Using Workflow Patterns to Model and Validate Service Requirements

Author(s):  
Ye Wang ◽  
Bo Jiang ◽  
Ting Wang
Keyword(s):  



2009 ◽  
pp. 3557-3558 ◽  
Author(s):  
W. M. P. van der Aalst
Keyword(s):  


Author(s):  
Vitus S. W. Lam

Originating from a pragmatic need to document strategies for modelling recurrent business scenarios, collections of workflow patterns have been proposed in the business process management community. The concrete applications of these workflow patterns in forward engineering have been extensively explored. Conversely, the core concern of business process archaeology is on recovering business process models from legacy systems utilizing reverse engineering methods. Little attention is given to the relationship between business process recovery and workflow patterns. This chapter aims to give a compact introduction to workflow control-flow patterns, workflow data patterns, workflow exception patterns, and service interaction patterns. In particular, the feasibility of combining workflow patterns with business process archaeology is examined by drawing on the research results of the MARBLE framework.



Author(s):  
Sami Bhiri ◽  
Walid Gaaloul ◽  
Claude Godart ◽  
Olivier Perrin ◽  
Maciej Zaremba ◽  
...  

Web services are defined independently of any execution context. Due to their inherent autonomy and heterogeneity, it is difficult to examine the behaviour of composite services, especially in case of failures. This paper is interested in ensuring composite services reliability. Reliable composition is defined as a composition where all instance executions are correct from a transactional and business point of view. In this paper, the authors propose a transactional approach for ensuring reliable Web service compositions. The approach integrates the expressivity power of workflow models and the reliability of Advanced Transactional Models (ATM). This method offers flexibility for designers to specify their requirements in terms of control structure, using workflow patterns, and execution correctness. Contrary to ATM, the authors start from the designers’ specifications to define the appropriate transactional mechanisms that ensure correct executions according to their requirements.



2019 ◽  
Vol 39 ◽  
pp. e6
Author(s):  
S. Olds ◽  
S. Geelhood ◽  
L. Crecraft ◽  
E. Rhead ◽  
P. Haydock


Sign in / Sign up

Export Citation Format

Share Document