{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T00:04:51Z","timestamp":1774915491964,"version":"3.50.1"},"reference-count":86,"publisher":"Association for Computing Machinery (ACM)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Form. Asp. Comput."],"published-print":{"date-parts":[[2011,5]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p><jats:italic>Workflow nets<\/jats:italic>, a particular class of Petri nets, have become one of the standard ways to model and analyze workflows. Typically, they are used as an abstraction of the workflow that is used to check the so-called<jats:italic>soundness property<\/jats:italic>. This property guarantees the absence of livelocks, deadlocks, and other anomalies that can be detected without domain knowledge. Several authors have proposed alternative notions of soundness and have suggested to use more expressive languages, e.g., models with cancellations or priorities. This paper provides an<jats:italic>overview of the different notions of soundness and investigates these in the presence of different extensions of workflow nets<\/jats:italic>. We will show that the eight soundness notions described in the literature are decidable for workflow nets. However, most extensions will make all of these notions undecidable. These new results show the theoretical limits of workflow verification. Moreover, we discuss some of the analysis approaches described in the literature.<\/jats:p>","DOI":"10.1007\/s00165-010-0161-4","type":"journal-article","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T13:51:52Z","timestamp":1280757112000},"page":"333-363","source":"Crossref","is-referenced-by-count":278,"title":["Soundness of workflow nets: classification, decidability, and analysis"],"prefix":"10.1145","volume":"23","author":[{"given":"W. M. P.","family":"van der Aalst","sequence":"first","affiliation":[{"name":"Eindhoven University of Technology, P.O. Box 513, 5600\u00a0MB, Eindhoven, The Netherlands"},{"name":"Queensland University of Technology, Brisbane, Australia"}]},{"given":"K. M.","family":"van Hee","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology, P.O. Box 513, 5600\u00a0MB, Eindhoven, The Netherlands"}]},{"given":"A. H. M.","family":"ter Hofstede","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology, P.O. Box 513, 5600\u00a0MB, Eindhoven, The Netherlands"},{"name":"Queensland University of Technology, Brisbane, Australia"}]},{"given":"N.","family":"Sidorova","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology, P.O. Box 513, 5600\u00a0MB, Eindhoven, The Netherlands"}]},{"given":"H. M. W.","family":"Verbeek","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology, P.O. Box 513, 5600\u00a0MB, Eindhoven, The Netherlands"}]},{"given":"M.","family":"Voorhoeve","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology, P.O. Box 513, 5600\u00a0MB, Eindhoven, The Netherlands"}]},{"given":"M. T.","family":"Wynn","sequence":"additional","affiliation":[{"name":"Queensland University of Technology, Brisbane, Australia"}]}],"member":"320","reference":[{"key":"e_1_2_1_2_1_2","first-page":"407","volume-title":"Application and theory of Petri nets 1997. Lecture notes in computer science, vol 1248","author":"van der Aalst WMP","year":"1997"},{"key":"e_1_2_1_2_2_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218126698000043"},{"key":"e_1_2_1_2_3_2","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/3-540-45594-9_11","volume-title":"Business process management: models, techniques, and empirical studies. Lecture notes in computer science, vol 1806","author":"van der Aalst WMP","year":"2000"},{"key":"e_1_2_1_2_4_2","volume-title":"Workflow management: models, methods, and systems","author":"van der Aalst WMP","year":"2004"},{"key":"e_1_2_1_2_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2004.02.002"},{"key":"e_1_2_1_2_6_2","unstructured":"van der Aalst WMP van Hee KM ter Hofstede AHM Sidorova N Verbeek HMW Voorhoeve M Wynn MT (2008) Soundness of workflow nets: classification decidability and analysis. Computer Science report no. 08-13. Technische Universiteit Eindhoven The Netherlands"},{"key":"e_1_2_1_2_7_2","first-page":"50","volume-title":"Transactions on Petri nets and other models of Concurrency III. Lecture notes in computer science, vol 5800","author":"van der Aalst WMP","year":"2009"},{"key":"e_1_2_1_2_8_2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022883727209"},{"key":"e_1_2_1_2_9_2","unstructured":"van der Aalst WMP Hirnschall A Verbeek HMW (2002) An alternative way to analyze workflow graphs. In: Banks-Pidduck A Mylopoulos J Woo CC Ozsu MT (eds) Proceedings of the 14th international conference on advanced information systems engineering (CAiSE\u201902). Lecture notes in computer science vol 2348. Springer-Verlag Berlin pp 535\u2013552"},{"key":"e_1_2_1_2_10_2","doi-asserted-by":"crossref","unstructured":"van der Aalst WMP Lohmann N Massuthe P Stahl C Wolf K (2008) From public views to private views: correctness-by-design for services. In: Dumas M Heckel H (eds) Proceedings of the 4th international workshop on Web services and formal methods (WS-FM 2007). Lecture notes in computer science vol 4937. Springer-Verlag Berlin pp 139\u2013153","DOI":"10.1007\/978-3-540-79230-7_10"},{"key":"e_1_2_1_2_11_2","first-page":"42","volume-title":"Formal methods for Web services. Lecture notes in computer science, vol 5569","author":"van der Aalst WMP","year":"2009"},{"key":"e_1_2_1_2_12_2","doi-asserted-by":"publisher","DOI":"10.1287\/isre.11.1.17.11787"},{"key":"e_1_2_1_2_13_2","first-page":"360","volume-title":"Advances in Petri nets 1986. Part I: Petri nets, central models and their properties. Lecture notes in computer science, vol 254","author":"Berthelot G","year":"1987"},{"key":"e_1_2_1_2_14_2","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.1.1.94"},{"key":"e_1_2_1_2_15_2","unstructured":"Barkaoui K Petrucci L (1998) Structural analysis of workflow nets with shared resources. In: van der Aalst WMP De Michelis G Ellis CA (eds) Proceedings of workflow management: net-based concepts models techniques and tools (WFM\u201998) vol 98\/7 of Computing science reports Lisbon Portugal. Eindhoven University of Technology Eindhoven pp 82\u201395"},{"key":"e_1_2_1_2_16_2","doi-asserted-by":"publisher","DOI":"10.1023\/B:ITEM.0000031583.16306.0f"},{"key":"e_1_2_1_2_17_2","first-page":"268","volume-title":"Application and theory of Petri nets. Lecture notes in computer science, vol 1639","author":"Chrzastowski-Wachtel P","year":"1999"},{"key":"e_1_2_1_2_18_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218843004000973"},{"key":"e_1_2_1_2_19_2","doi-asserted-by":"crossref","unstructured":"Dwyer MB Avrunin GS Corbett JC (1999) Patterns in property specifications for finite-state verification. In: ICSE \u201999: proceedings of the 21st international conference on software engineering Los Alamitos CA USA. IEEE Computer Society Press pp 411\u2013420","DOI":"10.1145\/302405.302672"},{"key":"e_1_2_1_2_20_2","doi-asserted-by":"publisher","DOI":"10.1002\/0471741442"},{"key":"e_1_2_1_2_21_2","doi-asserted-by":"crossref","unstructured":"van Dongen BF van der Aalst WMP Verbeek HMW (2005) Verification of EPCs: using reduction rules and Petri nets. In: Pastor O Falc\u00e3o e Cunha J (eds) Proceedings of the 17th conference on advanced information systems engineering (CAiSE\u201905). Lecture notes in computer science vol 3520. Springer-Verlag Berlin pp 372\u2013386","DOI":"10.1007\/11431855_26"},{"key":"e_1_2_1_2_22_2","doi-asserted-by":"crossref","unstructured":"Desel J Esparza J (1995) Free choice Petri nets. In: Cambridge tracts in theoretical computer science vol 40. Cambridge University Press Cambridge","DOI":"10.1017\/CBO9780511526558"},{"key":"e_1_2_1_2_23_2","doi-asserted-by":"crossref","unstructured":"Dufourd C Finkel A Schnoebelen Ph (1998) Reset nets between decidability and undecidability. In: Larsen K Skyum S Winskel G (eds) Proceedings of the 25th international colloquium on automata languages and programming. Lecture notes in computer science vol 1443. Springer-Verlag Berlin pp 103\u2013115","DOI":"10.1007\/BFb0055044"},{"key":"e_1_2_1_2_24_2","first-page":"301","volume-title":"Lectures on concurrency and Petri nets Lecture notes. in computer science, vol 1644","author":"Dufourd C","year":"1999"},{"key":"e_1_2_1_2_25_2","unstructured":"Dehnert J Rittgen P (2001) Relaxed soundness of business processes. In: Dittrich KR Geppert A Norrie MC (eds) Proceedings of the 13th international conference on advanced information systems engineering (CAiSE\u201901). Lecture notes in computer science vol 2068. Springer-Verlag Berlin pp 157\u2013170"},{"key":"e_1_2_1_2_26_2","first-page":"143","article-title":"Decidability issues for Petri nets: a survey","volume":"30","author":"Esparza J","year":"1994","journal-title":"J Inf Process Cybern"},{"key":"e_1_2_1_2_27_2","first-page":"374","volume-title":"Lectures on Petri nets I: basic models. Lecture notes in computer science, vol 1491","author":"Esparza J","year":"1998"},{"key":"e_1_2_1_2_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(97)00235-1"},{"key":"e_1_2_1_2_29_2","first-page":"188","volume-title":"Web services, E-business, and the semantic web, CAiSE 2002 international workshop (WES 2002). Lecture notes in computer science, vol 2512","author":"Fu X","year":"2002"},{"key":"e_1_2_1_2_30_2","doi-asserted-by":"crossref","unstructured":"Fu X Bultan T Su J (2004) Analysis of interacting BPEL Web services. In: International World Wide Web conference: proceedings of the 13th international conference on World Wide Web New York. ACM Press pp 621\u2013630","DOI":"10.1145\/988672.988756"},{"key":"e_1_2_1_2_31_2","first-page":"278","volume-title":"Business process management (BPM 2009). Lecture notes in computer science, vol 5701","author":"Fahland D","year":"2009"},{"key":"e_1_2_1_2_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(00)00102-X"},{"key":"e_1_2_1_2_33_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF01277643"},{"key":"e_1_2_1_2_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233556"},{"key":"e_1_2_1_2_35_2","first-page":"220","volume-title":"International conference on business process management (BPM 2005). Lecture notes in computer science, vol 3649","author":"Hinz S","year":"2005"},{"key":"e_1_2_1_2_36_2","first-page":"250","volume-title":"Applications and theory of Petri nets 2005. Lecture notes in computer science, vol 3536","author":"van Hee KM","year":"2005"},{"key":"e_1_2_1_2_37_2","first-page":"335","volume-title":"Application and theory of Petri nets 2003. Lecture notes in computer science, vol 2679","author":"van Hee KM","year":"2003"},{"key":"e_1_2_1_2_38_2","first-page":"197","volume-title":"Application and theory of Petri nets 2004. Lecture notes in computer science, vol 3099","author":"van Hee KM","year":"2004"},{"key":"e_1_2_1_2_39_2","volume-title":"Workflow management: modeling concepts, architecture, and implementation","author":"Jablonski S","year":"1996"},{"key":"e_1_2_1_2_40_2","volume-title":"Coloured Petri nets. Basic concepts, analysis methods and practical use, vol 1. EATCS monographs on theoretical computer science","author":"Jensen K","year":"1997"},{"key":"e_1_2_1_2_41_2","first-page":"1","volume-title":"Applications and theory of Petri nets 2010. Lecture notes in computer science, vol 6128","author":"Juhas G","year":"2010"},{"key":"e_1_2_1_2_42_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(99)00074-5"},{"key":"e_1_2_1_2_43_2","doi-asserted-by":"crossref","unstructured":"Karamanolis C Giannakopoulou D Magee J Wheater SM (2000) Model checking of workflow schemas. In: Proceedings of the fourth international enterprise distributed object computing conference (EDOC\u201900) Los Alamitos CA USA 2000. IEEE Computer Society pp 170\u2013181","DOI":"10.1109\/EDOC.2000.882357"},{"key":"e_1_2_1_2_44_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2005.02.005"},{"key":"e_1_2_1_2_45_2","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/3-540-45594-9_15","volume-title":"Business process management: models, techniques, and empirical studies. Lecture notes in computer science, vol 1806","author":"Kindler E","year":"2000"},{"key":"e_1_2_1_2_46_2","unstructured":"Keller G N\u00fcttgens M Scheer AW (1992) Semantische Processmodellierung auf der Grundlage Ereignisgesteuerter Processketten (EPK). Ver\u00f6ffentlichungen des Instituts f\u00fcr Wirtschaftsinformatik Heft 89 (in German) University of Saarland Saarbr\u00fccken"},{"key":"e_1_2_1_2_47_2","first-page":"17","volume-title":"International conference on business process management (BPM 2006). Lecture notes in computer science, vol 4102","author":"Lohmann N","year":"2006"},{"key":"e_1_2_1_2_48_2","doi-asserted-by":"publisher","DOI":"10.5555\/317105"},{"key":"e_1_2_1_2_49_2","first-page":"279","volume-title":"Applications and theory of Petri nets 2010. Lecture notes in computer science, vol 6128","author":"Lohmann N","year":"2010"},{"key":"e_1_2_1_2_50_2","unstructured":"Lin H Zhao Z Li H Chen Z (2002) A novel graph reduction algorithm to identify structural conflicts. In: Proceedings of the thirty-fourth annual Hawaii international conference on system science (HICSS-35). IEEE Computer Society Press"},{"key":"e_1_2_1_2_51_2","first-page":"12","article-title":"On Compatibility of Web services","volume":"65","author":"Martens A","year":"2003","journal-title":"Petri Net Newsl"},{"key":"#cr-split#-e_1_2_1_2_52_2.1","doi-asserted-by":"crossref","unstructured":"Martens A (2005) Analyzing Web service based business processes. In: Cerioli M","DOI":"10.1007\/978-3-540-31984-9_3"},{"key":"#cr-split#-e_1_2_1_2_52_2.2","unstructured":"(ed) Proceedings of the 8th international conference on fundamental approaches to software engineering (FASE 2005). Lecture notes in computer science vol 3442. Springer-Verlag Berlin pp 19-33"},{"key":"e_1_2_1_2_53_2","doi-asserted-by":"crossref","unstructured":"Martens A (2005) Consistency between executable and abstract processes. In: Proceedings of international IEEE conference on e-Technology e-Commerce and e-Services (EEE\u201905). IEEE Computer Society Press pp 60\u201367","DOI":"10.1109\/EEE.2005.53"},{"key":"e_1_2_1_2_54_2","first-page":"451","volume-title":"International conference on business process management (BPM 2006). Lecture notes in computer science, vol 4102","author":"Mendling J","year":"2006"},{"key":"e_1_2_1_2_55_2","doi-asserted-by":"crossref","unstructured":"Mendling J Neumann G van der Aalst WMP (2007) Understanding the occurrence of errors in process models based on metrics. In: Curbera F Leymann F Weske M (eds) Proceedings of the OTM conference on cooperative information systems (CoopIS 2007). Lecture notes in computer science vol 4803. Springer-Verlag Berlin pp 113\u2013130","DOI":"10.1007\/978-3-540-76848-7_9"},{"key":"e_1_2_1_2_56_2","unstructured":"Massuthe P Reisig W Schmidt K (2005) An operating guideline approach to the SOA. In: Proceedings of the 2nd South-East European workshop on formal methods 2005 (SEEFM05) Ohrid Republic of Macedonia"},{"issue":"3","key":"e_1_2_1_2_57_2","first-page":"35","article-title":"An operating guideline approach to the SOA","volume":"1","author":"Massuthe P","year":"2005","journal-title":"Ann Math Comput Teleinformatics"},{"key":"e_1_2_1_2_58_2","volume-title":"Workflow-based process controlling: foundation, design and application of workflow-driven process information systems","author":"zur Muehlen M","year":"2004"},{"key":"e_1_2_1_2_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/5.24143"},{"key":"e_1_2_1_2_60_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2007.06.019"},{"key":"e_1_2_1_2_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/1555392.1555395"},{"key":"e_1_2_1_2_62_2","doi-asserted-by":"crossref","unstructured":"Puhlmann F Weske M (2006) Interaction soundness for service orchestrations. In: Dan A Lamersdorf W (eds) Proceedings of service-oriented computing (ICSOC 2006). Lecture notes in computer science vol 4294. Springer-Verlag Berlin pp 302\u2013313","DOI":"10.1007\/11948148_25"},{"key":"e_1_2_1_2_63_2","first-page":"145","volume-title":"International conference on business process management (BPM 2006). Lecture notes in computer science, vol 4102","author":"Puhlmann F","year":"2006"},{"key":"e_1_2_1_2_64_2","first-page":"64","volume-title":"Transactions on Petri nets and other models of concurrency II. Lecture notes in computer science, vol 5460","author":"Puhlmann F","year":"2009"},{"key":"e_1_2_1_2_65_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2007.07.001"},{"key":"e_1_2_1_2_66_2","unstructured":"Sadiq W Orlowska ME (1997) On correctness issues in conceptual modeling of workflows. In: Proceedings of the 5th European conference on information systems (ECIS \u201997) Cork Ireland pp 19\u201321"},{"key":"e_1_2_1_2_67_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(00)00012-0"},{"key":"e_1_2_1_2_68_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(00)00292-7"},{"key":"e_1_2_1_2_69_2","first-page":"425","volume-title":"Advanced information systems engineering, proceedings of the 21st international conference on advanced information systems engineering (CAiSE\u201909). Lecture notes in computer science, vol 5565","author":"Trcka N","year":"2009"},{"key":"e_1_2_1_2_70_2","unstructured":"van der Toorn R (2004) Component-based software design with Petri nets: an approach based on inheritance of behavior. PhD thesis Eindhoven University of Technology Eindhoven The Netherlands"},{"key":"e_1_2_1_2_71_2","unstructured":"Verbeek HMW van der Aalst WMP (2005) Analyzing BPEL processes using Petri nets. In: Marinescu D (ed) Proceedings of the second international workshop on applications of Petri nets to coordination workflow and business process management. Florida International University Miami Florida pp 59\u201378"},{"key":"e_1_2_1_2_72_2","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxl074"},{"key":"e_1_2_1_2_73_2","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/44.4.246"},{"key":"e_1_2_1_2_74_2","doi-asserted-by":"crossref","unstructured":"Vanhatalo J V\u00f6lzer H Leymann F (2007) Faster and more focused control-flow analysis for business process models through SESE decomposition. In: Kr\u00e4mer B Lin K Narasimhan P (eds) Proceedings of service-oriented computing (ICSOC 2007). Lecture notes in computer science vol 4749. Springer-Verlag Berlin pp 43\u201355","DOI":"10.1007\/978-3-540-74974-5_4"},{"key":"e_1_2_1_2_75_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2009.06.003"},{"key":"e_1_2_1_2_76_2","first-page":"389","volume-title":"International conference on business process management (BPM 2006). Lecture notes in computer science, vol 4102","author":"Wynn MT","year":"2006"},{"key":"e_1_2_1_2_77_2","first-page":"423","volume-title":"Applications and theory of Petri nets 2005. Lecture notes in computer science, vol 3536","author":"Wynn MT","year":"2005"},{"key":"e_1_2_1_2_78_2","volume-title":"Business process management: concepts, languages, architectures","author":"Weske M","year":"2007"},{"key":"e_1_2_1_2_79_2","first-page":"51","volume-title":"Software composition. Lecture notes in computer science, vol 4829","author":"Wong PYH","year":"2007"},{"key":"e_1_2_1_2_80_2","first-page":"27","volume-title":"International conference on formal engineering methods (ICFEM 2008). Lecture notes in computer science, vol 5256","author":"Wong PYH","year":"2008"},{"key":"e_1_2_1_2_81_2","doi-asserted-by":"crossref","unstructured":"Wong PYH Gibbons J (2009) Property specifications for workflow modelling. In: Proceedings of 7th international conference on integrated formal methods. Lecture notes in computer science vol 5423. Springer-Verlag Berlin","DOI":"10.1007\/978-3-642-00255-7_5"},{"key":"e_1_2_1_2_82_2","unstructured":"White SA et\u00a0al (2009) Business process modeling notation specification (Version 1.2 OMG Final Adopted Specification)"},{"key":"e_1_2_1_2_83_2","first-page":"152","volume-title":"Transactions on Petri nets and other models of concurrency II. Lecture notes in computer science, vol 5460","author":"Wolf K","year":"2009"},{"key":"e_1_2_1_2_84_2","doi-asserted-by":"crossref","unstructured":"Wombacher A (2006) Decentralized consistency checking in cross-organizational workflows. In: Proceedings of international conference on e-Technology e-Commerce and e-Service (CEC\/EEE 2006). IEEE Computer Society pp 39\u201346","DOI":"10.1109\/CEC-EEE.2006.32"},{"key":"e_1_2_1_2_85_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.10.033"}],"container-title":["Formal Aspects of Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1007\/s00165-010-0161-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T17:56:23Z","timestamp":1740333383000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1007\/s00165-010-0161-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5]]},"references-count":86,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,5]]}},"alternative-id":["10.1007\/s00165-010-0161-4"],"URL":"https:\/\/doi.org\/10.1007\/s00165-010-0161-4","relation":{},"ISSN":["0934-5043","1433-299X"],"issn-type":[{"value":"0934-5043","type":"print"},{"value":"1433-299X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,5]]}}}