期刊文献+

一种面向业务规则和流程的推理引擎架构 被引量:2

AN INFERENCE ENGINE ARCHITECTURE FOR BUSINESS RULES AND PROCESSES
下载PDF
导出
摘要 目前基于业务流程模型控制规则引擎的工作流引擎已经开始提倡使用。针对这种情况,基于BPMN业务流程模型的工作流引擎,提出一种适用于业务流程模型和规则集成与执行的推理引擎架构。该架构引入XTT2的规则表示,集成了jBPM工作流管理系统和HeaRT规则引擎,由工作流引擎控制专用规则推理引擎执行规则决策表运行。原型实现表明了该架构可实现规则任务的可视化设计,并支持对得到的规则任务模型的形式验证。 At present, the workflow engine based on business process model controlling rule advocated. In view of this situation, an inference engine architecture for integrating and executing models with rules is proposed based on the workflow engine which runs BPMN business process model. introduces XTT2 rules and integrates jBPM workflow management system and HeaRT rule engine, engine has been business process The architecture making the rule decision tables executed by a dedicated rule inference engine which is controlled by workflow engine. The implementation of the prototype demonstrates that the architecture can realize, visual design and formal verification of obtained rule tasks.
作者 倪曌 白利芳 董奥冬 Ni Zhao Bai Lifang Dong Aodong(State Grid Xiaogan Power Supply Company,Xiaogan 432000, Hubei, China Information Engineering University, Zhengzhou 450001, Henan, China State Grid Henan Electric Power Company Jiaozuo Power Supply Company, Jiaozuo 454000,Henan, China)
出处 《计算机应用与软件》 2017年第3期98-102,153,共6页 Computer Applications and Software
关键词 BPMN 业务流程模型 规则 BPMN Business process models Rules
  • 相关文献

参考文献1

二级参考文献20

  • 1李斓,何永忠,冯登国.面向XML文档的细粒度强制访问控制模型[J].软件学报,2004,15(10):1528-1537. 被引量:41
  • 2殷丽凤,赵硕.XML局部函数依赖[J].齐齐哈尔大学学报(自然科学版),2005,21(4):54-55. 被引量:1
  • 3BREWSTER Keith . Inference and Aggregation Issues InSecure Database Management Systems [ R ]. WilliamsburgVA, USA:NCSC Technical Report, 1996.
  • 4DAMIANI Ernesto, VIMERCATI Sabrina.,PARABOS-Cill Stefano,et al. A Fine-Grained Access Control Sys-te*m for XML Documents [ J ]. ACM Transactiongs on In-formation and System Security, 2002, 5(2) : 169-202.
  • 5BERTINO Elisa, CASTANO Silvana, FERRARI Elena,et al. Specifying and Enforcing Access Control Policiesfor XML Document Sources [ J ]. World Wide Web,2000,3(3) :139-151.
  • 6BERITTNO Elisa, CASTANO Silvana, FERRAI Elena.Securing XML Documents with Author - x[ J ] . IEEE In-U'met Computing,2001,5(3) :21-31.
  • 7CHANDHAMOULl Hamaswamy. Application of XMLTools for Enterprise-Wide RBAC Implementation Tasks[C ]// Fifth ACM Workshop on Role - Based AccessControl. New York, NY, USA: ACM, 2000: 11-18.
  • 8HITCHENS Michael, VARADHARAJAN Vijay. RBACfor XML document stores [ C]// Third International Con-ference. Berlin, Germany: Springer, 2001 : 131-143.
  • 9VUONC N. Nathan, SMITH Geoffrey, DENG Yi. Manag-ing Security Policies in a Distributed Environment UsingExtensible Markup Language [ C ] // The 2001 ACM Sym-posium on Applied Computing. New York, NV, USA :ACM, 2011 : 405-411.
  • 10FRANK Jeremy, JONSSON Ari. Constraint - Based At-tribute and Interval Planning[ J ]. Constraints, 2003 , 8(4): 339-364.

共引文献2

同被引文献17

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部