Flexibility and Security of Careflow Systems Modeled by Petri Nets

Author(s):  
Boleslaw Mikolajczak

The purpose of this chapter is to present an interplay of two important structural and behavioral features of robust intelligence in careflow systems, called flexibility and multi-level security. The chapter deals with design and analysis of careflow systems, i.e. workflow systems with applications in broadly understood healthcare industry. The authors focus on providing a robust intelligence to such systems in a form of structural and behavioral flexibility. They analyze several forms of design and run-time flexibility. However, the authors focus on case handling systems, exception handling, and on careflow systems with sub-processes called worklets. They also present how to model multi-level security within careflow systems that already have desired forms of flexibility. This implies that flexibility and security are conceptually independent and can therefore be modeled with Petri nets separately and incrementally in sequential order, first flexibility and then security. The authors apply Petri nets and colored Petri nets as conceptual modeling tool. They use example of Cutaneous Melanoma (CM) to illustrate some of our considerations.

2006 ◽  
Vol 20 (10) ◽  
pp. 1527-1533 ◽  
Author(s):  
Feng Zhou ◽  
Rui-Feng Bo ◽  
Hong-Zhong Huang ◽  
Dan Ling ◽  
Qiang Miao

2015 ◽  
Vol 19 (5) ◽  
pp. 115-130
Author(s):  
L. W. Dworza´nski ◽  
I. A. Lomazova

Nested Petri nets (NP-nets) are an extension of Petri net formalism within the “netswithin-nets” approach, when tokens in a marking are Petri nets, which have an autonomous behavior and are synchronized with the system net. The formalism of NP-nets allows modeling multi-level multi-agent systems with dynamic structure in a natural way. Currently, there is no tool for supporting NP-nets simulation and analysis. The paper proposes the translation of NP-nets into Colored Petri nets and the use of CPN Tools as a virtual machine for NP-nets modeling, simulation and automatic verification.


2014 ◽  
Vol 35 (11) ◽  
pp. 2608-2614
Author(s):  
Xiang Gao ◽  
Yue-fei Zhu ◽  
Sheng-li Liu

Sign in / Sign up

Export Citation Format

Share Document