Automating correctness verification of artifact-centric business process models

Artifact-centric business process models are fully automatically verified.Two correctness notions are verified: reachability and weak termination.The models integrate pre and postconditions defining the behavior of the services.Verification of numerical data, even for models formed by several artifacts.Novel verification algorithms check the correctness, offering precise diagnosis. ContextThe artifact-centric methodology has emerged as a new paradigm to support business process management over the last few years. This way, business processes are described from the point of view of the artifacts that are manipulated during the process. ObjectiveOne of the research challenges in this area is the verification of the correctness of this kind of business process models where the model is formed of various artifacts that interact among them. MethodIn this paper, we propose a fully automated approach for verifying correctness of artifact-centric business process models, taking into account that the state (lifecycle) and the values of each artifact (numerical data described by pre and postconditions) influence in the values and the state of the others. The lifecycles of the artifacts and the numerical data managed are modeled by using the Constraint Programming paradigm, an Artificial Intelligence technique. ResultsTwo correctness notions for artifact-centric business process models are distinguished (reachability and weak termination), and novel verification algorithms are developed to check them. The algorithms are complete: neither false positives nor false negatives are generated. Moreover, the algorithms offer precise diagnosis of the detected errors, indicating the execution causing the error where the lifecycle gets stuck. ConclusionTo the best of our knowledge, this paper presents the first verification approach for artifact-centric business process models that integrates pre and postconditions, which define the behavior of the services, and numerical data verification when the model is formed of more than one artifact. The approach can detect errors not detectable with other approaches.

[1]  Wil M. P. van der Aalst,et al.  Workflow Verification: Finding Control-Flow Errors Using Petri-Net-Based Techniques , 2000, Business Process Management.

[2]  Alin Deutsch,et al.  Artifact systems with data dependencies and arithmetic , 2012, TODS.

[3]  Andreas Meyer,et al.  Weak Conformance of Process Models with respect to Data Objects , 2012, ZEUS.

[4]  José Miguel Pérez-Álvarez,et al.  Compliance validation and diagnosis of business data constraints in business processes at runtime , 2015, Inf. Syst..

[5]  Anil Nigam,et al.  Business artifacts: An approach to operational specification , 2003, IBM Syst. J..

[6]  Peter C. Cheeseman,et al.  Where the Really Hard Problems Are , 1991, IJCAI.

[7]  Dirk Fahland,et al.  Conformance Checking of Interacting Processes with Overlapping Instances , 2011, BPM.

[8]  Niels Lohmann Compliance by design for artifact-centric business processes , 2013, Inf. Syst..

[9]  Ahmed Awad,et al.  Diagnosing and Repairing Data Anomalies in Process Models , 2009, Business Process Management Workshops.

[10]  Richard Hull,et al.  Business Artifacts: A Data-centric Approach to Modeling Business Operations and Processes , 2009, IEEE Data Eng. Bull..

[11]  Mathias Weske,et al.  Business Process Management: Concepts, Languages, Architectures , 2007 .

[12]  Alin Deutsch,et al.  Automatic verification of data-centric business processes , 2009, ICDT '09.

[13]  Robert M. Haralick,et al.  Increasing Tree Search Efficiency for Constraint Satisfaction Problems , 1979, Artif. Intell..

[14]  Jianwen Su,et al.  Static Analysis of Business Artifact-centric Operational Models , 2007, IEEE International Conference on Service-Oriented Computing and Applications (SOCA '07).

[15]  Rik Eshuis,et al.  Splitting GSM Schemas: A Framework for Outsourcing of Declarative Artifact Systems , 2013, BPM.

[16]  Alessio Lomuscio,et al.  Verifying GSM-Based Business Artifacts , 2012, 2012 IEEE 19th International Conference on Web Services.

[17]  Rik Eshuis,et al.  Diagnosing correctness of semantic workflow models , 2013, Data Knowl. Eng..

[18]  Andreas Meyer,et al.  Modeling and Enacting Complex Data Dependencies in Business Processes , 2013, BPM.

[19]  Krzysztof R. Apt,et al.  Principles of constraint programming , 2003 .

[20]  Rik Eshuis,et al.  An integer programming based approach for verification and diagnosis of workflows , 2010, Data Knowl. Eng..

[21]  Peter Jeavons,et al.  Classifying the Complexity of Constraints Using Finite Algebras , 2005, SIAM J. Comput..

[22]  Jianwen Su,et al.  Specification and Verification of Artifact Behaviors in Business Process Models , 2007, ICSOC.

[23]  Pascal Van Hentenryck Constraint satisfaction in logic programming , 1989, Logic programming.

[24]  Goetz Graefe,et al.  A survey of B-tree logging and recovery techniques , 2012, ACM Trans. Database Syst..

[25]  Wil M. P. van der Aalst,et al.  The Application of Petri Nets to Workflow Management , 1998, J. Circuits Syst. Comput..

[26]  Jan Mendling,et al.  Beyond soundness: on the verification of semantic business process models , 2010, Distributed and Parallel Databases.

[27]  Richard Hull,et al.  Artifact-Centric Business Process Models: Brief Survey of Research Results and Challenges , 2008, OTM Conferences.

[28]  María Teresa Gómez López,et al.  Data State Description for the Migration to Activity-Centric Business Process Model Maintaining Legacy Databases , 2014, BIS.

[29]  Alessio Lomuscio,et al.  Verification of GSM-Based Artifact-Centric Systems through Finite Abstraction , 2012, ICSOC.

[30]  Alberto Trombetta,et al.  BPMN: An introduction to the standard , 2012, Comput. Stand. Interfaces.