Early Detection of Temporal Constraint Violations

Authors Isaac Mackey , Raghubir Chimni , Jianwen Su



PDF
Thumbnail PDF

File

LIPIcs.TIME.2022.4.pdf
  • Filesize: 0.94 MB
  • 16 pages

Document Identifiers

Author Details

Isaac Mackey
  • University of California, Santa Barbara, CA, USA
Raghubir Chimni
  • University of California, Santa Barbara, CA, USA
Jianwen Su
  • University of California, Santa Barbara, CA, USA

Cite As Get BibTex

Isaac Mackey, Raghubir Chimni, and Jianwen Su. Early Detection of Temporal Constraint Violations. In 29th International Symposium on Temporal Representation and Reasoning (TIME 2022). Leibniz International Proceedings in Informatics (LIPIcs), Volume 247, pp. 4:1-4:16, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2022) https://doi.org/10.4230/LIPIcs.TIME.2022.4

Abstract

Software systems rely on events for logging, system coordination, handling unexpected situations, and more. Monitoring events at runtime can ensure that a business service system complies with policies, regulations, and business rules. Notably, detecting violations of rules as early as possible is much desired as it allows the system to reclaim resources from erring service enactments. We formalize a model for events and a logic-based rule language to specify temporal and data constraints. The primary goal of this paper is to develop techniques for detecting each rule violation as soon as it becomes inevitable. We further develop optimization techniques to reduce monitoring overhead. Finally, we implement a monitoring algorithm and experimentally evaluate it to demonstrate our approach to early violation detection is beneficial and effective for processing service enactments.

Subject Classification

ACM Subject Classification
  • Information systems → Information systems applications
Keywords
  • temporal constraints
  • monitoring
  • events
  • early violation detection

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. S. Abiteboul, R. Hull, and V. Vianu. Foundations of Databases. Addison-Wesley, 1995. Google Scholar
  2. Howard Barringer, Ylies Falcone, Bernd Finkbeiner, Klaus Havelund, Insup Lee, Gordon Pace, Grigore Rosu, Oleg Sokolsky, and Nikolai Tillmann. Runtime Verification: First International Conference, RV 2010, St. Julians, Malta, November 1-4, 2010. Proceedings, volume 6418. Springer, 2010. Google Scholar
  3. David Basin, Felix Klaedtke, Samuel Müller, and Eugen Zălinescu. Monitoring metric first-order temporal properties. Journal of the ACM (JACM), 62(2):1-45, 2015. Google Scholar
  4. Andreas Bauer, Martin Leucker, and Christian Schallhart. Comparing ltl semantics for runtime verification. Journal of Logic and Computation, 20(3):651-674, 2010. Google Scholar
  5. Saoussen Cheikhrouhou, Slim Kallel, Nawal Guermouche, and Mohamed Jmaiel. On enabling time-aware consistency of collaborative cross-org. business processes. In ICSOC 2014, pages 351-358. Springer, 2014. Google Scholar
  6. Carlo Combi and Roberto Posenato. Towards temporal controllabilities for workflow schemata. In TIME 2010, pages 129-136. IEEE, 2010. Google Scholar
  7. Riccardo De Masellis, Fabrizio M Maggi, and Marco Montali. Monitoring data-aware business constraints with finite state automata. In Proceedings of the 2014 International Conference on Software and System Process, pages 134-143, 2014. Google Scholar
  8. Riccardo De Masellis and Jianwen Su. Runtime enforcement of first-order ltl properties on data-aware business processes. In International Conference on Service-Oriented Computing, pages 54-68. Springer, 2013. Google Scholar
  9. Christophe Dousson and Pierre Le Maigat. Chronicle recognition improvement using temporal focusing and hierarchization. In IJCAI, volume 7, pages 324-329, 2007. Google Scholar
  10. Johann Eder, Marco Franceschetti, and Julius Köpke. Controllability of business processes with temporal variables. In Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, pages 40-47, 2019. Google Scholar
  11. Ashish Gupta, Inderpal Singh Mumick, and Venkatramanan Siva Subrahmanian. Maintaining views incrementally. ACM SIGMOD Record, 22(2):157-166, 1993. Google Scholar
  12. Klaus Havelund and Grigore Rosu. Monitoring programs using rewriting. In ASE 2001, pages 135-143. IEEE, 2001. Google Scholar
  13. Luke Hunsberger and Roberto Posenato. Sound-and-complete algorithms for checking the dynamic controllability of conditional simple temporal networks with uncertainty. In 25th International Symposium on Temporal Representation and Reasoning (TIME 2018). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, 2018. Google Scholar
  14. Linh Thao Ly, Fabrizio Maria Maggi, Marco Montali, Stefanie Rinderle-Ma, and Wil MP Van Der Aalst. Compliance monitoring in business processes: Functionalities, application, and tool-support. Information systems, 54:209-234, 2015. Google Scholar
  15. Isaac Mackey and Jianwen Su. Mapping business rules to ltl formulas. In ICSOC 2019, pages 563-565, 2019. Google Scholar
  16. Isaac Mackey and Jianwen Su. Mapping singly-linked, acyclic rules to linear temporal logic formulas. In submission, 2022. Google Scholar
  17. Fabrizio Maria Maggi, Marco Montali, and Ubaier Bhat. Compliance monitoring of multi-perspective declarative process models. In 2019 IEEE 23rd International Enterprise Distributed Object Computing Conference (EDOC), pages 151-160. IEEE, 2019. Google Scholar
  18. Fabrizio Maria Maggi, Marco Montali, Michael Westergaard, and Wil MP Van Der Aalst. Monitoring business constraints with linear temporal logic: An approach based on colored automata. In International Conference on Business Process Management, pages 132-147. Springer, 2011. Google Scholar
  19. Fabrizio Maria Maggi, Michael Westergaard, Marco Montali, and Wil MP van der Aalst. Runtime verification of ltl-based declarative process models. In International Conference on Runtime Verification, pages 131-146. Springer, 2011. Google Scholar
  20. Alessandro Margara, Emanuele Della Valle, Alexander Artikis, Nesime Tatbul, and Helge Parzyjegla, editors. International Conference on Distributed and Event-Based Systems. ACM, ACM, 2021. Google Scholar
  21. Marco Montali, Federico Chesani, Paola Mello, and Fabrizio M Maggi. Towards data-aware constraints in declare. In Proceedings of the 28th annual ACM symposium on applied computing, pages 1391-1396, 2013. Google Scholar
  22. Marco Montali, Fabrizio M Maggi, Federico Chesani, Paola Mello, and Wil MP van der Aalst. Monitoring business constraints with the event calculus. ACM TIST 2014, 5(1):1-30, 2014. Google Scholar
  23. Milos Nikolic, Mohammad Dashti, and Christoph Koch. How to win a hot dog eating contest: Distributed incremental view maintenance with batch updates. In Proceedings of the 2016 International Conference on Management of Data, pages 511-526, 2016. Google Scholar
  24. Peter Z Revesz. A closed-form evaluation for datalog queries with integer (gap)-order constraints. Theoretical Computer Science, 116(1):117-149, 1993. Google Scholar
  25. Gabriel Siqueria. Log generator. https://github.com/GabrielSiq/LogGenerator, 2020.
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail