WESOA'15 CPN DAO Eanctment v4 PDF
WESOA'15 CPN DAO Eanctment v4 PDF
WESOA'15 CPN DAO Eanctment v4 PDF
Alex Norta
1 Introduction
The depiction in Figure 1(a) shows the top-level structure of the smart contract-
ing language eSourcing Markup Language (eSML) for which citation [21] gives
full details and examples. The bold typed eSML-definitions extend and modificy
the Electronic Contracting Markup Language (ECML) [2] foundation.
The structure of a smart contract uses the interrogatives Who for defining
the contracting parties together with their resources and data-use, Where to
specify the business- and legal context, and What for define exchanged busi-
ness values. Consensus establishment assumes the What-interrogative comprises
Lecture Notes in Computer Science: Authors’ Instructions 3
process views that are cross-organizational matched We refer to [21] for more
information about the smart-contracting ontology.
Fig. 1. P2P-collaboration using the eSourcing framework with (a) showing a smart-
contracting template [21] and (b) showing a corresponding collaboration model [15].
populating stage. The validation of BNMs matches the available inserted service
offers of potential collaboration partners against service types.
The populate-phase in Figure 2, yields a proto-contract for a negotiate step
that involves the collaborating partners. The negotiation phase has three dif-
ferent outcome options. An agreement of all partners establishes the eContract
for subsequent rollout of a distributed governance infrastructure; a counter-offer
from a partner that results in a new contract negotiation; finally, a disagreement
of a partner results in a complete termination of the setup phase. Note that the
setup-lifecycle is formalized and we refer the reader to [18] for further details.
4.2 shows how policies are extracted from the local eContracts. Finally, Section
4.3 focuses on equipping the DGI with a technical enactment foundation. The
sections present on the one hand CPN-models and on the other hand, discusses
what pre-existing research and technology exists for an application system im-
plementation.
Fig. 3. Policy extraction from local contract copies and assignment of monitors and
BNMAs (governance distribution) [17].
Citation [36] recognizes the need for constant evolution of business policies in
service-oriented systems due to changes in the environment. Consequently, a clear
separation exists of policy specification, enforcement strategy and realization
drawing on Adaptive Service Oriented Architecture. Furthermore, contractual
compliance during business interactions in [12], business policies assure that
represent contractual clauses.
Fig. 4. Extracting from local contract copies a set of required policies (extraction) [17].
[1] is the eXchangable Markup Languag XML [22] in the form of generated
business-rules documents.
Fig. 5. Electronic service choosing and communication endpoint creation (prepare) [17].
5 Model-Checking Results
We used CPN Tools [10] for correctness and performance checking, especially on
aspects relevant for system developers: reachability of CPN-modules end states in
manual, or fully automated simulation token games as state explosion means full
computational verification is challenging for this size of models; detection of loops
as a potential source of livelocks that prevent desired termination reachability;
loops require specific attention with respect to effectiveness of exit conditions,
such as elements of business-level policy control; performance peaks during run-
time either for the design of sufficient resources or for restricting the load with
business-level policy control; full system utilisation for ensuring that each part
of the modelled system actually is used in some scenario; and consistent ter-
mination, i.e., consistent home markings that ensure simple testing of a real
system.
The model-checking results in Table 2 focus on CPN-modules where the
generated state-space is computationally feasible to verify. Loops exist in the
enact-module, while not in remaining modules. Performance peaks in Table 2
represent places in the startup-lifecycle that are potential performance bottle-
necks. Peaks exist in all listed modules and we give in the corresponding column
the labels of occurrence transitions. While no module listed in Table 2 has any
home marking, the model-checking results for dead markings show they are all
Lecture Notes in Computer Science: Authors’ Instructions 9
multiple. D∗ means the model-checking results show the dead markings result
from intentional disabling of marking paths for the purpose of focusing in spe-
cific marking paths under investigation. The latter means for practitioners the
testing of implementations is more demanding as many test cases are required.
Finally, pertaining to utilisation tests, Table 2 shows no unused subsets exist in
the models. We refer to [17] for full details about the model-checking results.
6 Related Work
independent of e-Government as the models in this paper that are also suitable
for cyberphysical system governance.
Finally, citation [27] discusses the advantages and disadvantages of using
distributed governance systems for the internet of things. The authors show
that distributed governance poses additional security- and privacy challenges.
The assumption in this paper of using process views that hide business secrets
internally in larger local services, solves many security- and privacy challenges.
7 Conclusion
The focus of the paper is establishing a decentralized governance infrastructure
for enacting cross-organizational business-process aware collaborations. For that,
the notion of smart contracts and an affiliated collaboration model is the founda-
tion for deducing a collaboration lifecycle. Assuming an eContract already exists,
the lifecycle for establishing and enacting a decentralized autonomous organiza-
tion we present in combination with additional pre-existing literature discussions
that underlines the feasibility of the approach. Finally, the model-checking re-
sults allow for a deeper collaboration-system understanding that supports an
application-system implementation.
For the lifecycle itself, we choose a formal approach using Coloured Petri Nets
that has a graphical notation and also tool support for design, simulation and
model checking. We also list the concepts that are embedded in specific parts
of the collaboration lifecycle. The latter for decentralized governance infrastruc-
ture establishment commences with copying the agreed upon eContract to each
respective collaborating party. Next, from each local eContract copy a set of
local policies is extracted and monitors and business-network-model agents are
assigned to each party. A configuration of local services together with their com-
munication endpoints follows in the lifecycle. When checking the models, the
considered properties are loops, performance peaks, liveness, home- and dead
markings as they reveal valuable insight for application-system realizations.
For future work, we plan to apply the lifecycle for establishing distributed
governance infrastructures in projects for cyberphysical system governance. Ad-
ditionally, we explore blockchain technology for realizing non-repudiation in
process-aware collaboration missions. Furthermore, blockchain technology also
promises to enable novel approaches for an effective management of trust, repu-
tation, privacy and security in cross-organizational cyberphysical system collab-
orations.
References
1. S. Ali, B. Soh, and J. Lai. Rule extraction methodology by using xml for business
rules documentation. In Industrial Informatics, 2005. INDIN ’05. 2005 3rd IEEE
International Conference on, pages 357–361, Aug 2005.
2. S. Angelov. Foundations of B2B Electronic Contracting. Dissertation, Technology
University Eindhoven, Faculty of Technology Management, Information Systems
Department, 2006.
Lecture Notes in Computer Science: Authors’ Instructions 11
3. A. Avizienis, J.C. Laprie, B. Randell, and C. Landwehr. Basic concepts and tax-
onomy of dependable and secure computing. Dependable and Secure Computing,
IEEE Transactions on, 1(1):11–33, 2004.
4. V. Butterin. A next-generation smart contract and decentralized application plat-
form, 2014.
5. . Di Nitto, C. Ghezzi, A. Metzger, M. Papazoglou, and K. Pohl. A journey to
highly dynamic, self-adaptive service-based applications. Automated Software En-
gineering, 15(3-4):313–341, 2008.
6. Hicker G. Huemer C. Erven, H. and M. Zaptletal. The web services-
businessactivity-initiator (ws-ba-i) protocol: an extension to the web services-
businessactivity specification. In In 2007 IEEE International Conference on Web
Services (ICWS 2007), page 216âĂŞ224, 2007.
7. R. Eshuis, A. Norta, O. Kopp, and E. Pitkanen. Service outsourcing with process
views. IEEE Transactions on Services Computing, 99(PrePrints):1, 2013.
8. C. Hahn, J. Recker, and J. Mendling. An exploratory study of it-enabled collabo-
rative process modeling. In M. zur Muehlen and J. Su, editors, Business Process
Management Workshops, volume 66 of Lecture Notes in Business Information Pro-
cessing, pages 61–72. Springer Berlin Heidelberg, 2011.
9. Christopher Hahn, Jan Recker, and Jan Mendling. An exploratory study of it-
enabled collaborative process modeling. In M. zur Muehlen and J. Su, editors,
Business Process Management Workshops, volume 66 of Lecture Notes in Business
Information Processing, pages 61–72. Springer Berlin Heidelberg, 2011.
10. K. Jensen, L. Michael, K.L. Wells, K. Jensen, and L.M. Kristensen. Coloured
petri nets and cpn tools for modelling and validation of concurrent systems. In
International Journal on Software Tools for Technology Transfer, page 2007, 2007.
11. N. Minsky. Decentralized governance of distributed systems via interaction con-
trol. In A. Artikis, R. Craven, C. Kesim, B. Nihan, Babak. Sadighi, and K. Stathis,
editors, Logic Programs, Norms and Action, volume 7360 of Lecture Notes in Com-
puter Science, pages 374–400. Springer Berlin Heidelberg, 2012.
12. C. Molina-Jimenez, S. Shrivastava, and M. Strano. A model for checking contrac-
tual compliance of business interactions. Services Computing, IEEE Transactions
on, 5(2):276–289, April 2012.
13. F. Montesi and N. Yoshida. Compositional choreographies. In P.R. D’Argenio
and H. Melgratti, editors, CONCUR 2013–Concurrency Theory, volume 8052 of
Lecture Notes in Computer Science, pages 425–439. Springer Berlin Heidelberg,
2013.
14. S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system. Consulted,
1(2012):28, 2008.
15. N.C. Narendra, A. Norta, M. Mahunnah, and F. Maggi. Modelling sound conflict
management for virtual-enterprise collaboration. In Services Computing (SCC),
2014 IEEE International Conference on, pages 813–820, June 2014.
16. H.R.M. Nezhad, C. Bartolini, J. Erbes, and S. Graupner. A process- and policy-
aware cross enterprise collaboration framework for multisourced services. In SRII
Global Conference (SRII), 2012 Annual, pages 488–493, July 2012.
17. A. Norta. Safeguarding Trusted eBusiness Transactions of Lifecycles for Cross-
Enterprise Collaboration. http://tinyurl.com/lghxtrx, 2012.
18. A. Norta. Creation of Smart-Contracting Collaborations for Decentralized Au-
tonomous Organizations (forthcoming). In 14th International Conference on Per-
spectives in Business Informatics Research (BIR’15), Tallinn, Estonia, August
2015.
12 Alex Norta
19. A. Norta, P. Grefen, and N.C Narendra. A reference architecture for managing
dynamic inter-organizational business processes. Data & Knowledge Engineering,
91(0):52 – 89, 2014.
20. A. Norta and L. Kutvonen. A cloud hub for brokering business processes as a ser-
vice: A ”rendezvous” platform that supports semi-automated background checked
partner discovery for cross-enterprise collaboration. In SRII Global Conference
(SRII), 2012 Annual, pages 293–302, July 2012.
21. A. Norta, L. Ma, Y. Duan, A. Rull, M. Kõlvart, and K. Taveter. econtractual
choreography-language properties towards cross-organizational business collabora-
tion. Journal of Internet Services and Applications, 6(1):8, 2015.
22. OASIS. eXtensible Markup Language (SOAP) 1.1. http://www.xml.org/, 2006.
23. D. Oppenheim, S. Bagheri, K. Ratakonda, and Y.M. Chee. Agility of enterprise
operations across distributed organizations: A model of cross enterprise collabo-
ration. In SRII Global Conference (SRII), 2011 Annual, pages 154–162, March
2011.
24. B.S. Panikkar, S. Nair, P. Brody, and V. Pureswaran. Adept: An iot practitioner
perspective, 2014.
25. M.P. Papazoglou and D. Georgakopoulos. Service-oriented computing. Communi-
cations of the ACM, 46(10):24–28, 2003.
26. T. Patron. The Bitcoin Revolution: An Internet of Money. Travis Patron.
27. R. Rodrigo, J. Zhou, and J. Lopez. On the features and challenges of security and
privacy in distributed internet of things. Computer Networks, 57(10):2266 – 2279,
2013. Towards a Science of Cyber Security Security and Identity Architecture for
the Future Internet.
28. F. Rosenberg and S. Dustdar. Towards a distributed service-oriented business rules
system. In Web Services, 2005. ECOWS 2005. Third IEEE European Conference
on, pages 11 pp.–, Nov 2005.
29. T. Ruokolainen, S. Ruohomaa, and L. Kutvonen. Solving service ecosystem
governance. In Enterprise Distributed Object Computing Conference Workshops
(EDOCW), 2011 15th IEEE International, pages 18–25. IEEE, 2011.
30. S.Y.W. Su, Xuelian Xiao, J. DePree, H.W. Beck, C. Thomas, A. Coggeshall, and
R. Bostock. Interoperation of organizational data, rules, processes and services for
achieving inter-organizational coordination and collaboration. In System Sciences
(HICSS), 2011 44th Hawaii International Conference on, pages 1–10, Jan 2011.
31. M. Swan. Blockchain thinking: The brain as a dac (decentralized autonomous
organization). In Texas Bitcoin Conference, pages 27–29, 2015.
32. N. Szabo. Formalizing and securing relationships on public networks. First Mon-
day, 2(9), 1997.
33. A. Tripathi and B. Parihar. E-governance challenges and cloud benefits. In
Computer Science and Automation Engineering (CSAE), 2011 IEEE International
Conference on, volume 1, pages 351–354, June 2011.
34. W.M.P. van der Aalst, K.M. van Hee, A.H.M. ter Hofstede, N. Sidorova, H.M.W.
Verbeek, M. Voorhoeve, and M.T. Wynn. Soundness of workflow nets: classifi-
cation, decidability, and analysis. Formal Aspects of Computing, 23(3):333–363,
2011.
35. Y. Wei and M.B. Blake. Service-oriented computing and cloud computing: Chal-
lenges and opportunities. Internet Computing, IEEE, 14(6):72–75, 2010.
36. H. Weigand, W.J. van den Heuvel, and M Hiel. Business policy compliance in
service-oriented systems. Information Systems, 36(4):791 – 807, 2011. Selected
Papers from the 2nd International Workshop on Similarity Search and Applications
(SISAP) 2009.