Data functions, datalog and negation
SIGMOD '88 Proceedings of the 1988 ACM SIGMOD international conference on Management of data
A transaction-based approach to relational database specification
Journal of the ACM (JACM)
The Z notation: a reference manual
The Z notation: a reference manual
Local verification of global integrity constraints in distributed databases
SIGMOD '93 Proceedings of the 1993 ACM SIGMOD international conference on Management of data
Constraint checking with partial information
PODS '94 Proceedings of the thirteenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
Dependency preservation in semantic databases
Acta Informatica
Verifiable properties of database transactions
PODS '96 Proceedings of the fifteenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
Protocols for Integrity Constraint Checking in FederatedDatabases
Distributed and Parallel Databases
Calculating constraints on relational expression
ACM Transactions on Database Systems (TODS)
Guarded commands, nondeterminacy and formal derivation of programs
Communications of the ACM
Foundations of Databases: The Logical Level
Foundations of Databases: The Logical Level
A Toolkit for Constraint Management in Heterogeneous Information Systems
ICDE '96 Proceedings of the Twelfth International Conference on Data Engineering
Deriving Production Rules for Constraint Maintainance
VLDB '90 Proceedings of the 16th International Conference on Very Large Data Bases
Business artifacts: An approach to operational specification
IBM Systems Journal
Automatic construction of simple artifact-based business processes
Proceedings of the 12th International Conference on Database Theory
Towards formal analysis of artifact-centric business process models
BPM'07 Proceedings of the 5th international conference on Business process management
Document Engineering: Analyzing and Designing Documents for Business Informatics and Web Services
Document Engineering: Analyzing and Designing Documents for Business Informatics and Web Services
Automated realization of business workflow specification
ICSOC/ServiceWave'09 Proceedings of the 2009 international conference on Service-oriented computing
Introducing the guard-stage-milestone approach for specifying business entity lifecycles
WS-FM'10 Proceedings of the 7th international conference on Web services and formal methods
Proceedings of the 5th ACM international conference on Distributed event-based system
BPM'11 Proceedings of the 9th international conference on Business process management
Hi-index | 0.00 |
Integrity constraints on data are typically defined when workflow and business process models are developed. Keeping data consistent is vital for workflow execution. Traditionally, enforcing data integrity constraints is left for the underlying database system, while workflow system focuses primarily on performing tasks. This paper presents a new mechanism that turns a workflow into an equivalent one that will preserve integrity constraints. For a given workflow schema (or model) and a given set of data integrity constraints, an algorithm developed in this paper injects additional conditions into the workflow schema that restricts possible execution paths. The modified workflow will guarantee data consistency (i.e., satisfaction of the integrity constraints) whenever the workflow updates the database(s). In addition, we show that our injection mechanism is "conservative complete", i.e., the conditions inserted are weakest possible. By making workflow execution self-behaving, enforcing integrity constraints over multi-databases is avoided, and constraints specific to a workflow can also be enforced effectively. Mechanisms such as this enhance independence of workflow executions from the environment--a much desired property.