Data Consistency Enforcement on Business Process Transactions

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7759)


Transactions are common in business processes (BPs). Consistency on data, which is defined as satisfaction of a set of data integrity constraints, is one of the basic properties for business process transactions (BPTs). This requires a BPT to bring the BP execution from one consistent state to another consistent state. It is desirable to ensure within BP executions that every BPT preserves data consistency. Besides, the earlier an inconsistency is detected the less recovery is necessary. It is studied in this paper how to detect and recover from potential future inconsistency as early as possible in a BPT execution. We propose a runtime proactive mechanism enforcing consistency on BPTs, called “transaction consistency guarding”, based on symbolic execution of BPEL scopes for bounded length and correct design of fault and compensation handlers.


Business Process Integrity Constraint Symbolic Execution Database Transaction Very Large Data Base 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Benedikt, M., Griffin, T., Libkin, L.: Verifiable properties of database transactions. In: Proc. of Symposium on Principles of Database Systems (PODS), pp. 117–127 (1996)Google Scholar
  2. 2.
    Butler, M., Hoare, S.T., Ferreira, C.: A Trace Semantics for Long-Running Transactions. In: Abdallah, A.E., Jones, C.B., Sanders, J.W. (eds.) CSP 25. LNCS, vol. 3525, pp. 133–150. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  3. 3.
    Ceri, S., Widom, J.: Deriving production rules for constraint maintainance. In: Proc. Int. Conf. on Very Large Data Bases (VLDB), pp. 566–577 (1990)Google Scholar
  4. 4.
    Deutsch, A., Hull, R., Patrizi, F., Vianu, V.: Automatic verification of data-centric business processes. In: Proc. of Int. Conf. on Database Theory (ICDT), pp. 252–267 (2009)Google Scholar
  5. 5.
    Fu, X., Bultan, T., Su, J.: Model checking XML manipulating software. In: Proc. Int. symposium on Software Testing and Analysis (ISSTA), pp. 252–262 (2004)Google Scholar
  6. 6.
    Garcia-Molina, H., Salem, K.: Sagas. In: Proc. of Int. Conf. on Management of data (SIGMOD), pp. 249–259 (1987)Google Scholar
  7. 7.
    Greenfield, P., Fekete, A., Jang, J., Kuo, D.: Compensation is not enough. In: Proc. of Int. Conf. on Enterprise Distributed Object Computing (EDOC), pp. 232–239 (2003)Google Scholar
  8. 8.
    Grefen, P., Widom, J.: Protocols for integrity constraint checking in federated databases. Distrib. Parallel Databases 5, 327–355 (1997)CrossRefGoogle Scholar
  9. 9.
    Gupta, A., Widom, J.: Local verification of global integrity constraints in distributed databases. In: Proc. of Int. Conf. on Management of Data (SIGMOD), pp. 49–58 (1993)Google Scholar
  10. 10.
    Kopp, O., Khalaf, R., Leymann, F.: Deriving explicit data links in WS-BPEL processes. In: Proc. of Int. Conf. on Services Computing (SCC), pp. 367–376 (2008)Google Scholar
  11. 11.
    Liu, X., Su, J., Yang, J.: Preservation of integrity constraints by workflow. In: Proc. of Int. Conf. on Cooperative Information Systems (CoopIS), pp. 64–81 (2011)Google Scholar
  12. 12.
    Lohmann, N.: A Feature-Complete Petri Net Semantics for WS-BPEL 2.0. In: Dumas, M., Heckel, R. (eds.) WS-FM 2007. LNCS, vol. 4937, pp. 77–91. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  13. 13.
    Qiu, Z., Wang, S., Pu, G., Zhao, X.: Semantics of BPEL4WS-like fault and compensation handling. In: Proc. of Int. Conf. on Formal Methods, pp. 350–365 (2005)Google Scholar
  14. 14.
    Ramakrishnan, R., Gehrke, J.: Database Management Systems, 3rd edn. McGraw-Hill (2002)Google Scholar
  15. 15.
    Wang, R., Salzberg, B., Lomet, D.: Log-based middleware server recovery with transaction support. The VLDB Journal, 1–24 (2010)Google Scholar
  16. 16.
    Amme, W., Martens, A., Moser, S.: Advanced verification of distributed WS-BPEL business processes incorporating CSSA-based data flow analysis. Int. Journal of Business Process Integration and Management 4(1), 47–59 (2009)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Xi Liu
    • 1
  1. 1.State Key Laboratory for Novel Software Technology at Nanjing University, Department of Computer Science and TechnologyNanjing UniversityChina

Personalised recommendations