• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Haibo, Zhan Dechen, Xu Xiaofei. Integration Verification of Workflow Business Rule Semantic[J]. Journal of Computer Research and Development, 2009, 46(7): 1143-1151.
Citation: Li Haibo, Zhan Dechen, Xu Xiaofei. Integration Verification of Workflow Business Rule Semantic[J]. Journal of Computer Research and Development, 2009, 46(7): 1143-1151.

Integration Verification of Workflow Business Rule Semantic

More Information
  • Published Date: July 14, 2009
  • Workflow model must be described correctly to guarantee successful execution at runtime. So verification technology of model is important and can be classified into syntactic, structural, and semantic. The strictest and highest-level verification is the semantic one which has not been solved well yet in the workflow research. Futhermore, correctness of control logic depends on business semantic, and is one of the influence factors on structual soundness. By analyzing business rules and their constraint parts described in workflow model, business rules semantic can be formalized to expression. So verifying semantic integrality of business rules can be converted into that of constraint sets. Constraint sets are used to decide which path is chosen to execute. If a constraint set described in a condition node in workflow model misses some semantics and expresses redundant or meaningless semantics, these can also cause erroneous structure, which is one of the important factors executing unsuccessfully. Domain of universe coverability theorem and decision-tree-based verification arithmetic are put forward to verify the semantic integrality of constraint sets, and then the structrual soundness of workflow model is ensured by this method. This verification technology is independent of specific modeling mothods, so that complete commonality, modeling-independentce, and wide applicability are the three advantages of this verification method.
  • Related Articles

    [1]Han Bing, Wang Hao, Fang Min, Zhang Yongchao, Zhou Lu, Ge Chunpeng. Data Integrity Verification Scheme For Lightweight Devices in Cloud Storage Scenarios[J]. Journal of Computer Research and Development, 2024, 61(10): 2467-2481. DOI: 10.7544/issn1000-1239.202440489
    [2]He Qiuyan, Deng Minghua. Survey of Universal Domain Adaptation[J]. Journal of Computer Research and Development, 2024, 61(1): 120-144. DOI: 10.7544/issn1000-1239.202220935
    [3]Fu Yao, Li Qingdan, Zhang Zehui, Gao Tiegang. Data Integrity Verification Scheme for Privacy Protection and Fair Payment[J]. Journal of Computer Research and Development, 2022, 59(6): 1343-1355. DOI: 10.7544/issn1000-1239.20210023
    [4]Xu Guangwei, Bai Yanke, Yan Cairong, Yang Yanbin, Huang Yongfeng. Check Algorithm of Data Integrity Verification Results in Big Data Storage[J]. Journal of Computer Research and Development, 2017, 54(11): 2487-2496. DOI: 10.7544/issn1000-1239.2017.20160825
    [5]Tan Shuang, He Li, Chen Zhikun, Jia Yan. A Method of Provable Data Integrity Based on Lattice in Cloud Storage[J]. Journal of Computer Research and Development, 2015, 52(8): 1862-1872. DOI: 10.7544/issn1000-1239.2015.20140610
    [6]Chen Wei, Xu Ruomei, Li Yuling. A Privacy-Preserving Integrity-Verification-Based Top-k Query Processing[J]. Journal of Computer Research and Development, 2014, 51(12): 2585-2592. DOI: 10.7544/issn1000-1239.2014.20140666
    [7]Shen Guohua, Zhang Wei, Huang Zhiqiu, Zhang Yulong, Jin Lantao, He Wenmin, Jia Zhe, Zhao Ziyue. Description-Logic-Based Feature Modeling and Verification[J]. Journal of Computer Research and Development, 2013, 50(7): 1501-1512.
    [8]Qian Zhenjiang, Liu Wei, and Huang Hao. OSOSM:Operating System Object Semantics Model and Formal Verification[J]. Journal of Computer Research and Development, 2012, 49(12): 2702-2712.
    [9]Li Bo, Li Jianxin, Hu Chunming, Wo Tianyu, and Huai Jinpeng. Software Integrity Verification Based on VMM-Level System Call Analysis Technique[J]. Journal of Computer Research and Development, 2011, 48(8): 1438-1446.
    [10]Xian Hequn, Feng Dengguo. An Integrity Checking Scheme in Outsourced Database Model[J]. Journal of Computer Research and Development, 2010, 47(6): 1107-1115.

Catalog

    Article views (868) PDF downloads (497) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return