<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Evaluating Compliance: From LTL to Abductive Logic Programming</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Marco Montali</string-name>
          <email>montali@inf.unibz.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Federico Chesani</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marco Gavanelli</string-name>
          <email>g@unibo.it</email>
          <email>g@unife.it</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Evelina Lamma</string-name>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Paola Mello</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Ferrara</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Free University of Bozen-Bolzano Piazza Domenicani 3</institution>
          ,
          <addr-line>39100</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Bologna V.le Risorgimento 2</institution>
          ,
          <addr-line>40136</addr-line>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>University of Ferrara Via Saragat 1</institution>
          ,
          <addr-line>44122</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>The compliance veri cation task amounts to establishing if the execution of a system, given in terms of observed events, does respect a given property. In the past both the frameworks of Temporal Logics and Logic Programming have been extensively exploited to assess compliance. In this work we review the LTL and the Abductive Logic Programming frameworks in the light of compliance evaluation, and formally investigate the relationship between the two approaches. We de ne a notion of compliance within each approach, and then we show that an arbitrary LTL formula can be expressed in SCIFF, by providing an automatic translation procedure from LTL to SCIFF which preserves compliance.</p>
      </abstract>
      <kwd-group>
        <kwd>Linear Temporal Logic</kwd>
        <kwd>Abductive Logic Programming</kwd>
        <kwd>Compliance Veri cation</kwd>
        <kwd>Business Process Management</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Linear Temporal Logic (LTL) [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] speci cations are traditionally used for
expressing the properties that a reactive system should exhibit (or avoid), and are
exploited by model checking tools for formal veri cation (e.g., [
        <xref ref-type="bibr" rid="ref15 ref9">15,9</xref>
        ]). Recently,
LTL has been also used to describe the system under study itself, in elds like
Business Process Management (BPM) and Service Oriented Computing (SOC):
e.g., the DECLARE system [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] and the ConDec language [
        <xref ref-type="bibr" rid="ref20 ref23">23,20</xref>
        ] adopt LTL to
model business processes, business rules and policies.
      </p>
      <p>
        In these domains, a relevant task is to assess compliance, usually de ned as
checking if an implementation faithfully meets the requirements of a speci
cation. The LTL models correspond to linear Kripke structures representing the
execution traces (i.e., sequences of events) occurred during a speci c
instantiation of the system, while entailment becomes a compliance evaluator w.r.t. a
regulatory speci cation expressed as an LTL formula. Such approach has been
used, for example, in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] for static compliance veri cation of BPMN business
processes, and in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] for auditing event logs.
      </p>
      <p>
        Recently, Logic Programming (LP) based approaches have been applied for
speci cation and veri cation of normative systems [
        <xref ref-type="bibr" rid="ref14 ref5">5,14</xref>
        ], web services [
        <xref ref-type="bibr" rid="ref25 ref7">25,7</xref>
        ]
and business processes as well [
        <xref ref-type="bibr" rid="ref11 ref20">11,20</xref>
        ]. The LP framework nicely meets the
advantages of a declarative, rst-order speci cation, grounded on a model-based
semantics, and equipped with an operational proof procedure. Abductive Logic
Programming (ALP, [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]), in particular, integrates abductive reasoning into LP,
supporting an hypothesis-making mechanism.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] we have de ned the abductive proof procedure named SCIFF, originally
developed for speci cation and veri cation of open societies of \computees" (a
sort of agents), and later applied to normative systems [
        <xref ref-type="bibr" rid="ref4 ref8">4,8</xref>
        ], web service
interaction [
        <xref ref-type="bibr" rid="ref21 ref3">3,21</xref>
        ] and BPM [
        <xref ref-type="bibr" rid="ref20 ref22">22,20</xref>
        ]. SCIFF speci cations are given in terms of integrity
constraints linking occurring events to expectations about the future course of
events, and the declarative semantics has been given in terms of compliance of
a given trace with respect to a SCIFF speci cation.
      </p>
      <p>
        In this paper we investigate the relation between the LTL-based approach
and the SCIFF framework, showing that if we focus on the compliance task,
an LTL model can be (formally and correctly) translated into a SCIFF one.
Starting from the seminal work in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] about Separated Normal Forms (SNF)
for LTL formulae, we de ne proper mapping functions and show how any LTL
formula can be expressed within the SCIFF formalism. Then, we formally de ne
the notion of compliance in both the approaches, we identify a tight equivalence
relation, and we prove how such equivalence is indeed maintained when moving
from the LTL approach to the SCIFF-based one.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Linear Temporal Logic</title>
      <p>
        In this section, we provide a brief introduction to (propositional) Linear-time
Temporal Logic (LTL), in particular w.r.t. the notion of compliance; the
interested reader can refer to [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] for a more general introduction.
      </p>
      <p>
        LTL formulae are built up from atomic propositions, whose truth values
change over time. The LTL time structure F , also called frame, models a single,
linear timeline; formally, F is a totally ordered set (K ; ) [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>De nition 1 (LTL model). Let P be the set of all atomic propositions in the
system. An LTL model M for P is a triple (K ; ; v) where v : P ! 2K is a
function which maps each proposition in P to the set of time instants at which
the proposition holds.</p>
      <p>We are interested in systems characterized by dynamics consisting of a stream
of events. In this respect, each proposition represents a possible event that may
occur in an instance of the system. More speci cally, a proposition e 2 P is
true in a certain state if at that state the event denoted by e occurs. Under this
interpretation, LTL models correspond to execution traces.</p>
      <sec id="sec-2-1">
        <title>De nition 2 (LTL execution trace). Given a set E of atomic propositions</title>
        <p>(representing possible events), an LTL execution trace TL is an LTL model
having (N; &lt;) as time structure and E as the set of atomic propositions. In
particular, TL = (N; &lt;; vocc), where vocc : E ! 2N is a valuation function mapping each
event e 2 E to the set of all time instants i 2 N at which e occurs.
We will use the following abbreviations: TL(i) will denote the i-th state of TL,
i.e. the subset fe 2 E j i 2 vocc(e)g.
2.1</p>
      </sec>
      <sec id="sec-2-2">
        <title>Syntax of LTL</title>
        <p>LTL formulae are de ned by using (i) atomic propositions, i.e., events, together
with the two special constants true and f alse; (ii) classical propositional
connectives, i.e., :, ^, _ and ); (iii) temporal operators, i.e., (next time), U
(until), (eventually), (globally) and W (weak until). An LTL formula is
recursively de ned as: each event e 2 E is a formula; if ' and are formulae,
then :', ' ^ , , and 'U are formulae. Other LTL formulae can be de ned
as abbreviations:
{ ' _ , :(:' ^ : ) and ' ) , :' _ ;
{ true , :' _ ' and f alse , :true;
{ ' , trueU ', ' , : :' and W' ,
U ' _
.
2.2</p>
      </sec>
      <sec id="sec-2-3">
        <title>Semantics of LTL and Compliance</title>
        <p>The semantics of LTL is given w.r.t. an LTL execution trace, and w.r.t. a speci c
state. We will use j=L to denote the logical entailment in the LTL setting.
M; i j=L ' means that ' is true at time i in model M. j=L is de ned by
induction on the structure of the formulae4:
(TL j=L ') i (TL; 0 j=L ');
(TL; i j=L e) i e 2 TL(i) (i.e., i 2 vocc(e));
(TL; i 6j=L e) i e 62 TL(i);
(TL; i j=L :') i (TL; i 6j=L ');
(TL; i j=L ' ^ ) i (TL; i j=L ') and (TL; i j=L
(TL; i j=L ' _ ) i (TL; i j=L ') or (TL; i j=L );
(TL; i j=L ' ) ) i (TL; i 6j=L ') or (TL; i j=L );
(TL; i j=L ') i (TL; i + 1 j=L ');
(TL; i j=L U ') i 9k i s.t. (TL; k j=L ') and 8i
(TL; i j=L ') i 9j i s.t. (TL; j j=L ');
(TL; i j=L ') i 8j i (TL; j j=L ');
);
j &lt; k (TL; j j=L
);
4 For the sake of readability, we explicitly show the semantics of ,
their meaning can be obtained from the semantics of U and .
and W, even if
(TL; i j=L</p>
        <p>W') i either (TL; i j=L</p>
        <p>U ') or (TL; i j=L
).</p>
        <p>When LTL is employed to formalize compliance rules, the declarative
semantics selects those events that must be contained (or avoided) in certain states so
as to ful l them, separating compliant traces from non-compliant ones. In this
respect, j=L plays the role of a compliance evaluator.</p>
        <sec id="sec-2-3-1">
          <title>De nition 3 (LTL Compliance). An LTL trace TL is compliant with a LTL</title>
          <p>formula ' if and only if TL entails ':</p>
          <p>cmpLTL(TL; ') , TL j=L ':</p>
          <p>
            When LTL formulae are used to express business constraints/rules of a
regulatory model, as for example in the ConDec language [
            <xref ref-type="bibr" rid="ref23">23</xref>
            ], then the LTL formula
used for compliance is the conjunction of all formulae contained in the regulatory
model. From an operational viewpoint, the compliance of a formula ' w.r.t. a
TL is veri ed by means of model checking algorithms.
3
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>The SCIFF Framework</title>
      <p>
        In the following we will brie y recap the main features of the SCIFF framework.
The interested reader can refer to [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] for a detailed and comprehensive
presentation. A SCIFF speci cation S is an Abductive Logic Program hKB; A; ICi [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]
where: (i) KB is a (static) knowledge base (a Logic Program [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]); (ii) A is a
special set of predicates, called abducibles; two special abducibles, namely E=2
and EN=2, are used to represent the expectations; (iii) IC is a set of SCIFF
integrity constraints, relating happened events with expectations.
      </p>
      <p>Roughly speaking, given a goal G, abductive reasoning looks for a set of
literals built from predicates A such that the goal is entailed by the program
KB [ , and the set of integrity constraints IC is entailed too. The set is
referred to as an abductive explanation (see De nition 6).</p>
      <p>Three special predicates are used to model happened events and
positive/negative expectations. Happened events are denoted by using the (non abducible)
predicate H(Ev; T ), where Ev is a term representing the occurred event, while
T explicitly represents the time at which the event occurred. In the remainder
of this paper we will assume the time domain relies on natural numbers.</p>
      <sec id="sec-3-1">
        <title>De nition 4 (SCIFF Execution Trace). A SCIFF execution trace T (or</title>
        <p>simply a SCIFF trace) is a set of positive ground H(E; T ) atoms.</p>
        <p>A speci c execution of the system under study is called an instance, and it is
formally identi ed by the SCIFF speci cation modeling the system and by the
execution trace produced during the instance execution.</p>
        <p>De nition 5 (SCIFF Instance). Given a SCIFF speci cation S = hKB; A; ICi
and a trace T , hS; T i is an instance of S.</p>
        <p>Positive and negative expectations model expected and forbidden events.
They are represented by E(Ev; T ) and EN(Ev; T ), where Ev is a term describing
the event, and T is a term or a variable. The intended meaning is that event Ev
is expected to occur/not occur at time T .</p>
        <p>SCIFF Integrity Constraints (IC) are mainly used to relate happened events
with expectations. They are body ! head rules, where body contains a
conjunction of happened events, general abducibles, and de ned predicates, while head
contains a disjunction of conjunctions of expectations, general abducibles, and
de ned predicates. When the body is matched with events and abducibles, the
IC is triggered, and expectations occurring in the head are assumed (abduced).</p>
      </sec>
      <sec id="sec-3-2">
        <title>De nition 6 (Abductive explanation ). Given a SCIFF instance hS; T i,</title>
        <p>
          a set A is an abductive explanation for hS; T i if and only if
Comp (KB [ T [
) [ CET [TX j= IC
where Comp is the (two-valued) completion of a theory [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ], CET stands for
Clark Equational Theory [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] and TX is the CLP constraint theory [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ],
parametrized by the domain X .
        </p>
        <p>We remind for completeness that CET is provided by the following axioms:
{ c 6= c0 c; c0 any pair of distinct constants
{ f (x1; : : : ; xn) 6= g(y1; : : : ; ym) f; g any pair of distinct functors
{ f (x1; : : : ; xn) = f (y1; : : : ; yn) ! x1 = y1 ^ : : : xn = yn
{ f (x1; : : : ; xn) 6= c f any functor, c any constant
{ (x) 6= x (x) any term structure in which x is free.</p>
        <p>{ x = y ! [W (x) $ W (y)] W any formula
together with the usual rules of re exivity, symmetry and transitivity for
equality. Fixing a CLP theory corresponds to instantiate the parameter X and the
set of allowed constraints. Therefore, di erent structures can be chosen without
a ecting the notion of SCIFF's abductive explanation. We will instantiate such
a parameter to N, with linear equations and dis-equations. The theory of
constraints TN de nes the symbols +; ; ; =; =; &gt;; &lt;; ; : : : with the usual meanings
(e.g., 1 &lt; 2 + 2 is evaluated to true).</p>
        <p>Remark 1 (Abductive explanations and sub-speci cations). If is an
abductive explanation for hS; T i, then is an abductive explanation also for hS0 =
hKB; A; IC0i; T i, where IC0 IC.</p>
        <p>Being able to generate hypotheses might not be enough: in speci c domains
like, e.g., legal reasoning, a further step of veri cation of the hypotheses against
the observed events (available data) is mandatory. Hence, the SCIFF framework
provides also an hypotheses-con rmation mechanism, based on the formal
notions of ful llment and violation. First of all, expectations must be E-consistent :
the same event cannot be expected and prohibited at the same time.</p>
        <sec id="sec-3-2-1">
          <title>De nition 7 (E-consistency). An abducible set is E-consistent i for each</title>
          <p>event e and for each time t it holds that fE(e; t); EN(e; t)g *
The relationship between expectations and happened events is instead captured
by the notions of ful llment and violation.</p>
          <p>De nition 8 (T -Ful llment). Given a SCIFF trace T and an abducible set
, is T -ful lled i for each event e and for each time t: E(e; t) 2 !
H(e; t) 2 T and EN(e; t) 2 ! H(e; t) 2= T
De nition 9 (T -Violation). Given a SCIFF trace T and an abducible set ,
is T -violated i it exists at least one event e and time t such that: E(e; t) 2
^ H(e; t) 2= T , or EN(e; t) 2 ^ H(e; t) 2 T
Given an abductive explanation , ful llment acts as a classi er that separates
the legal/correct execution traces with respect to from the wrong ones.
De nition 10 (Compliance in SCIFF). A trace T is compliant with a SCIFF
speci cation S if and only if there exists an abducible set such that:
1.
2.
3.</p>
          <p>is an abductive explanation for hS; T i;
is E-consistent;
is T -ful lled.</p>
          <p>If this is the case, we write cmpSCIFF (T ; S) or simply cmpSCIFF (T ; S).
4</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Relating LTL and SCIFF</title>
      <p>LTL and SCIFF rely on di erent logics, but when capturing regulatory models
they both act as compliance evaluators, capturing the same idea of compliance.
To capture some similarity w.r.t. compliance, we propose a mapping between
LTL and SCIFF. First of all, we need to provide a mapping between an LTL
trace TL and the corresponding SCIFF trace T (and vice versa).
De nition 11 (Trace mapping). Given an LTL trace TL = (N; &lt;; vocc) and
the set of atomic propositions E , we map any possible pair (e; i) into a
corresponding SCIFF event H(e; i), where e 2 E and i 2 N.</p>
      <p>A trace mapping tm is a transformation which maps an arbitrary LTL trace
TL onto a corresponding SCIFF one, by applying the event mapping to each
proposition belonging to TL, i.e. to each e 2 E and for each i 2 vocc(e):
tm(TL) =</p>
      <p>H(e; i)je 2 E ; i 2 vocc(e)
Example 1. Let us consider an LTL execution trace TL = (N; &lt;; vocc), where
E = fa; b; c; d g is the set of propositional events and vocc is de ned as follows:
vocc(a) = f0; 1g
vocc(b) = f2g
vocc(c) = f3g
vocc(d) = ;
Then tm (TL) =</p>
      <p>H(a; 0); H(a; 1); H(b; 2); H(c; 3)
The inverse translation, which starts from a SCIFF execution trace and produces
a corresponding LTL trace, will be denoted by tm 1.</p>
      <p>Thanks to the trace mapping function tm, it is possible to evaluate whether
the \same" execution trace complies with an LTL and a SCIFF speci cation: if
the two models agree, then they express in some sense \equivalent" prescriptions
w.r.t. the trace. Generalizing, if such an agreement is valid for all the possible
execution traces, then the two speci cations are behaviorally equivalent.</p>
      <sec id="sec-4-1">
        <title>De nition 12 (Behavioural equivalence w.r.t. compliance). A SCIFF</title>
        <p>speci cation S and an LTL formula ' are behaviorally equivalent w.r.t.
complic
ance (' ! S) if and only if for each LTL trace TL it holds that:
cmpLTL (TL; ') () cmpSCIFF (tm (TL) ; S) :
We might notice that De nition 12 does not pose any constraint on the SCIFF
speci cation S: indeed, only the trace TL is somehow constrained by the
application of the mapping function tm.
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>On the Expressiveness of SCIFF</title>
      <p>We show now that an arbitrary LTL formula can be expressed in SCIFF by
providing an automatic translation procedure from LTL to SCIFF which preserves
the compliance equivalence. To this end, we exploit the Separated Normal Form
(SNF) for LTL formulae.
5.1</p>
      <sec id="sec-5-1">
        <title>A Separated Normal Form for LTL Formulae</title>
        <p>
          Fisher and colleagues [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] introduced SNF to express an arbitrary LTL formula
by adopting a conjunction of three-basic forms, while preserving satis ability.
De nition 13 (SNF Formula [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]). An LTL formula ' is in SNF i ' is a
conjunction of formulas of the following forms:
start =)
where ki and lj are literals (i.e., atomic propositions or negation of atomic
propositions) and start is a special symbol true only at the initial time (i.e., whose
valuation function is the set f0g). In this case, we say that ' is an SNF formula.
        </p>
      </sec>
      <sec id="sec-5-2">
        <title>De nition 14 (LTL to SNF translation [13]). snf is a function which</title>
        <p>translates an arbitrary LTL formula to a corresponding SNF formula.
During the transformation, new proposition symbols are introduced to rename
complex sub-formulae. Hence, we distinguish between propositions used to
represent activities/events, and those used for renaming.</p>
        <p>De nition 15 (Proposition symbols, renaming and event sets). Given
an LTL formula ', P (') is the set of proposition symbols contained in '. Given
an SNF formula s.t. = snf('), it holds that P ( ) = E ( ) [ R ( ), where:
1. event set E ( ) is the set of atomic propositions contained in the original LTL
formula ', which denote events (E ( ) = P ('))
2. renaming set R ( ) is the set of atomic propositions used for renaming during
the transformation.</p>
        <p>Example 2. Let us consider LTL \precedence" formula stating that the send receipt
activity can be executed only after having executed the pay activity:
' = :send receipt W pay
Hence, P (') = fpay; send receiptg. The SNF translation of ' is:
= snf [:send receipt W pay] =
8 start ) (:x _ :send receipt _ pay) ^
&gt;
&gt;&gt;&gt;&gt; true ) (:x _ :send receipt _ pay) ^
&gt;&lt; start ) (:x _ y _ pay) ^
= start ) x ^ &gt; true ) (:x _ y _ pay) ^
&gt;&gt;&gt;&gt; y ) (:send receipt _ pay) ^
&gt;: y ) (y _ pay)
Therefore, R ( ) = fstart; x; y; trueg.
5.2</p>
      </sec>
      <sec id="sec-5-3">
        <title>Translation from SNF Formulae to SCIFF</title>
        <p>We now provide a syntactic procedure which translates an arbitrary SNF formula
to SCIFF, and prove that such a translation preserves compliance.
De nition 16 (IC-mapping). An IC-mapping icm is a function which
translates an SNF formula to a set of SCIFF integrity constraints, de ned as5:
5 Abducible predicates will be represented as bold terms.</p>
        <p>" #
icm ^ 'i , [ icm ['i]</p>
        <p>i i
"
icm start =)</p>
        <p>#
_ lc , icm [start; 0] ! _ icm [lc; 0] :
c c
icm
"
icm
^ ka =)
a
"
_ ld
d
!#
!#
, ^ icm [ka; T ] ! _ (icm [ld; T2] ^ T2 = T + 1) :</p>
        <p>a d
Where a stands for a generic propositional symbol. The IC-mapping maps the
presence of a certain proposition in a given state onto an abducible occ/2,
stating that the proposition occurs in that state. Conversely, the absence of
the proposition is mapped onto an abducible not occ/2.</p>
        <p>De nition 17 (S-mapping sm). Given an SNF formula ' and a set V P (')
of proposition symbols, the S-mapping sm translates ' to a SCIFF speci cation
depending on V . sm is de ned as:
sm :</p>
        <p>'; V 7 ! h;; fE=2; EN=2; true=1; occ=2; not occ=2g; IC)i
where</p>
        <p>IC = icm(') [ f
true ! occ(start; 0):
true ! true(0):
(S)
(T1)
true(T ) ! true(T2) ^ T2 = T + 1: (T2)
8p 2 P ('); p 6= start; true(T ) ! occ(p; T ) _ not occ(p; T ): (2V )
occ(X; T ) ^ not occ(X; T ) ! ?: (C)
H(X; T ) ^ X 2 V ! occ(X; T ): (O)
occ(X; T ) ^ X 2 V ! E(X; T ): (E1)
not occ(X; T ) ^ X 2 V ! EN(X; T ): g (E2)
S-mapping applies IC-mapping and then augments the obtained constraints with
further general rules. Such rules capture speci c aspects of the LTL semantics:
{ (S) translates the special start symbol, which is introduced by SNF and is
true only at the initial state (i.e., at time point 0).
{ (T1) and (T2) formalize the LTL true atom, which is implicitly subject to
the formula (true). To this aim, the true abducible is introduced, using
an initial rule (T1) and a recursive rule.
{ (2V ) and (C) are used to model the two-valued semantics of LTL, i.e., that in
each state either a proposition is either true or false. We exclude the symbol
\start", which is introduced by Fisher et al. as a special symbol holding only
in the initial state.
{ (O), (E1) and (E2) relate the (not) occurrence of each proposition in each
state with the SCIFF concepts of happened events and expectations.</p>
        <p>The next theorem states that sm preserves compliance: an arbitrary SNF
formula can be translated to a behaviourally equivalent SCIFF speci cation.</p>
      </sec>
      <sec id="sec-5-4">
        <title>Theorem 1 (SCIFF can express SNF formulae ). Given an SNF formula</title>
        <p>and the SCIFF speci cation S = sm [ ; P ( )], it holds that !c S.
Proof. Since LTL and SCIFF share the same semantics for logical symbols
AND(^), OR (_), and implication() in LTL and ! in SCIFF), we will
focus only on the simplest SNF-forms, consisting of single proposition symbols
(instead of conjunctions/disjunctions).</p>
        <p>= (start ) l)</p>
        <p>If l is a positive literal, say, l = a, each compliant LTL execution trace TL
must satisfy the property that a 2 TL(0), because start always holds in state
0. The obtained S contains the corresponding IC</p>
        <p>icm[start ) a] = occ(start; 0) ! occ(a; 0):
By taking into account also the two general ICs (S) and (E1), all abductive
explanations of S must expect a at time point 0, i.e., they must contain
E(a; 0). Therefore, each compliant trace T must contain H(a; 0). By
considering the trace mapping function tm, this is exactly the same property
required for compliant LTL traces, and therefore compliance is preserved by
switching from to S or vice-versa. The case in which l is a negative literal,
say, l = :a, can be proven in a similar way.
= (k ) l)</p>
        <p>Let us consider a rst case where both k and l are positive literals, and focus
on one side of the equivalence ( c ); the other side can be proven in a very
similar way. To disprove c , one must nd an execution trace TL which is
compliant with , but whose corresponding trace T is not compliant with
S = sm [ ; P ( )]. Notice that, by De nition 17 (applying (O) and (E1)), S
explicitly foresees that in case k happens at a time t, then l is expected to
happen at time t2; t2 = t + 1. Hence, to violate S, T must contain, for a
certain time t the event H(k; t), while H(l; t2) 62 T . By applying the tm 1
function on this trace, one obtains a TL which obeys the following properties:
(1) k 2 TL(t), and (2) l 62 TL(t + 1). The second property in particular
implies that TL is not compliant with , hence the initial hypothesis does not
hold. The other side of the implication ( c ) can be proved in the same way,
exploiting again the characteristics of the tm function. This same proving
schema can be applied also to the case where k is a positive literal, and
l is a negative literal: the only di erence is that S will contain a negative
expectation EN, rather than a positive one as before.</p>
        <p>Let us now consider the case in which k is a negative literal, say k = :a,
and l is a positive literal, say l = b; again, the case in which l is a negative
literal can be proven in the same way. Each compliant TL trace must obey
the following property: 8 t; a 2 TL(t) _ b 2 TL(t + 1). The IC obtained by the
application of icm is not occ(a; T ) ! occ(b; T2) ^ T2 = T + 1. For each time
t, if a happens at time t then rule (O) states that occ(a; t) is abduced, rule
(C) prevents not occ(a; t) to be abduced and thus the IC does not trigger.
If, conversely, a does not happen at time t, by rule (2V ) we can have two
options. In the rst, occ(a; t) is abduced, which imposes that also E(a; t) is
abduced (rule E1); since a does not happen at time t, this assumption is not
ful lled. In the second, not occ(a; t) is abduced, the IC triggers, abducing
occ(b; t + 1), which in turn triggers (E1), imposing that b is expected to
happen at time t + 1. Therefore, each SCIFF compliant execution trace T
must satisfy that 8 t; H(a; t) 2 T _ H(b; t + 1) 2 T , which is equivalent,
under tm, to the property on LTL traces.
= (k ) l)</p>
        <p>This case of a simple sometime LTL-clause trivially follows from the
discussion made for the previous LTL-clause. The only di erence is that the
constraint T2 = T + 1 is substituted by T2 T in this more general case.
Having proven that sm preserves compliance for each SNF basic form, we must
prove that the translation preserves compliance when applied to a conjunction
of these forms. This is straightforward, because a trace complies with a SCIFF
speci cation if all the integrity constraints are respected.
5.3</p>
      </sec>
      <sec id="sec-5-5">
        <title>Translation of Arbitrary LTL Formulae to SCIFF</title>
        <p>We now demonstrate that also an arbitrary LTL formula can be encoded in
SCIFF preserving compliance. The main technical problem is that the SNF
translation introduces new symbols (used for renaming complex sub-formulae) which
do not represent events. At the SNF level, the distinction between concrete events
and renaming symbols gets lost, and therefore the SCIFF speci cation produced
by applying in cascade the SNF and the sm translation does not preserve
compliance w.r.t. the original LTL formula: positive expectations are imposed also
on renaming symbols, which however do not appear in the original LTL formula.</p>
        <p>To overcome this issue, the intuitive idea is to restrict the translation sm
function only to events. The rst step is therefore to de ne, in both settings, a
suitable trace projection, which lters an execution trace by maintaining only
certain symbols (in particular, the ones which correspond to events).</p>
        <sec id="sec-5-5-1">
          <title>De nition 18 (SCIFF trace projection). Given a SCIFF execution trace T</title>
          <p>and a set V of predicate symbols, the trace projection of T on V (T jV ) is the
subset of T containing only events taken from V :</p>
          <p>T jV , fH(e; t) j H(e; t) 2 T ^ e 2 V g
De nition 19 (LTL trace projection). Given an LTL execution trace TL =
(N; &lt;; vocc) and a set V of proposition symbols, the trace projection of TL on V
(TLjV ) is the projection of TL containing only events taken from V :
TLjV = (N; &lt;; vocc0) s.t. vocc0(e) ,
;
vocc(e) if e 2 V ;
otherwise:</p>
        </sec>
      </sec>
      <sec id="sec-5-6">
        <title>Lemma 1 (Commutativity between trace projection and trace map</title>
        <p>ping). For each LTL execution trace TL and for each set of proposition symbols
V</p>
        <p>tm [TLjV ] = tm [TL] jV
Proof. From the de nitions of trace mapping (Def. 11) and of trace projection
(Def. 18 and 19).</p>
        <p>
          We now brie y recall one of the main results presented in [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ], which proves
that SNF preserves satis ability, i.e., in our setting, that it preserves
compliance. Lemma 2 reviews the satis ability result by explicitly taking into account
execution traces. In particular, it states that execution traces compliant
respectively with an LTL formula and its corresponding SNF are exactly the same if
we restrict the comparison only to concrete events.
        </p>
      </sec>
      <sec id="sec-5-7">
        <title>Theorem 2 (SNF preserves satis ability [13]). An LTL formula ' is sat</title>
        <p>is able i snf(') is satis able.</p>
      </sec>
      <sec id="sec-5-8">
        <title>Lemma 2 (Compliance preservation via extended traces, adapted from</title>
        <p>
          [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]). For each LTL formula ', it holds that
        </p>
        <p>8 TL cmpLTL (TL; snf [']) =) cmpLTL TLjE(snf[']); '
8 TL cmpLTL (TL; ') =) 9TL0 s:t: TL = TL0 jE(snf[']) ^ cmpLTL (TL0 ; snf ['])
where we remember that (by De nition 15) E (snf [']) = P ('). With such
preliminaries, it is possible to prove that each LTL formula is translatable to a
SCIFF speci cation, preserving compliance.</p>
      </sec>
      <sec id="sec-5-9">
        <title>Theorem 3 (SCIFF can express LTL). Given an arbitrary LTL formula '</title>
        <p>and the SCIFF speci cation S = sm [snf ['] ; P (')], it holds that S !c '.
Proof. Let us denote = snf [']. From Def. 12, and by remembering that the
event set of contains all the proposition symbols of ' (P (') = E( )), one has
to prove that</p>
        <p>8TL; cmpLTL(TL; ') () cmpSCIFF (tm [TL]; sm [ ; E( )])
We will prove rstly one way of the implication (=)), and then the opposite
direction ((=). Both the proofs are organized in the same way: by applying the
results obtained in Lemma 1, Lemma 2, and Theorem 1, the problem of proving
a formula is reduced to prove another, simpler formula. Hence, each proof starts
with a diagram that shows how each previous result is applied to a formula, and
then the simpler formula is proved.
(=)) Let us consider the following schema:</p>
        <p>( )
8 TL; cmpLTL(TL; ') ========) cmpSCIFF (tm [TL]; sm [ ; E ( )])
wwwwwwLemma 2 wwwww~(y)
 ww</p>
        <p>Theorem 1 w
9TL0 ; TL = TL0 jE( ) =========) cmpSCIFF (tm [TL0 ]; sm [ ; P ( )])</p>
        <p>^cmpLTL(TL0 ; )
The schema shows that proving ( ) reduces to prove (y), i.e., we prove that
cmpSCIFF (tm [TL0 ]; sm [ ; P ( )]) =) cmpSCIFF tm TL0 jE( ) ; sm [ ; E ( )]
By taking into account abducible sets, Def. 15 and Lemma 1, (y) becomes:
cmpSCIFF</p>
        <p>T ; SER
=) cmpSCIFF
0</p>
        <p>T jE( ); SE
(y)
(z)
where SER = sm [ ; E ( ) [ R ( )], SE = sm [ ; E ( )] and T = tm [TL0 ]. To prove
(z), we demonstrate that
0 =</p>
        <p>n fE(e; t)je 2 R ( )g n fEN(e; t)je 2 R ( )g
obeys the three properties required by the De nition 10 of SCIFF compliance:
and SER is that, for the rst speci cation, rules (O), (E1) and (E2) of Def. 17
do not trigger for events outside E ( ) (in particular, they do not trigger for
events inside R ( )). From Remark 1, is therefore a suitable abductive
explanation for SE too. Furthermore, being (E1) and (E2) the only constraints
involving positive and negative expectations concerning elements in R ( ), it
is not required for an abductive explanation to contain them anymore.
0 is E-consistent, because 0 and is E-consistent.</p>
        <p>0 is T jE( )-ful lled. Since T jE( ) is a projection of T , 0 and is
T -ful lled, no negative expectation in 0 can be violated by T jE( ). Positive
expectations concerning elements in E ( ) are maintained in 0, and so are
the corresponding happened events after the trace projection. Positive
expectations concerning elements in R ( ) are removed from when obtaining
0, and therefore the application of the trace projection, which rules out
happened events concerning elements in R ( ), does not a ect ful llment.
((=) We move then to prove the other way of the double implication stated in
this theorem. Again, let us consider the following schema:
cmpLTL tm 1 [T ] ; '
~
w
w
wwLemma 2, then Lemma 1
w
w
w
cmpLTL tm 1 [T 0] ;</p>
        <p>Theorem 1
(===========</p>
        <p>( )
(========== 8 T ; cmpSCIFF (T ; sm [ ; E( )])
w
w
w
www(x)

9 T 0; T = T 0jE( )
^cmpSCIFF (T 0; sm [ ; P ( )])
The schema shows that proving ( ) reduces to prove (x), i.e. we prove that
8 T ; cmpSCIFF</p>
        <p>T ; SE =) 9 T 0; T = T 0jE( ) ^ cmpSCIFF
0 T 0; SER
(x)
where SER = sm [ ; E( ) [ R ( )] and SE = sm [ ; E( )].</p>
        <p>First of all, it is worth noting that SER extends SE by imposing that rules
(O), (E1) and (E2) can be also triggered by occ/not occ abducibles involving
symbols in R ( ), generating a larger set of expectations. Since T 0 T , an
abductive explanation 0 can be therefore found for SER by extending with
the new generated expectations: 0 = [ RE [ REN, where RE and REN
respectively represent the inserted positive and negative expectations.</p>
        <p>0 is E-consistent. Indeed, since RE and REN contain only expectations
generated by rules (E1) and (E2), by construction we have:</p>
        <p>8 E(a; t); E(a; t) 2 RE ) occ(a; t) 2 0
8 EN(a; t); EN(a; t) 2 REN ) not occ(a; t) 2
0
(xx)
Let us suppose by absurdum that there exist a, t (with a 2 R ( )) s.t. E(a; t) 2</p>
        <p>RE and EN(a; t) 2 REN. In this case, (xx) would state that occ(a; t) 2 0 and
not occ(a; t) 2 0. This would violate rule (C), making impossible that 0 is
an abductive explanation.</p>
        <p>An execution trace T compliant with SER can be therefore built as follows:
T</p>
        <p>= T [ T R , where H(a; t) 2 T R , E(a; t) 2 RE
Under this choice:
1. 0 is left untouched by T . Indeed, the only impact of T R on the ICs of SER
is to trigger rule (O), generating corresponding occ abducibles. However,
from (xx) we know that all these abducibles are already contained in 0.
2. 0 is T -ful lled by construction.
3. T jE( ) = T , because all the happened events contained in T R involve
symbols belonging to R ( ), and are therefore ruled out by applying the
projection.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Discussion and Conclusion</title>
      <p>In this work we compare the framework SCIFF with the widely adopted LTL,
from the viewpoint of the compliance veri cation task. To this end, we have
proposed a formal notion of compliance for each one of the approaches, and
de ned the equivalence of the two notions. Then we provide an automatic
translation between LTL-based and SCIFF-based speci cations. We prove that such
translation preserves the notion of compliance, w.r.t. the de ned equivalence.</p>
      <p>LTL-based techniques for veri cation have a number of strengths and
weaknesses, as well as the SCIFF framework that inherits advantages and limits of
LP approaches. An important result of this work is to better clarify the links
between the two techniques: this opens up to the possibility of an integrated
approach based on Computational Logic, where the best of both worlds (LTL
and SCIFF) can be coherently exploited. E.g., LP-based approaches support the
use of variables and constraints over them, allowing to model systems where also
data and data relations/constraints are taken into account.</p>
      <p>
        A limit of the presented approach stems from the semi-decidability issues
of (refutation-based) logic programming. SCIFF inherits such characteristics: as
a consequence, not any possible LTL speci cation could be directly reasoned
about in SCIFF. From an operational viewpoint the problem can be avoided
by restricting to a signi cant fragment of LTL, and provide ad-hoc translations
for which termination is guaranteed. Alternatively, it is possible to notice that a
number of applications inherently require nite traces, like e.g. business processes
[
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], that are developed to reach a business goal (such as delivery a product) in a
nite number of steps. Automatic translation of any LTL formula within a nite
trace semantics into a SCIFF corresponding model is matter of ongoing work.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>van der Aalst</surname>
            , W., de Beer, H., van Dongen,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Process Mining and Veri cation of Properties: An Approach based on Temporal Logic</article-title>
          . In: Meersman,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Tari</surname>
          </string-name>
          ,
          <string-name>
            <surname>Z</surname>
          </string-name>
          . (eds.)
          <article-title>Proceedings of the OTM 2005 Confederated International Conferences CoopIS, DOA, and ODBASE</article-title>
          . LNCS, vol.
          <volume>3760</volume>
          , pp.
          <volume>130</volume>
          {
          <fpage>147</fpage>
          . Springer (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Alberti</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chesani</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gavanelli</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lamma</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mello</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Torroni</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Veri able agent interaction in abductive logic programming: the SCIFF framework</article-title>
          .
          <source>ACM Transactions on Computational Logic</source>
          <volume>9</volume>
          (
          <issue>4</issue>
          ),
          <volume>29</volume>
          :1{
          <fpage>29</fpage>
          :43 (Aug
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Alberti</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gavanelli</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lamma</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chesani</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mello</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Montali</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>An abductive framework for a-priori veri cation of web services</article-title>
          . In: Bossi,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Maher</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.J</surname>
          </string-name>
          . (eds.)
          <source>Procs. of PPDP 2006, July 10-12</source>
          ,
          <year>2006</year>
          , Venice, Italy. pp.
          <volume>39</volume>
          {
          <fpage>50</fpage>
          .
          <string-name>
            <surname>ACM</surname>
          </string-name>
          , New York, USA (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Alberti</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gavanelli</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lamma</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mello</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Torroni</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sartor</surname>
          </string-name>
          , G.:
          <article-title>Mapping deontic operators to abductive expectations</article-title>
          .
          <source>Computational &amp; Mathematical Organization Theory</source>
          <volume>12</volume>
          (
          <issue>2-3</issue>
          ),
          <volume>205</volume>
          {
          <fpage>225</fpage>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Artikis</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sergot</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pitt</surname>
            ,
            <given-names>J.: Specifying</given-names>
          </string-name>
          <string-name>
            <surname>Norm-Governed Computational</surname>
          </string-name>
          <article-title>Societies</article-title>
          .
          <source>ACM Transactions on Computational Logic</source>
          <volume>10</volume>
          (
          <issue>1</issue>
          ),
          <volume>1</volume>
          {
          <fpage>42</fpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Awad</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Decker</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weske</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>E cient Compliance Checking Using BPMNQ and Temporal Logic</article-title>
          . In: Dumas,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Reichert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Shan</surname>
          </string-name>
          , M.C. (eds.) 6th
          <source>Intl. Conf. BPM 2008. LNCS</source>
          , vol.
          <volume>5240</volume>
          , pp.
          <volume>326</volume>
          {
          <fpage>341</fpage>
          . Springer (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Baldoni</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Baroglio</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Martelli</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patti</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Reasoning about interaction protocols for customizing web service selection and composition</article-title>
          .
          <source>Journal of Logic and Algebraic Programming</source>
          <volume>70</volume>
          (
          <issue>1</issue>
          ),
          <volume>53</volume>
          {
          <fpage>73</fpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Chesani</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mello</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Montali</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Torroni</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Commitment Tracking via the Reactive Event Calculus</article-title>
          . In: Boutilier,
          <string-name>
            <surname>C</surname>
          </string-name>
          . (ed.)
          <source>Proceedings of the 21st International Joint Conference on Arti cial Intelligence (IJCAI</source>
          <year>2009</year>
          ). pp.
          <volume>91</volume>
          {
          <issue>96</issue>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Cimatti</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Clarke</surname>
            ,
            <given-names>E.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giunchiglia</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giunchiglia</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pistore</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Roveri</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sebastiani</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tacchella</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Nusmv 2: An opensource tool for symbolic model checking</article-title>
          . In: Brinksma,
          <string-name>
            <given-names>E.</given-names>
            ,
            <surname>Larsen</surname>
          </string-name>
          , K.G. (eds.)
          <source>CAV. Lecture Notes in Computer Science</source>
          , vol.
          <volume>2404</volume>
          , pp.
          <volume>359</volume>
          {
          <fpage>364</fpage>
          . Springer (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Clark</surname>
            ,
            <given-names>K.L.</given-names>
          </string-name>
          :
          <article-title>Negation as Failure</article-title>
          . In: Gallaire,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Minker</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (eds.)
          <source>Logic and Data Bases</source>
          , pp.
          <volume>293</volume>
          {
          <fpage>322</fpage>
          . Plenum Press (
          <year>1978</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>De Nicola</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Missiko</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Proietti</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>A logic-based method for business process knowledge base management</article-title>
          . In: Bergamaschi,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Lodi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Martoglia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Sartori</surname>
          </string-name>
          , C. (eds.) 8th
          <source>Italian Symposium on Advanced Database Systems</source>
          . pp.
          <volume>170</volume>
          {
          <fpage>181</fpage>
          .
          <string-name>
            <surname>Rimini</surname>
          </string-name>
          ,
          <string-name>
            <surname>Italy</surname>
          </string-name>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Emerson</surname>
            ,
            <given-names>E.A.</given-names>
          </string-name>
          :
          <article-title>Temporal and Modal Logic</article-title>
          . In: van Leeuwen,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (ed.)
          <source>Handbook of Theoretical Computer Science</source>
          , Volume B:
          <article-title>Formal Models and Sematics. Elsevier and</article-title>
          MIT Press (
          <year>1990</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13. Fisher,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Dixon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Peim</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          :
          <article-title>Clausal Temporal Resolution</article-title>
          .
          <source>ACM Transactions on Computational Logic</source>
          <volume>2</volume>
          (
          <issue>1</issue>
          ),
          <volume>12</volume>
          {
          <fpage>56</fpage>
          (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Fornara</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Colombetti</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Specifying arti cial institutions in the event calculus</article-title>
          . In: Dignum,
          <string-name>
            <surname>V</surname>
          </string-name>
          . (ed.)
          <source>Handbook of Research on Multi-Agent Systems: Semantics and Dynamics of Organizational Models</source>
          . pp.
          <volume>335</volume>
          {
          <fpage>366</fpage>
          .
          <string-name>
            <given-names>IGI</given-names>
            <surname>Global</surname>
          </string-name>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Holzmann</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>The model checker spin</article-title>
          .
          <source>Software Engineering, IEEE Transactions on 23(5)</source>
          ,
          <volume>279</volume>
          {
          <fpage>295</fpage>
          (
          <year>1997</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Ja</surname>
            <given-names>ar</given-names>
          </string-name>
          , J.,
          <string-name>
            <surname>Maher</surname>
            ,
            <given-names>M.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marriott</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stuckey</surname>
            ,
            <given-names>P.J.:</given-names>
          </string-name>
          <article-title>The semantics of constraint logic programs</article-title>
          .
          <source>J. Log. Program</source>
          .
          <volume>37</volume>
          (
          <issue>1-3</issue>
          ),
          <volume>1</volume>
          {
          <fpage>46</fpage>
          (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Kakas</surname>
            ,
            <given-names>A.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kowalski</surname>
            ,
            <given-names>R.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toni</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Abductive Logic Programming</article-title>
          .
          <source>Journal of Logic and Computation</source>
          <volume>2</volume>
          (
          <issue>6</issue>
          ),
          <volume>719</volume>
          {
          <fpage>770</fpage>
          (
          <year>1993</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Kunen</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Negation in logic programming</article-title>
          .
          <source>J. Log. Program</source>
          .
          <volume>4</volume>
          (
          <issue>4</issue>
          ),
          <volume>289</volume>
          {
          <fpage>308</fpage>
          (
          <year>1987</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Lloyd</surname>
            ,
            <given-names>J.W.</given-names>
          </string-name>
          :
          <article-title>Foundations of Logic Programming</article-title>
          . Springer, 2nd edn. (
          <year>1987</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Montali</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Speci cation and Veri cation of Declarative Open Interaction Models: a Logic-Based Approach</article-title>
          , LNBIP, vol.
          <volume>56</volume>
          . Springer (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Montali</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pesic</surname>
          </string-name>
          , M.,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chesani</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mello</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Storari</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Declarative Speci cation and Veri cation of Service Choreographies</article-title>
          .
          <source>ACM Transactions on the Web</source>
          <volume>4</volume>
          (
          <issue>1</issue>
          ) (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Montali</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Torroni</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chesani</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mello</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alberti</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lamma</surname>
          </string-name>
          , E.:
          <article-title>Abductive logic programming as an e ective technology for the static veri cation of declarative business processes</article-title>
          .
          <source>Fundamenta Informaticae</source>
          <volume>102</volume>
          (
          <issue>3-4</issue>
          ),
          <volume>325</volume>
          {
          <fpage>361</fpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Pesic</surname>
          </string-name>
          , M.,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.:</given-names>
          </string-name>
          <article-title>A Declarative Approach for Flexible Business Processes Management</article-title>
          . In: Eder,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Dustdar</surname>
          </string-name>
          , S. (eds.) Procs.
          <article-title>of the BPM 2006 Workshops</article-title>
          . LNCS, vol.
          <volume>4103</volume>
          , pp.
          <volume>169</volume>
          {
          <fpage>180</fpage>
          . Springer (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Pesic</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schonenberg</surname>
            , H., van der Aalst,
            <given-names>W.M.P.</given-names>
          </string-name>
          : DECLARE:
          <article-title>Full Support for Loosely-Structured Processes</article-title>
          .
          <source>In: Procs. IEEE EDOC</source>
          <year>2007</year>
          . pp.
          <volume>287</volume>
          {
          <fpage>300</fpage>
          . IEEE Computer Society (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Roman</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kifer</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Semantic Web Service Choreography: Contracting and Enactment</article-title>
          . In: Sheth,
          <string-name>
            <given-names>A.P.</given-names>
            ,
            <surname>Staab</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Dean</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Paolucci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Maynard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Finin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.W.</given-names>
            ,
            <surname>Thirunarayan</surname>
          </string-name>
          ,
          <string-name>
            <surname>K. (eds.) Procs. ISWC</surname>
          </string-name>
          <year>2008</year>
          .
          <article-title>LNCS</article-title>
          , vol.
          <volume>5318</volume>
          , pp.
          <volume>550</volume>
          {
          <fpage>566</fpage>
          . Springer (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>