Filters








30 Hits in 4.8 sec

Verifying Business Rules Using an SMT Solver for BPEL Processes

Ganna Monakova, Oliver Kopp, Frank Leymann, Simon Moser, Klaus Schäfers
2009 Business Process and Services Computing  
WS-BPEL is the standard for modelling executable business processes.  ...  This logical representation captures the relations between process variables and execution paths that allowproperties to be verified using Satisfiability Modulo Theory (SMT) solversunder constraints represented  ...  Such theories can be, for example, theoriesofarrays,lists andstrings[B + 06]. In addition, an SMT solver can be extendedwith newtheories as shown in [ND79] .  ... 
dblp:conf/bpsc/MonakovaKLMS09 fatcat:fezqhjbyjjadfnny5jkjvy22j4

Path Feasibility Analysis of BPEL Processes under Dead Path Elimination Semantics

Hongda WANG, Jianchun XING, Juelong LI, Qiliang YANG, Xuewei ZHANG, Deshuai HAN, Kai LI
2016 IEICE transactions on information and systems  
Finally, we solve these formulas with the help of Satisfiability Modulo Theory (SMT) solvers and the feasible paths of BPEL processes are obtained.  ...  Web Service Business Process Execution Language (BPEL) has become the de facto standard for developing instant serviceoriented workflow applications in open environment.  ...  Acknowledgments The authors are very grateful to the anonymous reviewers for their insightful remarks and helpful comments on an earlier draft.  ... 
doi:10.1587/transinf.2015edp7121 fatcat:w7k2z64vljedbjl3rloqg6bbkm

Improving control flow verification in a business process using an extended Petri net

Ganna Monakova, Oliver Kopp, Frank Leymann
2009 Central-European Workshop on Services and their Composition  
In a business process, control flow decisions are based on the evaluation of conditions. Thus, conditions must be considered for control flow verification.  ...  We outline a Petri net extension with predicate transitions, which are responsible for conditions evaluation based on the collected knowledge, and effect places, which contain fact tokens representing  ...  An Extension for Petri Nets The conditions constrain the execution of the business process.  ... 
dblp:conf/zeus/MonakovaKL09 fatcat:vg2wxlqv65fzfiumoepomvber4

Knowledge-Based Verification of Service Compositions -- An SMT Approach

Sven Walther, Heike Wehrheim
2013 2013 18th International Conference on Engineering of Complex Computer Systems  
As an underlying verification engine we use an SMT solver.  ...  In this paper, we present a verification technique for service compositions which makes use of this domain knowledge.  ...  ACKNOWLEDGMENTS We like to thank our domain experts Florian Stapel and Corinna Hallmann for numerous discussions on water supply networks.  ... 
doi:10.1109/iceccs.2013.14 dblp:conf/iceccs/WaltherW13 fatcat:z4mjtnyzubglpayzgrr6glkxcu

WSSMT: Towards the Automated Analysis of Security-Sensitive Services and Applications

Michele Barletta, Alberto Calvi, Silvio Ranise, Luca Vigano, Luca Zanetti
2010 2010 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing  
As a by-product, it is possible to re-use state-ofthe-art theorem-proving technology to mechanize the verification process.  ...  Given the importance of security-sensitive service applications, the development of techniques for their automated validation is growing.  ...  Since the source specification was BPEL, we have used the RBAC4BPEL framework proposed in [25] , which is an extension of the Role-Based Access Control (RBAC) [4] for BPEL processes.  ... 
doi:10.1109/synasc.2010.74 dblp:conf/synasc/BarlettaCRVZ10 fatcat:xxyzirhdsfgxbmj75rhesieypa

An LTL Semantics of Business Workflows with Recovery [article]

Luca Ferrucci, Marcello M. Bersani, Manuel Mazzara
2014 arXiv   pre-print
The working assumption is that such a lightweight approach would easily fit into processes that are already in place without the need for a radical change of procedures, tools and people's attitudes.  ...  We describe a business workflow case study with abnormal behavior management (i.e. recovery) and demonstrate how temporal logics and model checking can provide a methodology to iteratively revise the design  ...  All our tests were carried out by using Zot and the well and widely known Microsot Z3 SMT solver (Microsoft Research, 2009) .  ... 
arXiv:1406.1395v1 fatcat:fsineonql5cvnomxbtew6gskwi

Static Analysis of Infrastructure as Code: a Survey [article]

Michele Chiari
2022 arXiv   pre-print
The increasing use of Infrastructure as Code (IaC) in DevOps leads to benefits in speed and reliability of deployment operation, but extends to infrastructure challenges typical of software systems.  ...  We analyze and survey the current state of research in this respect by conducting a literature review on static analysis techniques for IaC.  ...  The process relies on user-supplied information describing the behavior of the modelled services, written in the Web Services Business Process Execution Lan- guage (WS-BPEL, or BPEL).  ... 
arXiv:2206.10344v1 fatcat:6cjvotgbkvhiveoxowx54idnsa

Challenges in Formal Methods for Testing and Verification of Cloud Computing Systems

Amjad Gawanme, Ahmad Alomari
2015 Scalable Computing : Practice and Experience  
For instance, several scheduling algorithms are being used for cloud frameworks, such as Hadoop for instance, that are found to suffer from scheduling failures.  ...  This could have been avoided if the schedular has been properly verified.  ...  In [54] , the authors used Interface Automata (IA) to model consistency of service and business processes in SaaS along with transformation rules and algorithm between Business Process Execution Language  ... 
doi:10.12694/scpe.v16i3.1104 fatcat:3paeyn7khzfh5jtadfnxdfiyla

Size Matters: Microservices Research and Applications [article]

Manuel Mazzara, Antonio Bucchiarone, Nicola Dragoni, Victor Rivera
2019 arXiv   pre-print
In this chapter we offer an overview of microservices providing the introductory information that a reader should know before continuing reading this book.  ...  In [56] we integrated dynamic and static type checking with the introduction of refinement types, verified via an SMT solver.  ...  The type checker prototype consists of a set of rules for the type system expressed in SMT Lib language.  ... 
arXiv:1904.03027v1 fatcat:2anbkw2mabhe3mseyfaerx6etm

Adaptation of Service Protocols Using Process Algebra and On-the-Fly Reduction Techniques [chapter]

Radu Mateescu, Pascal Poizat, Gwen Salaün
2008 Lecture Notes in Computer Science  
We use a process algebra to encode the adaptation problem, and propose on-the-fly exploration and reduction techniques to compute adaptor protocols.  ...  Software Adaptation has become a hot topic as a non-intrusive solution to work mismatch out using corrective pieces named adaptors.  ...  ACKNOWLEDGMENTS The authors would like to thank the TSE Associate Editor and the anonymous reviewers for their very useful comments during the review process, José Antonio Martín for his participation  ... 
doi:10.1007/978-3-540-89652-4_10 fatcat:g4hqxkz4qnekfh4iwg5oszla4m

Automated synthesis of local time requirement for service composition

Étienne André, Tian Huat Tan, Manman Chen, Shuang Liu, Jun Sun, Yang Liu, Jin Song Dong
2020 Journal of Software and Systems Modeling  
In this work, we use the BPEL modeling language, that aims at specifying Web services. We extend it with timing parameters, and equip it with a formal semantics.  ...  Then, we propose a fully automated approach to synthesize the response time requirement of component services modeled using BPEL, in the form of a constraint on the local response times.  ...  To make use of a set of services to achieve a business goal, service composition languages such as BPEL (Business Process Execution Language) [Alv+07] have been proposed.  ... 
doi:10.1007/s10270-020-00787-5 fatcat:5blfn2w3ljhx5ix6nqwq7etune

SMT-Based Abstract Parametric Temporal Planning [chapter]

Artur Niewiadomski, Wojciech Penczek
2015 Lecture Notes in Computer Science  
The paper extends Planics with a module for temporal planning, by extending the user query with an LT L k X formula specifying temporal aspects of world transformations in a plan.  ...  Our solution comes together with an example, an implementation, and experimental results.  ...  specifications, while [15] exploits SMT to verification of WS-BPEL specifications against business rules.  ... 
doi:10.1007/978-3-662-48650-4_4 fatcat:6kyhc2nsqfexvejznzssvfhbnq

A Survey on Workflow Satisfiability, Resiliency, and Related Problems [article]

Daniel Ricardo dos Santos, Silvio Ranise
2017 arXiv   pre-print
The WSP is inherently hard, but solutions to this problem have a practical application in reconciling business compliance and business continuity.  ...  The Workflow Satisfiability Problem (WSP) asks whether there exists an assignment of users to tasks in a workflow such that every task is executed and the policy is not violated.  ...  [39] presented an approach to verify security properties of an annotated business process model by automatically translating it into a process meta language and using SPIN 11 for verification.  ... 
arXiv:1706.07205v1 fatcat:r54f5z6ykvaojpleu6cjwqtmni

A component-based framework for certification of components in a cloud of HPC services

Allberson Bruno de Oliveira Dantas, Francisco Heron de Carvalho Junior, Luis Soares Barbosa
2020 Science of Computer Programming  
They are designed to inspect other components and verify them for different types of functional, non-functional and behavioral requirements.  ...  This paper presents a Verification-as-a-Service (VaaS) framework for component certification on HPC Shelf.  ...  Klai and Ochi address the problem of abstracting and verifying the correctness of integrating service-based business processes (SBPs) [74] .  ... 
doi:10.1016/j.scico.2019.102379 fatcat:edpmeirlxbdmzgl4gfp5tepoie

On the Feasibility of Byzantine Agreement to Secure Fog/Edge Data Management [chapter]

Ali Shoker, Houssam Yactine
2021 Advances in Information Security  
They are designed to inspect other components and verify them for different types of functional, non-functional and behavioral requirements.  ...  This paper presents a Verification-as-a-Service (VaaS) framework for component certification on HPC Shelf.  ...  Klai and Ochi address the problem of abstracting and verifying the correctness of integrating service-based business processes (SBPs) [74] .  ... 
doi:10.1007/978-3-030-57328-7_5 fatcat:7bbgcsplazb7bi2cjopwaxdql4
« Previous Showing results 1 — 15 out of 30 results