Modeling and Correctness Repair for Collaborative Business Processes
Author:
Affiliation:

Fund Project:

National Natural Science Foundation of China (61862065, 61702442, 61662085); Application Basic Research Project in Yunnan Province (2018FB105); Open Foundation of Key Laboratory for Software Engineering of Yunnan Province (2017 SE201, 2016SE202); Yunnan Province Young Academic and Technical Leaders Funds for Training (C6143002); Project of Yunnan Provincial Department of Education Science Research Fund (2017ZZX227); Basic Research Project in Yunnan Province (2020 01BB050031)

  • Article
  • | |
  • Metrics
  • |
  • Reference [43]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    There are usually inconsistencies in collaborative business processes established by the bottom-up modeling method, so the correctness analysis is an important means to ensure its correct implementation. Most of the existing methods focus on correctness detection, which makes the analysis process of correctness of collaborative business processes complicated and time consuming. The correctness repairing method can avoid the duplicate detection and adjustment existing in the correctness detection method. However, this method is less researched and cannot be effectively applied to the repair of collaborative business processes. To this end, a method of repairing the correctness of collaborative business processes is proposed based on the complete route. First, the behaviors of partial correct collaborative business processes are abstracted into complete simple routes under the consideration of active synchronization and asynchronous interaction, and merged them into a core. Then, the coordination mapping is used to map the core to repaired business processes, and the repaired collaborative business process is established by combining all the repaired business processes concurrently. The repaired collaborative business process conforms to the actual characteristics of collaborative business processes, and contains all complete traces in the pre-repair collaborative business process, and no hidden traces are also introduced, thereby avoiding validation. Finally, experiments are used to compare the proposed method with the existing methods. The results show that compared with the existing work, under the consideration of the actual characteristics of collaborative business processes, the proposed approach can more effectively repair collaborative business processes.

    Reference
    [1] Lu YH, Ming Z, Zhang L. Collaboration patterns of business process. Computer Integrated Manufacturer Systems, 2011,17(8):1570-1579(in Chinese with English abstract).
    [2] Sill A. Cloud, data, and business process standards for manufacturing. IEEE Cloud Computing, 2016,3(4):74-80.
    [3] Yousfi A, Freitas AD, Dey A, et al. The use of ubiquitous computing for business process improvement. IEEE Trans. on Services Computing, 2016,9(4):621-632.
    [4] Li Y, Luo ZL, Yin JW, et al. Enterprise pattern:integrating the business process into a unified enterprise model of modern service company. Enterprise Information Systems, 2017,11(1):1-21.
    [5] Yu WY, Yan CG, Ding ZJ, et al. Modeling and verification of online shopping business processes by considering malicious behavior patterns. IEEE Trans. on Automation Science and Engineering, 2016,13(2):647-662.
    [6] Mo Q, Dai F, Zhu R, et al. An approach to extract public process from private process for building business collaboration. Journal of Computer Research and Development, 2017,54(9):1892-1908(in Chinese with Engliash abstract).
    [7] Aalst W, Lohmann N, Massuthe P, et al. From public views to private view correctness by design for services. In:Proc. of the 4th Int'l Workshop on Web Service and Formal Methods. LNCS 4937, Berlin:Springer-Verlag, 2007. 139-153.
    [8] Aalst W, Weske M. The P2P Approach to Interorganizational Workflows. Berlin:Springer-Verlag, 2013.
    [9] Aalst W. Modeling and analyzing interorganizational workflows. In:Proc of the 1st Int'l Conf. on Application of Concurrency to System Design. Los Alamitos:IEEE Computer Society, 1998. 262-272.
    [10] Zeng QT, Lu FM, Liu C, et al. Modeling and verification for cross-department collaborative business processes using extended Petri nets. IEEE Trans. on Systems, Man, and Cybernetics:Systems, 2015,45(2):349-362.
    [11] Lohmann N. Compliance by design for artifact-centric business processes. Information Systems, 2013,38(4):606-618.
    [12] Lohmann N. Compliance by design for artifact-centric business processes. In:Proc of the 9th Int'l Conf. on Business Process Management. Berlin:Springer-Verlag, 2011. 99-115.
    [13] Zheng M, Mo Q, Zhou XX, et al. Compatibility detection and correction of collaborative business process. Journal of Frontiers of Computer Science and Technology, 2017,11(12):1907-1921(in Chinese with English abstract).
    [14] Fahland D, Aalst W. Repairing process models to reflect reality. LNCS, 2012,7481:229-245.
    [15] Fahland D, Aalst W. Model repair-aligning process models to reality. Information Systems, 2015,47(1):220-243.
    [16] Zhang J, Wang HY, Cui LZ. Research on cross-organization workflow modeling based on Pi-calculus. Journal of Computer Research and Development, 2007,44(7):1243-1251(in Chinese with English abstract).
    [17] Aalst W. Process Mining:Discovery, Conformance and Enhancement of Business Processes. Berlin:Springer-Verlag, 2011.
    [18] Milner R. Communication and Concurrency. London:Prentice Hall, 1989.
    [19] Glabbeek RJV. The linear time-branching time spectrum. LNCS, 1990,3(1):278-297.
    [20] Hopcroft JE, Ullman JD. Introduction to Automata Theory, Languages and Computation. Boston:Addison Wesley, 1979.
    [21] Cortadella J, Kishinevsky M, Lavagno L, et al. Deriving Petri nets from finite transition systems. IEEE Trans. on Computers, 1998, 47(8):859-882.
    [22] Borkowski M, Fdhila W, Nardelli M, et al. Event-based failure prediction in distributed business processes. Information Systems, 2017.[doi:1016/j.is.2017.12.005]
    [23] Zhang L, Lu YH, Xu FQ. Unified modeling and analysis of collaboration business process based on Petri nets and Pi calculus. IET Software, 2010,4(5):303-317.
    [24] Xiao FX, Huang ZQ, Cao ZN, et al. Describing and cost analyzing of Web services composition using PPA. Journal of Computer Research and Development, 2009,46(5):832-840(in Chinese with English abstract).
    [25] Norta A, Eshuis R. Specification and verification of harmonized business-process collaborations. Information Systems Frontiers, 2010,12(4):457-479.
    [26] Liu GJ, Jiang CJ. Net-structure-based conditions to decide compatibility and weak compatibility for a class of inter-organizational workflow nets. Science China Information Sciences, 2015,58(7):1-16.
    [27] Corradini F, Polini A, Re B. Inter-organizational business process verification in public administration. Business Process Management Journal, 2015,21(5):1040-1065.
    [28] Kheldoun A, Barkaoui K, Ioualalen M. Formal verification of complex business processes based on high-level Petri nets. Information Sciences, 2017,385-386:39-54.
    [29] Mendoza LE, Capel MI, Rez M, et al. Conceptual framework for business processes compositional verification. Information & Software Technology, 2012,54(2):149-161.
    [30] Rai GN, Gangadharan GR, Padmanabhan V, et al. Web service interaction modeling and verification using recursive. IEEE Trans. on Services Computing, 2018.[doi:10.1109/TSC.2018:2789454]
    [31] Camara J, Salaün J, Canal C, et al. Interactive specification and verification of behavioral adaptation contracts. Information & Software Technology, 2012,54(7):701-723.
    [32] Daclin N. Enabling model checking for collaborative process analysis:From BPMN to network of timed automata. Enterprise Information Systems, 2014,9(3):279-299.
    [33] Daclin N, Daclin SM, Chapurlat V, et al. Writing and verifying interoperability requirements:Application to collaborative processes. Computers in Industry, 2016,82:1-18.
    [34] Martinez-Araiza U, Lopez-Mellado E. CTL model repair for inter-organizational business processes modelled as oWFN. IFAC-PapersOnLine, 2016,49(2):6-11.
    [35] Sun YN, Du YY, Li MZ. A repair of workflow models based on mirroring matrices. Int'l Journal of Parallel Programming, 2016, 45(4):1-20.
    [36] Tan W, Fan YS, Zhou MC. A Petri net-based method for compatibility analysis and composition of Web services in business process execution language. IEEE Trans. on Automation Science and Engineering, 2009,6(1):94-106.
    [37] Du Y, Tan W, Zhou MC. Timed compatibility analysis of Web service composition:A modular approach based on Petri nets. IEEE Trans. on Automation Science & Engineering, 2014,11(2):594-606.
    附中文参考文献:
    [1] 卢亚辉,明仲,张力.业务过程协同模式的研究.计算机集成制造系统,2011,17(8):1570-1579.
    [6] 莫启,代飞,朱锐,等.从私有过程提取公共过程构建业务协同的方法.计算机研究与发展,2017,9(54):1892-1908.
    [13] 郑明,莫启,周小煊,等.协同业务过程的相容性检测及修正.计算机科学与探索,2017,11(12):1907-1921.
    [16] 张静,王海洋,崔立真.基于Pi演算的跨组织工作流建模研究.计算机研究与发展,2007,44(7):1243-1251.
    [24] 肖芳雄,黄志球,曹子宁,等.基于价格进程代数的Web服务组合描述和成本分析.计算机研究与发展,2009,46(5):832-840.
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

莫启,代飞,笪建,朱锐,谢仲文,李彤.协同业务过程的建模及正确性修正.软件学报,2020,31(10):3147-3166

Copy
Share
Article Metrics
  • Abstract:1861
  • PDF: 5118
  • HTML: 1693
  • Cited by: 0
History
  • Received:May 09,2018
  • Revised:September 18,2018
  • Online: April 21,2020
  • Published: October 06,2020
You are the first2033297Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063