Enforcing Data-Aware Business Processes Using Execution Path-Oriented Strategies
Since the data-aware business process usually covers the control flow and data flow, and both of them have a direct impact on its execution, it is challenging to ensure its correctness. In this article, we propose a novel correctness enforcement approach for the data-aware business the processes. Gi...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on systems, man, and cybernetics. Systems man, and cybernetics. Systems, 2024-11, Vol.54 (11), p.6708-6722 |
---|---|
Hauptverfasser: | , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 6722 |
---|---|
container_issue | 11 |
container_start_page | 6708 |
container_title | IEEE transactions on systems, man, and cybernetics. Systems |
container_volume | 54 |
creator | Mo, Qi Wang, Jianeng Jiang, Yi Xie, Zhongwen Wang, Wei Liu, Cong Dai, Fei |
description | Since the data-aware business process usually covers the control flow and data flow, and both of them have a direct impact on its execution, it is challenging to ensure its correctness. In this article, we propose a novel correctness enforcement approach for the data-aware business the processes. Given a data-aware business process, this approach first relies on the notion of the execution paths to capture all the parts of it that can be executed correctly. More specifically, it first splits the data-aware business process into a set of the execution paths, and then presents the notion of well-formedness to determine whether each execution path is correct. Based on these captured correct execution paths, an execution path-oriented strategy is generated, which is nonintrusive, and can enforce it to follow one of its correct execution paths during each execution, thereby realizing its correct execution. This approach is evaluated using the extensive experiments, which shows that it is effective and efficient, as well as scalable in practice. |
doi_str_mv | 10.1109/TSMC.2024.3427838 |
format | Article |
fullrecord | <record><control><sourceid>crossref_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TSMC_2024_3427838</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10637994</ieee_id><sourcerecordid>10_1109_TSMC_2024_3427838</sourcerecordid><originalsourceid>FETCH-LOGICAL-c148t-3737a691617cda05b236732a55ad0330cba00eb583d87988328368b3e838d34a3</originalsourceid><addsrcrecordid>eNpNkF9LwzAUxYMoOOY-gOBDv0DnTW6bpI9zzj8wWWHbc0nT2xnRVpIM9du7siE-nfNwzoHzY-yaw5RzKG4365f5VIDIppgJpVGfsZHgUqdCoDj_81xeskkIbwDAhZYIcsTKRdf23rpul9ybaNLZl_GU3O2D6yiEpPS9PSiFZBuGzOKb7D66vktKE1_TlXfURWqSdfQm0s5RuGIXrXkPNDnpmG0fFpv5U7pcPT7PZ8vU8kzHFBUqIwsuubKNgbwWKBUKk-emAUSwtQGgOtfYaFVojUKj1DXS4V2DmcEx48dd6_sQPLXVp3cfxv9UHKqBSjVQqQYq1YnKoXNz7Dgi-peXqIoiw1-12l11</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Enforcing Data-Aware Business Processes Using Execution Path-Oriented Strategies</title><source>IEEE Electronic Library (IEL)</source><creator>Mo, Qi ; Wang, Jianeng ; Jiang, Yi ; Xie, Zhongwen ; Wang, Wei ; Liu, Cong ; Dai, Fei</creator><creatorcontrib>Mo, Qi ; Wang, Jianeng ; Jiang, Yi ; Xie, Zhongwen ; Wang, Wei ; Liu, Cong ; Dai, Fei</creatorcontrib><description>Since the data-aware business process usually covers the control flow and data flow, and both of them have a direct impact on its execution, it is challenging to ensure its correctness. In this article, we propose a novel correctness enforcement approach for the data-aware business the processes. Given a data-aware business process, this approach first relies on the notion of the execution paths to capture all the parts of it that can be executed correctly. More specifically, it first splits the data-aware business process into a set of the execution paths, and then presents the notion of well-formedness to determine whether each execution path is correct. Based on these captured correct execution paths, an execution path-oriented strategy is generated, which is nonintrusive, and can enforce it to follow one of its correct execution paths during each execution, thereby realizing its correct execution. This approach is evaluated using the extensive experiments, which shows that it is effective and efficient, as well as scalable in practice.</description><identifier>ISSN: 2168-2216</identifier><identifier>EISSN: 2168-2232</identifier><identifier>DOI: 10.1109/TSMC.2024.3427838</identifier><identifier>CODEN: ITSMFE</identifier><language>eng</language><publisher>IEEE</publisher><subject>Aerospace electronics ; Business ; Business Process Execution Language ; Correctness ; Data models ; data-aware business process ; execution path ; execution path-oriented strategy ; Petri net ; Petri nets ; Process control ; System recovery</subject><ispartof>IEEE transactions on systems, man, and cybernetics. Systems, 2024-11, Vol.54 (11), p.6708-6722</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c148t-3737a691617cda05b236732a55ad0330cba00eb583d87988328368b3e838d34a3</cites><orcidid>0000-0002-5999-2126 ; 0000-0002-3438-5303 ; 0000-0001-6469-357X ; 0009-0006-5268-0513</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10637994$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>315,781,785,797,27929,27930,54763</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10637994$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Mo, Qi</creatorcontrib><creatorcontrib>Wang, Jianeng</creatorcontrib><creatorcontrib>Jiang, Yi</creatorcontrib><creatorcontrib>Xie, Zhongwen</creatorcontrib><creatorcontrib>Wang, Wei</creatorcontrib><creatorcontrib>Liu, Cong</creatorcontrib><creatorcontrib>Dai, Fei</creatorcontrib><title>Enforcing Data-Aware Business Processes Using Execution Path-Oriented Strategies</title><title>IEEE transactions on systems, man, and cybernetics. Systems</title><addtitle>TSMC</addtitle><description>Since the data-aware business process usually covers the control flow and data flow, and both of them have a direct impact on its execution, it is challenging to ensure its correctness. In this article, we propose a novel correctness enforcement approach for the data-aware business the processes. Given a data-aware business process, this approach first relies on the notion of the execution paths to capture all the parts of it that can be executed correctly. More specifically, it first splits the data-aware business process into a set of the execution paths, and then presents the notion of well-formedness to determine whether each execution path is correct. Based on these captured correct execution paths, an execution path-oriented strategy is generated, which is nonintrusive, and can enforce it to follow one of its correct execution paths during each execution, thereby realizing its correct execution. This approach is evaluated using the extensive experiments, which shows that it is effective and efficient, as well as scalable in practice.</description><subject>Aerospace electronics</subject><subject>Business</subject><subject>Business Process Execution Language</subject><subject>Correctness</subject><subject>Data models</subject><subject>data-aware business process</subject><subject>execution path</subject><subject>execution path-oriented strategy</subject><subject>Petri net</subject><subject>Petri nets</subject><subject>Process control</subject><subject>System recovery</subject><issn>2168-2216</issn><issn>2168-2232</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkF9LwzAUxYMoOOY-gOBDv0DnTW6bpI9zzj8wWWHbc0nT2xnRVpIM9du7siE-nfNwzoHzY-yaw5RzKG4365f5VIDIppgJpVGfsZHgUqdCoDj_81xeskkIbwDAhZYIcsTKRdf23rpul9ybaNLZl_GU3O2D6yiEpPS9PSiFZBuGzOKb7D66vktKE1_TlXfURWqSdfQm0s5RuGIXrXkPNDnpmG0fFpv5U7pcPT7PZ8vU8kzHFBUqIwsuubKNgbwWKBUKk-emAUSwtQGgOtfYaFVojUKj1DXS4V2DmcEx48dd6_sQPLXVp3cfxv9UHKqBSjVQqQYq1YnKoXNz7Dgi-peXqIoiw1-12l11</recordid><startdate>202411</startdate><enddate>202411</enddate><creator>Mo, Qi</creator><creator>Wang, Jianeng</creator><creator>Jiang, Yi</creator><creator>Xie, Zhongwen</creator><creator>Wang, Wei</creator><creator>Liu, Cong</creator><creator>Dai, Fei</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-5999-2126</orcidid><orcidid>https://orcid.org/0000-0002-3438-5303</orcidid><orcidid>https://orcid.org/0000-0001-6469-357X</orcidid><orcidid>https://orcid.org/0009-0006-5268-0513</orcidid></search><sort><creationdate>202411</creationdate><title>Enforcing Data-Aware Business Processes Using Execution Path-Oriented Strategies</title><author>Mo, Qi ; Wang, Jianeng ; Jiang, Yi ; Xie, Zhongwen ; Wang, Wei ; Liu, Cong ; Dai, Fei</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c148t-3737a691617cda05b236732a55ad0330cba00eb583d87988328368b3e838d34a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Aerospace electronics</topic><topic>Business</topic><topic>Business Process Execution Language</topic><topic>Correctness</topic><topic>Data models</topic><topic>data-aware business process</topic><topic>execution path</topic><topic>execution path-oriented strategy</topic><topic>Petri net</topic><topic>Petri nets</topic><topic>Process control</topic><topic>System recovery</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mo, Qi</creatorcontrib><creatorcontrib>Wang, Jianeng</creatorcontrib><creatorcontrib>Jiang, Yi</creatorcontrib><creatorcontrib>Xie, Zhongwen</creatorcontrib><creatorcontrib>Wang, Wei</creatorcontrib><creatorcontrib>Liu, Cong</creatorcontrib><creatorcontrib>Dai, Fei</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE transactions on systems, man, and cybernetics. Systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Mo, Qi</au><au>Wang, Jianeng</au><au>Jiang, Yi</au><au>Xie, Zhongwen</au><au>Wang, Wei</au><au>Liu, Cong</au><au>Dai, Fei</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Enforcing Data-Aware Business Processes Using Execution Path-Oriented Strategies</atitle><jtitle>IEEE transactions on systems, man, and cybernetics. Systems</jtitle><stitle>TSMC</stitle><date>2024-11</date><risdate>2024</risdate><volume>54</volume><issue>11</issue><spage>6708</spage><epage>6722</epage><pages>6708-6722</pages><issn>2168-2216</issn><eissn>2168-2232</eissn><coden>ITSMFE</coden><abstract>Since the data-aware business process usually covers the control flow and data flow, and both of them have a direct impact on its execution, it is challenging to ensure its correctness. In this article, we propose a novel correctness enforcement approach for the data-aware business the processes. Given a data-aware business process, this approach first relies on the notion of the execution paths to capture all the parts of it that can be executed correctly. More specifically, it first splits the data-aware business process into a set of the execution paths, and then presents the notion of well-formedness to determine whether each execution path is correct. Based on these captured correct execution paths, an execution path-oriented strategy is generated, which is nonintrusive, and can enforce it to follow one of its correct execution paths during each execution, thereby realizing its correct execution. This approach is evaluated using the extensive experiments, which shows that it is effective and efficient, as well as scalable in practice.</abstract><pub>IEEE</pub><doi>10.1109/TSMC.2024.3427838</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0002-5999-2126</orcidid><orcidid>https://orcid.org/0000-0002-3438-5303</orcidid><orcidid>https://orcid.org/0000-0001-6469-357X</orcidid><orcidid>https://orcid.org/0009-0006-5268-0513</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2168-2216 |
ispartof | IEEE transactions on systems, man, and cybernetics. Systems, 2024-11, Vol.54 (11), p.6708-6722 |
issn | 2168-2216 2168-2232 |
language | eng |
recordid | cdi_crossref_primary_10_1109_TSMC_2024_3427838 |
source | IEEE Electronic Library (IEL) |
subjects | Aerospace electronics Business Business Process Execution Language Correctness Data models data-aware business process execution path execution path-oriented strategy Petri net Petri nets Process control System recovery |
title | Enforcing Data-Aware Business Processes Using Execution Path-Oriented Strategies |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-14T12%3A51%3A20IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Enforcing%20Data-Aware%20Business%20Processes%20Using%20Execution%20Path-Oriented%20Strategies&rft.jtitle=IEEE%20transactions%20on%20systems,%20man,%20and%20cybernetics.%20Systems&rft.au=Mo,%20Qi&rft.date=2024-11&rft.volume=54&rft.issue=11&rft.spage=6708&rft.epage=6722&rft.pages=6708-6722&rft.issn=2168-2216&rft.eissn=2168-2232&rft.coden=ITSMFE&rft_id=info:doi/10.1109/TSMC.2024.3427838&rft_dat=%3Ccrossref_RIE%3E10_1109_TSMC_2024_3427838%3C/crossref_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=10637994&rfr_iscdi=true |