [36] developed an effective model-checking method for IoT system operation verification.…”
Section: Runtime Verificationmentioning
confidence: 99%
“…To conduct this survey the authors defined a hypothesis that "there is a direct relation between business outcomes and data quality factors". To know the impact of data quality in the business process, a runtime data quality verification mechanism has been discussed [42]. This mechanism checks data quality in two aspects that the business process completed well with the provided data and whether the completed process affect the stored data negatively.…”
Section: Background and Related Workmentioning
confidence: 99%