<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>SMT-Based Safety Veri cation of Data-Aware Processes under Ontologies (Preliminary Results)</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Diego Calvanese</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alessandro Gianola</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrea Mazzullo</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marco Montali</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Computing Science Department, Umea University</institution>
          ,
          <country country="SE">Sweden</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>KRDB Research Centre for Knowledge and Data Free University of Bozen-Bolzano</institution>
          ,
          <addr-line>Italy surname @inf.unibz.it</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>In the context of veri cation of data-aware processes, a formal approach based on satis ability modulo theories (SMT) has been considered to verify parameterised safety properties of so-called artifactcentric systems. This approach requires a combination of model-theoretic notions and algorithmic techniques based on backward reachability. We introduce here a variant of one of the most investigated models in this spectrum, namely simple artifact systems (SASs), where, instead of managing a database, we operate over a description logic (DL) ontology expressed in (a slight extension of) RDFS. This DL, enjoying suitable model-theoretic properties, allows us to de ne DL-based SASs to which backward reachability can still be applied, leading to decidability in PSpace of the corresponding safety problems.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Verifying and reasoning about dynamic systems that integrate processes and
data is a long-standing challenge that attracted considerable attention, and that
led to a ourishing series of results, within business process management [
        <xref ref-type="bibr" rid="ref20 ref28 ref9">28,9,20</xref>
        ]
and data management [
        <xref ref-type="bibr" rid="ref17 ref18 ref30 ref4 ref8">30,8,4,17,18</xref>
        ]. Among the several conceptual models
studied in this area, data-centric systems and in particular artifact-centric systems
have been brought forward as a principled approach where relevant (business)
objects are elicited, then de ning how actions evolve them throughout their
lifecycle [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. Di erent formal models have been proposed to capture artifact
systems and study their veri cation [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. One of the most studied settings considers
artifact systems as being composed of: a read-only database storing background
information about artifacts that does not change during the evolution of the
system; a working memory, used to store data that can be modi ed in the course
of the evolution; and transitions (also called actions or services) that query the
Copyright c 2021 for this paper by its authors. Use permitted under Creative
Commons License Attribution 4.0 International (CC BY 4.0).
read-only database and the working memory and use the retrieved answers to
update the working memory. Veri cation of such systems is particularly
challenging, not only because the working memory in general evolves through in nitely
many di erent con gurations, but also because the desired veri cation
properties should hold regardless of the speci c content of the read-only database, thus
calling for a particular form of parameterised veri cation [
        <xref ref-type="bibr" rid="ref10 ref11 ref15 ref18">15,18,10,11</xref>
        ].
      </p>
      <p>In this paper, we study for the rst time semantic artifact systems where
the read-only database is substituted by a Description Logic ontology, which
stores background, incomplete information about the artifacts. In this setting,
two possible notions of parameterisation may be studied: one where the evolution
of the system is veri ed against all possible choices for the ABox, another where
veri cation is against all possible models of a xed ABox. In this work, we adopt
the latter hypothesis, and thus verify whether the artifact system enjoys desired
properties irrespectively of how the information explicitly provided by the ABox
is completed through the TBox assertions.</p>
      <p>
        More in detail, we consider an extensively studied, basic model of such
artifact-centric systems, called simple artifact system (SAS ) in [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], where the
artifact working memory consists of a xed set of artifact variables [
        <xref ref-type="bibr" rid="ref11 ref15 ref16">16,15,11</xref>
        ].
On top of this basis, we study the veri cation of safety properties in the case
where the ontology is speci ed in (a slight extension of) RDFS [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], a schema
language for the Semantic Web formalized by the W3C, and we make use of the
ontology signature to express the transitions that update the working memory.
For this setting, we show that we can decide safety properties in PSpace by
relying on an SMT-based backward reachability procedure.
      </p>
      <p>
        In spirit, our approach is reminiscent of previous works studying the
verication of dynamic systems (in particular, Golog programs) operating over a
DL ontology, such as [
        <xref ref-type="bibr" rid="ref14 ref31">14,31</xref>
        ]. In fact, both in their settings and ours, the
dynamic system evolves each model of the ontology, and veri cation properties
are assessed over all the resulting evolutions. This is radically di erent from
approaches where the ABox itself is evolved by the process, with an execution
semantics following Levesque's functional approach, in which query entailment
over the current state is used to compute the successor states [
        <xref ref-type="bibr" rid="ref3 ref5">3,5</xref>
        ]. However, we
di er from [
        <xref ref-type="bibr" rid="ref14 ref31">14,31</xref>
        ] in that our goal is not only to derive foundational results, but
also to transfer such results into practical algorithms and thus obtain a model
that is readily implementable by relying on a state-of-the-art model checker such
as MCMT [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. As customary in the formal literature on artifact-centric systems,
our approach is based on actions that manipulate the artifact variables, coupled
with condition-action rules that declaratively de ne which actions are currently
executable, and with which parameters. Alternative choices could be seamlessly
taken, by adapting approaches that rely on an explicit description of the
controlow, e.g., based on state machines [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] or Petri nets interpreted with interleaving
semantics [
        <xref ref-type="bibr" rid="ref20 ref27">20,27</xref>
        ].
      </p>
      <p>
        Full details are provided in the extended version of this paper [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>Preliminaries</title>
      <p>
        In this section, we rst recall the syntax and semantics of rst-order logic (FO).
We then de ne the syntax of the DL RDFS+ considered in this paper, which is a
slight extension of RDFS [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Its semantics is provided by means of the standard
translation, mapping RDFS+ ontologies into equivalent sets of FO formulas.
2.1
      </p>
      <sec id="sec-2-1">
        <title>First-Order Logic Preliminaries</title>
        <p>The alphabet of rst-order logic (FO ) consists of: countably in nite and pairwise
disjoint sets NP of predicate symbols (with ar(P ) 2 N being the arity of P 2 NP),
NF of function symbols (with ar(f ) 2 N being the arity of f 2 NF), NI of individual
symbols (or individual names ), and Var of variables; the equality symbol `='; the
Boolean operators `:' and `^'; and the existential quanti er `9'. An (FO ) formula
is an expression ' ::= P (t) j s = t j :' j (' ^ ') j 9x', where x 2 Var, P 2 NP,
s, t are terms, and t = (t1; : : : ; tar(P )) is a (possibly empty) tuple of terms, where
terms are de ned inductively as follows: t ::= x j a j f (t), where x 2 Var, a 2 NI,
f 2 NF, and t = (t1; : : : ; tar(f)). A formula of the form P (t) is called an atom,
and a literal has the form P (t) or :P (t). We adopt the usual abbreviations
and conventions: in particular, ' _ = :(:' ^ : ) and 8x' = :9x:', where
8 is the universal quanti er. We write '(x) to indicate that the free variables
(de ned as usual) of ' are included in x, and we write '(a) for the formula
obtained from '(x) by substituting a to x. Similar notions and notation are
adopted for terms. A sentence is de ned as a formula without free variables,
while we call quanti er-free a formula without any occurrence of existential or
universal quanti ers. A formula is existential if it has the form 9x'(x), where '
is a quanti er-free formula, and it is universal if it has the form 8x'(x), where
' is quanti er-free. A (FO ) theory T is a set of FO sentences, and T is said to be
universal if every ' 2 T is universal. A signature is a subset of NP [ NF [ NI.
For a set of formulas, the signature of , denoted , is the set of predicate,
function, and individual symbols occurring in . Given a signature , we say
that is a set of -formulas if = (we will use -formula, -theory, etc.,
in an analogous way).</p>
        <p>An (FO ) interpretation is a pair I = ( I ; I ), where I is a non-empty
set, called domain of I, and I is an interpretation function such that: P I
( I )ar(P ), for every P 2 NP; f I : ( I )ar(f) ! I , for every f 2 NF; and
aI 2 I , for every a 2 NI. An assignment in I is a function a : Var ! I .
We de ne the value of a term t in I under a as follows: a(t) = a(x), if t = x;
a(t) = aI , if t = a 2 NI; and a(t) = f I (a(t)), if t = f (t), where f 2 NF and,
for an m-tuple t = (t1; : : : ; tm) of terms, we set a(t) = (a(t1); : : : ; a(tm)). The
notion of a formula ' being satis ed in an interpretation I under an assignment
a, or of I being a model of ' under a, written I j=a ', is inductively de ned as:
I j=a P (t) i
I j=a s = t i
I j=a : i
I j=a ^ i
I j=a 9x i
a(t) 2 P I ;
a(s) = a(t);
not I j=a ;
I j=a and I j=a ;</p>
        <p>I j=a0 for some a0 that can di er from a on x:
For a formula '(x), we write I j= '[d] in place of I j=a '(x), with a(x) = d.
We say that a set of formulas is satis ed in an interpretation I under an
assignment a, or that I is a model of under a, written I j=a , if I j=a ', for
every ' 2 (we refer to a singleton = f'g simply as '). For a sentence ',
the satisfaction of ' in I under a does not depend on a, thus we write I j= ' in
place of I j=a ', and we say that ' is satis ed in I. For a theory T , we say that
T is satis ed in an interpretation I (or that I is a model of T ), written I j= T ,
if every sentence of T is satis ed in I. A formula ' is satis able w.r.t. T (or
T -satis able) if there exist an interpretation I and an assignment a in I such
that I j= T and I j=a '. Moreover, we say that T logically implies a formula ',
or that ' is a logical consequence of T , written T j= ', if, for every interpretation
I and every assignment a in I, I j= T implies that I j=a '. Finally, formulas ',
are equivalent w.r.t. T (or T -equivalent ) if T j= ' $ .
2.2</p>
      </sec>
      <sec id="sec-2-2">
        <title>Description Logics Preliminaries</title>
        <p>Let NC, NR, and NI be countably in nite and pairwise disjoint sets of concept,
role, and individual names, respectively (with NC [ NR NP, i.e., concept and
role names are predicate symbols, with arity 1 and 2, respectively).</p>
        <p>
          The DL we consider here is an extension of RDFS [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] with disjointness
between concepts and roles, conjunction and (one-level) quali ed existential
quanti cation on the left-hand side of inclusions, and inclusion of direct and inverse
roles. We denote such DL RDFS+ , and we de ne it below.
        </p>
        <p>In RDFS+ , concepts C and roles R are de ned according to the grammar
R ::= P j P ;</p>
        <p>C ::= A1 u u An j 9R:&gt; j 9R:A;
where P 2 NR, n 1, and A; A1; : : : ; An 2 NC.</p>
        <p>A concept inclusion (CI) has the form C v A or C v :A, and a role inclusion
(RI) has the form R v R0 or R v :R0, where C is an RDFS+ concept, A 2 NC,
and R, R0 are roles. An RDFS+ TBox T is a nite set of CIs and RIs. An
assertion has the form A(a), :A(a), P (a; b), :P (a; b), (a = b), or :(a = b),
where A 2 NC, P 2 NR, and a; b 2 NI. An ABox A is a nite set of assertions.
(We point out that in an ABox we allow for negated assertions, which is a feature
that is not always supported in DLs.) An RDFS+ ontology O is a pair (T ; A),
where T is a TBox and A is an ABox.</p>
        <p>
          We observe that RDFS+ is incomparable in expressive power with the DLs
of the popular DL-Lite family [
          <xref ref-type="bibr" rid="ref2 ref7">7,2</xref>
          ]. Indeed, while DL-Lite allows for the use of
existential quanti cation on the right-hand side of CIs, these are ruled out in
RDFS+ . On the other hand, in RDFS+ one can locally type the second
component of a role through the use of quali ed existential quanti cation on the
left-hand side of CIs, while this is not possible in DL-Lite. As we will see later,
di erently from what happens for DL-Lite, the FO translation of an RDFS+
ontology is a universal theory.
        </p>
        <p>Example 1. To represent part of the domain knowledge on job hiring processes
for university personnel, we de ne the RDFS+ ontology O = (T ; A), where T
consists of the following concept inclusions:</p>
        <sec id="sec-2-2-1">
          <title>AcademicPosition v JobPosition</title>
        </sec>
        <sec id="sec-2-2-2">
          <title>AdminPosition v JobPosition</title>
        </sec>
        <sec id="sec-2-2-3">
          <title>9appliesFor:&gt; v User</title>
        </sec>
        <sec id="sec-2-2-4">
          <title>9suitableFor:&gt; v User</title>
        </sec>
        <sec id="sec-2-2-5">
          <title>9suitableFor:&gt; v PositivelyEvaluated</title>
        </sec>
        <sec id="sec-2-2-6">
          <title>User u Graduate v EligibleUser</title>
        </sec>
        <sec id="sec-2-2-7">
          <title>AcademicPosition v :AdminPosition</title>
        </sec>
        <sec id="sec-2-2-8">
          <title>User v :JobPosition</title>
        </sec>
        <sec id="sec-2-2-9">
          <title>9appliesFor :&gt; v JobPosition</title>
        </sec>
        <sec id="sec-2-2-10">
          <title>9suitableFor :&gt; v JobPosition</title>
        </sec>
        <sec id="sec-2-2-11">
          <title>EligibleUser v User</title>
        </sec>
        <sec id="sec-2-2-12">
          <title>EligibleUser v Graduate</title>
          <p>while A, which stores data on available job positions, contains the assertions
AcademicPosition(professor123);
AcademicPosition(researcher123);</p>
          <p>AdminPosition(secretary123);
AdminPosition(secretary456):
Moreover, we assume that A contains all the assertions of the form :A(u),
:P (u; a) and :P (a; u), for a distinguished individual name u 2 NI and every
A; P; a 2 O, so that u can be used to represent an unde ned value. The CIs of
T formalise the following facts: there are both academic and administrative job
positions and these are disjoint; users and job positions are disjoint; appliesFor
relates users to job positions; to be suitable for something one has to be a user
that is positively evaluated; the range of suitableFor is included in the extension
of JobPositions; an eligible user is de ned as a graduate user. /</p>
          <p>We de ne now the standard translation from RDFS+ expressions to FO
formulas, which maps concepts to FO formulas with one free variable, and roles
to FO formulas with two free variables. Speci cally, the translation T generates
formulas that contain just two variables x; y 2 Var, and is de ned as follows:
T(A1 u
u An) = A1(x) ^</p>
          <p>T(P ) = P (x; y);
T(9R:&gt;) = 9yT(R);</p>
          <p>T(:A) = :T(A);
^ An(x);</p>
          <p>T(P ) = P (y; x);
T(9R:A) = 9y(T(R) ^ A(y));</p>
          <p>
            T(:R) = :T(R);
where A; A1; : : : ; An are unary predicates and P is a binary predicate. Moreover,
we map CIs and RIs into universal FO sentences in the following way:
T(C v D) = 8x(T(C) ! T(D));
T(R v S) = 8x8y(T(R) ! T(S));
where D stands for either A or :A, and S stands for either R0 or :R0. We
also set T(T ) = S 2T fT( )g. Assertions are (identically) mapped into FO
literals without free variables (i.e., ground ), as T( ) = , and we set T(A) =
S 2AfT( )g. Finally, T(O) = T(T ) [ T(A). It is easy to see that the set of FO
sentences obtained as the translation T(O) of an RDFS+ ontology O, can be
equivalently rewritten into a universal Horn theory [
            <xref ref-type="bibr" rid="ref23 ref25">25,23</xref>
            ]. Such a theory, which
we identify with T (O), can be obtained from T (O) by simply putting formulas
into prenex normal form.
          </p>
          <p>
            The semantics for RDFS+ expressions can be given in terms of their FO
translation [
            <xref ref-type="bibr" rid="ref25">25</xref>
            ]. For an interpretation I = ( I ; I ) and a concept C, we de ne
the extension of C in I as CI = fd 2 I j I j= T(C)[d]g. Similarly, for a role
R, we de ne its extension in I as RI = f(d; e) 2 I I j I j= T(R)[d; e]g. We
say that C and R are satis ed in I if CI 6= ; and RI 6= ;, respectively.
          </p>
          <p>Moreover, given a CI, RI, assertion, TBox, ABox, or ontology , we say that
is satis ed in I (or that I is a model of ), written I j= , i I j= T( ).
Given an ontology O and (a concept, role, CI, RI, or assertion mapped, via
its FO translation, into) an FO formula ', we say that ' is satis able w.r.t.
O (or O-satis able) if there exists a model I of O that satis es ' under some
assignment in I. Finally, we say that O logically implies an FO formula ', or
that ' is a logical consequence of O, written O j= ', if, for every model I of O
and every assignment a in I, we have that I satis es ' under a.
3</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Basic Model-Theoretic Properties</title>
      <p>
        In this section, we prove the model-theoretic properties that will be used later
on to develop our veri cation machinery. Speci cally, we show here that the
standard translation of the RDFS+ ontologies introduced in the previous section
admits model completion, and has the constraint satis ability problem decidable.
These properties will allow us, in the subsequent sections, to verify suitably
de ned DL-based data-aware processes by employing a variant of the SMT-based
backward reachability procedure introduced in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. To present our results, we
require the following preliminary notions.
      </p>
      <p>
        A formula that is a conjunction of -literals is called a -constraint. Given a
-theory T , we de ne the constraint satis ability problem for T as follows: given
a formula 9y'(x; y), where '(x; y) is a -constraint, decide whether 9y'(x; y)
is satis able w.r.t. T . A theory T has quanti er elimination i , for every T
formula '(x), there exists a quanti er-free formula (x) such that T j= '(x) $
(x). Finally, we will use the following de nition of model completion, which
is restricted to cover the case of universal theories (the ones considered in this
work) and that is nonetheless known to be equivalent (for universal theories) to
the usual one from model theory [
        <xref ref-type="bibr" rid="ref10 ref13 ref19">13,19,10</xref>
        ]. Let T be a universal -theory and
let T T be a further -theory. We say that T is a model completion of T
i : (i) every -constraint satis ed in some model of T is also satis ed in some
model of T ; (ii) T has quanti er elimination.
      </p>
      <p>We now state the main technical result of the section.
Theorem 2. Given an RDFS+ ontology O, T(O) is a nite universal FO theory
that (i) has a decidable constraint satis ability problem, and (ii) admits a model
completion.</p>
      <p>
        Proof (Sketch). To prove Point (i), we reduce to RDFS+ (seen as a fragment of
ALCHI, [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ]) ontology satis ability. For Point (ii), since there is no function
symbol in T (O), it is su cient to show that T (O) enjoys the amalgamation
property: this is proved by explicitly constructing a T (O)-amalgam for every
pair of models I1 and I2 of T (O) sharing a submodel I0 (see [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] for details).
Remark 3. For every RDFS+ ontology O, the model completion T (O) of T (O)
admits quanti er elimination. The algorithm for quanti er elimination in T (O)
follows from the proof of Theorem 2: to eliminate 9x from a T (O)-formula
9x'(x; y), it is su cient to take the conjunction of the clauses (y) implied
by '(x; y), which are nitely many for T (O), up to T (O)-equivalence. This
procedure is used in Algorithm 1 below and is crucial to get the decidability
results of Theorem 6. /
      </p>
      <p>
        Properties (i) and (ii) from Theorem 2 are in line with the foundational
framework of [
        <xref ref-type="bibr" rid="ref10 ref11">10,11</xref>
        ], where a third property is additionally assumed: the nite
model property for constraint satis ability (see the references for the de nition).
However, di erently from [
        <xref ref-type="bibr" rid="ref10 ref11">10,11</xref>
        ], this property is not needed anymore for the
results of our paper. This is an important di erence from [
        <xref ref-type="bibr" rid="ref10 ref11">10,11</xref>
        ], since the
artifact systems studied there require to interact with nite structures (i.e.,
databases), whereas in the context of the present work we admit that the models
of the knowledge base of our artifact systems can be in nite.
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>Ontology-Based Data-Aware Processes</title>
      <p>
        In this section, we present our main contributions. We rst de ne our model,
called RDFS+ -based simple artifact systems, or RDFS+ -SASs for short, to
formalise data-aware processes under RDFS+ ontologies. These systems are a
variant of the artifact-centric systems studied in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. RDFS+ -SASs read data from
a given RDFS+ ontology, used to store background information of the system,
and manipulate individual variables, called artifact variables, which represent
the current state of the process. We then study the parameterised safety
problems of such models by adopting a symbolic version [
        <xref ref-type="bibr" rid="ref11 ref21">21,11</xref>
        ] of the well-known
backward reachability procedure [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
4.1
      </p>
      <sec id="sec-4-1">
        <title>DL-Based Simple Artifact Systems</title>
        <p>We rst require the following preliminary notions. For an RDFS+ ontology O,
an O-partition is a nite set P = f 1(x); : : : ; n(x)g of O-literals such that
O j= 8x Win=1 i(x) ^ 8x Vi6=j :( i(x) ^ j (x)). Given an ontology O, an
Opartition P = f 1(x); : : : ; n(x)g, and O-terms t(x) = (t1(x); : : : ; tn(x)), (the
value of) a case-de ned function F based on P and t, for a fresh function symbol</p>
        <p>F 2 NF, is de ned as follows: for every model I of O, every assignment a in I,
and every tuple x of variables, a(F (x)) = a(ti(x)), if I j=a i(x).</p>
        <p>In order to introduce veri cation problems in a symbolic setting, one rst
has to specify which formulas are used to represent (i) the sets of states, (ii) the
system initialisations, and (iii) the system evolution. To capture these aspects,
we provide the following de nitions.</p>
        <p>An RDFS+ -based simple artifact system (RDFS+ -SAS) is a tuple</p>
        <p>S = (O; x; (x); Sjm=1f j (x; x0)g);
where m 2 N, and
{ O = (T ; A) is an RDFS+ ontology;
{ x = (x1; : : : ; xn) is a tuple of variables, called artifact variables, and x0 is a
tuple of variables that are renamed copies of variables in x;
{ (x) = Vin=1 xi = ai, with ai 2 NI, is an initial state formula;
{ j (x; x0) = 9y( j (x; y) ^ Vin=1 x0i = Fij (x; y)), for 1 j m, is a transition
formula, where j (x; y) is a conjunction of O-literals called guard of j ,
and x0i = Fij (x; y), where each Fij is a case-de ned function based on some
O-partition and list of O-terms, is an update of j .</p>
        <p>Given an RDFS+ ontology O, we call state ( O-)formula a quanti er-free
O-formula '(x). A state formula constrains the content of the artifact variables
characterising the current states of the systems. Notice that a state formula can
represent a (possibly in nite) set of states, because of the presence of (possibly
in nitely many) di erent elements in a model of the ontology O. A safety formula
for S is a state O-formula (x), used to describe the undesired states of the
system. We say that S is safe w.r.t. (x) if there does not exist k 0 and a
formula of the form
(x0) ^ j0 (x0; x1) ^
^ jk 1 (xk 1; xk) ^ (xk);
(?)
that is satis able w.r.t. O, where 1 j0; : : : ; jk 1 m and each xh, with
0 h k, is a tuple of variables that are renamed copies of variables in x. The
safety problem for S is the following decision problem: given a safety formula
(x) for S, decide whether S is safe w.r.t. (x). This veri cation problem is
parametric on the models of a xed RDFS+ ontology, since safety is assessed
irrespectively of the choice of such a model. This implies that, when the system
is safe, it is so for every execution of the process under every possible model
(which in principle are in nitely many) of the given ontology.</p>
        <p>Example 4. We develop a simpli ed job hiring process for university personnel
based on the domain knowledge formalised in Example 1. Each application is
created using a dedicated website portal, where users that are potentially
interested in applying need to register in advance. When a registered user decides
to apply, the data created by this single application do not have to be stored
persistently and thus can be maintained just by using artifact variables
(described below) that can interact with the knowledge base. All these variables
are initialised with an unde ned value u. In the rst transition of the system,
an application is created by a registered user, which falls into the extension of
the concept User: the information about this user is then stored in the artifact
variable xapplicant. At this point, the application website asks the user whether
they hold a university degree: in case of an a ermative answer, the website
accepts the user as eligible, the information about the user is stored using xapplicant
and the process can progress. Then, the user picks up a job position (assigned to
xjob) and applies for it. The following steps of the process involve the evaluation
of the application: for both academic and administrative positions, if the eligible
candidate is suitable for the chosen position, they are declared winner (assigned
to xwinner), otherwise they are declared loser (assigned to xloser). To formalise this
process, we de ne the RDFS+ -SAS S = (O; x; (x); Sj7=1f j (x; x0)g) so that:
{ the ontology O is the RDFS+ ontology given in Example 1;
{ the artifact variables are x = (xapplicant; xjob; xeligible; xwinner; xloser);
{ the initial state formula is</p>
        <p>= (xapplicant = u) ^ (xjob = u) ^ (xeligible = u) ^ (xwinner = u) ^ (xloser = u);
{ the transition formulas are
1 = 9y1(User(y1) ^ x0applicant = y1);
2 = EligibleUser(xapplicant) ^ x0eligible = xapplicant;
3 = 9z1(JobPosition(z1) ^ appliesFor(xeligible; z1) ^ xj0ob = z1);
4 = AcademicPosition(xjob) ^ suitableFor(xeligible; xjob) ^ x0winner = xeligible;
5 = AdminPosition(xjob) ^ suitableFor(xeligible; xjob) ^ x0winner = xeligible;
6 = AcademicPosition(xjob) ^ :suitableFor(xeligible; xjob) ^ xl0oser = xeligible;
7 = AdminPosition(xjob) ^ :suitableFor(xeligible; xjob) ^ xl0oser = xeligible:
An undesired situation of the system is the one where an applicant registered
user is declared winner even if they were not eligible. This situation is formally
described by the following safety formula for S:
= User(xwinner) ^ :EligibleUser(xwinner):
/
4.2</p>
        <p>Backward Search for RDFS+ -SASs
Algorithm 1 shows the SMT-based backward reachability procedure (or backward
search) for handling the safety problem for an RDFS+ -SAS S. An integral part
of the algorithm is to compute symbolic preimages (Line 5). The intuition behind
the algorithm is to execute a loop where, starting from the undesired states of
the system (described by the safety formula (x)), the state space of the system
is explored backward : in every iteration of the while loop (Line 2), the current set
of states is regressed through transitions thanks to the preimage computation.
For that purpose, for any (z; z0) and (z) (where z0 are renamed copies of z), we
de ne := Whm=1 h and Pre( ; ) as the formula 9z0( (z; z0) ^ (z0)). Let (x)
be a state formula, describing the state of the artifact variables x. The preimage
of the set of states described by the formula (x) is the set of states described by
Pre( ; ) (notice that, when = W ^, then Pre( ; ) = W Pre(^; )). We recall
that a state formula is a quanti er-free O-formula. Unfortunately, because of</p>
        <p>
          Algorithm 1: SMT-based backward reachability procedure
the presence of the existentially quanti ed variables y in , Pre( ; ) is not a
state formula, in general. As stated in [
          <xref ref-type="bibr" rid="ref10 ref11">10,11</xref>
          ], if the quanti ed variables were
not eliminated, we would break the regressability of the procedure: indeed, the
states reached by computing preimages, intuitively described by Pre( ; ), need
to be represented by a state formula 0 in the new iteration of the while loop.
In addition, the increase of the number of variables due to the iteration of the
preimage computation would a ect the performance of the satis ability tests
described below, in case the loop is executed many times. In order to solve these
issues, it is essential to introduce the subprocedure QE(T (O) ; ) in Line 6.
        </p>
        <p>QE(T (O) ; ) in Line 6 is a subprocedure that implements the quanti er
elimination algorithm of T (O) and that converts the preimage Pre( ; ) of a
state formula into a state formula (equivalent to it modulo the axioms of
T (O) ), so as to guarantee the regressability of the procedure: this conversion
is possible since T (O) eliminates from h the existentially quanti ed variables
y. Backward search computes iterated preimages of the safety formula , until
a xpoint is reached (in that case, S is safe w.r.t. ) or until a set intersecting
the initial states (i.e., satisfying ) is found (in that case, S is unsafe w.r.t. ).
Inclusion (Line 2) and disjointness (Line 3) tests can be discharged via proof
obligations to be handled by SMT solvers. The xpoint is reached when the test
in Line 2 returns unsat : the preimage of the set of the current states is included
in the set of states reached by the backward search so far (represented as the
iterated application of preimages to the safety formula ). The test at Line 3
is satis able when the states visited so far by the backward search includes a
possible initial state (i.e., a state satisfying ). If this is the case, then S is
unsafe w.r.t. . Together with the unsafe outcome, the algorithm also returns an
unsafe trace of the form (?), explicitly witnessing the sequence of transitions h
that, starting from the initial con gurations, lead the system to a set of states
satisfying the undesired conditions described by (x).</p>
        <p>Theorem 5. Backward search (Algorithm 1) is correct for detecting whether an
RDFS+ -SAS S is safe w.r.t. (x).</p>
        <p>Proof (Sketch). First, we require the following claim, which follows immediately
from the de nitions.
Claim 1. For every safety formula (x) for S and every k 0, a formula # of
the form (?) is satis able w.r.t. O i # is satis able w.r.t. T (O).</p>
        <p>Then, we need to show that, instead of considering satis ability of formulas of
the form (?) in models of T (O), we can concentrate on satis ability w.r.t. T (O)
(T (O) exists thanks to Property (ii) of Theorem 2). Then, by exploiting the
algorithm for quanti er elimination in T (O) described in Remark 3, formulas
of the form (?) can be represented via backward search by using quanti er-free
formulas. We nally conclude by noticing that safety/unsafety of S w.r.t (x)
can be now detected invoking the satis ability tests (which are e ective thanks
to Property (i) of Theorem 2) over those quanti er-free formulae.</p>
        <p>
          Backward search for generic artifact systems is not guaranteed to
terminate [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. However, in case S is unsafe w.r.t. (x), an unsafe trace|which is
nite|is found after nitely many iterations of the while loop: hence, in the
unsafe case, backward search must terminate. Together with the theorem above,
this means that the backward reachability procedure is at least a semi-decision
procedure for detecting unsafety of RDFS+ -SASs. Nevertheless, we show in the
following theorem that, in case of RDFS+ -SASs, backward search always
terminates: thus, it is a full decision procedure, for which we also provide a PSpace
upper bound.
        </p>
        <p>Theorem 6. For an RDFS+ ontology O and an RDFS+ -SAS S =
(O; x; (x); Sm</p>
        <p>j=1f j (x; x0)g), the safety problem for S is decidable in PSpace
in the combined size of x, (x) and Sm</p>
        <p>j=1f j (x; x0)g.</p>
        <p>Proof (Sketch). For every RDFS+ ontology O, there are only nitely many
quanti er-free T (O)-formulas, up to T (O)-equivalence, that can be built out
of a nite set of variables x. Thanks to the availability of the quanti er
elimination procedure QE(T (O) ; '), the overall number of variables in ' is never
increased. This implies that globally there are only nitely many quanti er-free</p>
        <p>T (O)-formulas that Algorithm 1 needs to analyse. Hence, Algorithm 1
terminates. Concerning complexity, we rst note that the translation T (O) requires
polynomial time. Then, we need to eliminate the occurrences of case-de ned
functions (creating an equivalent SAS whose size is polynomial in the size of the
original one), and to modify Algorithm 1 by making it nondeterministic with an
NPSpace complexity. The claim follows by applying Savitch's Theorem.</p>
        <p>
          We observe that Algorithm 1 is not yet implemented in the state-of-the-art
model checker MCMT (Model Checker Modulo Theories [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ]), which is based
on SMT solving. Such an implementation, however, can be obtained by
extending MCMT with the quanti er elimination algorithm for T (O) (described in
Remark 3), required in Line 6, together with a procedure for RDFS+ ontology
satis ability (seen as a fragment of ALCHI, [
          <xref ref-type="bibr" rid="ref29">29</xref>
          ]), required in Lines 2 and 3.
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>We have studied the problem of veri cation of data-aware processes under
RDFS+ ontologies, where the process component can interact with a knowledge
base speci ed by means of the DL RDFS+ , underpinning the RDFS constructs.
We addressed this problem by introducing a suitable model of DL-based
artifactcentric systems, called RDFS+ -based SASs, and by leveraging the SMT-based
version of the backward reachability procedure, which is a well-known technique
to employ for verifying systems of this kind. Speci cally, we showed that this
procedure is a full decision procedure for detecting safety of RDFS+ -based SASs,
and we also provided a PSpace complexity upper bound.</p>
      <p>
        This work opens several directions for future work. First, we notice that the
choice of RDFS+ ontologies is not intrinsic to our approach. Indeed, motivated
by conceptual modelling and data integration issues in OBDA applications, we
are currently working on the DL-Lite family of DLs, to de ne suitable
DLLite-based SASs with analogous decidability and complexity results. The main
di erence we have to account for is that, for a DL-Lite ontology O, we have an
equisatis able (but not equivalent) translation into a universal one-variable FO
sentence T (O), and Claim 1 in the proof of Theorem 5 has to be modi ed to show
that a trace # is satis able w.r.t. O i a suitably translated trace #^ is satis able
w.r.t. T (O). In general, nonetheless, we point out that any DL satisfying the
two conditions stated in Theorem 2 can be chosen for our purposes, and that
the same theoretical guarantees can be obtained over the SMT-based backward
reachability procedure. As future work, we thus intend to introduce a more
general framework for DL-based SASs that is able to account for di erent DLs.
We also intend to extend the results obtained here to more sophisticated
artifactcentric models, such as the relational artifact systems (RASs) studied in [
        <xref ref-type="bibr" rid="ref10 ref11">10,11</xref>
        ].
Moreover, it could be worth investigating in this setting also properties that go
beyond safety, such as liveness and fairness.
      </p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgements</title>
      <p>This research has been partially supported by the Wallenberg AI, Autonomous
Systems and Software Program (WASP) funded by the Knut and Alice
Wallenberg Foundation, by the Italian Basic Research (PRIN) project HOPE, by
the EU H2020 project INODE (grant agreement 863410) by the CHIST-ERA
project PACMEL, by the project IDEE (FESR1133) funded by the Eur. Reg.
Development Fund (ERDF) Investment for Growth and Jobs Programme
20142020, and by the Free University of Bozen-Bolzano through the projects KGID,
GeoVKG, STyLoLa, VERBA and MENS.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Abdulla</surname>
            ,
            <given-names>P.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cerans</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jonsson</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsay</surname>
          </string-name>
          , Y.:
          <article-title>General decidability theorems for in nite-state systems</article-title>
          .
          <source>In: Proc. of the 11th Int. Conf. on Logic in Computer Science (LICS)</source>
          . pp.
          <volume>313</volume>
          {
          <fpage>321</fpage>
          . IEEE Computer Society (
          <year>1996</year>
          ). https://doi.org/10.1109/LICS.
          <year>1996</year>
          .561359
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Artale</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kontchakov</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zakharyaschev</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>The DL-Lite family and relations</article-title>
          .
          <source>J. of Arti cial Intelligence Research</source>
          <volume>36</volume>
          ,
          <issue>1</issue>
          {
          <fpage>69</fpage>
          (
          <year>2009</year>
          ). https://doi.org/10.1613/jair.2820
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Bagheri</given-names>
            <surname>Hariri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Calvanese</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>De Giacomo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>De</surname>
          </string-name>
          <string-name>
            <surname>Masellis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Montali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Felli</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.</surname>
          </string-name>
          :
          <article-title>Veri cation of description logic Knowledge and Action Bases</article-title>
          .
          <source>In: Proc. of the 20th Eur. Conf. on Arti cial Intelligence (ECAI)</source>
          . pp.
          <volume>103</volume>
          {
          <issue>108</issue>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>Bagheri</given-names>
            <surname>Hariri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Calvanese</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>De Giacomo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Deutsch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Montali</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          :
          <article-title>Veri cation of relational data-centric dynamic systems with external services</article-title>
          .
          <source>In: Proc. of the 32nd ACM Symp. on Principles of Database Systems (PODS)</source>
          . pp.
          <volume>163</volume>
          {
          <issue>174</issue>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>Bagheri</given-names>
            <surname>Hariri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Calvanese</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Montali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>De Giacomo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>De</surname>
          </string-name>
          <string-name>
            <surname>Masellis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Felli</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.</surname>
          </string-name>
          :
          <article-title>Description logic Knowledge and Action Bases</article-title>
          .
          <source>J. of Arti cial Intelligence Research</source>
          <volume>46</volume>
          ,
          <volume>651</volume>
          {
          <fpage>686</fpage>
          (
          <year>2013</year>
          ). https://doi.org/10.1613/jair.3826
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Brickley</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guha</surname>
          </string-name>
          , R.:
          <source>RDF Schema 1.1. W3C Recommendation</source>
          , World Wide Web Consortium (
          <year>2014</year>
          ), available at https://www.w3.org/TR/rdf-schema/
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>De Giacomo</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lembo</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lenzerini</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosati</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Tractable reasoning and e cient query answering in description logics: The DL-Lite family</article-title>
          .
          <source>J. of Automated Reasoning</source>
          <volume>39</volume>
          (
          <issue>3</issue>
          ),
          <volume>385</volume>
          {
          <fpage>429</fpage>
          (
          <year>2007</year>
          ). https://doi.org/10.1007/s10817- 007-9078-x
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>De Giacomo</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Montali</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Foundations of data aware process analysis: A database theory perspective</article-title>
          .
          <source>In: Proc. of the 32nd ACM Symp. on Principles of Database Systems (PODS)</source>
          . pp.
          <volume>1</volume>
          {
          <issue>12</issue>
          (
          <year>2013</year>
          ). https://doi.org/10.1145/2463664.2467796
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ghilardi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gianola</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Montali</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rivkin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Formal modeling and SMT-based parameterized veri cation of data-aware BPMN</article-title>
          .
          <source>In: Proc. of the 17th Int. Conf. on Business Process Management (BPM). Lecture Notes in Computer Science</source>
          , vol.
          <volume>11675</volume>
          , pp.
          <volume>157</volume>
          {
          <fpage>175</fpage>
          . Springer (
          <year>2019</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -26619-6 12
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ghilardi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gianola</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Montali</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rivkin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>From model completeness to veri cation of data aware processes</article-title>
          . In: Description Logic,
          <string-name>
            <given-names>Theory</given-names>
            <surname>Combination</surname>
          </string-name>
          , and All That { Essays Dedicated to Franz
          <source>Baader on the Occasion of his 60th Birthday. Lecture Notes in Computer Science</source>
          , vol.
          <volume>11560</volume>
          , pp.
          <volume>212</volume>
          {
          <fpage>239</fpage>
          . Springer (
          <year>2019</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -22102-7 10
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ghilardi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gianola</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Montali</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rivkin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>SMTbased veri cation of data-aware processes: A model-theoretic approach</article-title>
          .
          <source>Mathematical Structures in Computer Science</source>
          <volume>30</volume>
          (
          <issue>3</issue>
          ),
          <volume>271</volume>
          {
          <fpage>313</fpage>
          (
          <year>2020</year>
          ). https://doi.org/10.1017/S0960129520000067
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gianola</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mazzullo</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Montali</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>SMT-Based Safety Veri cation of Data-Aware Processes under Ontologies (Extended Version)</article-title>
          .
          <source>Tech. Rep. arXiv:2108.12330</source>
          , arXiv.org e-Print
          <string-name>
            <surname>archive</surname>
          </string-name>
          (
          <year>2021</year>
          ), available at https://arxiv.org/abs/2108.12330
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Chang</surname>
            ,
            <given-names>C.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Keisler</surname>
            ,
            <given-names>H.J.</given-names>
          </string-name>
          :
          <source>Model Theory. North-Holland Publ. Co., 3rd edn.</source>
          (
          <year>1990</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Cla</surname>
            <given-names>en</given-names>
          </string-name>
          , J.,
          <string-name>
            <surname>Liebenberg</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lakemeyer</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zarrie</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Exploring the boundaries of decidable veri cation of non-terminating golog programs</article-title>
          .
          <source>In: Proc. of the 28th AAAI Conf. on Arti cial Intelligence (AAAI)</source>
          . pp.
          <volume>1012</volume>
          {
          <fpage>1019</fpage>
          . AAAI Press (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Damaggio</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Deutsch</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vianu</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Artifact systems with data dependencies and arithmetic</article-title>
          .
          <source>ACM Trans. on Database Systems</source>
          <volume>37</volume>
          (
          <issue>3</issue>
          ),
          <volume>22</volume>
          (
          <year>2012</year>
          ). https://doi.org/10.1145/2338626.2338628
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Deutsch</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hull</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patrizi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vianu</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Automatic veri cation of data-centric business processes</article-title>
          .
          <source>In: Proc. of the 12th Int. Conf. on Database Theory (ICDT)</source>
          . pp.
          <volume>252</volume>
          {
          <issue>267</issue>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Deutsch</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hull</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vianu</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Automatic veri cation of database-centric systems</article-title>
          .
          <source>SIGMOD Record</source>
          <volume>43</volume>
          (
          <issue>3</issue>
          ),
          <volume>5</volume>
          {
          <fpage>17</fpage>
          (
          <year>2014</year>
          ). https://doi.org/10.1145/2694428.2694430
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Deutsch</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vianu</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Veri cation of hierarchical artifact systems</article-title>
          .
          <source>ACM Trans. on Database Systems</source>
          <volume>44</volume>
          (
          <issue>3</issue>
          ),
          <volume>12</volume>
          :1{
          <fpage>12</fpage>
          :
          <fpage>68</fpage>
          (
          <year>2019</year>
          ). https://doi.org/10.1145/3321487
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Ghilardi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Model-theoretic methods in combined constraint satis ability</article-title>
          .
          <source>J. of Automated Reasoning</source>
          <volume>33</volume>
          (
          <issue>3</issue>
          {4),
          <volume>221</volume>
          {
          <fpage>249</fpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Ghilardi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gianola</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Montali</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rivkin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Petri nets with parameterised data - modelling and veri cation</article-title>
          .
          <source>In: Proc. of the 18th Int. Conf. on Business Process Management (BPM). Lecture Notes in Computer Science</source>
          , vol.
          <volume>12168</volume>
          , pp.
          <volume>55</volume>
          {
          <fpage>74</fpage>
          . Springer (
          <year>2020</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -58666-9 4
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Ghilardi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ranise</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Backward reachability of array-based systems by SMT solving: Termination and invariant synthesis</article-title>
          .
          <source>Log. Methods Comput. Sci. 6</source>
          (
          <issue>4</issue>
          ) (
          <year>2010</year>
          ). https://doi.org/10.2168/LMCS-6(
          <issue>4</issue>
          :10)
          <fpage>2010</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Ghilardi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ranise</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <string-name>
            <surname>MCMT</surname>
          </string-name>
          :
          <article-title>A model checker modulo theories</article-title>
          . In: Giesl,
          <string-name>
            <surname>J.</surname>
          </string-name>
          , Hahnle, R. (eds.)
          <source>Proc. of the 5th Int. Joint Conf. on Automated Reasoning (IJCAR). Lecture Notes in Computer Science</source>
          , vol.
          <volume>6173</volume>
          , pp.
          <volume>22</volume>
          {
          <fpage>29</fpage>
          . Springer (
          <year>2010</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>642</fpage>
          -14203-1 3
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Hodges</surname>
          </string-name>
          , W.:
          <source>Model Theory, Encyclopedia of Mathematics and its applications</source>
          , vol.
          <volume>42</volume>
          . Cambridge University Press (
          <year>1993</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Hull</surname>
          </string-name>
          , R.:
          <article-title>Artifact-centric business process models: Brief survey of research results and challenges</article-title>
          .
          <source>In: Proc. of the 7th Int. Conf. on Ontologies, DataBases, and Applications of Semantics (ODBASE). Lecture Notes in Computer Science</source>
          , vol.
          <volume>5332</volume>
          , pp.
          <volume>1152</volume>
          {
          <fpage>1163</fpage>
          . Springer (
          <year>2008</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>540</fpage>
          -88873-4 17
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Kontchakov</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zakharyaschev</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>An introduction to description logics and query rewriting</article-title>
          .
          <source>In: Reasoning Web: Reasoning on the Web in the Big Data Era { 10th Int. Summer School Tutorial Lectures (RW). Lecture Notes in Computer Science</source>
          , vol.
          <volume>8714</volume>
          , pp.
          <volume>195</volume>
          {
          <fpage>244</fpage>
          . Springer (
          <year>2014</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -10587-1 5
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26. de Leoni,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Felli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Montali</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          :
          <article-title>Strategy synthesis for data-aware dynamic systems with multiple actors</article-title>
          . In: Calvanese,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Erdem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            ,
            <surname>Thielscher</surname>
          </string-name>
          , M. (eds.)
          <source>Proc. of the 17th Int. Conf. on Principles of Knowledge Representation and Reasoning (KR)</source>
          . pp.
          <volume>315</volume>
          {
          <issue>325</issue>
          (
          <year>2020</year>
          ). https://doi.org/10.24963/kr.2020/32
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Montali</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rivkin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ritter</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Formalizing integration patterns with multimedia data</article-title>
          .
          <source>In: Proc. of the 24th Int. Conf. on Enterprise Distributed Object Computing (EDOC)</source>
          . pp.
          <volume>67</volume>
          {
          <fpage>76</fpage>
          .
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>2020</year>
          ). https://doi.org/10.1109/EDOC49727.
          <year>2020</year>
          .00018
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Reichert</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Process and data: Two sides of the same coin?</article-title>
          <source>In: Proc. of the On the Move Confederated Int. Conf. (OTM). Lecture Notes in Computer Science</source>
          , vol.
          <volume>7565</volume>
          , pp.
          <volume>2</volume>
          {
          <fpage>19</fpage>
          . Springer (
          <year>2012</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>642</fpage>
          -33606-5 2
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Rudolph</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Foundations of description logics</article-title>
          .
          <source>In: Reasoning Web: Semantic Technologies for the Web of Data { 7th Int. Summer School Tutorial Lectures (RW). Lecture Notes in Computer Science</source>
          , vol.
          <volume>6848</volume>
          , pp.
          <volume>76</volume>
          {
          <fpage>136</fpage>
          . Springer (
          <year>2011</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>642</fpage>
          -23032-5 2
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Vianu</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Automatic veri cation of database-driven systems: a new frontier</article-title>
          .
          <source>In: Proc. of the 12th Int. Conf. on Database Theory (ICDT)</source>
          . pp.
          <volume>1</volume>
          {
          <issue>13</issue>
          (
          <year>2009</year>
          ). https://doi.org/10.1145/1514894.1514896
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Zarrie</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cla</surname>
            <given-names>en</given-names>
          </string-name>
          , J.:
          <article-title>Decidable veri cation of golog programs over non-local e ect actions</article-title>
          .
          <source>In: Proc. of the 30th AAAI Conf. on Arti cial Intelligence (AAAI)</source>
          . pp.
          <volume>1109</volume>
          {
          <fpage>1115</fpage>
          . AAAI Press (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>