[HTML][HTML] Formal Verification of Business Constraints in Workflow-Based Applications

F Stoica, LF Stoica - Information, 2024 - mdpi.com
Workflows coordinate a series of computing tasks to create a sophisticated workflow logic.
Ensuring the correctness of a workflow specification is essential for automating business …

Stepwise structural verification of cyclic workflow models with acyclic decomposition and reduction of loops

Y Choi, P Kongsuwan, CM Joo, JL Zhao - Data & Knowledge Engineering, 2015 - Elsevier
Existence of cycles (or loops) is one of the main sources that make the analysis of workflow
models difficult. Several approaches of structural verification exist in the literature, but how to …

Petri net-based verification of security protocol implementation in software evolution

MAB Ahmadon, S Yamaguchi… - International Journal of …, 2018 - inderscienceonline.com
Implementation of security protocol in software plays an important role to protect the whole
system from vulnerabilities. In order to protect the system from new threats, software needs …

CLTSA: labelled transition system analyser with counting fluent support

G Regis, R Degiovanni, N D'Ippolito… - Proceedings of the 2017 …, 2017 - dl.acm.org
In this paper we present CLTSA (Counting Fluents Labelled Transition System Analyser), an
extension of LTSA (Labelled Transition System Analyser) that incorporates counting fluents …