Reusing a Declarative Specification to Check the Conformance of Different CIGs

نویسندگان

  • María Adela Grando
  • Wil M. P. van der Aalst
  • R. S. Mans
چکیده

Several Computer Interpretable Guidelines (CIGs) languages have been proposed by the health community. Even though these CIG languages share common ideas each language has to be provided with his own mechanism of verification. In an earlier work we have shown that a DECLARE model can be used for checking the conformance of a PROforma CIG. In this paper, we show that the same model can also be used for checking the conformance of a similar CIG expressed in the GLIF language. Besides, as the GLIF model has been expressed in terms of a Coloured Petri Net (CPN), we also elaborate on the experiences obtained when applying the model checking techniques supported by CPN tools.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A-Priori Verification of Web Services with Abduction

Although stemming from very different research areas, MultiAgent Systems (MAS) and Service Oriented Computing (SOC) share common topics, problems and settings. A common problem is the need to formally verify the conformance of individuals (Agents or Web Services) to common rules and specifications (resp. Protocols/Choreographies), in order to provide a coherent behaviour and to reach the user’s...

متن کامل

DecSerFlow: Towards a Truly Declarative Service Flow Language

The need for process support in the context of web services has triggered the development of many languages, systems, and standards. Industry has been developing software solutions and proposing standards such as BPEL, while researchers have been advocating the use of formal methods such as Petri nets and π-calculus. The languages developed for service flows, i.e., process specification languag...

متن کامل

Not-Quite-So-Broken TLS: Lessons in Re-Engineering a Security Protocol Specification and Implementation

Transport Layer Security (TLS) implementations have a history of security flaws. The immediate causes of these are often programming errors, e.g. in memory management, but the root causes are more fundamental: the challenges of interpreting the ambiguous prose specification, the complexities inherent in large APIs and code bases, inherently unsafe programming choices, and the impossibility of d...

متن کامل

2 Specifying and Monitoring Service Flows : Making Web Services Process - Aware

BPEL has emerged as the de-facto standard for implementing processes based on web services while formal languages like Petri nets have been proposed as an “academic response” allowing for all kinds of analysis. Although languages such as BPEL and Petri nets can be used to describe service flows, they both tend to “overspecify” the process and this does not fit well with the autonomous nature of...

متن کامل

Specifying and Monitoring Service Flows: Making Web Services Process-Aware

BPEL has emerged as the de-facto standard for implementing processes based on web services while formal languages like Petri nets have been proposed as an “academic response” allowing for all kinds of analysis. Although languages such as BPEL and Petri nets can be used to describe service flows, they both tend to “overspecify” the process and this does not fit well with the autonomous nature of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011