<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">SMT-Based Safety Verification of Data-Aware Processes under Ontologies (Preliminary Results)</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Diego</forename><surname>Calvanese</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">KRDB Research Centre for Knowledge and Data</orgName>
								<orgName type="institution">University of Bozen-Bolzano</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department">Computing Science Department</orgName>
								<orgName type="institution">Umeå University</orgName>
								<address>
									<country key="SE">Sweden</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Alessandro</forename><surname>Gianola</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">KRDB Research Centre for Knowledge and Data</orgName>
								<orgName type="institution">University of Bozen-Bolzano</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrea</forename><surname>Mazzullo</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">KRDB Research Centre for Knowledge and Data</orgName>
								<orgName type="institution">University of Bozen-Bolzano</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Marco</forename><surname>Montali</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">KRDB Research Centre for Knowledge and Data</orgName>
								<orgName type="institution">University of Bozen-Bolzano</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">SMT-Based Safety Verification of Data-Aware Processes under Ontologies (Preliminary Results)</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">2670184A432C86F08E08F25B1356FDFD</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T19:48+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In the context of verification of data-aware processes, a formal approach based on satisfiability modulo theories (SMT) has been considered to verify parameterised safety properties of so-called artifactcentric systems. This approach requires a combination of model-theoretic notions and algorithmic techniques based on backward reachability. We introduce here a variant of one of the most investigated models in this spectrum, namely simple artifact systems (SASs), where, instead of managing a database, we operate over a description logic (DL) ontology expressed in (a slight extension of) RDFS. This DL, enjoying suitable model-theoretic properties, allows us to define DL-based SASs to which backward reachability can still be applied, leading to decidability in PSpace of the corresponding safety problems.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Verifying and reasoning about dynamic systems that integrate processes and data is a long-standing challenge that attracted considerable attention, and that led to a flourishing series of results, within business process management <ref type="bibr" target="#b27">[28,</ref><ref type="bibr" target="#b8">9,</ref><ref type="bibr" target="#b19">20]</ref> and data management <ref type="bibr" target="#b29">[30,</ref><ref type="bibr" target="#b7">8,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b16">17,</ref><ref type="bibr" target="#b17">18]</ref>. Among the several conceptual models studied in this area, data-centric systems and in particular artifact-centric systems have been brought forward as a principled approach where relevant (business) objects are elicited, then defining how actions evolve them throughout their lifecycle <ref type="bibr" target="#b23">[24]</ref>. Different formal models have been proposed to capture artifact systems and study their verification <ref type="bibr" target="#b7">[8]</ref>. One of the most studied settings considers artifact systems as being composed of: a read-only database storing background information about artifacts that does not change during the evolution of the system; a working memory, used to store data that can be modified in the course of the evolution; and transitions (also called actions or services) that query the read-only database and the working memory and use the retrieved answers to update the working memory. Verification of such systems is particularly challenging, not only because the working memory in general evolves through infinitely many different configurations, but also because the desired verification properties should hold regardless of the specific content of the read-only database, thus calling for a particular form of parameterised verification <ref type="bibr" target="#b14">[15,</ref><ref type="bibr" target="#b17">18,</ref><ref type="bibr" target="#b9">10,</ref><ref type="bibr" target="#b10">11]</ref>.</p><p>In this paper, we study for the first time semantic artifact systems where the read-only database is substituted by a Description Logic ontology, which stores background, incomplete information about the artifacts. In this setting, two possible notions of parameterisation may be studied: one where the evolution of the system is verified against all possible choices for the ABox, another where verification is against all possible models of a fixed ABox. In this work, we adopt the latter hypothesis, and thus verify whether the artifact system enjoys desired properties irrespectively of how the information explicitly provided by the ABox is completed through the TBox assertions.</p><p>More in detail, we consider an extensively studied, basic model of such artifact-centric systems, called simple artifact system (SAS ) in <ref type="bibr" target="#b10">[11]</ref>, where the artifact working memory consists of a fixed set of artifact variables <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b14">15,</ref><ref type="bibr" target="#b10">11]</ref>. On top of this basis, we study the verification of safety properties in the case where the ontology is specified in (a slight extension of) RDFS <ref type="bibr" target="#b5">[6]</ref>, a schema language for the Semantic Web formalized by the W3C, and we make use of the ontology signature to express the transitions that update the working memory. For this setting, we show that we can decide safety properties in PSpace by relying on an SMT-based backward reachability procedure.</p><p>In spirit, our approach is reminiscent of previous works studying the verification of dynamic systems (in particular, Golog programs) operating over a DL ontology, such as <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b30">31]</ref>. In fact, both in their settings and ours, the dynamic system evolves each model of the ontology, and verification properties are assessed over all the resulting evolutions. This is radically different from approaches where the ABox itself is evolved by the process, with an execution semantics following Levesque's functional approach, in which query entailment over the current state is used to compute the successor states <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b4">5]</ref>. However, we differ from <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b30">31]</ref> in that our goal is not only to derive foundational results, but also to transfer such results into practical algorithms and thus obtain a model that is readily implementable by relying on a state-of-the-art model checker such as MCMT <ref type="bibr" target="#b21">[22]</ref>. As customary in the formal literature on artifact-centric systems, our approach is based on actions that manipulate the artifact variables, coupled with condition-action rules that declaratively define which actions are currently executable, and with which parameters. Alternative choices could be seamlessly taken, by adapting approaches that rely on an explicit description of the controlflow, e.g., based on state machines <ref type="bibr" target="#b25">[26]</ref> or Petri nets interpreted with interleaving semantics <ref type="bibr" target="#b19">[20,</ref><ref type="bibr" target="#b26">27]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Preliminaries</head><p>In this section, we first recall the syntax and semantics of first-order logic (FO). We then define the syntax of the DL RDFS + considered in this paper, which is a slight extension of RDFS <ref type="bibr" target="#b5">[6]</ref>. Its semantics is provided by means of the standard translation, mapping RDFS + ontologies into equivalent sets of FO formulas.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">First-Order Logic Preliminaries</head><p>The alphabet of first-order logic (FO) consists of: countably infinite and pairwise disjoint sets N P of predicate symbols (with ar(P ) ∈ N being the arity of P ∈ N P ), N F of function symbols (with ar(f ) ∈ N being the arity of f ∈ N F ), N I of individual symbols (or individual names), and Var of variables; the equality symbol '='; the Boolean operators '¬' and '∧'; and the existential quantifier '∃'. An (FO) formula is an expression ϕ ::</p><formula xml:id="formula_0">= P (t) | s = t | ¬ϕ | (ϕ ∧ ϕ) | ∃xϕ</formula><p>, where x ∈ Var, P ∈ N P , s, t are terms, and t = (t 1 , . . . , t ar(P ) ) is a (possibly empty) tuple of terms, where terms are defined inductively as follows: t ::= x | a | f (t), where x ∈ Var, a ∈ N I , f ∈ N F , and t = (t 1 , . . . , t ar(f ) ). A formula of the form P (t) is called an atom, and a literal has the form P (t) or ¬P (t). We adopt the usual abbreviations and conventions: in particular, ϕ ∨ ψ = ¬(¬ϕ ∧ ¬ψ) and ∀xϕ = ¬∃x¬ϕ, where ∀ is the universal quantifier. We write ϕ(x) to indicate that the free variables (defined as usual) of ϕ are included in x, and we write ϕ(a) for the formula obtained from ϕ(x) by substituting a to x. Similar notions and notation are adopted for terms. A sentence is defined as a formula without free variables, while we call quantifier-free a formula without any occurrence of existential or universal quantifiers. A formula is existential if it has the form ∃xϕ(x), where ϕ is a quantifier-free formula, and it is universal if it has the form ∀xϕ(x), where ϕ is quantifier-free. A (FO) theory T is a set of FO sentences, and T is said to be universal if every ϕ ∈ T is universal. A signature Σ is a subset of N P ∪ N F ∪ N I . For a set Γ of formulas, the signature of Γ , denoted Σ Γ , is the set of predicate, function, and individual symbols occurring in Γ . Given a signature Σ, we say that Γ is a set of Σ-formulas if Σ Γ = Σ (we will use Σ-formula, Σ-theory, etc., in an analogous way). An (FO) interpretation is a pair I = (∆ I , • I ), where ∆ I is a non-empty set, called domain of I, and • I is an interpretation function such that: P I ⊆ (∆ I ) ar(P ) , for every P ∈ NP; f I : (∆ I ) ar(f ) −→ ∆ I , for every f ∈ N F ; and a I ∈ ∆ I , for every a ∈ N I . An assignment in I is a function a : Var −→ ∆ I . We define the value of a term t in I under a as follows: a(t) = a(x), if t = x; a(t) = a I , if t = a ∈ N I ; and a(t) = f I (a(t)), if t = f (t), where f ∈ N F and, for an m-tuple t = (t 1 , . . . , t m ) of terms, we set a(t) = (a(t 1 ), . . . , a(t m )). The notion of a formula ϕ being satisfied in an interpretation I under an assignment a, or of I being a model of ϕ under a, written I |= a ϕ, is inductively defined as:</p><formula xml:id="formula_1">I |= a P (t) iff a(t) ∈ P I , I |= a s = t iff a(s) = a(t), I |= a ¬ψ</formula><p>iff not I |= a ψ, I |= a ψ ∧ χ iff I |= a ψ and I |= a χ, I |= a ∃xψ iff I |= a ψ for some a that can differ from a on x.</p><p>For a formula ϕ(x), we write I |= ϕ[d] in place of I |= a ϕ(x), with a(x) = d. We say that a set Γ of formulas is satisfied in an interpretation I under an assignment a, or that I is a model of Γ under a, written I |= a Γ , if I |= a ϕ, for every ϕ ∈ Γ (we refer to a singleton Γ = {ϕ} simply as ϕ). For a sentence ϕ, the satisfaction of ϕ in I under a does not depend on a, thus we write I |= ϕ in place of I |= a ϕ, and we say that ϕ is satisfied in I. For a theory T , we say that T is satisfied in an interpretation I (or that I is a model of T ), written I |= T , if every sentence of T is satisfied in I. A formula ϕ is satisfiable w.r.t. T (or T -satisfiable) if there exist an interpretation I and an assignment a in I such that I |= T and I |= a ϕ. Moreover, we say that T logically implies a formula ϕ, or that ϕ is a logical consequence of T , written T |= ϕ, if, for every interpretation I and every assignment a in I, I |= T implies that I |= a ϕ. Finally, formulas ϕ, ψ are equivalent w.r.t.</p><formula xml:id="formula_2">T (or T -equivalent) if T |= ϕ ↔ ψ.</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Description Logics Preliminaries</head><p>Let N C , N R , and N I be countably infinite and pairwise disjoint sets of concept, role, and individual names, respectively (with N C ∪ N R ⊆ N P , i.e., concept and role names are predicate symbols, with arity 1 and 2, respectively).</p><p>The DL we consider here is an extension of RDFS <ref type="bibr" target="#b5">[6]</ref> with disjointness between concepts and roles, conjunction and (one-level) qualified existential quantification on the left-hand side of inclusions, and inclusion of direct and inverse roles. We denote such DL RDFS + , and we define it below.</p><p>In RDFS + , concepts C and roles R are defined according to the grammar (We point out that in an ABox we allow for negated assertions, which is a feature that is not always supported in DLs.) An RDFS + ontology O is a pair (T , A), where T is a TBox and A is an ABox.</p><formula xml:id="formula_3">R ::= P | P − , C ::= A 1 • • • A n | ∃R. | ∃R.A, where P ∈ N R , n ≥ 1,</formula><p>We observe that RDFS + is incomparable in expressive power with the DLs of the popular DL-Lite family <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b1">2]</ref>. Indeed, while DL-Lite allows for the use of existential quantification on the right-hand side of CIs, these are ruled out in RDFS + . On the other hand, in RDFS + one can locally type the second component of a role through the use of qualified existential quantification on the left-hand side of CIs, while this is not possible in DL-Lite. As we will see later, differently from what happens for DL-Lite, the FO translation of an RDFS + ontology is a universal theory.</p><p>Example 1. To represent part of the domain knowledge on job hiring processes for university personnel, we define the RDFS + ontology O = (T , A), where T consists of the following concept inclusions: Moreover, we assume that A contains all the assertions of the form ¬A(u), ¬P (u, a) and ¬P (a, u), for a distinguished individual name u ∈ N I and every A, P, a ∈ Σ O , so that u can be used to represent an undefined value. The CIs of T formalise the following facts: there are both academic and administrative job positions and these are disjoint; users and job positions are disjoint; appliesFor relates users to job positions; to be suitable for something one has to be a user that is positively evaluated; the range of suitableFor is included in the extension of JobPositions; an eligible user is defined as a graduate user.</p><p>We define now the standard translation from RDFS + expressions to FO formulas, which maps concepts to FO formulas with one free variable, and roles to FO formulas with two free variables. Specifically, the translation T generates formulas that contain just two variables x, y ∈ Var, and is defined as follows:</p><formula xml:id="formula_4">T(A 1 • • • A n ) = A 1 (x) ∧ • • • ∧ A n (x), T(P ) = P (x, y), T(P − ) = P (y, x), T(∃R. ) = ∃yT(R), T(∃R.A) = ∃y(T(R) ∧ A(y)), T(¬A) = ¬T(A), T(¬R) = ¬T(R),</formula><p>where A, A 1 , . . . , A n are unary predicates and P is a binary predicate. Moreover, we map CIs and RIs into universal FO sentences in the following way:</p><formula xml:id="formula_5">T(C D) = ∀x(T(C) → T(D)), T(R S) = ∀x∀y(T(R) → T(S)),</formula><p>where D stands for either A or ¬A, and S stands for either R or ¬R . We also set T(T ) = β∈T {T(β)}. Assertions α are (identically) mapped into FO literals without free variables (i.e., ground ), as T(α) = α, and we set</p><formula xml:id="formula_6">T(A) = α∈A {T(α)}. Finally, T(O) = T(T ) ∪ T(A).</formula><p>It is easy to see that the set of FO sentences obtained as the translation T(O) of an RDFS + ontology O, can be equivalently rewritten into a universal Horn theory <ref type="bibr" target="#b24">[25,</ref><ref type="bibr" target="#b22">23]</ref>. Such a theory, which we identify with T (O), can be obtained from T (O) by simply putting formulas into prenex normal form.</p><p>The semantics for RDFS + expressions can be given in terms of their FO translation <ref type="bibr" target="#b24">[25]</ref>. For an interpretation I = (∆ I , • I ) and a concept C, we define the extension of C in I as</p><formula xml:id="formula_7">C I = {d ∈ ∆ I | I |= T(C)[d]}.</formula><p>Similarly, for a role R, we define its extension in I as</p><formula xml:id="formula_8">R I = {(d, e) ∈ ∆ I × ∆ I | I |= T(R)[d, e]}. We say that C and R are satisfied in I if C I = ∅ and R I = ∅, respectively.</formula><p>Moreover, given a CI, RI, assertion, TBox, ABox, or ontology Γ , we say that Γ is satisfied in I (or that I is a model of Γ ), written I |= Γ , iff I |= T(Γ ). Given an ontology O and (a concept, role, CI, RI, or assertion mapped, via its FO translation, into) an FO formula ϕ, we say that ϕ is satisfiable w.r.t. O (or O-satisfiable) if there exists a model I of O that satisfies ϕ under some assignment in I. Finally, we say that O logically implies an FO formula ϕ, or that ϕ is a logical consequence of O, written O |= ϕ, if, for every model I of O and every assignment a in I, we have that I satisfies ϕ under a.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Basic Model-Theoretic Properties</head><p>In this section, we prove the model-theoretic properties that will be used later on to develop our verification machinery. Specifically, we show here that the standard translation of the RDFS + ontologies introduced in the previous section admits model completion, and has the constraint satisfiability problem decidable. These properties will allow us, in the subsequent sections, to verify suitably defined DL-based data-aware processes by employing a variant of the SMT-based backward reachability procedure introduced in <ref type="bibr" target="#b9">[10]</ref>. To present our results, we require the following preliminary notions.</p><p>A formula that is a conjunction of Σ-literals is called a Σ-constraint. Given a Σ-theory T , we define the constraint satisfiability problem for T as follows: given a formula ∃yϕ(x, y), where ϕ(x, y) is a Σ-constraint, decide whether ∃yϕ(x, y) is satisfiable w.r.t. T . A theory T has quantifier elimination iff, for every Σ Tformula ϕ(x), there exists a quantifier-free formula ψ(x) such that T |= ϕ(x) ↔ ψ(x). Finally, we will use the following definition of model completion, which is restricted to cover the case of universal theories (the ones considered in this work) and that is nonetheless known to be equivalent (for universal theories) to the usual one from model theory <ref type="bibr" target="#b12">[13,</ref><ref type="bibr" target="#b18">19,</ref><ref type="bibr" target="#b9">10]</ref>. Let T be a universal Σ-theory and let T * ⊇ T be a further Σ-theory. We say that T * is a model completion of T iff: (i) every Σ-constraint satisfied in some model of T is also satisfied in some model of T * ; (ii) T * has quantifier elimination.</p><p>We now state the main technical result of the section.</p><p>Theorem 2. Given an RDFS + ontology O, T(O) is a finite universal FO theory that (i) has a decidable constraint satisfiability problem, and (ii) admits a model completion.</p><p>Proof (Sketch). To prove Point (i), we reduce to RDFS + (seen as a fragment of ALCHI, <ref type="bibr" target="#b28">[29]</ref>) ontology satisfiability. For Point (ii), since there is no function symbol in Σ T (O) , it is sufficient to show that T (O) enjoys the amalgamation property: this is proved by explicitly constructing a T (O)-amalgam for every pair of models I 1 and I 2 of T (O) sharing a submodel I 0 (see <ref type="bibr" target="#b11">[12]</ref> for details). Properties (i) and (ii) from Theorem 2 are in line with the foundational framework of <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b10">11]</ref>, where a third property is additionally assumed: the finite model property for constraint satisfiability (see the references for the definition). However, differently from <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b10">11]</ref>, this property is not needed anymore for the results of our paper. This is an important difference from <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b10">11]</ref>, since the artifact systems studied there require to interact with finite structures (i.e., databases), whereas in the context of the present work we admit that the models of the knowledge base of our artifact systems can be infinite.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Ontology-Based Data-Aware Processes</head><p>In this section, we present our main contributions. We first define our model, called RDFS + -based simple artifact systems, or RDFS + -SASs for short, to formalise data-aware processes under RDFS + ontologies. These systems are a variant of the artifact-centric systems studied in <ref type="bibr" target="#b9">[10]</ref>. RDFS + -SASs read data from a given RDFS + ontology, used to store background information of the system, and manipulate individual variables, called artifact variables, which represent the current state of the process. We then study the parameterised safety problems of such models by adopting a symbolic version <ref type="bibr" target="#b20">[21,</ref><ref type="bibr" target="#b10">11]</ref> of the well-known backward reachability procedure <ref type="bibr" target="#b0">[1]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">DL-Based Simple Artifact Systems</head><p>We first require the following preliminary notions. For an RDFS + ontology O, an O-partition is a finite set P = {κ 1 (x), . . . , κ n (x)} of Σ O -literals such that O |= ∀x n i=1 κ i (x) ∧ ∀x i =j ¬(κ i (x) ∧ κ j (x)). Given an ontology O, an Opartition P = {κ 1 (x), . . . , κ n (x)}, and Σ O -terms t(x) = (t 1 (x), . . . , t n (x)), (the value of) a case-defined function F based on P and t, for a fresh function symbol F ∈ N F , is defined as follows: for every model I of O, every assignment a in I, and every tuple x of variables, a(F (x)) = a(t i (x)), if I |= a κ i (x).</p><p>In order to introduce verification problems in a symbolic setting, one first has to specify which formulas are used to represent (i) the sets of states, (ii) the system initialisations, and (iii) the system evolution. To capture these aspects, we provide the following definitions.</p><p>An RDFS + -based simple artifact system (RDFS + -SAS) is a tuple</p><formula xml:id="formula_9">S = (O, x, ι(x), m j=1 {τ j (x, x )}),</formula><p>where m ∈ N, and</p><formula xml:id="formula_10">-O = (T , A) is an RDFS + ontology; -x = (x 1 , . . . , x n</formula><p>) is a tuple of variables, called artifact variables, and x is a tuple of variables that are renamed copies of variables in x;</p><formula xml:id="formula_11">-ι(x) = n i=1 x i = a i , with a i ∈ N I , is an initial state formula; -τ j (x, x ) = ∃y(γ j (x, y) ∧ n i=1 x i = F j i (x, y))</formula><p>, for 1 ≤ j ≤ m, is a transition formula, where γ j (x, y) is a conjunction of Σ O -literals called guard of τ j , and x i = F j i (x, y), where each F j i is a case-defined function based on some O-partition and list of Σ O -terms, is an update of τ j .</p><p>Given an RDFS + ontology O, we call state (Σ O -)formula a quantifier-free Σ O -formula ϕ(x). A state formula constrains the content of the artifact variables characterising the current states of the systems. Notice that a state formula can represent a (possibly infinite) set of states, because of the presence of (possibly infinitely many) different elements in a model of the ontology O. A safety formula for S is a state Σ O -formula ν(x), used to describe the undesired states of the system. We say that S is safe w.r.t. ν(x) if there does not exist k ≥ 0 and a formula of the form</p><formula xml:id="formula_12">ι(x 0 ) ∧ τ j0 (x 0 , x 1 ) ∧ • • • ∧ τ j k−1 (x k−1 , x k ) ∧ ν(x k ), ( )</formula><p>that is satisfiable w.r.t. O, where 1 ≤ j 0 , . . . , j k−1 ≤ m and each x h , with 0 ≤ h ≤ k, is a tuple of variables that are renamed copies of variables in x. The safety problem for S is the following decision problem: given a safety formula ν(x) for S, decide whether S is safe w.r.t. ν(x). This verification problem is parametric on the models of a fixed RDFS + ontology, since safety is assessed irrespectively of the choice of such a model. This implies that, when the system is safe, it is so for every execution of the process under every possible model (which in principle are infinitely many) of the given ontology.</p><p>Example 4. We develop a simplified job hiring process for university personnel based on the domain knowledge formalised in Example 1. Each application is created using a dedicated website portal, where users that are potentially interested in applying need to register in advance. When a registered user decides to apply, the data created by this single application do not have to be stored persistently and thus can be maintained just by using artifact variables (described below) that can interact with the knowledge base. All these variables are initialised with an undefined value u. In the first transition of the system, an application is created by a registered user, which falls into the extension of the concept User: the information about this user is then stored in the artifact variable x applicant . At this point, the application website asks the user whether they hold a university degree: in case of an affermative answer, the website accepts the user as eligible, the information about the user is stored using x applicant and the process can progress. Then, the user picks up a job position (assigned to x job ) and applies for it. The following steps of the process involve the evaluation of the application: for both academic and administrative positions, if the eligible candidate is suitable for the chosen position, they are declared winner (assigned to x winner ), otherwise they are declared loser (assigned to x loser ). To formalise this process, we define the RDFS + -SAS S = (O, x, ι(x), 7 j=1 {τ j (x, x )}) so that: the ontology O is the RDFS + ontology given in Example 1; the artifact variables are x = (x applicant , x job , x eligible , x winner , x loser ); the initial state formula is</p><formula xml:id="formula_13">ι = (x applicant = u) ∧ (x job = u) ∧ (x eligible = u) ∧ (x winner = u) ∧ (x loser = u); -the transition formulas are τ 1 = ∃y 1 (User(y 1 ) ∧ x applicant = y 1 ), τ 2 = EligibleUser(x applicant ) ∧ x eligible = x applicant , τ 3 = ∃z 1 (JobPosition(z 1 ) ∧ appliesFor(x eligible , z 1 ) ∧ x job = z 1 ), τ 4 = AcademicPosition(x job ) ∧ suitableFor(x eligible , x job ) ∧ x winner = x eligible , τ 5 = AdminPosition(x job ) ∧ suitableFor(x eligible , x job ) ∧ x winner = x eligible , τ 6 = AcademicPosition(x job ) ∧ ¬suitableFor(x eligible , x job ) ∧ x loser = x eligible , τ 7 = AdminPosition(x job ) ∧ ¬suitableFor(x eligible , x job ) ∧ x loser = x eligible .</formula><p>An undesired situation of the system is the one where an applicant registered user is declared winner even if they were not eligible. This situation is formally described by the following safety formula for S: ν = User(x winner ) ∧ ¬EligibleUser(x winner ).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Backward Search for RDFS + -SASs</head><p>Algorithm 1 shows the SMT-based backward reachability procedure (or backward search) for handling the safety problem for an RDFS + -SAS S. An integral part of the algorithm is to compute symbolic preimages (Line 5). The intuition behind the algorithm is to execute a loop where, starting from the undesired states of the system (described by the safety formula ν(x)), the state space of the system is explored backward : in every iteration of the while loop (Line 2), the current set of states is regressed through transitions thanks to the preimage computation. For that purpose, for any τ (z, z ) and φ(z) (where z are renamed copies of z), we define τ := m h=1 τ h and Pre(τ, φ) as the formula ∃z (τ (z, z ) ∧ φ(z )). Let φ(x) be a state formula, describing the state of the artifact variables x. The preimage of the set of states described by the formula φ(x) is the set of states described by Pre(τ, φ) (notice that, when τ = τ , then Pre(τ, φ) = Pre(τ , φ)). We recall that a state formula is a quantifier-free Σ O -formula. Unfortunately, because of the presence of the existentially quantified variables y in τ , Pre(τ, φ) is not a state formula, in general. As stated in <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b10">11]</ref>, if the quantified variables were not eliminated, we would break the regressability of the procedure: indeed, the states reached by computing preimages, intuitively described by Pre(τ, φ), need to be represented by a state formula φ in the new iteration of the while loop. In addition, the increase of the number of variables due to the iteration of the preimage computation would affect the performance of the satisfiability tests described below, in case the loop is executed many times. In order to solve these issues, it is essential to introduce the subprocedure QE(T (O) * , φ) in Line 6.</p><p>QE(T (O) * , φ) in Line 6 is a subprocedure that implements the quantifier elimination algorithm of T (O) * and that converts the preimage Pre(τ, φ) of a state formula φ into a state formula (equivalent to it modulo the axioms of T (O) * ), so as to guarantee the regressability of the procedure: this conversion is possible since T (O) * eliminates from τ h the existentially quantified variables y. Backward search computes iterated preimages of the safety formula ν, until a fixpoint is reached (in that case, S is safe w.r.t. ν) or until a set intersecting the initial states (i.e., satisfying ι) is found (in that case, S is unsafe w.r.t. ν). Inclusion (Line 2) and disjointness (Line 3) tests can be discharged via proof obligations to be handled by SMT solvers. The fixpoint is reached when the test in Line 2 returns unsat: the preimage of the set of the current states is included in the set of states reached by the backward search so far (represented as the iterated application of preimages to the safety formula ν). The test at Line 3 is satisfiable when the states visited so far by the backward search includes a possible initial state (i.e., a state satisfying ι). If this is the case, then S is unsafe w.r.t. ν. Together with the unsafe outcome, the algorithm also returns an unsafe trace of the form ( ), explicitly witnessing the sequence of transitions τ h that, starting from the initial configurations, lead the system to a set of states satisfying the undesired conditions described by ν(x).</p><p>Theorem 5. Backward search (Algorithm 1) is correct for detecting whether an RDFS + -SAS S is safe w.r.t. ν(x).</p><p>Proof (Sketch). First, we require the following claim, which follows immediately from the definitions. Claim 1. For every safety formula ν(x) for S and every k ≥ 0, a formula ϑ of the form ( ) is satisfiable w.r.t. O iff ϑ is satisfiable w.r.t. T (O).</p><p>Then, we need to show that, instead of considering satisfiability of formulas of the form ( ) in models of T (O), we can concentrate on satisfiability w.r.t. T (O) * (T (O) * exists thanks to Property (ii) of Theorem 2). Then, by exploiting the algorithm for quantifier elimination in T (O) * described in Remark 3, formulas of the form ( ) can be represented via backward search by using quantifier-free formulas. We finally conclude by noticing that safety/unsafety of S w.r.t ν(x) can be now detected invoking the satisfiability tests (which are effective thanks to Property (i) of Theorem 2) over those quantifier-free formulae.</p><p>Backward search for generic artifact systems is not guaranteed to terminate <ref type="bibr" target="#b10">[11]</ref>. However, in case S is unsafe w.r.t. ν(x), an unsafe trace-which is finite-is found after finitely many iterations of the while loop: hence, in the unsafe case, backward search must terminate. Together with the theorem above, this means that the backward reachability procedure is at least a semi-decision procedure for detecting unsafety of RDFS + -SASs. Nevertheless, we show in the following theorem that, in case of RDFS + -SASs, backward search always terminates: thus, it is a full decision procedure, for which we also provide a PSpace upper bound. Proof (Sketch). For every RDFS + ontology O, there are only finitely many quantifier-free Σ T (O) -formulas, up to T (O)-equivalence, that can be built out of a finite set of variables x. Thanks to the availability of the quantifier elimination procedure QE(T (O) * , ϕ), the overall number of variables in ϕ is never increased. This implies that globally there are only finitely many quantifier-free Σ T (O) -formulas that Algorithm 1 needs to analyse. Hence, Algorithm 1 terminates. Concerning complexity, we first note that the translation T (O) requires polynomial time. Then, we need to eliminate the occurrences of case-defined functions (creating an equivalent SAS whose size is polynomial in the size of the original one), and to modify Algorithm 1 by making it nondeterministic with an NPSpace complexity. The claim follows by applying Savitch's Theorem.</p><p>We observe that Algorithm 1 is not yet implemented in the state-of-the-art model checker MCMT (Model Checker Modulo Theories <ref type="bibr" target="#b20">[21]</ref>), which is based on SMT solving. Such an implementation, however, can be obtained by extending MCMT with the quantifier elimination algorithm for T (O) * (described in Remark 3), required in Line 6, together with a procedure for RDFS + ontology satisfiability (seen as a fragment of ALCHI, <ref type="bibr" target="#b28">[29]</ref>), required in Lines 2 and 3.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusions</head><p>We have studied the problem of verification of data-aware processes under RDFS + ontologies, where the process component can interact with a knowledge base specified by means of the DL RDFS + , underpinning the RDFS constructs. We addressed this problem by introducing a suitable model of DL-based artifactcentric systems, called RDFS + -based SASs, and by leveraging the SMT-based version of the backward reachability procedure, which is a well-known technique to employ for verifying systems of this kind. Specifically, we showed that this procedure is a full decision procedure for detecting safety of RDFS + -based SASs, and we also provided a PSpace complexity upper bound.</p><p>This work opens several directions for future work. First, we notice that the choice of RDFS + ontologies is not intrinsic to our approach. Indeed, motivated by conceptual modelling and data integration issues in OBDA applications, we are currently working on the DL-Lite family of DLs, to define suitable DL-Lite-based SASs with analogous decidability and complexity results. The main difference we have to account for is that, for a DL-Lite ontology O, we have an equisatisfiable (but not equivalent) translation into a universal one-variable FO sentence T (O), and Claim 1 in the proof of Theorem 5 has to be modified to show that a trace ϑ is satisfiable w.r.t. O iff a suitably translated trace θ is satisfiable w.r.t. T (O). In general, nonetheless, we point out that any DL satisfying the two conditions stated in Theorem 2 can be chosen for our purposes, and that the same theoretical guarantees can be obtained over the SMT-based backward reachability procedure. As future work, we thus intend to introduce a more general framework for DL-based SASs that is able to account for different DLs. We also intend to extend the results obtained here to more sophisticated artifactcentric models, such as the relational artifact systems (RASs) studied in <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b10">11]</ref>. Moreover, it could be worth investigating in this setting also properties that go beyond safety, such as liveness and fairness.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>and A, A 1 , . . . , A n ∈ N C . A concept inclusion (CI) has the form C A or C ¬A, and a role inclusion (RI) has the form R R or R ¬R , where C is an RDFS + concept, A ∈ N C , and R, R are roles. An RDFS + TBox T is a finite set of CIs and RIs. An assertion has the form A(a), ¬A(a), P (a, b), ¬P (a, b), (a = b), or ¬(a = b), where A ∈ N C , P ∈ N R , and a, b ∈ N I . An ABox A is a finite set of assertions.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Remark 3 .</head><label>3</label><figDesc>For every RDFS + ontology O, the model completion T (O) * of T (O) admits quantifier elimination. The algorithm for quantifier elimination in T (O) * follows from the proof of Theorem 2: to eliminate ∃x from a Σ T (O) -formula ∃xϕ(x, y), it is sufficient to take the conjunction of the clauses χ(y) implied by ϕ(x, y), which are finitely many for T (O), up to T (O)-equivalence. This procedure is used in Algorithm 1 below and is crucial to get the decidability results of Theorem 6.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Algorithm 1 : 1 φ 4 B ←− φ ∨ B; 5 φ 6 φ</head><label>11456</label><figDesc>SMT-based backward reachability procedureFunction BReach(ν) ←− ν; B ←− ⊥; 2 while φ ∧ ¬B is T (O)-satisfiable do 3 if ι ∧ φ is T (O)-satisfiable then return (unsafe, unsafe trace of form ( )); ←− Pre(τ, φ); ←− QE(T (O) * , φ); return safe;</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Theorem 6 .</head><label>6</label><figDesc>For an RDFS + ontology O and an RDFS + -SAS S = (O, x, ι(x), m j=1 {τ j (x, x )}), the safety problem for S is decidable in PSpace in the combined size of x, ι(x) and m j=1 {τ j (x, x )}.</figDesc></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgements</head><p>This research has been partially supported by the Wallenberg AI, Autonomous Systems and Software Program (WASP) funded by the Knut and Alice Wallenberg Foundation, by the Italian Basic Research (PRIN) project HOPE, by the EU H2020 project INODE (grant agreement 863410) by the CHIST-ERA project PACMEL, by the project IDEE (FESR1133) funded by the Eur. Reg. Development Fund (ERDF) Investment for Growth and Jobs Programme 2014-2020, and by the Free University of Bozen-Bolzano through the projects KGID, GeoVKG, STyLoLa, VERBA and MENS.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">General decidability theorems for infinite-state systems</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">A</forename><surname>Abdulla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Cerans</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Jonsson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Tsay</surname></persName>
		</author>
		<idno type="DOI">10.1109/LICS.1996.561359</idno>
		<ptr target="https://doi.org/10.1109/LICS.1996.561359" />
	</analytic>
	<monogr>
		<title level="m">Proc. of the 11th Int. Conf. on Logic in Computer Science (LICS)</title>
				<meeting>of the 11th Int. Conf. on Logic in Computer Science (LICS)</meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="1996">1996</date>
			<biblScope unit="page" from="313" to="321" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">The DL-Lite family and relations</title>
		<author>
			<persName><forename type="first">A</forename><surname>Artale</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Calvanese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kontchakov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zakharyaschev</surname></persName>
		</author>
		<idno type="DOI">10.1613/jair.2820</idno>
		<ptr target="https://doi.org/10.1613/jair.2820" />
	</analytic>
	<monogr>
		<title level="j">J. of Artificial Intelligence Research</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="page" from="1" to="69" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Verification of description logic Knowledge and Action Bases</title>
		<author>
			<persName><forename type="first">B</forename><surname>Bagheri Hariri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Calvanese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>De Giacomo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>De Masellis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Montali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Felli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 20th Eur. Conf. on Artificial Intelligence (ECAI)</title>
				<meeting>of the 20th Eur. Conf. on Artificial Intelligence (ECAI)</meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="103" to="108" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Verification of relational data-centric dynamic systems with external services</title>
		<author>
			<persName><forename type="first">B</forename><surname>Bagheri Hariri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Calvanese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>De Giacomo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Deutsch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Montali</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 32nd ACM Symp. on Principles of Database Systems (PODS)</title>
				<meeting>of the 32nd ACM Symp. on Principles of Database Systems (PODS)</meeting>
		<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="163" to="174" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Description logic Knowledge and Action Bases</title>
		<author>
			<persName><forename type="first">B</forename><surname>Bagheri Hariri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Calvanese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Montali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>De Giacomo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>De Masellis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Felli</surname></persName>
		</author>
		<idno type="DOI">10.1613/jair.3826</idno>
		<ptr target="https://doi.org/10.1613/jair.3826" />
	</analytic>
	<monogr>
		<title level="j">J. of Artificial Intelligence Research</title>
		<imprint>
			<biblScope unit="volume">46</biblScope>
			<biblScope unit="page" from="651" to="686" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<author>
			<persName><forename type="first">D</forename><surname>Brickley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Guha</surname></persName>
		</author>
		<ptr target="https://www.w3.org/TR/rdf-schema/" />
		<title level="m">RDF Schema 1.1. W3C Recommendation, World Wide Web Consortium</title>
				<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Tractable reasoning and efficient query answering in description logics: The DL-Lite family</title>
		<author>
			<persName><forename type="first">D</forename><surname>Calvanese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>De Giacomo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Lembo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Lenzerini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Rosati</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10817-007-9078-x</idno>
		<ptr target="https://doi.org/10.1007/s10817-007-9078-x" />
	</analytic>
	<monogr>
		<title level="j">J. of Automated Reasoning</title>
		<imprint>
			<biblScope unit="volume">39</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="385" to="429" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Foundations of data aware process analysis: A database theory perspective</title>
		<author>
			<persName><forename type="first">D</forename><surname>Calvanese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>De Giacomo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Montali</surname></persName>
		</author>
		<idno type="DOI">10.1145/2463664.2467796</idno>
		<ptr target="https://doi.org/10.1145/2463664.2467796" />
	</analytic>
	<monogr>
		<title level="m">Proc. of the 32nd ACM Symp. on Principles of Database Systems (PODS)</title>
				<meeting>of the 32nd ACM Symp. on Principles of Database Systems (PODS)</meeting>
		<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="1" to="12" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Formal modeling and SMT-based parameterized verification of data-aware BPMN</title>
		<author>
			<persName><forename type="first">D</forename><surname>Calvanese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ghilardi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gianola</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Montali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rivkin</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-26619-6_12</idno>
		<idno>-030-26619-6 12</idno>
		<ptr target="https://doi.org/10.1007/978-3" />
	</analytic>
	<monogr>
		<title level="m">Proc. of the 17th Int. Conf. on Business Process Management (BPM)</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<meeting>of the 17th Int. Conf. on Business ess Management (BPM)</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">11675</biblScope>
			<biblScope unit="page" from="157" to="175" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Description Logic, Theory Combination, and All That -Essays Dedicated to Franz Baader on the Occasion of his 60th Birthday</title>
		<author>
			<persName><forename type="first">D</forename><surname>Calvanese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ghilardi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gianola</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Montali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rivkin</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-22102-7_10</idno>
		<idno>-030-22102-7 10</idno>
		<ptr target="https://doi.org/10.1007/978-3" />
	</analytic>
	<monogr>
		<title level="s">Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="volume">11560</biblScope>
			<biblScope unit="page" from="212" to="239" />
			<date type="published" when="2019">2019</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
	<note>From model completeness to verification of data aware processes</note>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">SMTbased verification of data-aware processes: A model-theoretic approach</title>
		<author>
			<persName><forename type="first">D</forename><surname>Calvanese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ghilardi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gianola</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Montali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rivkin</surname></persName>
		</author>
		<idno type="DOI">10.1017/S0960129520000067</idno>
		<ptr target="https://doi.org/10.1017/S0960129520000067" />
	</analytic>
	<monogr>
		<title level="j">Mathematical Structures in Computer Science</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="271" to="313" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">SMT-Based Safety Verification of Data-Aware Processes under Ontologies</title>
		<author>
			<persName><forename type="first">D</forename><surname>Calvanese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gianola</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mazzullo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Montali</surname></persName>
		</author>
		<idno type="arXiv">arXiv:2108.12330</idno>
		<idno>arXiv.org e-</idno>
		<ptr target="https://arxiv.org/abs/2108.12330" />
		<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
	<note type="report_type">Print archive</note>
	<note>Extended Version</note>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">Model Theory</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">C</forename><surname>Chang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">J</forename><surname>Keisler</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1990">1990</date>
			<publisher>North-Holland Publ. Co</publisher>
		</imprint>
	</monogr>
	<note>3rd edn</note>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Exploring the boundaries of decidable verification of non-terminating golog programs</title>
		<author>
			<persName><forename type="first">J</forename><surname>Claßen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Liebenberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Lakemeyer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Zarrieß</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 28th AAAI Conf. on Artificial Intelligence (AAAI)</title>
				<meeting>of the 28th AAAI Conf. on Artificial Intelligence (AAAI)</meeting>
		<imprint>
			<publisher>AAAI Press</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="1012" to="1019" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Artifact systems with data dependencies and arithmetic</title>
		<author>
			<persName><forename type="first">E</forename><surname>Damaggio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Deutsch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vianu</surname></persName>
		</author>
		<idno type="DOI">10.1145/2338626.2338628</idno>
		<ptr target="https://doi.org/10.1145/2338626.2338628" />
	</analytic>
	<monogr>
		<title level="j">ACM Trans. on Database Systems</title>
		<imprint>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page">22</biblScope>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Automatic verification of data-centric business processes</title>
		<author>
			<persName><forename type="first">A</forename><surname>Deutsch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Hull</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Patrizi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vianu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 12th Int. Conf. on Database Theory (ICDT)</title>
				<meeting>of the 12th Int. Conf. on Database Theory (ICDT)</meeting>
		<imprint>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="252" to="267" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Automatic verification of database-centric systems</title>
		<author>
			<persName><forename type="first">A</forename><surname>Deutsch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Hull</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vianu</surname></persName>
		</author>
		<idno type="DOI">10.1145/2694428.2694430</idno>
		<ptr target="https://doi.org/10.1145/2694428.2694430" />
	</analytic>
	<monogr>
		<title level="j">SIGMOD Record</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="5" to="17" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Verification of hierarchical artifact systems</title>
		<author>
			<persName><forename type="first">A</forename><surname>Deutsch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vianu</surname></persName>
		</author>
		<idno type="DOI">10.1145/3321487</idno>
		<ptr target="https://doi.org/10.1145/3321487" />
	</analytic>
	<monogr>
		<title level="j">ACM Trans. on Database Systems</title>
		<imprint>
			<biblScope unit="volume">44</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page">68</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Model-theoretic methods in combined constraint satisfiability</title>
		<author>
			<persName><forename type="first">S</forename><surname>Ghilardi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. of Automated Reasoning</title>
		<imprint>
			<biblScope unit="volume">33</biblScope>
			<biblScope unit="issue">3-4</biblScope>
			<biblScope unit="page" from="221" to="249" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Petri nets with parameterised data -modelling and verification</title>
		<author>
			<persName><forename type="first">S</forename><surname>Ghilardi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gianola</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Montali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rivkin</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-58666-9_4</idno>
		<idno>-58666-9 4</idno>
		<ptr target="https://doi.org/10.1007/978-3-030" />
	</analytic>
	<monogr>
		<title level="m">Proc. of the 18th Int. Conf. on Business Process Management (BPM)</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<meeting>of the 18th Int. Conf. on Business ess Management (BPM)</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">12168</biblScope>
			<biblScope unit="page" from="55" to="74" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Backward reachability of array-based systems by SMT solving: Termination and invariant synthesis</title>
		<author>
			<persName><forename type="first">S</forename><surname>Ghilardi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ranise</surname></persName>
		</author>
		<idno type="DOI">10.2168/LMCS-6(4:10)2010</idno>
		<idno>(4:10)2010</idno>
		<ptr target="https://doi.org/10.2168/LMCS-6" />
	</analytic>
	<monogr>
		<title level="j">Log. Methods Comput. Sci</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">4</biblScope>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">MCMT: A model checker modulo theories</title>
		<author>
			<persName><forename type="first">S</forename><surname>Ghilardi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ranise</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-642-14203-1_3</idno>
		<idno>-14203-1 3</idno>
		<ptr target="https://doi.org/10.1007/978-3-642" />
	</analytic>
	<monogr>
		<title level="m">Proc. of the 5th Int. Joint Conf. on Automated Reasoning (IJ-CAR)</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">J</forename><surname>Giesl</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Hähnle</surname></persName>
		</editor>
		<meeting>of the 5th Int. Joint Conf. on Automated Reasoning (IJ-CAR)</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="volume">6173</biblScope>
			<biblScope unit="page" from="22" to="29" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<author>
			<persName><forename type="first">W</forename><surname>Hodges</surname></persName>
		</author>
		<title level="m">Model Theory, Encyclopedia of Mathematics and its applications</title>
				<imprint>
			<publisher>Cambridge University Press</publisher>
			<date type="published" when="1993">1993</date>
			<biblScope unit="volume">42</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Artifact-centric business process models: Brief survey of research results and challenges</title>
		<author>
			<persName><forename type="first">R</forename><surname>Hull</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-540-88873-4_17</idno>
		<idno>-88873-4 17</idno>
		<ptr target="https://doi.org/10.1007/978-3-540" />
	</analytic>
	<monogr>
		<title level="m">Proc. of the 7th Int. Conf. on Ontologies, DataBases, and Applications of Semantics (ODBASE)</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<meeting>of the 7th Int. Conf. on Ontologies, DataBases, and Applications of Semantics (ODBASE)</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="volume">5332</biblScope>
			<biblScope unit="page" from="1152" to="1163" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">An introduction to description logics and query rewriting</title>
		<author>
			<persName><forename type="first">R</forename><surname>Kontchakov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zakharyaschev</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-10587-1_5</idno>
		<idno>- 319-10587-1 5</idno>
		<ptr target="https://doi.org/10.1007/978-3" />
	</analytic>
	<monogr>
		<title level="m">Reasoning Web: Reasoning on the Web in the Big Data Era -10th Int. Summer School Tutorial Lectures (RW)</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="volume">8714</biblScope>
			<biblScope unit="page" from="195" to="244" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Strategy synthesis for data-aware dynamic systems with multiple actors</title>
		<author>
			<persName><forename type="first">M</forename><surname>De Leoni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Felli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Montali</surname></persName>
		</author>
		<idno type="DOI">10.24963/kr.2020/32</idno>
		<ptr target="https://doi.org/10.24963/kr.2020/32" />
	</analytic>
	<monogr>
		<title level="m">Proc. of the 17th Int. Conf. on Principles of Knowledge Representation and Reasoning (KR)</title>
				<editor>
			<persName><forename type="first">D</forename><surname>Calvanese</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">E</forename><surname>Erdem</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Thielscher</surname></persName>
		</editor>
		<meeting>of the 17th Int. Conf. on Principles of Knowledge Representation and Reasoning (KR)</meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="315" to="325" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Formalizing integration patterns with multimedia data</title>
		<author>
			<persName><forename type="first">M</forename><surname>Montali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rivkin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Ritter</surname></persName>
		</author>
		<idno type="DOI">10.1109/EDOC49727.2020.00018</idno>
		<ptr target="https://doi.org/10.1109/EDOC49727.2020.00018" />
	</analytic>
	<monogr>
		<title level="m">Proc. of the 24th Int. Conf. on Enterprise Distributed Object Computing (EDOC)</title>
				<meeting>of the 24th Int. Conf. on Enterprise Distributed Object Computing (EDOC)</meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="67" to="76" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Process and data: Two sides of the same coin?</title>
		<author>
			<persName><forename type="first">M</forename><surname>Reichert</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-642-33606-5_2</idno>
		<idno>-33606-5 2</idno>
		<ptr target="https://doi.org/10.1007/978-3-642" />
	</analytic>
	<monogr>
		<title level="m">Proc. of the On the Move Confederated Int. Conf. (OTM)</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<meeting>of the On the Move Confederated Int. Conf. (OTM)</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="volume">7565</biblScope>
			<biblScope unit="page" from="2" to="19" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Foundations of description logics</title>
		<author>
			<persName><forename type="first">S</forename><surname>Rudolph</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-642-23032-5_2</idno>
		<idno>-23032-5 2</idno>
		<ptr target="https://doi.org/10.1007/978-3-642" />
	</analytic>
	<monogr>
		<title level="m">Reasoning Web: Semantic Technologies for the Web of Data -7th Int. Summer School Tutorial Lectures (RW)</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="volume">6848</biblScope>
			<biblScope unit="page" from="76" to="136" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Automatic verification of database-driven systems: a new frontier</title>
		<author>
			<persName><forename type="first">V</forename><surname>Vianu</surname></persName>
		</author>
		<idno type="DOI">10.1145/1514894.1514896</idno>
		<ptr target="https://doi.org/10.1145/1514894.1514896" />
	</analytic>
	<monogr>
		<title level="m">Proc. of the 12th Int. Conf. on Database Theory (ICDT)</title>
				<meeting>of the 12th Int. Conf. on Database Theory (ICDT)</meeting>
		<imprint>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="1" to="13" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Decidable verification of golog programs over non-local effect actions</title>
		<author>
			<persName><forename type="first">B</forename><surname>Zarrieß</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Claßen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 30th AAAI Conf. on Artificial Intelligence (AAAI)</title>
				<meeting>of the 30th AAAI Conf. on Artificial Intelligence (AAAI)</meeting>
		<imprint>
			<publisher>AAAI Press</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="1109" to="1115" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
