Constraint-Based Flexible Workflows

  • Jacques Wainer
  • Fábio de Lima Bezerra
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2806)

Abstract

This work presents the idea and a prototype of workflow systems defined through constraints. We think that in many domain areas, such as health care, workflow systems are too inflexible. One does not know in advance what activities does the patient has to go through. Actually a new form of interaction with the workflow is needed, in which a controller asks the systems which precondition activities are necessary in order to execute a target activity and schedule the target activity. We also present Tucupi, a prototype of such constraint based WFMS.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Role Based Access Control: Features and Motivations. IEEE Computer Society Press, New Orleans, Louisianna (December 1995)Google Scholar
  2. 2.
    Dourish, P., Holmes, J., MacLean, A., Marqvardsen, P., Zbyslaw, A.: Freeflow: mediating between representation and action in workflow systems. In: Conference on Computer Supported Cooperative Work CSCW 1996, ACM, New York (1996)Google Scholar
  3. 3.
    Eder, J., Panagos, E.: Managing time in workflow systems. In: Fischer, L. (ed.) Workflow Handbook 2001. Future Strategies INC, pp. 109–132 (2000)Google Scholar
  4. 4.
    Mangan, P., Sadiq, S.: On building workflow models for flexible processes. In: The Thirteenth Australasian Database Conference ADC2002, Melbourne, Australia (2002)Google Scholar
  5. 5.
    Mangan, P.J., Sadiq, S.: A constraint specification approach to building flexible workflows. Journal of Research and Practice in Information Technology (2002)Google Scholar
  6. 6.
    Marjanovic, O., Orlowska, M.: On modeling and verification of temporal constraints in production workflows. Knowledge and Information Systems 1(2) (1999)Google Scholar
  7. 7.
    name withheld. W-RBAC: a workflow secutiry model incorporating controlled overriding of constraints (2003) (submitted)Google Scholar
  8. 8.
    Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. IEEE Computer 29(2), 38–47 (1996)Google Scholar
  9. 9.
    Wainer, J.: Logic representation of processes in work activity coordination. In: Proceedings of the ACM Symposium on Applied Computing, Coordination Track, vol. 1, pp. 203–209. ACM Press, New York (2000)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Jacques Wainer
    • 1
  • Fábio de Lima Bezerra
    • 1
  1. 1.IC – UNICAMPCampinasBrasil

Personalised recommendations