Abstract
This paper addresses the problem of describing and analysing internally consistent data within business process workflow specifications. We use Rodin platform for verifying the correctness of the Event-B models. These models we obtain from an ontology and an associated set of normative rules by applying mapping rules. The latter enable us to transform these specifications into Event-B modular artefacts. The resulting model, by virtue of the Event-B formalism, is very close to a typical loosely coupled component-based implementation of a business system workflow, but has the additional value of being amenable to theorem proving techniques to check and refine data representation with respect to process evolution. In this paper, we give a formal account of the design specifications defined by Event-B modules and perform verification and validation by using theorem proving techniques provided by Rodin platform.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
van der Aalst, W., van Hee, K.: Workflow Management: Models, Methods, and Systems. The MIT Press, Cambridge (2002)
Hepp, M., Roman, D.: An ontology framework for semantic business process management. In: Proceedings of the 8th International Conference Wirtschaftsinformatik Universitaetsverlag Karlsruhe (2007)
Liu, K.: Semiotics in Information Systems Engineering. Cambridge University Press, Cambridge (2000)
Poernomo, I., Umarov, T.: A mapping from normative requirements to event-b to facilitate verified data-centric business process management. In: Szmuc, T., Szpyrka, M., Zendulka, J. (eds.) CEE-SET 2009. LNCS, vol. 7054, pp. 136–149. Springer, Heidelberg (2012)
Back, R.-J.: Refinement calculus, part II: parallel and reactive programs. In: de Bakker, J.W., de Roever, W.-P., Rozenberg, G. (eds.) Stepwise Refinement of Distributed Systems. LNCS, vol. 430, pp. 67–93. Springer, Heidelberg (1990)
Abrial, J.-R., Métayer, C., Voisin, L.: Event-B language. RODIN Deliverable 3.2 (2005)
Dijkstra, E.: Guarded commands, nondeterminacy and formal derivation of program. Commun. ACM 18(8), 453–457 (1975)
Gurevich, Y., Kutter, P., Odersky, M., Thiele, L. (eds.): ASM 2000. LNCS, vol. 1912. Springer, Heidelberg (2000)
Wolfgang, R.: Petri Nets: An Introduction. Springer, Heidelberg (1985)
Poernomo, I., Umarov, T.: Implementing a sound mapping from normative requirements to event-b design blueprints using MDA. In: Proceedings of the 2012 International Conference on Software Engineering Research & Practice. CSREA Press (2012)
Kamun, R., Omarov, A., Umarov, T.: Business Requirements: Normative Approach to Behavior Modeling Proceedings of the 4th International Symposium on Business Modeling and Software Design (2014)
Jones, A., Sergot, M.: On the characterization of law and computer systems: the normative systems perspective. In: Meyer, J.-J.C., Wieringa, R.J. (eds.) Deontic Logic in Computer Science: Normative System Specification, pp. 275–307. Wiley, Chichester (1993)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Umarov, T., Kamun, R., Omarov, A., Altayev, S. (2015). Verification and Validation of Formal Data-Centric Business Models. In: Horne, R. (eds) Embracing Global Computing in Emerging Economies. EGC 2015. Communications in Computer and Information Science, vol 514. Springer, Cham. https://doi.org/10.1007/978-3-319-25043-4_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-25043-4_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25042-7
Online ISBN: 978-3-319-25043-4
eBook Packages: Computer ScienceComputer Science (R0)