<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">On the synthesis of industry level process models from enterprise level process models</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Pieter</forename><surname>Kwantes</surname></persName>
							<email>p.m.kwantes@liacs.leidenuniv.nl</email>
							<affiliation key="aff0">
								<orgName type="department">LIACS</orgName>
								<orgName type="institution">Leiden University</orgName>
								<address>
									<postBox>P.O.Box 9512</postBox>
									<postCode>NL-2300 RA</postCode>
									<settlement>Leiden</settlement>
									<country key="NL">The Netherlands</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Jetty</forename><surname>Kleijn</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">LIACS</orgName>
								<orgName type="institution">Leiden University</orgName>
								<address>
									<postBox>P.O.Box 9512</postBox>
									<postCode>NL-2300 RA</postCode>
									<settlement>Leiden</settlement>
									<country key="NL">The Netherlands</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">On the synthesis of industry level process models from enterprise level process models</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">81E61FE5F931904A07CC7E921F1052F8</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-19T16:26+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>business process modelling</term>
					<term>Petri net</term>
					<term>industry and enterprise level</term>
					<term>synthesis</term>
					<term>verification</term>
					<term>(partitioned) labelled transition system</term>
					<term>qualified branching bimilarity</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In this paper we provide a framework to specify the synthesis of a comprehensive (industry level) process model from a set of lower level (enterprise) process models. This framework allows us to verify that the resulting model is compliant with a given blueprint (reference model), using local checks only. The reference model describes the intended interactions between the enterprise processes in accordance with industry standards. We propose an approach that allows to check compliance locally per enterprise without requiring information from other enterprise models. This implies in particular that there is no need for individual enterprises to disclose internal design information to the public domain. In our general set-up, we use Petri nets as a modelling framework for our process models and labelled transition systems with silent actions as their semantics. Branching bisimilarity of their transition systems is here the criterion for compliance of process models.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Industry level standardisation is a prerequisite for interoperability between business processes of the enterprises in an industry. 1 Typical areas eligible for standardisation include communication, eg., the syntax of messages exchanged between business processes, and the flow of control of this communication, i.e., who sends which messages in which order to whom. 2 1 We use the term "industry" here rather loosely to include, eg., any group of enterprises involved in the supply chain for a particular good or service. 2 Industry level institutions for message syntax standardisation are quite common, eg., SWIFT for Financial services <ref type="bibr" target="#b22">[23]</ref>, HL7 for Health care <ref type="bibr" target="#b13">[14]</ref>, Roset-taNet for the electronics industry <ref type="bibr" target="#b11">[12]</ref>, EDSN for the Dutch energy market <ref type="bibr" target="#b6">[7]</ref> to name just a few.</p><p>Interoperability between business processes is therefore dependent on the compliance of these business processes with industry standards. The flow of control at the industry level emerges from the interaction of business processes at the enterprise level. However, the design (and verification) of business processes at the enterprise level is typically the exclusive domain of the enterprise in question. To align the design of (enterprise level) business processes with the required behaviour emerging at the industry level, poses a significant and costly coordination problem for the enterprises involved.</p><p>As an example, consider the settlement of a transaction on the secondary capital market (eg., buying or selling of a security). This is an industry level process that emerges from the interaction of several business processes at the enterprise level like those of Investors, Brokers, Counterparties, Custodians and Banks, but there could be (many) more depending on the nature of the transaction. Such interaction typically involves the bilateral asynchronous exchange of standardized messages between these enterprise level processes <ref type="foot" target="#foot_0">3</ref> . This is where the coordination problem arises. First of all because there is no central authority to ensure that (enterprise level) implementation decisions are compliant with the requirements, i.e., the intended flow of control, at the industry level. Moreover the specifications of these requirements are often informal and/or incomplete. Any approach aiming to solve this problem should take into account that, as a rule, implementation decisions are taken locally, at the enterprise level. We cannot, in general, assume the presence of an entity with the authority to align these local decisions with global requirements <ref type="foot" target="#foot_1">4</ref>In this paper we demonstrate how this problem could be solved by outlining an approach to establish an enterprise's (local) compliance with a (global) industry level reference model on basis of local checks. Petri nets provide the modelling framework for our process models with labelled transition systems with silent actions as their semantics. We introduce Enterprise nets (E-nets) that can exchange messages with other E-nets, to represent enterprise process models and Industry nets (I-nets), composed of communicating E-nets, to represent process models at the industry level. A publicly available I-net reflecting the intended flow of control of communication for a particular industry level process, serves as a reference model for enterprises participating in that process, but is not concerned with how enterprises organise themselves internally. This reference model can be considered as a (minimum) set of operational requirements negotiated at the industry level. The implementation of the reference model, i.e., the synthesis of implementations provided by the individual enterprises, should be compliant with these requirements.</p><p>Compliance relates to communicating behaviour. We use labelled transition systems with silent actions to represent the behaviour of E-nets and I-nets, and branching bisimilarity to define compliance. Silent actions represent non-communicating behaviour. Bisimilarity is a well established approach for relating behaviours in this set up <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b21">22]</ref>. Branching bisimilarity is the finest bismilarity relation that ignores differences in non-communicating behaviour while respecting its branching structure <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9]</ref>. This appears to be a good point to start our investigation into the notion of compliance, which is defined in more detail later on. To reflect their modular structure, we introduce labelled transition systems with a partition of their labels, as an additional semantic model for I-nets. This leads to a notion of qualified branching bisimilarity, suitable for such transition systems. This auxiliary notion facilitates the proof that -indeed -compliance can be verified locally. Consequently, we arrive at the main result that, when combining enterprise models into an industry level process model that should be compliant with a given blueprint, local compliance checks suffice.</p><p>Our approach is an original contribution to existing approaches towards local verification of compliant global behaviour. First of all, it includes a modelling framework with a strong built in separation of concerns between global (domain specific) requirements laid down in an (industry level) reference model and local implementation decisions left to enterprises. Secondly, many existing approaches appear to be mainly concerned with the verification of general correctness properties (like deadlock freeness, soundness, or accordance) while here we are particularly concerned with the verification of domain specific requirements as laid down in the global reference model.</p><p>The paper is organised as follows. In Sections 2 and 3, we provide a precise definition of E-nets and I-nets and their implementations. In Section 4 compliance is defined and we formulate the main theorem that global compliance can be verified locally. In Section 5 we introduce qualified branching bisimilarity for partitioned labelled transition systems. In Section 6 an outline is given for the proof of our main result as presented in Section 4. Finally, related work is discussed in Section 7, while Section 8 forms the conclusion of the paper.</p><p>2 Enterprise nets and Industry nets</p><formula xml:id="formula_0">N = {0, 1, 2, • • • } is the set of natural numbers. Given a natural number n ≥ 1, we denote the set {j ∈ N | 1 ≤ j ≤ n} by [n]. Let L be a set. Then L * is the set consisting of all finite sequences w = a 1 • • • a m of elements a i ∈ L for i ∈ [m]</formula><p>. If m = 0, then w is the empty sequence, denoted by λ. If a i = a for all i ∈ [m], then we may write w = a m . In particular, for all a ∈ L, we have that a 0 is the empty sequence.</p><p>A Petri net is a triple N = (P, T, F ), where P is a finite set of places, T is a finite set of transitions such that (P ∩T ) = ∅, and F ⊆ (P ×T )∪(T ×P ) is a set of arcs (flow relation). We refer to the elements of P ∪ T as the nodes of N . If N is a Petri net such that N and N have disjoint sets of nodes then N and N are called disjoint.</p><p>Let N = (P, T, F ) be a Petri net. Then • x = {y | (y, x) ∈ F } and x • = {y | (x, y) ∈ F } are the preset and the postset respectively, of the node x ∈ P ∪ T . A place p ∈ P such that • p = ∅ is a source place of N .</p><p>A marking of N is a function µ : P → N. Let t ∈ T and µ a marking of N . Then t is enabled at µ if µ(p) &gt; 0 for all p ∈ • t. If t is enabled at µ, it may occur, leading to a new marking µ . This we write as</p><formula xml:id="formula_1">µ t − → µ with µ (p) = µ(p) − 1 whenever p ∈ • t \ t • ; µ (p) = µ(p) + 1 whenever p ∈ t • \ • t;</formula><p>and µ (p) = µ(p) otherwise. We extend the notation µ [µ is the set of markings reachable from µ. The marking µ of N such that, for all p ∈ P , µ(p) = 1 if p is a source place and µ(p) = 0 otherwise, is the default initial marking of N .</p><p>Let M be the set of message types fixed throughout this paper. Enterprise nets, to be defined next, are Petri nets that can communicate (asynchronously) through the occurrence of output and input transitions with matching message types. They have a single source place, resembling the notion of workflow-nets in that respect, but without a designated final marking. Composition of these lower level nets results in a higher level net with multiple source places. We are particularly interested in the global communicating behaviour that emerges from bilateral interactions between local processes. Definition 1 (Enterprise net). An Enterprise net, E-net for short, is a tuple E = (P, [T int , T inp , T out ], F, M ) such that T int , T inp , and T out are mutually disjoint sets; T int is the set of internal transitions of E, T inp its set of input transitions, and T out its set of output transitions; moreover, (P, T int ∪ T inp ∪ T out , F ), the underlying Petri net of E, is a Petri net with exactly one source place; finally M :</p><formula xml:id="formula_2">T inp ∪T out → M is the communication function of E. The triple (T inp , T out , M ) is the interface of E.</formula><p>We assume that the E-nets that constitute an Industry net (defined below) are disjoint, i.e., their underlying Petri nets are disjoint. Moreover the input and output transitions of these nets can be matched.</p><formula xml:id="formula_3">Definition 2 (Matching). Let n ≥ 2. Let V = {E i | i ∈ [n]} be a set of pairwise disjoint E-nets. Let, for each i ∈ [n],</formula><p>T out,i be the set of output transitions of E i , T inp,i its set of input transitions, and</p><formula xml:id="formula_4">M i its communication function. A matching over V is a bijection ϕ : i∈[n] T out,i → j∈[n] T inp,j</formula><p>such that whenever t ∈ T out,i and ϕ(t) ∈ T inp,j , for some i, j, then i = j and M i (t) = M j (ϕ(t)).</p><p>A set V of mutually disjoint E-nets is said to be composable if there exists a matching over V . Note that not every such V is composable; and if it is, there may exist more than one matching over this set.</p><p>Given a composable set V as specified in Definition 2, and a matching ϕ over V , the nets in V are connected through (new) channel places from the set</p><formula xml:id="formula_5">P (V, ϕ) = {[t, ϕ(t)] | t ∈ T out,i , i ∈ [n]} using the channel arcs from F (V, ϕ) = {(t, [t, ϕ(t)]) | t ∈ T out,i , i ∈ [n]} ∪ {([t, ϕ(t)], ϕ(t)) | t ∈ T out,i , i ∈ [n]}. Definition 3 (Industry net). Let n ≥ 2. Let V = {E i : i ∈ [n]} be a com- posable set of disjoint E-nets with E i = (P i , [T int,i , T inp,i , T out,i ], F i , M i ) for all i ∈ [n]</formula><p>, and let ϕ be a matching over V . The Industry net, or Inet for short, over (V, ϕ), denoted I(V, ϕ), is the Petri net (P, T, F ) with</p><formula xml:id="formula_6">P = i∈[n] P i ∪ P (V, ϕ), T = i∈[n] T i , and F = i∈[n] F i ∪ F (V, ϕ). The Petri net (P (V, ϕ), T \ i∈[n] T int,i , F (V, ϕ)) is the communication sub- net of I(V, ϕ).</formula><p>Note that I-nets are (communication-)closed systems, in the sense that all transitions that occur as an output (input) transition in one of the Enets are connected through a channel place with a matching input (output, respectively) transition of another E-net.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Implementations</head><p>We assume the existence of a publicly available I-net reflecting the intended flow of control of communication for a particular industry level process and serving as a reference model for the enterprises that will participate in that process. The idea is that each of these enterprises provides a local implementation of one of the E-nets in the reference model. The aim of the reference model however is not concerned with how they are organised internally. It only prescribes the communication requirements at a global (industry) level and the local implementations (E-nets themselves) should obey these requirements. To ensure that all implementations "fit together" (match) as prescribed by the reference model, each should have the same interface as the E-net it implements. We assume moreover that the E-nets of different enterprises are always disjoint (eg., by proper indexing).</p><p>Let n ≥ 2. Let V = {E i : i ∈ [n]} be a composable set of E-nets and let ϕ be a matching over V . Let I(V, ϕ) be a reference model.</p><formula xml:id="formula_7">Definition 4 (Implementation). Let E ∈ V . An E-net E is an imple- mentation of E with respect to V if E is disjoint with all E-nets in V \ {E} and E and E have the same interface. Note that if E is an implementation of E, then W = (V \ {E}) ∪ {E } is composable and ϕ is a matching over W . Thus I(W, ϕ) is an I-net. Let V = {E i : i ∈ [n]} be a set of E-nets such that, for all i ∈ [n], E i is an implementation of E i ∈ V .</formula><p>Since, by our assumption above, the E i are pairwise disjoint and because ϕ is a matching over V , it follows that also I(V , ϕ) is a well-defined Industry net. It is an (full) implementation of I(V, ϕ). Note that V can inherit the matching φ from V, because by Definition 4 their E-nets have the same interface.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Compliance</head><p>To define compliance, a notion of behaviour is needed. We use labelled transition systems to represent behaviour and branching bisimilarity as a measure of behavioural equivalence.</p><p>A labelled transition system, LTS for short, is a tuple T = (Q, L, δ), where Q is a set of states, L is a set of (action) labels, and δ ⊆ Q × L × Q is a transition relation. Rather than (q, a, q ) ∈ δ, where q, q ∈ Q and a ∈ L, we may also write q a − → q . A path in T from q ∈ Q to q ∈ Q is a finite sequence (q 1 , a 1 , q 2 ), (q 2 , a 2 , q 3 ), . . . , (q m , a m , q m+1 ), where m ≥ 0, q = q 1 , q = q m+1 , and (q i , a i , q i+1 ) ∈ δ, for all i ∈ [m]. Such path may also be denoted as</p><formula xml:id="formula_8">(q 1 , a 1 • • • a m , q m+1 ) or as q 1 a1•••am − −−−− → q m+1 . If m =</formula><p>0 the path is empty and q = q . Let L be a set of labels and l : L → L a function. Then l(δ) = {(q, l(a), q ) : (q, a, q</p><formula xml:id="formula_9">) ∈ δ}, l(L) = {l(a) | a ∈ L} and l(T ) = (Q, l(L), l(δ)).</formula><p>In our process model we will hide internal actions and therefore we need the concept of a silent action. For technical reasons we introduce LTSs with more than one silent action. An LTS with silent actions is a tuple T = (Q, L, S, δ) where S ⊆ L is a set of specified silent actions. All notions and notations introduced for labelled transition systems carry over to LTSs with silent actions in the obvious way. Note that every LTS T = (Q, L, δ) can be interpreted as an LTS with an empty set of silent actions (Q, L, ∅, δ). Moreover, our labelled transition systems will often be equipped with a designated initial state. Thus, an initialized LTS (with silent actions) is a tuple T = (Q, L, δ, q in ) (or T = (Q, L, S, δ, q in ), respectively) such that T = (Q, L, δ) is an LTS (or (Q, L, S, δ) is an LTS with silent actions, respectively) where q in ∈ Q is a designated initial state.</p><p>We are now ready to introduce the labelled transition systems associated with an Industry net.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 5 (Transition System of an</head><formula xml:id="formula_10">I-net). Let n ≥ 2. Let V = {E i : i ∈ [n]} be a composable set of E-nets, with E i = (P i , [T int,i , T inp,i , T out,i ], F i , M i ) for all i ∈ [n]</formula><p>, ϕ a matching over V and µ in the default initial marking of I(V, ϕ) = (P, T, F ).</p><formula xml:id="formula_11">-LT S(V, ϕ) = ([µ in , T, ∅, δ, µ in ), where δ = {(µ, t, µ ) | µ ∈ [µ in , t ∈ T, µ t − → µ in I(V, ϕ)}, is the initialized labelled transition system of I(V, ϕ). -Let λ V,τ : T → T ∪ {τ } be defined as λ V,τ (t) = τ if t ∈ i∈[n] T int,i t otherwise Then λ V,τ (LT S(V, ϕ)) = ([µ in , λ V,τ (T ), {τ }, λ V,τ (δ), µ in ),</formula><p>is the initialized labelled transition system with silent action τ of I(V, ϕ). The labelled transition system associated with the Industry net I(V, ϕ) is its marking graph with the default initial marking as initial state. Note that since each Enterprise net has exactly one source place, the Industry net has n source places, all initially marked with one token. In λ V,τ (LT S(V, ϕ)), the labels of the internal transitions of the Enterprise nets constituting V , are made silent using the special symbol τ .</p><p>Branching bisimilarity as a criterion for behavioural equivalence based on labelled transitions systems with a single silent action was introduced in <ref type="bibr" target="#b8">[9]</ref>. A detailed proof that branching bisimilarity is an equivalence relation is provided in <ref type="bibr" target="#b4">[5]</ref>. The definitions of branching bisimilarity provided in both papers are slightly different, but as explained there, they are equivalent. For the purpose of this paper, it is more convenient to follow the definition from <ref type="bibr" target="#b4">[5]</ref>.</p><p>Definition 6 (Branching bisimilarity). Let T = (Q, L, {τ }, δ) be an LTS with a unique silent action τ . Then</p><formula xml:id="formula_12">1. R ⊆ Q × Q is a branching bisimulation for T if -for all (p 0 , q 0 ) ∈ R</formula><p>and a ∈ L, the following holds: (a) If p 0 a − → p 1 in T , then a = τ and (p 1 , q 0 ) ∈ R or there exists a path q 0</p><formula xml:id="formula_13">τ k −→ q 1 a − → q 2 in T , such that k ≥ 0, (p 0 , q 1 ) ∈ R and (p 1 , q 2 ) ∈ R; (b) If q 0 a − → q 1 in</formula><p>T , then a = τ and (p 0 , q 1 ) ∈ R or there exists a path p 0</p><formula xml:id="formula_14">τ k −→ p 1 a − → p 2 in T , such that k ≥ 0, (p 1 , q 0 ) ∈ R and (p 2 , q 1 ) ∈ R.</formula><p>2. If (p, q) ∈ Q × Q, then p and q are branching bisimilar in T , denoted p ≈ bb q, whenever there is a branching bisimulation R ⊆ Q × Q for T such that (p, q) ∈ R. 3. Two initialised labelled transition systems with τ as silent action,</p><formula xml:id="formula_15">T 1 = (Q 1 , L, {τ }, δ 1 , q 1,in ) and T 2 = (Q 2 , L, {τ }, δ 2 , q 2,in ) such that Q 1 ∩Q 2 = ∅, are branching bisimilar if there exists a branching bisimulation R ⊆ Q 1 × Q 2 such that (q 1,in , q 2,in ) ∈ R.</formula><p>To establish whether an implementation of a reference Industry net is correct, the communicating behaviour of the implementation has to be compared with the communicating behaviour of the reference model.</p><formula xml:id="formula_16">Definition 7 (Global compliance). Let n ≥ 2. Let V = {E i : i ∈ [n]} be a composable set of E-nets and ϕ a matching over V . Let I(V , ϕ) be an implementation of I(V, ϕ). Then I(V , φ) is compliant with I(V, φ), denoted I(V , φ) I(V, φ), if λ V ,τ (LT S(V , φ)) ≈ bb λ V,τ (LT S(V, φ)).</formula><p>A problem here is that we cannot investigate the behaviour of the full implementation as such. The reason being that in general enterprises are reluctant to disclose information about the implementation of their internal operations to the public domain. Each enterprise has knowledge of its own operations, but not of the operations of the other enterprises. So we must assume that the full set of implementations of the enterprise nets is not known. What can be done locally however, is to investigate the behaviour of each local E-net implementation by comparing it with the behaviour of the corresponding original E-net in the reference model. To make this comparison we should consider these behaviours in the same context. We can accomplish this by replacing the E-net in the reference model with its local implementation.</p><formula xml:id="formula_17">Definition 8 (Local compliance). Let n ≥ 2. Let V = {E i : i ∈ [n]} be a composable set of E-nets and ϕ a matching over V . Let i ∈ [n] and E i an implementation of E i with respect to V . Let V i = (V \ {E i }) ∪ {E i }. -Then I(V i , ϕ) is the local replacement of E i in I(V, ϕ) by E i . -E i is compliant with I(V, ϕ), denoted E i ∼ I(V, ϕ), if λ V i ,τ (LT S(V i , ϕ)) ≈ bb λ V,τ (LT S(V, ϕ)), for all i ∈ [n]</formula><p>We now claim as our main result that if local compliance is established for all local replacements of enterprise nets in the reference model, then global compliance of the full implementation follows. More formally, the following theorem holds:</p><formula xml:id="formula_18">Theorem 1. Let n ≥ 2. Let V = {E i : i ∈ [n]</formula><p>} be a composable set of E-nets, ϕ a matching over V , and V = {E i : i ∈ [n]} where for all i ∈ [n], E i an implementation of E i with respect to V . Then I(V , φ)</p><formula xml:id="formula_19">I(V, φ) if E i ∼ I(V, φ) for all i ∈ [n].</formula><p>To prove this result, we introduce in Section 5 the new, auxiliary notion of qualified branching bisimilarity. This facilitates our reasoning about the equivalence of modular process specifications. In general, this concept of bisimilarity, as it is based on the distinction between different silent actions, does not coincide with branching bisimilarity. For the transition systems defined by I-nets, it can be shown however that it leads to the same equivalence classes. We will use this result to give a rough outline of the proof of Theorem 1 in Section 5.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Qualified branching bisimilarity</head><p>Before we can introduce the new variant of branching bisimilarity, we need a modification of labelled transition systems that reflect the modular specification of I-nets. A partitioned labelled transition system, or PLTS , is a tuple T P = (Q, [L 1 , . . . , L n ], δ), such that the L i are nonempty, pairwise disjoint sets of (action) labels and T = (Q, i∈[n] L i , δ) is a labelled transition system. We refer to T P as the partitioned labelled transition system derived from T and [L 1 , . . . , L n ]; and to T as the underlying labelled transition system of T P . All terminology and notation introduced for labelled transition systems carry over to partitioned labelled transition systems. As with labelled transition systems we can add silent actions and an initial state to the specification of a partitioned labelled transition system. This leads to tuples of the form (Q, [L 1 , . . . , L n ], S, δ, q in ) with S ⊆ i∈[n] L i . Definition 9 (Partitioned transition system of a I-net). Let n ≥ 2. Let V = {E i : i ∈ [n]} be a composable set of E-nets and ϕ a matching over V . Let µ in be the default initial marking of I(V, ϕ) = (P, T, F ).</p><formula xml:id="formula_20">-Let, for all i ∈ [n], N i = (P i , T i , F i ) be the underlying Petri net of E i . Then PLT S(I(V, ϕ)) = ([µ in , [T 1 , . . . , T n ], ∅, δ, µ in ), the PLTS derived from LT S(V, ϕ) and [T 1 , . . . , T n ], is the initialized partitioned labelled transition system of I(V, ϕ). -Let, for each i ∈ [n], T int,i be the set of internal actions of E i . Let S = {(τ, i) | i ∈ [n]} be a set of n new (silent action) labels, where (τ, i) is associated with E i , for i ∈ [n]. Let V,S : T → (T \ i∈[n] T int,i ) ∪ S be defined as V,S (t) = (τ, i) if t ∈ T int,i for some i ∈ [n] t otherwise</formula><p>Then V,S (PLT S(I(V, ϕ))) = ([µ in , [ (T 1 ), . . . , (T n )], S, (δ), µ in ), is the initialized labelled transition system with silent actions S of I(V, ϕ).</p><p>In what follows, we write PLT S(V, ϕ) rather than PLT S(I(V, ϕ)).</p><p>The specification of the transition system PLT S(V, ϕ)) provides a partition of its labels according to the enterprise nets from V . Moreover, the labels of the internal transitions of each Enterprise net E i ∈ V are made silent using a dedicated symbol (τ, i).</p><p>The following notion of branching bisimilarity requires that in each simulation all actions (silent and non-silent ones) come from the same subset of labels.</p><formula xml:id="formula_21">Definition 10 (Qualified branching bisimulation). Let n ≥ 2. Let T = (Q, [L 1 , • • • , L n ], S, δ) be a PLTS with silent actions. Let, for all i ∈ [n], S i = L i ∩ S. Then 1. R ⊆ Q × Q is a qualified branching bisimulation for T if -for all (p 0 , q 0 ) ∈ R and a ∈ i∈[n] L i , the following holds: (a) if p 0 a − → p 1 , then a ∈ S and (p 1 , q 0 ) ∈ R or a ∈ L i for some i ∈ [n] and there exists a path q 0 w − → q 1 a − → q 2 in T such that w ∈ S * i , (p 0 , q 1 ) ∈ R and (p 1 , q 2 ) ∈ R; (b) if q 0 a − → q 1 ,</formula><p>then a ∈ S and (p 0 , q 1 ) ∈ R or a ∈ L i for some i ∈ [n] and there exists a path p 0 w − → p 1 a − → p 2 in T such that w ∈ S * i , (p 1 , q 0 ) ∈ R and (p 2 , q 1 ) ∈ R. 2. Let p, q ∈ Q. Then p and q are qualified branching bisimilar in T , denoted p ≈ qb q, whenever there exists a qualified branching bisimulation R ⊆ Q × Q for T such that (p, q) ∈ R.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Two initialised partitioned labelled transition systems with silent actions</head><formula xml:id="formula_22">T 1 = (Q 1 , [L 1 , . . . , L n ], S, δ 1 , q 1,in ) and T 2 = (Q 2 , [L 1 , . . . , L n ], S, δ 2 , q 2,in ) such that Q 1 ∩ Q 2 = ∅, are qualified branching bisimilar, denoted T 1 ≈ qb T 2 , if q 1,</formula><p>in and q 2,in are qualified branching bisimilar in</p><formula xml:id="formula_23">(Q 1 ∪ Q 2 , [L 1 , . . . , L n ], S, δ 1 ∪ δ 2 ).</formula><p>Branching bisimilarity does not imply qualified branching bisimilarity. Consider Figure <ref type="figure">1</ref>.</p><formula xml:id="formula_24">Let L 1 = {a 1 }, L 2 = {a 2 , τ 2 }, L = L 1 ∪ L 2 and S = {τ 2 }. Let T 1 = ({p 1 , p 2 }, L, S, {(p 1 , a 1 , p 2 )}, p 1</formula><p>) and T 2 = ({q 1 , q 2 , q 3 }, L, S, {(q 1 , τ 2 , q 2 ), (q 2 , a 1 , q 3 )}, p 1 ) be two initialized LTS s (with silent action τ = τ 2 ). Then the dotted lines in Figure <ref type="figure">1</ref> represent a branching bisimulation between T 1 and T 2 . Now let T 1,P = ({p 1 , p 2 }, [L 1 , L 2 ], S, {(p 1 , a 1 , p 2 )}, p 1 ) be the initialized PLTS with silent actions derived from T 1 and [L 1 , L 2 ] and T 2,P = ({q 1 , q 2 , q 3 }, [L 1 , L 2 ], S, {(q 1 , τ 2 , q 2 ), (q 2 , a 1 , q 3 )}, p 1 ) the initialized PLTS p 1 p 2 q 1 q 2 q 3 Fig. <ref type="figure">1</ref>: ≈ bb does not imply ≈ qb with silent actions derived from T 2 and [L 1 , L 2 ]. Then it is not possible to find a qualified branching bisimulation between T 1,P and T 2,P because a 1 and τ 2 are from different subsets of labels. However there is a strong relationship between branching bisimilarity and qualified branching bisimilarity for labelled transition systems of I-nets which is captured in Theorem 2.</p><p>Theorem 2 (≈ bb and ≈ qb for I-nets).</p><formula xml:id="formula_25">Let n ≥ 2. Let V = {E i : i ∈ [n]} and V = {E i : i ∈ [n]} be composable sets of E-nets. Let ϕ be a matching over V and ϕ a matching over V . Let S = {(τ, i) | i ∈ [n]} be a set of n new action labels, with for all i ∈ [n], (τ, i) associated with E i in V and with E i in V . Then λ V,τ (LT S(V, ϕ)) ≈ bb λ V ,τ (LT S(V , ϕ)) if and only if V,S (PLT S(V, ϕ)) ≈ qb V ,S (PLT S(V , ϕ)).</formula><p>The if direction of Theorem 2 follows directly from Definitions 5, 6, 9 and 10. To prove the only-if direction is however more involved. The basic idea is as follows (we sketch the qualified simulation of V,S (PLT S(V, ϕ)) by V ,S (PLT S(V , ϕ))). From λ V,τ (LT S(V, ϕ)) ≈ bb λ V ,τ (LT S(V , ϕ)) it follows that when a transition labelled a from an Enterprise net E i ∈ V is simulated by a sequence wa in λ V ,τ (LT S(V , ϕ)), then w can be any combination of silent actions from various E-nets in V . Because of the modularity of I-nets and the Petri net semantics it is then possible to first execute the transitions underlying the occurrences in w from E i (labelled by (τ, i)). These form a sequence w and it can be shown that qualified branching bisimilarity is preserved after w a.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Outline of proof of Theorem 1</head><p>In this section we sketch a proof of Theorem 1. For the sake of convenience we repeat the statement here:</p><formula xml:id="formula_26">Theorem 1 Let n ≥ 2. Let V = {E i : i ∈ [n]} be a composable set of E-nets, ϕ a matching over V , and V = {E i : i ∈ [n]} where for all i ∈ [n], E i is an implementation of E i with respect to V . Then I(V , φ) I(V, φ) if, for all i ∈ [n], E i is locally compliant with I(V, ϕ).</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Let us assume that, for all</head><formula xml:id="formula_27">i ∈ [n], E i is locally compliant with I(V, ϕ), that is λ V i ,τ (LT S(V i , ϕ)) ≈ bb λ V,τ (LT S(V, ϕ)), see Definition 8. Recall that V i = (V \ {E i }) ∪ {E i }.</formula><p>From Theorem 2 we have V,S (PLT S(V, ϕ)) ≈ qb V i ,S (PLT S (V i , ϕ)) for all i ∈ [n]. We will argue next how from this we can deduce that V,S (PLT S(V, ϕ)) ≈ qb V ,S (PLT S(V , ϕ)). The theorem then follows from Theorem 2.</p><p>Let µ in and µ in be the default initial markings of I(V, ϕ) and I(V , ϕ), respectively. For all i ∈ [n], µ i in denotes the default initial marking of</p><formula xml:id="formula_28">I(V i , ϕ) and R i ⊆ [µ in × [µ i</formula><p>in is a qualified branching bisimulation between V,S (PLT S(V, ϕ)) and V i ,S (PLT S(V i , ϕ)).</p><p>In addition, we define relations Z i for all i ∈ [n], consisting of all pairs of markings (µ i , µ ) in [µ i in × [µ in such that µ i (p) = µ (p) for all places p shared by I(V i , φ) and I(V , φ). Note that I(V i , φ) and I(V , φ) share all and only the places of E i and the channel places P (V , ϕ).</p><p>As a consequence, if (µ i , µ ) ∈ Z i for some i ∈ [n], then every transition t of E i enabled at µ i in I(V i , φ) is also enabled at µ in I(V , φ) and vice versa; moreover, if</p><formula xml:id="formula_29">µ i t − → µ i 1 in I(V i , φ) and µ t − → µ 1 in I(V , φ</formula><p>), then also (µ i 1 , µ 1 ) ∈ Z i (property A) <ref type="foot" target="#foot_2">5</ref> . Finally, we define the relation R by R = i∈[n] R i • Z i . We briefly consider the steps followed to establish that R is a qualified branching bisimulation between V,S (PLT S(V, ϕ)) and V ,S (PLT S(V , ϕ)), as desired.</p><p>See Figure <ref type="figure">2</ref> for an illustration. The large squares in Figure <ref type="figure">2</ref> represent the transition systems associated with the I-nets considered. The smaller squares represent E-nets.</p><p>It is easy to see that (µ in , µ in ) ∈ R. Assume (µ, µ ) ∈ R. Let, for all i ∈ [n], µ i be such that (µ,</p><formula xml:id="formula_30">µ i ) ∈ R i and (µ i , µ ) ∈ Z i . Let µ a − → µ 1 in V,S (PLT S(V, ϕ)).</formula><p>Then there is a unique E j such that a = V,S (t) for some transition t of E j .</p><p>Since R j is a qualified branching bisimulation between V,S (PLT S(V, ϕ)) and V j ,S (PLT S(V j , ϕ)), it follows that µ a − → µ 1 can be simulated from µ j in V j ,S (PLT S(V j , ϕ)), as described in Definition 10, by</p><formula xml:id="formula_31">µ j w − → µ j 1 a − → µ j 2</formula><p>where wa is a sequence of zero or more transitions from E j such that (µ, µ j 1 ) ∈ R j and (µ 1 , µ j 2 ) ∈ R j . Then, by property A, we can conclude that For all i = j, we can apply a similar reasoning and conclude that a sequence</p><formula xml:id="formula_32">R j R R i Z j Z i</formula><formula xml:id="formula_33">µ i w −→ µ i 1 a − → µ i 2 (with w a a sequence from E j ∈ V i ) in V i ,S (PLT S(V i , ϕ)) such that (µ, µ i 1 ) ∈ R i and (µ 1 , µ i 2 ) ∈ R i .</formula><p>Since the transitions involved in the simulation are not from E i ∈ V i , it follows that (µ i 1 , µ 1 ) ∈ Z i and (µ i 2 , µ 2 ) ∈ Z i and so (µ</p><formula xml:id="formula_34">1 , µ 1 ) ∈ R i • Z i and (µ 2 , µ 2 ) ∈ R i • Z i . Consequently µ w − → µ 1 a − → µ 2 in V ,S (PLT S(V , ϕ)) with (µ, µ 1 ) ∈ R and (µ 1 , µ 2 ) ∈ R.</formula><p>To prove the other direction, assume that (µ, µ ) ∈ R and µ a − → µ 1 in V ,S (PLT S(V , ϕ)). Again, we can identify the unique E-net with the transition t such that V ,S (t) = a and then follow a similar pattern as before.</p><p>Note that qualified branching bisimulation is crucial for the conclusion that, for all i ∈ [n], the relation Z i is respected by each step in the simulation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Related work</head><p>The ideas underlying the concepts of E-nets, I-nets, and compliance belong to a well-established branch of research concerned with composing systems into larger correctly functioning (concurrent) systems (see, eg., <ref type="bibr" target="#b9">[10]</ref> for an overview).</p><p>In <ref type="bibr" target="#b12">[13]</ref> Petri nets are studied equipped with distinguished input and output labels (I/O Petri nets) indicating their possibilities to communicate with other I/O Petri nets. An asynchronous composition operator introduces new channels for the communication between the composed nets. The transition system semantics of these nets is compositional and the composition of transition systems preserves channel properties. Composition of local workflows is considered in <ref type="bibr" target="#b19">[20]</ref>. The open workflow nets of <ref type="bibr" target="#b20">[21]</ref> are Petri nets with interface places enabling the communication with other open workflow nets.</p><p>The composition of Petri nets as considered in <ref type="bibr" target="#b19">[20,</ref><ref type="bibr" target="#b20">21]</ref> and also in <ref type="bibr" target="#b1">[2]</ref> (open workflow nets) all combine local Petri nets extended with interface places which enables them to communicate with other Petri nets. In our approach, similarly to the approach in <ref type="bibr" target="#b12">[13]</ref>, local Petri nets do not have interface places but they can communicate via distinguished input and output labels. As mentioned in <ref type="bibr" target="#b12">[13]</ref>, the advantage of this approach is that it leads to a better separation of concerns: eg., the designer of a local Petri net does not have to consider whether it will be used in a synchronous or in an asynchronous environment later on; this should be a concern for the designer of the global Petri net.</p><p>An overview of research on inter-organisational workflows is given in <ref type="bibr" target="#b3">[4]</ref>. Much of this work is concerned with the construction of inter-organisational workflows. The Public-To-Private(P2P)approach in <ref type="bibr" target="#b2">[3]</ref> is concerned with the construction of local workflows as subclasses of global workflows. Inheritance preserving transformations should then guarantee compliance of a local implementation ("compliance by construction"). In <ref type="bibr" target="#b5">[6]</ref> refinement of local states of a Petri net is supported by behaviour preserving morphisms between the Petri net and its refinement. Weak bisimilarity is used as the criterion for the preservation of behaviour.</p><p>The approach in <ref type="bibr" target="#b1">[2]</ref> assumes a collaborative workflow, a multi-party contract between the participants, represented as an open workflow net and serving as a reference model. Then, a local implementation (called private view ) is in accordance with the open net included in the reference model (the public view ) if they both operate correctly (without deadlocks and terminating correctly) in the same context. Accordance can be checked locally and is compositional, i.e., if all private views are in accordance with the public view, then the overall collaborative workflow is guaranteed to be deadlock-free and terminating correctly. It should be noted here that accordance is a weaker notion than compliance as considered in this paper: compliance implies accordance, but the converse does not always hold.</p><p>In <ref type="bibr" target="#b17">[18,</ref><ref type="bibr" target="#b15">16,</ref><ref type="bibr" target="#b16">17]</ref> Symbolic Observation Graphs (SOG) are used to represent the behaviour of enterprise level business processes such that critical design information is kept private. It is shown that deadlock-freeness <ref type="bibr" target="#b17">[18]</ref> and soundness <ref type="bibr" target="#b15">[16]</ref> of inter-enterprise level business processes can then be verified using the composition of these enterprise level SOG's. In <ref type="bibr" target="#b16">[17]</ref> this approach is extended to include sharing of resources, asynchronous communication between enterprise level business processes and the verification of specific workflow properties using Linear Temporal Logic.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8">Conclusion</head><p>We have introduced I-nets as a means to capture global requirements concerning communication while leaving design decisions concerning internal operations to the local level. Compliance is then defined as branching bisimilarity between the labelled transition system of the original (global) reference model and the labelled transition system of its implementation (emerging from the local implementations). The use of qualified branching bisimilarity simplified the proof of our main theorem, Theorem 1, that local compliance for all local implementations implies global compliance for the global implementation. This provides a formal underpinning for an approach that allows verification of global compliance by checking local compliance only.</p><p>To our knowledge this is a new result in the current approaches towards local verification of compliant global behaviour (see also the previous section on related work). In particular, our result is not comparable to the congruence results for branching bisimilarity in process algebras by which branching bisimilar processes when inserted in the same context, yield again branching bisimilar processes <ref type="bibr" target="#b10">[11]</ref>. First of all, we did not formally introduce an algebra, but -more importantly -compliance does not assume or guarantee that the local processes (from the reference model and an implementation) are branching bisimilar.</p><p>In <ref type="bibr" target="#b18">[19]</ref>, the industry level requirements are captured in a reference model, then projected onto the enterprise level, and subsequently translated into an LTL formula. To verify that the transition system of the local replacement satisfies the LTL-formula, model checking is used. In this approach, the context information in the reference model is filtered out by the projection step. Furthermore, it requires the extra step to translate the requirements laid down in the (projected) reference model into an LTL formula, which is not required in the approach presented in this paper.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>sequences w ∈ T * as follows: µ λ − → µ for all µ and µ wt −→ µ for markings µ, µ of N , w ∈ T * and t ∈ T , whenever there is a marking µ such that µ w − → µ and µ t − → µ . If µ w − → µ , for some w ∈ T * , we say that µ is reachable from µ.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 2 :− → µ 1 a− → µ 2</head><label>212</label><figDesc>Fig. 2: R is a qualified branching bisimulation</figDesc></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_0">eg., XML messages, meeting the ISO20022 standard, exchanged over the SWIFT-network.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_1">Although in many cases industry level institutions, like the ones mentioned earlier, have emerged to facilitate the negotiation of certain industry level standards.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="5" xml:id="foot_2">This holds for t ∈ T int,i because E i is shared between I(V i , φ) and I(V , φ) and for t ∈ T i \ T int,i because I(V i , φ) and I(V , φ) have the same communication subnet.</note>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Our approach relies essentially on well-established concepts and results in the field of Petri nets, labelled transition systems and branching bisimilarity. This may allow implementation of automated support for our approach using already existing high performance tools incorporating proven technology like LT Smin <ref type="bibr" target="#b14">[15]</ref> with only minor changes, for checking local compliance of E-nets. This will be the subject of future work.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Inheritance of workflows: an approach to tackling problems related to change</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Basten</surname></persName>
		</author>
		<idno type="DOI">10.1016/S0304-3975</idno>
		<idno>(00)00321-2</idno>
		<ptr target="https://doi.org/10.1016/S0304-3975" />
	</analytic>
	<monogr>
		<title level="j">Theor. Comput. Sci</title>
		<imprint>
			<biblScope unit="volume">270</biblScope>
			<biblScope unit="issue">1-2</biblScope>
			<biblScope unit="page" from="125" to="203" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Multiparty contracts: Agreeing and implementing interorganizational processes</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Lohmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Massuthe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Stahl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Wolf</surname></persName>
		</author>
		<idno type="DOI">10.1093/comjnl/bxn064</idno>
		<ptr target="https://doi.org/10.1093/comjnl/bxn064" />
	</analytic>
	<monogr>
		<title level="j">Comput. J</title>
		<imprint>
			<biblScope unit="volume">53</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="90" to="106" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">The P2P approach to interorganizational workflows</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Weske</surname></persName>
		</author>
		<idno type="DOI">10.1007/3-540-45341-5_10</idno>
		<ptr target="http://dx.doi.org/10.1007/3-540-45341-5_10" />
	</analytic>
	<monogr>
		<title level="m">Advanced Information Systems Engineering, 13th International Conference, CAiSE 2001</title>
		<title level="s">Proceedings</title>
		<meeting><address><addrLine>Interlaken, Switzerland</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2001">June 4-8, 2001. 2001</date>
			<biblScope unit="page" from="140" to="156" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Reflections on a decade of interorganizational workflow research</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Weske</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-642-36926-1_24</idno>
		<ptr target="http://dx.doi.org/10.1007/978-3-642-36926-1_24" />
	</analytic>
	<monogr>
		<title level="m">Seminal Contributions to Information Systems Engineering, 25 Years of CAiSE</title>
				<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="307" to="313" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Branching bisimilarity is an equivalence indeed!</title>
		<author>
			<persName><forename type="first">T</forename><surname>Basten</surname></persName>
		</author>
		<idno type="DOI">10.1016/0020-0190(96)00034-8</idno>
		<ptr target="http://dx.doi.org/10.1016/0020-0190(96)00034-8" />
	</analytic>
	<monogr>
		<title level="j">Inf. Process. Lett</title>
		<imprint>
			<biblScope unit="volume">58</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="141" to="147" />
			<date type="published" when="1996">1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Local state refinement and composition of elementary net systems: An approach based on morphisms</title>
		<author>
			<persName><forename type="first">L</forename><surname>Bernardinello</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Mangioni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Pomello</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-642-40465-8_3</idno>
		<ptr target="https://doi.org/10.1007/978-3-642-40465-8_3" />
	</analytic>
	<monogr>
		<title level="j">Trans. Petri Nets and Other Models of Concurrency</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="48" to="70" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<author>
			<persName><surname>Edsn</surname></persName>
		</author>
		<ptr target="https://www.edsn.nl/" />
		<title level="m">Marktfacilitering</title>
				<imprint>
			<date type="published" when="2018-03">Mar 2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">The linear time-branching time spectrum (extended abstract)</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">J</forename><surname>Van Glabbeek</surname></persName>
		</author>
		<idno type="DOI">10.1007/BFb0039066</idno>
		<ptr target="http://dx.doi.org/10.1007/BFb0039066" />
	</analytic>
	<monogr>
		<title level="m">CONCUR &apos;90, Theories of Concurrency: Unification and Extension</title>
		<title level="s">Proceedings.</title>
		<meeting><address><addrLine>Amsterdam, The Netherlands</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1990">August 27-30, 1990. 1990</date>
			<biblScope unit="page" from="278" to="297" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Branching time and abstraction in bisimulation semantics</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">J</forename><surname>Van Glabbeek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">P</forename><surname>Weijland</surname></persName>
		</author>
		<idno type="DOI">10.1145/233551.233556</idno>
		<ptr target="http://doi.acm.org/10.1145/233551.233556" />
	</analytic>
	<monogr>
		<title level="j">J. ACM</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="555" to="600" />
			<date type="published" when="1996">1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Structuring and composability issues in petri nets modeling</title>
		<author>
			<persName><forename type="first">L</forename><surname>Gomes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">P</forename><surname>Barros</surname></persName>
		</author>
		<idno type="DOI">10.1109/TII.2005.844433</idno>
		<ptr target="https://doi.org/10.1109/TII.2005.844433" />
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. Industrial Informatics</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="112" to="123" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">Introduction to Concurrency Theory: Transition Systems and CCS</title>
		<author>
			<persName><forename type="first">R</forename><surname>Gorrieri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Versari</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-21491-7_1</idno>
		<ptr target="https://doi.org/10.1007/978-3-319-21491-7_1" />
		<imprint>
			<date type="published" when="2015">2015</date>
			<publisher>Springer International Publishing</publisher>
			<pubPlace>Cham</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<author>
			<persName><surname>Gs1us</surname></persName>
		</author>
		<ptr target="http://www.rosettanet.org/" />
		<title level="m">Rosettanet</title>
				<imprint>
			<date type="published" when="2018-02">Feb 2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Channel properties of asynchronously composed petri nets</title>
		<author>
			<persName><forename type="first">S</forename><surname>Haddad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Hennicker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">H</forename><surname>Møller</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-642-38697-8_20</idno>
		<ptr target="http://dx.doi.org/10.1007/978-3-642-38697-8_20" />
	</analytic>
	<monogr>
		<title level="m">Application and Theory of Petri Nets and Concurrency -34th International Conference, PETRI NETS 2013</title>
				<meeting><address><addrLine>Milan, Italy</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">June 24-28, 2013. 2013</date>
			<biblScope unit="page" from="369" to="388" />
		</imprint>
	</monogr>
	<note>Proceedings.</note>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<ptr target="http://www.hl7.org/" />
		<title level="m">HL7: Health level seven international</title>
				<imprint>
			<date type="published" when="2018-02">Feb 2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Ltsmin: High-performance language-independent model checking</title>
		<author>
			<persName><forename type="first">G</forename><surname>Kant</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Laarman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Meijer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Van De Pol</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Blom</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Van Dijk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Tools and Algorithms for the Construction and Analysis of Systems</title>
				<editor>
			<persName><forename type="first">C</forename><surname>Baier</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Tinelli</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin Heidelberg; Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="692" to="707" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Checking soundness of business processes compositionally using symbolic observation graphs</title>
		<author>
			<persName><forename type="first">K</forename><surname>Klai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Desel</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-</idno>
		<idno>642-30793-5_5</idno>
		<ptr target="https://doi.org/10.1007/978-3-" />
	</analytic>
	<monogr>
		<title level="m">Formal Techniques for Distributed Systems -Joint 14th IFIP WG 6.1 International Conference, FMOODS 2012 and 32nd IFIP WG 6.1 International Conference, FORTE 2012</title>
		<title level="s">Proceedings. Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">H</forename><surname>Giese</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Rosu</surname></persName>
		</editor>
		<meeting><address><addrLine>Stockholm, Sweden</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2012">June 13-16, 2012. 2012</date>
			<biblScope unit="volume">7273</biblScope>
			<biblScope unit="page" from="67" to="83" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">A bottom-up approach to check the correctness of interorganisational workflows</title>
		<author>
			<persName><forename type="first">K</forename><surname>Klai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Ochi</surname></persName>
		</author>
		<idno type="DOI">10.1109/TASE.2015.18</idno>
		<ptr target="https://doi.org/10.1109/TASE.2015.18" />
	</analytic>
	<monogr>
		<title level="m">International Symposium on Theoretical Aspects of Software Engineering, TASE 2015</title>
				<meeting><address><addrLine>Nanjing, China</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2015-09-12">2015. September 12-14, 2015. 2015</date>
			<biblScope unit="page" from="7" to="14" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Symbolic abstraction and deadlock-freeness verification of inter-enterprise processes</title>
		<author>
			<persName><forename type="first">K</forename><surname>Klai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Tata</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Desel</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3</idno>
		<idno>-642-03848-8_20</idno>
		<ptr target="https://doi.org/10.1007/978-3" />
	</analytic>
	<monogr>
		<title level="m">Business Process Management, 7th International Conference, BPM 2009</title>
		<title level="s">Proceedings. Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">U</forename><surname>Dayal</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Eder</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Koehler</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Reijers</surname></persName>
		</editor>
		<meeting><address><addrLine>Ulm, Germany</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2009">September 8-10, 2009. 2009</date>
			<biblScope unit="volume">5701</biblScope>
			<biblScope unit="page" from="294" to="309" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Towards compliance verification between global and local process models</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">M</forename><surname>Kwantes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">V</forename><surname>Gorp</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kleijn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rensink</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-21145-9_14</idno>
		<ptr target="http://dx.doi.org/10.1007/978-3-319-21145-9_14" />
	</analytic>
	<monogr>
		<title level="m">Graph Transformation -8th International Conference, ICGT 2015, Held as Part of STAF 2015</title>
				<meeting><address><addrLine>L&apos;Aquila, Italy</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2015">July 21-23, 2015. 2015</date>
			<biblScope unit="page" from="221" to="236" />
		</imprint>
	</monogr>
	<note>Proceedings.</note>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">On compatibility of web services</title>
		<author>
			<persName><forename type="first">A</forename><surname>Martens</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Petri Net Newsletter</title>
		<imprint>
			<biblScope unit="page" from="12" to="20" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<title level="m" type="main">An Operating Guideline Approach to the SOA</title>
		<author>
			<persName><forename type="first">P</forename><surname>Massuthe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Reisig</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Schmidt</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
		<respStmt>
			<orgName>Humboldt-Universitat zu Berlin ; Mathematisch-Naturwissenschaftliche Fakultat II ; Institut fur Informatik</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Communication and concurrency</title>
		<author>
			<persName><forename type="first">R</forename><surname>Milner</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">PHI Series in computer science</title>
				<imprint>
			<publisher>Prentice Hall</publisher>
			<date type="published" when="1989">1989</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">W I F T</forename></persName>
		</author>
		<ptr target="http://www.iso20022.org" />
		<title level="m">Iso20022 universal financial industry message scheme</title>
				<imprint>
			<date type="published" when="2015-03">Mar 2015</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
