Next Article in Journal
Study on Bifurcation and Dual Solutions in Natural Convection in a Horizontal Annulus with Rotating Inner Cylinder Using Thermal Immersed Boundary-Lattice Boltzmann Method
Previous Article in Journal
Photonic Discrete-time Quantum Walks and Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Hierarchical Information Entropy System Model for TWfMS

1
School of Computer Science and Engineering, North Minzu University, Yinchuan 750021, China
2
Key Laboratory of Trustworthy Distributed Computing and Services (Ministry of Education), Beijing University of Posts and Telecommunications, Beijing 100871, China
3
School of Science, Ningxia Medical University, Yinchuan 750021, China
*
Authors to whom correspondence should be addressed.
Entropy 2018, 20(10), 732; https://doi.org/10.3390/e20100732
Submission received: 14 August 2018 / Revised: 17 September 2018 / Accepted: 22 September 2018 / Published: 24 September 2018
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
Under the infrastructure of three gradually deepening layers consisting of System, Service and Software, the information entropy of the Trustworthy Workflow Management System (TWfMS) will evolve from being more precise to more undetermined, due to a series of exception event X occurring on certain components (ExCs), along with the life cycle of TWfMS, experienced in its phased original, as-is, to-be, and agile-consistent stages, and recover, more precisely again, by turning back to the original state from the agile-consistent stage, due to its self-autonomous improvement. With a special emphasis on the system layer, to assure the trustworthiness of WfMS, this paper firstly introduces the preliminary knowledge of the hierarchical information entropy model with correlation theories. After illustrating the fundamental principle, the transformation rule is deduced, step by step, followed by a case study, which is conducive to generating discussions and conclusions in the different research areas of TWfMS. Overall, in this paper, we argue that the trustworthiness maintenance of WfMS could be analyzed and computational, through the viewpoint that all the various states of TWfMS can be considered as the transformation between WfMS and its trustworthiness compensate components, whose information entropy fluctuate repeatedly and comply with the law of the dissipative structure system.

1. Introduction

As one of the chaotic effective metrics of the member systems that belongs to the workflow management system (WfMS), information entropy reflects the uncertainty of its trustworthiness, covered with gradually deepening layers from top to bottom, i.e., system engineering [1], service computing [2], and software engineering [3,4]. Under the iterative process, the entities in the real world and their relationships would evolve into more complex entities, and with the emergence of the Internet, their relations present new hybrid features that are mixed with the environment of the real world (origin) and the information world (migrated). When in doubt, in order to detail and summarize the complex evolution progress of WfMS, we must rely on a multidisciplinary view to carry out the relevant research works of WfMS, so that the trustworthy workflow of the service layer, which is between the system layer and software layer, can be verified and validated by the users in Figure 1. Just as ourselves feeling, the Entity (E*) and Agents (A*) are intertwined with each other, covering the real world and information world with the Trust_Workflow (T_W) based on the Trust_Service (T_S), into business processes among the users and service developers or providers. What needs to be particularly pointed out is that the Trust_Service (T_S) is encapsulated by the various instances of society and its digital form, i.e., cloud computing. Obviously, the Real and Information world in the lower part of Figure 1 have experienced a deep evolution far from the purely original Real World, without digitization present in the upper part of Figure 1, which consists of proxies with a single type, i.e., the Entity type. While the services were transferred from Service Providers to Users through Entities, a belief network was created that underlies the workflow consisting of the services. Therefore, the Trust_Workflow (T_W) was generated based on the Trust_Service (T_S). Progressively, with the digitalization evolution in the Real World, some entities undertake mechanized repetitive operations. These are selected out and changed into intelligent agents, which results in the emergence of the Real and Information World. As we know, compared with the original Real World, whatever the functions of the Real and Information World, the T_W in the Real and Information World should be maintained at the same level or at a higher level than the original Real World. Hence, we should conduct further research on the T_W from the top layer, i.e., system layer and its middle layer can focus on the service, and those on the bottom layer should focus on the software. As the early stage of this work, in this paper, we put the emphasis on the system layer in advance.
In order to reflect the complex evolutionary phenomenon mentioned above, this paper constructs an information entropy system model according to the dissipative structure relationship between states of WfMS via the interfaces connecting the components, which assures the trustworthiness of WfMS addressing special exception events on certain components of the WfMS, i.e., we proposed and argued the dissipative structure relationship on the quantities relationship of the information entropy of WfMS and those additional trustworthiness assure components regarding the same exception events, namely, that the former generates those events, and the latter eliminates them as thoroughly and fluently as possible.
The remainder of this paper consists of five sections: Section 2 presents the motivation inspiring our research works; Section 3 discusses related research work on information entropy methods regarding WfMS; Section 4 illustrates the hierarchical information entropy system models for TWfMS on preliminary knowledge, fundamental principle, and transformation rules respectively; Section 5 gives the case study on the course timetabling problems from the case-based reasoning (CBR) system viewpoint; and Section 6 summarizes future research areas, with discussions and conclusions.

2. Motivation

Based on the trustworthy workflow of services in Figure 1, we can recognize that the ultimate trust information of the workflow will be a mix of the entities in the real world and the agents in the information world, which create a belief network between the users and the service developer, as well as the service providers. For example, while the stakeholders above engage with the belief network to tackle their business process management (BPM) in scenarios about book publishing, sales, and purchase activities, they should also resolve the following important problems illustrated in Figure 2.
In Figure 2, almost all the elements in Figure 1 are initialized in the application scenario for the order books workflow, through the automation of the business process. At first, when we temporarily ignore specific software development and service computing details in Figure 2, regardless of the existence of service computing tasks, a system viewpoint can assist us in realizing that all the initialized elements in Figure 2 already make up one digitized dissipative structure system, which continues to realize its negentropy process through the absorption and digestion of low-information-entropy, while, at the same time, it discharges high-information-entropy. In the other words, if we take “White: Books Shop” as an example, the low-information-entropy for White is the information on the electronic books or paper books from the authors by computer editors or printing houses. On the contrary, the high-information-entropy for White is the information of a books volume’s contents, which can be assembled by the “BWP Inc” on the “BPD Inc” platform. Furthermore, these Book Shops will compete with regard to their low-information-entropy, and cooperate with the Book Sale Platform Developers or Web Portal Service Providers, like “BPD Inc” or “BWP Inc” to make a contribution to their common high-information-entropy, i.e., the information of Workflow Publishing. Obviously, negentropy is realized through a similar phenomenon in which the entropy increase is suppressed on Entities in the society, as well as on Agents in Cloud, concurrently. Hence, users like Bob, Alice, and Black can tell that their requirements are always met through the TWfMS in Figure 2.
Additionally, with the emergence of software engineering, the information entropy of software behavior trustworthiness will ultimately determine whether the whole workflow system is trustworthy or not to users. This means system information entropy is determined by the software information entropy. Moreover, by addressing the flexible and scalable needs of traditional software engineering, users no longer require local ownership of the software. With the software service engineering emergence, service-oriented information entropy gradually inserts itself into the gap between the system and software behavior information entropy as a fundamental infrastructure and, finally, setting up the hierarchical information entropy model for TWfMS.
Therefore, when the workflow publishing service is assembled by BWP Inc. in Figure 2, users such as Bob, Alice, and Black should make decisions to select their satisfied workflow service (i.e., Problem 2, P2) through the service ranking given by other users’ evaluation on their feeling of the workflow trustworthiness (i.e., Problem 3, P3) based on the workflow correctness (i.e., Problem 1, P1) assisted by the workflow modelling function provided by E1 or A1 and the construction function provided by E3 or A3.
In general, all the behaviors of the system, service, and software of TWfMS in Figure 2 have evident characteristics that imply that the workflow information entropy is the negentropy of the business process dissipative structure system entropy, and that it transfers the trustworthiness of TWfMS to users. Hence, under such a scenario, we have sufficient motivation to research the hierarchical information system model for TWfMS to reveal its trustworthiness evolution law. As the first step in carrying out this research work, we plan to study system layer of the hierarchical information entropy model firstly in this paper.

3. Related Work

One of the most significant intelligence of BPM is the business process capability of any single enterprise in Figure 1 and Figure 2, that can be multiplied with the other enterprises’ services, so as to provide an amplified capability to its users, which means, in the view of its users, the capability of the single enterprise is not limited by its local resources, but depends on the computing performance of the whole WfMS. Obviously, the critical factor which influences the virtual capability of a single enterprise, based on the whole WfMS, is the fact that all of the enterprises have a unified trustworthiness framework which includes each other, otherwise, any single enterprise could not provide an amplified capability to its users. By addressing the problem of trust in each other in such a distributed computing environment, accompanied with the merging blockchain technology [5,6], its potential to support the Trust_Workflow (T_W) in Figure 2 can assist those enterprises in assembling their business process with an amplified capability by the delivery of a trust distributed storage certification. This is because its potential could drastically change the environment by challenging the joint design and a lack of mutual trust, which hampers the broader uptake of the interorganizational BPM.
With the trend of blockchain technology, sooner or later, researchers realized that the transference from an agent in the blockchain to another agent is information entropy, i.e., the producer agent supplies are high-entropy to the consumer agent, which are seen as low-entropy by the latter. In a similar dissipative business process, the producer agent also abstracts a certain volume of low-entropy for themselves, when compared to upper-level agents. Meanwhile, all of the agents’ structures in the whole WfMS are maintained in a stabile status with mutual trust. The phenomenon above is called the negentropy realizing process [7,8] of the dissipative structure system [9,10,11].
Inspired by the dissipative structure system theory and blockchain technology, we can consider the WfMS as a self-organizing dissipative structure system based on blockchain technology. Against this background, the difference between traditional dissipative structure system and WfMS is that the former is a type of dissipative structure system in which physicality is meaningful. On the contrary, the latter is a type of dissipative structure system in which information is meaningful. Therefore, to promote the degree of automation and controllability of the former, the latter is a mirror of the former. While the former consumes materials or energy to maintain their physical entropy structure in a loop, the latter consumes data to maintain their information entropy structure in a loop with as little material or energy as possible, in order to support the indispensable operations of the latter system, i.e., cloud computing center of IT enterprises. Hence, to a certain extent, the pressure to mirror sufficient data from the physical dissipative structure system into the information dissipative structure system, by using as little material or energy as possible, in which the materials consumed have been one the main motivations for keeping to Moore’s law [12], and the energy consumed is limited to Landauer’s principle [13,14].
Along with such a research view as above, we will overview the related works from the system, service, and software layers on the WfMS, respectively, through a continuous conversion chain from the physical entropy of the system to the information entropy of the system, service, and software, based on a trustworthy distributed database which was created by blockchain.
Firstly, on the system aspect, by introducing the applicability of choosing between models and designing hydrological networks for data collection, the authors of [15] illustrated the application of the principle of maximum entropy (POME). Just as what the authors of [16] present, Shannon presented the fundamental mathematical theory of communication to make a contribution to information theory, mainly for the technical problems, and addressed the semantic and effectiveness problems, such as the communication problem in hydrological networks [15]. Hence, due to the complex essential features in the system aspect, there are a series of hard problems for information science researchers [17,18]. While the software system can simulate, define, and control the business processes of the real world at a multilevel of granularity, the authors of [19] introduced a series of research works based on original and new research results on complex systems (CS) and fractional dynamics, as well as specific topics illustrating the broad impact of entropy and information theory-based techniques.
Secondly, on the service aspect, for optimizing the workflow, the authors of [20] presented an abstract model of visualization and inference processes, usually by making the transformation of the data spaces (referred to as alphabets) correspond to the reduction of maximal entropy. Addressing the selection of the best combination of clouds to meet the application requirements, the authors of [21] introduced an entropy-based method to quantify the most reliable workflow deployments and apply an extension of the Bell–LaPadula multilevel security model, to address the application security requirements, finally optimizing the deployment in terms of its entropy. With regards to the security of mobile cloud computing, the authors of [22] developed a Personalized Search scheme over encrypted data with efficient and secure Updates (PSU), which takes advantages of both the searchable symmetric encryption (SSE) and searchable public-key encryption (SPE) techniques.
As an entrance to user interface (UI) learning, the specification language is a critical element for the requirement of understanding the semantics of the workflow. The authors of [23,24] extended a specification language, SWSpec, with consideration to formal logic, so as to introduce some effective theorems in SWSpec, including a new compositional proof system and compliance checking technology.
Thirdly, on the software aspect, commonly, the propagation of software faults is caused by incorrect architecture designs in complex software, as a result of reflecting and deriving from the complex relationship in the real world. By modelling software fault propagation, the authors of [25] explored the interactions between fault propagation dynamics and software parameters. On the contrary, the authors of [26] presented a multilevel formation model for complex software systems, which can generate more realistic structural properties by organizing more realistic software networks.
Corresponding to the references above, which mainly focus on the system and service model for the trustworthiness of WfMS, the authors of [27,28,29] made research works on the relative software model as an instantiation case of the system and service model, based on computer hardware. Especially on the software performance optimization model, the authors of [27] leveraged distribution entropy and its difference in an approximate Pareto front as a new objective space, in order to evaluate its individual environmental fitness, which is the metric used in updating the archive and selecting the global best solutions. On the software test optimization model, the authors of [28] demonstrated an approach to optimizing the software testing process by taking it as a Markov decision process based on the cross-entropy method; on the software resource optimization model, the authors of [29] proposed a resource evaluation model based on entropy optimization and dynamic weighting, which can filter the resources that satisfy user Quality of Service (QoS) and system maximization by a goal function and the constraints of maximum entropy and the entropy increase principle, so as to achieve optimal scheduling and satisfied user QoS.
Overall, the ultimate aim of almost all theories, regarding information systems, is to assist stakeholders in analysis, and design a perfect information system to meet the requirement of the users. To this end, the authors of [30] proposed the kernel concept family of the System Development Life Cycle (SDLC), and gave a completed approach to achieving the aim. Workflow management technology is a comprehensive advanced technology set to support the kernel concept of SDLC, and the authors of [31] described the ActionWorkflowTM approach as a design methodology and associated computer software for the support of work in organizations.
In contrast to the related works summarized above, from the total goal to assure the trustworthiness of workflow, the proposed model in this paper separated the whole workflow system into two independent parts: that one is the original workflow components set, and another is the trustworthiness assurance components set. Due to the complex correlation of the two component sets, we abstract their correlation into the hierarchical information entropy system model by ignoring relatively minor influence parameters on the trustworthiness of workflow. Hence, the model proposed in this paper has relatively high robustness to adapt to the multivariable original, as-is, to-be, and agile-consistent stages of a workflow survival environment.

4. Information Entropy System Model for TWfMS

In line with the motivation and related works discussed above, as a special type of Quality Management System (QMS) [32] for the workflow, WfMSs experience multiple loops consisting of re-engineering and/or reorganizations [33] with the emergence of statistic mechanics [34] based on the behavior of business processes, and they converge into a certain type of information entropy. These processes of loops improve the WfMS into a high-level order, with a relatively low entropy of information systems, from a low-level order with a high entropy of information systems in the long term, along with consistently maintaining its trustworthiness, as defined by the stakeholders of WfMS [33], i.e., resulting in a dissipative structure system. This cycle, which covers the entire life of the WfMS, is also known as the resilience engineering (RE) [35] model, and it is based on our prior research [33]. We will put forward this work to illustrate its information entropy system model in this section for TWfMS.
Based on the RE model for the WfMS [33], we illustrate our information entropy system model equations regarding TWfMS according to the standard WfMC reference model with the extension of methods and mechanisms, which is the fundamental goal of RE [33].
Considering that the implementation of RE for WfMS is imposed on the WfMS service components [36] in the middle stage, in this section, we firstly introduce the preliminary knowledge with the information entropy system model definition for the WfMS. Secondly, as the fundamental principle of WfMS RE, to assure its trustworthiness as perceived by users, we provide the fundamental quantity calculation principle, including relative constraints regarding to the information system entropy model definition of the WfMS. Thirdly, in order to implement TWfMS, the transformation rules based on the preliminary knowledge and fundamental principle are presented, as a guideline to develop TWfMS.

4.1. Preliminary Knowledge

Not just as System of Systems oriented (SoS-oriented), but also from the view of the dissipative structure system, the complex system software, a formal representation of the mechanisms and methods revealing the internal principles of WfMS trustworthiness, is imperative for the design, development, and maintenance tasks covering the entire WfMS life cycle. While it continues to consume high-entropy information from the supplier, it also produces low-entropy information. In our prior research, we presented a reference model for trustworthy WfMS (TWfMS) [33,36], as illustrated in Figure 3, inspired by the RE concept. As indicated in Figure 3, we expand the WfMC reference model from interfaces #0 and #6–#11. In the following paragraphs, we explain the information entropy model of system for TWfMS in terms of each of these interfaces.
A special entropy production on information system is derived from its role of non-equilibrium thermodynamics [37]. The “compensation” N in a certain cyclic process is defined by Equation (1)–(5), where T is the heat reservoir whose temperature is θ , d Q r is the heat transferred between the systems, d Q r T is the differential of a state function S (called the “entropy”), and d Q is called “uncompensated heat”, respectively, in the following conditions:
when the cyclic process is a reversible cycle, i.e., Equation (1):
N d Q r T = 0 ;
when the cyclic process is a reversible or irreversible cycle, i.e., Equation (2):
N d Q T 0 ;
when the cycle has a reversible path connecting two arbitrary equilibrium states 1 and 2, and an irreversible one connecting the same two states, i.e., Equation (3):
N + ( 1 ) ( 2 ) d Q T = S ( 2 ) S ( 1 ) ;
when the cycle is seen as an infinitesimally arbitrary process, i.e., Equation (4):
d S + d N = d Q T ;
when the cycle is faced by a dimensional requirement, i.e., Equation (5):
d N = d Q T .
Then, just as with the viewpoint of the authors of [37], what is the nature of N and how can we quantify it? The information entropy S is called the “negentropy” of the d Q T [23] and, according to the statement, goes by the name of the second principle of thermodynamics [38] (Equation (6)):
S Δ Q T .
Additionally, in a statistically-based interpretation of thermodynamics, the directly linked entropy of the number of molecular configuration of W (the thermodynamic weight) of the system [39] is Equation (7):
S = K ln W .
Then, after the first mention of “Negentropy” by Leo Szilard in 1929, Erwin Schrödinger applied “Negentropy” in biology, and made an argument that organisms rely on negative entropy to survive [40].
d S d T = d i S d T + d e S d T ,
where d S means the change of entropy of the whole system (e.g., in this paper, refer to the WfMS) and the d S is determined by the two elements, d i S and d e S , in which d i S means the production of entropy from the inside of the whole system (e.g., in this paper refer to WfMS) and d e S means the exchange of entropy from the outside of the whole system, in other words, the environment (e.g., in this paper, refer to the implementation of the components which assure the trustworthiness of WfMS). This means that, at any time, because d i S 0 , when ( d e S 0 ) & ( | d e S | d i S ) , then d S 0 , (e.g., the increase of trustworthiness of the WfMS). Otherwise, d S < 0 (e.g., the decrease of trustworthiness of the WfMS). Based on the theories above, we can give the following information entropy model of the system for TWfMS (Figure 3).

4.2. Fundamental Principle

To note the definition in the following hierarchical information entropy system model for TWfMS, and to be consistent with Equations (1)–(8), we declaim that ( R C ( W f M S # source ) ( W f M S # destination ) E ( c / o / h / n / r / / x / ) C s ) as d i S , ( N W f M S # source W f M S # destination ( # s o u r c e ) ) as d e S , and ( S ( W f M S # destination ) S ( W f M S # source ) ) as d S , thus, if we assume all the change of entropy occurred in the same period of time d T , we can simplify Equation (8) as d S = d i S + d e S . Then, we have
d S = d i S + d e S = ( R C ( W f M S # source ) ( W f M S # destination ) E ( c / o / h / n / r / / x / ) C s ) + ( N W f M S # source W f M S # destination ( # s o u r c e ) ) = ( i = 1 E x C s p ( W f M S _ E x C s i ) ln p ( W f M S _ E x C s i ) ) ( i = 1 E x C s p ( N W f M S # d e s t i n a t i o n ( # source ) i ) ln p ( N W f M S # d e s t i n a t i o n ( # source ) i ) i = 1 E x C s p ( N W f M S # s o u r c e ( # source ) i ) ln p ( N W f M S # s o u r c e ( # source ) i ) ) = ( S ( W f M S # destination ) S ( W f M S # source ) )
Furthermore, we declaim that the # d e s t i n a t i o n / # s o u r c e is a selection from the interface number in Figure 3, with the scope of 1–12; E ( c / o / h / n / r / / x / ) C s counts on certain unemployed components by varying exception events in the runtime of WfMS, i.e., the WfMS experiences those exception events from the state represented by # s o u r c e , and is promoted or recovered to the state represented by # d e s t i n a t i o n through the implementation of the components, which assure the trustworthiness of WfMS according to special exception events on certain components, i.e., exception event X (ExCs). For example, parameter configuration (EcCs), performance optimization (EoCs), healing data (EhCs), requirement analysis (ErCs), and so on.
Moreover, in analogy to the Boltzmann constant [39], we argued that a similar constant R C in the hierarchical information entropy model has the means of the investment resource, including the man-month per standard component for a certain WfMS. Additionally, the information entropy of ExCs can be represented as ( R C ( W f M S # source ) ( W f M S # destination ) E ( c / o / h / n / r / / x / ) C s ) S = ( i = 1 E x C s p ( W f M S _ E x C s i ) ln p ( W f M S _ E x C s i ) ) , which means from the view of statistical mechanics [41], in all the exception events that occurred on WfMS from the state represented by # s o u r c e , there is an ExCs amount of exception event X, and the probability of the i-th exception event X is p ( W f M S _ E x C s i ) . Then, from the state of the # s o u r c e to the state of the # d e s t i n a t i o n , there is an ( R C ( W f M S # source ) ( W f M S # destination ) E ( c / o / h / n / r / / x / ) C s ) amount of physical entropy occurring, for there is an ExCs amount of exception event X in the information entropy view. From the state of # s o u r c e to the state of # d e s t i n a t i o n , there is S = ( i = 1 E x C s p ( W f M S _ E x C s i ) ln p ( W f M S _ E x C s i ) ) amount of information entropy occurring for the same reason.
On the contrary, to realize a reversed cycle for WfMS or, in other words, to implement trustworthy WfMS (i.e., TWfMS), we should eliminate the information entropy of S = ( i = 1 E x C s p ( W f M S _ E x C s i ) ln p ( W f M S _ E x C s i ) ) as accurately as possible. Then, we attempt to promote or recovery the WfMS to their trustworthy state represented by # d e s t i n a t i o n through the implementation of the components in Figure 3, which assure the trustworthiness of WfMS, i.e., ( N W f M S # source W f M S # destination ( # s o u r c e ) ) . Concerning the internal structure of the isolated component N for compensating the information entropy of S = ( i = 1 E x C s p ( W f M S _ E x C s i ) ln p ( W f M S _ E x C s i ) ) , as implemented by system, service, or software method by a group of normal components, it also corresponds to unemployed components that emerge out to solve the i-th exception events X with a probability of p ( N W f M S # s o u r c e ( # source ) i ) before it starts to tackle those exception events X, and it also has corresponding components remaining unemployed and unused to solve those exception events X with a probability of p ( N W f M S # d e s t i n a t i o n ( # source ) i ) , after it has tackled those exception events X. Hence, their difference ( i = 1 E x C s p ( N W f M S # d e s t i n a t i o n ( # source ) i ) ln p ( N W f M S # d e s t i n a t i o n ( # source ) i ) i = 1 E x C s p ( N W f M S # s o u r c e ( # source ) i ) ln p ( N W f M S # s o u r c e ( # source ) i ) ) means the real work of N is to compensate the information entropy of S = ( i = 1 E x C s p ( W f M S _ E x C s i ) ln p ( W f M S _ E x C s i ) ) , and their difference in Equation (9) means the change of entropy of WfMS, i.e., ( S ( W f M S # destination ) S ( W f M S # source ) ) 0 .
Therefore, we can make the assumption that if there are a certain amount of exception events X, the larger is ( S ( W f M S # destination ) S ( W f M S # source ) ) , and the more trustworthiness gained by us. Thus, some constraints on this fundamental principle can be made so that ( a ) : T s t t e ( W f M S ) = T ( W f M S # 1 ) means the original version of WfMS-#1 owns the lowest trustworthiness (refer to trustworthiness on the software trusted threshold entropy [33]). In this paper, we prefer a trustworthiness on the system trusted threshold entropy of WfMS ( T s t t e ( W f M S ) ), then, all the following versions of WfMS-#n (n > 1) should own a higher trustworthiness than WfMS-#1. ( b ) : T s i t e ( W f M S ) = T ( W f M S # 2 ) means the first improved version of WfMS-#2 owns the system trusted initialization trustworthiness entropy of WfMS ( T s i t e ( W f M S ) ). Then, normally, all the following versions of WfMS-#n (n > 2) should own a lower trustworthiness than WfMS-#2 for an unavoidable encounter with exception event X, resulting in the decrease of their trustworthiness.
( c ) : max ( S ( W f M S ) ) = S ( W f M S # 1 ) ( d ) : min ( S ( W f M S ) ) = S ( W f M S # 2 ) ( e ) : T s r t e ( W f M S ) [ T ( W f M S # 2 ) , T ( W f M S # 1 ) ] ( f ) : T s t t e ( W f M S ) T s r t e ( W f M S ) T s i t e ( W f M S )
means that WfMS-#1 owns the maximum entropy in all the states of WfMS for the same reason as constraint (a) mentioned above, and that WfMS-#2 owns the minimum entropy in all the states of WfMS for the same reason as constraint (b) mentioned above. Hence, the system trusted runtime trustworthiness entropy of WfMS ( T s r t e ( W f M S ) ) should be in the range of [ T ( W f M S # 2 ) , T ( W f M S # 1 ) ] .
On the other hand, generally speaking, there exists a certain correspondence between the behavior trustworthiness and system entropy of WfMS. That is, the larger the degree of confusion of the WfMS due to more exception events occurring, the lower the credibility of WfMS due to erroneous or misplace actions. However, concerning the complex structure of the WfMS in the system, service, and software layers, in some special conditions, the corresponding relationship is not necessarily established. Thus, we cannot give the calculation method of this corresponding relationship in this paper, something we plan to resolve in our future research.
( g ) : i = 1 E x C s p ( W f M S _ E x C s i ) = i = 1 E x C s p ( N W f M S # d e s t i n a t i o n ( # source ) i ) = i = 1 E x C s p ( N W f M S # s o u r c e ( # source ) i ) = 1
means the sum the of probability of a type of exception event X occurring on a certain state where WfMS is 1, which is equal to the sum of the probability of the corresponding compensation actions reflected by the implementation of the components. This assures the trustworthiness of WfMS according to exception events X on certain components of WfMS. Either the sum of the probability of the corresponding compensation actions start to tackle the exception events X, or there are corresponding components that remain unemployed or unused to solve those exception events X.

4.3. Transformation Rule

Then, based on the definition discussed above, we illustrate the transformation rule of the hierarchical information entropy system model, step by step, on every interface, as follows:
(1) Interface #1 is linked to the requirement auto-analysis tool with the process definition tool, where the former consists of four components known as acquisition, decomposition, combination, and verification based on a Petri net (ADCV-PN); that is, we consider the ADCV-PN tools as an extension of and supplementary to the process definition tool [33]. As the supplementary components of WfMS and those dependent on TWfMS, we make the assumption that an error result probably exists in a certain entropy change, or lack of change, because of the exception event of the requirement analysis components (ErCs) through Interface #1.
N W f M S # 1 W f M S # 2 ( # 1 ) + R C ( W f M S # 1 ) ( W f M S # 2 ) E r C s = ( i = 1 E r C s p ( N W f M S # 2 ( # 1 ) i ) ln p ( N W f M S # 2 ( # 1 ) i ) i = 1 E r C s p ( N W f M S # 1 ( # 1 ) i ) ln p ( N W f M S # 1 ( # 1 ) i ) ) + ( i = 1 E r C s p ( W f M S _ E r C s i ) ln p ( W f M S _ E r C s i ) ) = S ( W f M S # 2 ) S ( W f M S # 1 ) 0
(2) Interface #2 is linked to the process definition tool with the process execution service, where the former defines and validates the TWfMS generated by the tools of ADCV-PN; that is, we consider the process definition tool as a standard component of TWfMS with an absolute correctness. Indeed, the absolute correctness does not really exist, but, as the process definition tool is an original component of WfMS and an undependable component of TWfMS, we make the assumption that it is error-free. Then, based on that assumption, there would be no entropy change because of the exception event of the process definition components (EdCs) through Interface #2.
N W f M S # 2 W f M S # 3 ( # 2 ) + R C ( W f M S # 2 ) ( W f M S # 3 ) E d C s = ( i = 1 E d C s p ( N W f M S # 3 ( # 2 ) i ) ln p ( N W f M S # 3 ( # 2 ) i ) i = 1 E d C s p ( N W f M S # 2 ( # 2 ) i ) ln p ( N W f M S # 2 ( # 2 ) i ) ) + ( i = 1 E d C s p ( W f M S _ E d C s i ) ln p ( W f M S _ E d C s i ) ) = S ( W f M S # 3 ) S ( W f M S # 2 ) = 0
(3) Interface #3 is linked to the process execution service with the “client-end application” and “work list produce”, where the latter assembles and calls for a remote client-end application and accepts batch tasks edited by the client-end user to produce a work list which aims to realize the reusability of some components in T W f M S # 1 . Just like Interface #2, we make the assumption that it is error-free. Then, based on that assumption, there would be no entropy change because of the exception event of the “client-end application” and “work list produce” components (EeCs) through Interface #3.
N W f M S # 3 W f M S # 4 ( # 3 ) + R C ( W f M S # 3 ) ( W f M S # 4 ) E e C s = ( i = 1 E e C s p ( N W f M S # 4 ( # 3 ) i ) ln p ( N W f M S # 4 ( # 3 ) i ) i = 1 E e C s p ( N W f M S # 3 ( # 3 ) i ) ln p ( N W f M S # 3 ( # 3 ) i ) ) + ( i = 1 E e C s p ( W f M S _ E e C s i ) ln p ( W f M S _ E e C s i ) ) = S ( W f M S # 4 ) S ( W f M S # 3 ) = 0
(4) Interface #4 is linked to the process execution service with the tools, where the latter assembles and calls for a remote application to search the typical web services. Just like with Interface 3#, we make the assumption that it is error-free. Then, based on that assumption, there would be no entropy change because of the exception event of the tools components (EtCs) through Interface #4.
N W f M S # 4 W f M S # 5 ( # 4 ) + R C ( W f M S # 4 ) ( W f M S # 5 ) E t C s = ( i = 1 E t C s p ( N W f M S # 5 ( # 4 ) i ) ln p ( N W f M S # 5 ( # 4 ) i ) i = 1 E t C s p ( N W f M S # 4 ( # 4 ) i ) ln p ( N W f M S # 4 ( # 4 ) i ) ) + ( i = 1 E t C s p ( W f M S _ E t C s i ) ln p ( W f M S _ E t C s i ) ) = S ( W f M S # 5 ) S ( W f M S # 4 ) = 0
(5) Interface #5 is linked to the tools for communication on the called application of typical web services with an additional tool, the auto construction method for WfMS (ACM4WMS), based on services combination. That is, we consider the ACM4WMS tool an extension of, and supplementary to, the standard tools, linked to the process execution service module via Interface #4 [33]. As a supplementary component of WfMS and dependent on TWfMS, we make the assumption that an error probably exists as a result of a certain entropy change, or lack of change, because of the exception event of the service combination components (EsCs) through Interface #5.
N W f M S # 5 W f M S # 6 ( # 5 ) + R C ( W f M S # 5 ) ( W f M S # 6 ) E s C s = ( i = 1 E s C s p ( N W f M S # 6 ( # 5 ) i ) ln p ( N W f M S # 6 ( # 5 ) i ) i = 1 E s C s p ( N W f M S # 5 ( # 5 ) i ) ln p ( N W f M S # 5 ( # 5 ) i ) ) + ( i = 1 E s C s p ( W f M S _ E s C s i ) ln p ( W f M S _ E s C s i ) ) = S ( W f M S # 6 ) S ( W f M S # 5 ) 0
(6) Interface #6 is linked to the process execution service with other workflow execution service, in order to improve the interoperability of WfMS assisted by outside workflow engine(s). Just like the similar reason above, we make the assumption that it is error-free. Then, based on that assumption, there would be no entropy change because of the exception event of other workflow execution service components (EwCs) through Interface #6.
N W f M S # 6 W f M S # 7 ( # 6 ) + R C ( W f M S # 6 ) ( W f M S # 7 ) E w C s = ( i = 1 E w C s p ( N W f M S # 7 ( # 6 ) i ) ln p ( N W f M S # 7 ( # 6 ) i ) i = 1 E w C s p ( N W f M S # 6 ( # 6 ) i ) ln p ( N W f M S # 6 ( # 6 ) i ) ) + ( i = 1 E w C s p ( W f M S _ E w C s i ) ln p ( W f M S _ E w C s i ) ) = S ( W f M S # 7 ) S ( W f M S # 6 ) = 0
(7) Interface #7 is linked to the core work engine(s) component of the WfMS, with the additional self-configuration-parameter system RE tool for the WfMS (SCP4WMS) in the process execution service module. That is, we consider the SCP4WMS tools to be an extension of and supplementary to the process execution service module [33]. As a supplementary component of WfMS, and dependent on TWfMS, we make the assumption that an error probably exists as a result of a certain entropy change or lack of change, because of the exception event of the parameter configuration components (EcCs) through Interface #7.
N W f M S # 7 W f M S # 8 ( # 7 ) + R C ( W f M S # 7 ) ( W f M S # 8 ) E c C s = ( i = 1 E c C s p ( N W f M S # 8 ( # 7 ) i ) ln p ( N W f M S # 8 ( # 8 ) i ) i = 1 E c C s p ( N W f M S # 7 ( # 7 ) i ) ln p ( N W f M S # 7 ( # 7 ) i ) ) + ( i = 1 E c C s p ( W f M S _ E c C s i ) ln p ( W f M S _ E c C s i ) ) = S ( W f M S # 8 ) S ( W f M S # 7 ) 0
(8) Interface #8 is the process execution service consisting of the core work engine(s) component of the WfMS with SCP4WMS via Interface #7, with the management and monitor tool. Just like the similar reason above, we make the assumption that the latter is error-free. Then, based on that assumption, there would be no entropy change because of the exception event of the management and monitor tool components (EmCs) through Interface #7.
N W f M S # 8 W f M S # 9 ( # 8 ) + R C ( W f M S # 8 ) ( W f M S # 9 ) E m C s = ( i = 1 E m C s p ( N W f M S # 9 ( # 8 ) i ) ln p ( N W f M S # 9 ( # 8 ) i ) i = 1 E m C s p ( N W f M S # 8 ( # 8 ) i ) ln p ( N W f M S # 8 ( # 8 ) i ) ) + ( i = 1 E m C s p ( W f M S _ E m C s i ) ln p ( W f M S _ E m C s i ) ) = S ( W f M S # 9 ) S ( W f M S # 8 ) = 0
(9) Interface #9 is linked to the management and monitor tool with the self-optimization framework system for the WfMS (SOF4WMS) RE tools, which contributes to the TWfMS mechanism with the SCP4WMS tools. That is, we consider the SOF4WMS tool an extension of, and supplementary to, the original management and monitoring tool [33]. As a supplementary component of WfMS and dependent on TWfMS, we make the assumption that an error probably exists as a result of a certain entropy change, or lack of change, because of the exception event of the performance optimization components (EoCs) through Interface #9.
N W f M S # 9 W f M S # 10 ( # 9 ) + R C ( W f M S # 9 ) ( W f M S # 10 ) E o C s = ( i = 1 E o C s p ( N W f M S # 10 ( # 9 ) i ) ln p ( N W f M S # 10 ( # 9 ) i ) i = 1 E o C s p ( N W f M S # 9 ( # 9 ) i ) ln p ( N W f M S # 9 ( # 9 ) i ) ) + ( i = 1 E o C s p ( W f M S _ E o C s i ) ln p ( W f M S _ E o C s i ) ) = S ( W f M S # 10 ) S ( W f M S # 9 ) 0
(10) Interface #10 is linked to the management and monitor tool with the self-healing model system for the WfMS (SHM4WMS) RE tools, which contributes to the TWfMS mechanism with the SCP4WMS and SOF4WMS tools. That is, we consider the SHM4WMS tool as an extension of, and supplementary to, the original management and monitoring tool [33]. As a supplementary component of WfMS and dependent on TWfMS, we make the assumption that an error probably exists as a result of a certain entropy change, or lack of change, because of the exception event of the healing data components (EhCs) through Interface #10.
N W f M S # 10 W f M S # 11 ( # 10 ) + R C ( W f M S # 10 ) ( W f M S # 11 ) E h C s = ( i = 1 E h C s p ( N W f M S # 11 ( # 10 ) i ) ln p ( N W f M S # 11 ( # 10 ) i ) i = 1 E h C s p ( N W f M S # 10 ( # 10 ) i ) ln p ( N W f M S # 10 ( # 10 ) i ) ) + ( i = 1 E h C s p ( W f M S _ E h C s i ) ln p ( W f M S _ E h C s i ) ) = S ( W f M S # 11 ) S ( W f M S # 10 ) 0
(11) Interface #11 is connected to the management and monitoring tool with the ACM4WMS tool when the WfMS encounters local break points, whereby the WfMS trustworthiness can no longer be maintained by the management and monitoring tool, even with the assistance of the SCP4WMS, SOF4WMS, and SHM4WMS toolsets. In the context of the scenario described above, via Interface #11, the management and monitoring tool transfers the unsolved exceptional event by the SCP4WMS, SOF4WMS, and SHM4WMS toolsets, sequentially, to the ACM4WMS tool, in order to reconstruct the WfMS by searching for resources in the cloud. At such a time, we consider the WfMS as the beginning of local resilience engineering [33]. As a supplementary component of WfMS and dependent on TWfMS, we make the assumption that an error probably exists as a result of a certain entropy change, or lack of change, because of the exception event of the local resilience engineering components (ElCs) through Interface #11.
N W f M S # 11 W f M S # 5 ( # 11 ) + R C ( W f M S # 11 ) ( W f M S # 5 ) E l C s = ( i = 1 E l C s p ( N W f M S # 5 ( # 11 ) i ) ln p ( N W f M S # 5 ( # 11 ) i ) i = 1 E l C s p ( N W f M S # 11 ( # 11 ) i ) ln p ( N W f M S # 11 ( # 11 ) i ) ) + ( i = 1 E l C s p ( W f M S _ E l C s i ) ln p ( W f M S _ E l C s i ) ) = S ( W f M S # 5 ) S ( W f M S # 11 ) 0
(12) Interface #12 is connected to the management and monitoring tool with the ADCV-PN tools when the WfMS encounters global break points, whereby the WfMS trustworthiness can no longer be sufficiently accurate by means of the ACM4WMS tool, even if all the resources in the cloud are traversed by means of the ACM4WMS tool. In the context of the scenario described above, via Interface #12, the management and monitoring tool finally transfers the exceptional event unsolved by the ACM4WMS tool to the ADCV-PN tools, in order to remodel the WfMS under user validation. At such a time, we consider the WfMS as the beginning of global resilience engineering [33]. As a supplementary component of WfMS and dependable on TWfMS, we make the assumption that an error probably exists as a result of a certain entropy change, or lack of change, because of the exception event of the global resilience engineering components (EgCs) through Interface #12.
N W f M S # 12 W f M S # 1 ( # 12 ) + R C ( W f M S # 12 ) ( W f M S # 1 ) E g C s = ( i = 1 E g C s p ( N W f M S # 1 ( # 12 ) i ) ln p ( N W f M S # 1 ( # 12 ) i ) i = 1 E g C s p ( N W f M S # 12 ( # 12 ) i ) ln p ( N W f M S # 12 ( # 12 ) i ) ) + ( i = 1 E g C s p ( W f M S _ E g C s i ) ln p ( W f M S _ E g C s i ) ) = S ( W f M S # 1 ) S ( W f M S # 12 ) 0

5. Case Study

The author of [33] has introduced the application of WfMS addressing the course timetabling problems [42] from the case-based reasoning (CBR) system viewpoint. In this section, we will discuss a case study by using the CBR system for a university in China. Firstly, all the course timetabling business processes are managed by stakeholders consisting of students, teachers, the undergraduate teaching secretary, the director of the office of teaching, the dean of departments and schools, and the administrative staff of the department of education of the university. Therefore, just as we found, the original WfMS of CBR system existed in the business processes tackled and managed by those stakeholders with almost purely traditional personal and physical resources. Then, we can gain the original version of WfMS-#1 by acquisition. The decomposition based on a Petri net (AD-PN) toolsets indicates the lowest trustworthiness of WfMS with the highest information entropy, followed by the generation of the WfMS-#2 version by the combination and verification based on Petri net (CV-PN) tools, to indicate the highest trustworthiness of WfMS with the lowest information entropy. The related activities implemented from WfMS-#1 to WfMS#2 correspond to Equation (10) in Section 4.
Secondly, through the process definition tool, assisted by the specification language with semantic formalization [18,19] on the CBR business, WfMS-#2 can be transformed into WfMS-#3 smoothly, without additional entropy needing to be eliminated. The related activities implemented from WfMS-#2 to WfMS-#3 correspond to Equation (11), with the condition of S ( W f M S # 3 ) S ( W f M S # 2 ) = 0 in Section 4.
Next, when defined, the workflow instructions written by the specification language enter the control of the process execution service. This is read by the workflow engine(s) of the CBR system, the process execution service would call for the client-end application, and the users may deliver a work list by assembling the workflow instructions in a reuse pattern, e.g., in a university. This step means the CBR system running in the information center of the university would call for the data generated from the application of the department implemented by the software developed by the department or manually completed by the undergraduate teaching secretary. At the same time, the undergraduate teaching secretary can also deliver a work list by reusing the workflow instructions, for example, he/she may deliver a request about an undergraduate graduation qualification examination by reusing the instructions on the compulsory course score inquiry. Then, the process execution service can start the related activities implemented from WfMS-#3 to WfMS-#4, which correspond to Equation (12), with the condition of S ( W f M S # 4 ) S ( W f M S # 3 ) = 0 in Section 4.
If there are services which are not supplied by the university itself, but are necessary to complete the workflow, then, the CBR system would call for an application from outside of the university, e.g., searching the IEEE/ACM 2013 computing curriculum by a web crawler service. With such a background, the process execution service can start the related activities implemented from WfMS-#4 to WfMS-#5, which correspond to Equation (13) with the condition of S ( W f M S # 5 ) S ( W f M S # 4 ) = 0 in Section 4.
Furthermore, addressing the curriculum credit replacement for the exchange of undergraduate students studying abroad, the dean of the department would let the CBR system call for the service combination through the automatic construction tool by consulting with the corresponding dean of department or colleagues of the university abroad, which is normally completed by a traditionally personal method using a physical resource, via a mobile telephone or email, which has had rather low effectiveness in the last decade. Now, this is tackled by intelligent agents based on data mining on the big data of the text resources of the mass curriculum training program. With such a background, the additional tool will link to the ACM4WMS as a supplementary tool to start the related activities implemented from WfMS-#5 to WfMS-#6, which correspond to Equation (14) in Section 4.
As a mature cross-organization, WfMS, in this case, would encounter the collaborative work requirement by its peer WfMS, i.e., the CBR system would call for the undergraduate archives WfMS of the smart campus management information system in the same university, or the foreign students’ archive information from an overseas university. With such a background, the process execution service can start related activities implemented from WfMS-#6 to WfMS-#7, which correspond to Equation (15) with the condition of S ( W f M S # 7 ) S ( W f M S # 6 ) = 0 in Section 4.
Until this ordinal stage, the TWfMS has been created from WfMS-#1 to WfMS-#7 through 6 interfaces. If the CBR system can work smoothly by eliminating the exception events of the requirement analysis and service combination (ErCs, EsCs), then nothing needs to be done, and the trustworthiness of WfMS complies with the constraint condition (e) in Section 4. However, the unavoidable exception events of parameter configuration, performance optimization, and healing data (EcCs, EoCs, and EhCs) will result in the decrease of the WfMS trustworthiness. Then, the core workflow engine(s) can start the related activities implemented from WfMS-#7 to WfMS-#8, which correspond to Equation (16) in Section 4, to solve the problem of the EcCs. This is followed by the management and monitor tool, which starts the related activities implemented from WfMS-#8 to WfMS-#9, which correspond to Equation (17) with the condition of S ( W f M S # 9 ) S ( W f M S # 8 ) = 0 in Section 4.
Moreover, the management and monitor tool also starts the related activities implemented from WfMS-#9 to WfMS-#10, and from WfMS-#10 to WfMS-11#, to solve the problem of the EoCs and EhCs, which correspond to Equations (18) and (19) in Section 4. Obviously, the EcCs stands for the functionalities of WfMS, e.g., to adapt to the limited classroom capacity with an ever-increasing number of students; the EoCs stands for the non-functionalities of WfMS, e.g., to adjust the venue to a new classroom that better suits the preference of the teacher and students; and the EhCs stands for the business transactions consistency of WfMS, e.g., to adapt to achieve more consistent teaching transaction log data with a uniform state.
Then, until this advanced self-autonomous stage, the TWfMS has been created from WfMS-#1 to WfMS-#11 through 10 interfaces. If the CBR system can work smoothly by eliminating the exception events of ErCs, EsCs, EcCs, EoCs, and EhCs, then nothing needs to be done, and the trustworthiness of WfMS always complies with the constraint condition (e) in Section 4, until condition (e) is violated by a serious exception event of EsCs, EcCs, EoCs, and EhCs (ErCs were not included as they have been eliminated via interface #1). However, these unavoidable exception events of service combination, parameter configuration, performance optimization, and healing data (EsCs, EcCs, EoCs, and EhCs) will result in the decrease of the trustworthiness of WfMS, then, the management and monitor tool will start the related activities implemented from WfMS-#11 back to WfMS-#5, which correspond to Equation (20) in Section 4, in order to solve the problem of local resilience engineering (LRE). Otherwise, if the LRE routine fails, the management and monitor tool will start the related activities implemented from WfMS-#12 back to WfMS-#1, which correspond to Equation (21) in Section 4, in order to solve the problem of global resilience engineering (GRE) in Section 4.
Hence, after the ordinal stage from WfMS-#1 to WfMS-#7, and the advance self-autonomous stage from WfMS-#7 to WfMS-#11, TWfMS maintains its trustworthiness by LRE or GRE, connecting the methods and mechanisms in its life cycle. This means that the CBR system can always assure its trustworthiness when it encounters ElCs or EgCs exception events, e.g., the revision or creation of new versions of undergraduate curriculum programs.

6. Discussions and Conclusions

6.1. Discussions

Through the case study in Section 5, we find that as indicated in the Equations (10–21), the Business Process Management System (BPMS) will evolve into a Workflow Management System (WfMS) by Computer Aided Software Engineering (CASE) experimental and development environment, via semi automation pattern mixed with manual intervention and, furthermore, the WfMS will ultimately evolve into Trustworthy WfMS (TWfMS), because of its continuously disappearing high-entropy information and gaining of low-entropy through the work of “compensation” N , which refers to the d e S , i.e., the exchange of entropy from the outside of the whole system, in other words, the environment (e.g., in the Section 5, all of the exception events handled in the system consist of the emergency management works of the stakeholders, which implement the automated or artificial components, which assure the trustworthiness of WfMS with the computational expressions as:
( N W f M S # source W f M S # destination ( # s o u r c e ) ) = ( i = 1 E x C s p ( N W f M S # d e s t i n a t i o n ( # source ) i ) ln p ( N W f M S # d e s t i n a t i o n ( # source ) i ) i = 1 E x C s p ( N W f M S # s o u r c e ( # source ) i ) ln p ( N W f M S # s o u r c e ( # source ) i ) ) ,
in Section 4.1).
In addition, while the TWfMS experiences continuous transformation via Equations (10–21), its status will also experience iterative Wild-time [43], Build-time, Run-time, and Maintain-time simultaneously, which is corresponding to the original, “as-is”, “to-be”, and “agile-consistent” stages in its life cycle, respectively, partially through the local resilience engineering (LRE) or the global resilience engineering (GRE) road map, as in Figure 4.
Thus, comparing with state-of-the-art achievement relative to BPMS or WfMS, the advantage of our proposals in this paper is that we divide and rule the principle for the transformation between WfMS and its trustworthiness compensate components, according to the second law of thermodynamics, because of the fact the information is negentropy of unemployment physics behavior.
Obviously, there is still a long way to go and hard work to be completed, in order to implement TWfMS using the proposals in this paper. As far as we know, addressing the gradually deepening self-adaptive and self-autonomous requirement to maintain the trustworthiness of WfMS, hyperparameters, machine learning, and search techniques [44], will play an important role in such a scenario described in Section 2. However, just as with the position the paper critically evaluated, genetic programming and hyper-heuristics should be embedded into the framework of large scale software development [45], e.g., TWfMS. Hence, due to there is no free lunch theorems for optimization [46], not only do we need traditional knowledge discovery in a database (KDD) process for extracting useful knowledge from Big Data [47], but we should also investigate the key technologies with interoperable interface specification standardization for developing TWfMSs.

6.2. Conclusions

Just like the author of [48] said many times, the “silver bullet” in software engineering does not exist. This means it is not realistic to strive to improve software development efficiency just by incremental Man-Months, for its inherent characteristics, i.e., that software is a mirror of the real world [49] with nonlinear complexity which is not yet fully controlled and understood by humans, although it is an artificial product. Therefore, plenty of classical artificial products and complex giant systems, with more complexity than the real world, have emerged recently, due to the linear, nonlinear, and even higher order complexity that has been woven into the life cycle of software by its artificial development processes, e.g., discovery process of critical nodes in road networks [50] with user-influenced behavior [51]. Thus, assuring the trustworthiness [52,53] of WfMS with the three characteristics of system, service, and software, is a problem that needs a solution urgently.
In order to address the measurement problem of WfMS trustworthiness, looking back at our prior research work, the authors of [54] proposed a software behavior trustworthiness measurement method as guidance for the following measurement algorithm [55]. Then, after a service-oriented trustworthiness measurement approach of components was presented for Business Process Re-engineering Application Server (BPRAS) [36], a relatively complete framework [56] of TWfMS has been described and integrated, with the more perfect software trustworthiness definitions [57] which were initially given by the authors of [54]. Furthermore, considering entropy as the main thread running through WfMS’s physics and informatics characteristics [33], from the view of a dissipative structure system, this paper proposed a hierarchical information entropy system model for TWfMS. This means that the deterministic entropy of the WfMS is always in a non-equilibrium state, even the state of being far from equilibrium [58,59,60,61], and that the aim of the users is used to maintain it in such a stable non-equilibrium state with current requirements. Alternatively, it encounters a new stable non-equilibrium state from the previous non-equilibrium state, due to the unavoidable continuous requirement changes [62,63,64].
In future research works, we plan to study the other two characteristics of service computing, the software engineering of TWfMS, and a novel algorithm for TWfMS trustworthiness based on the TWfMS framework mechanisms in an uncertain environment with incomplete software behavior test cases through the maximum-entropy model and its related applications [65]. We hope that the future research work can create a human-level control bridge connecting the hierarchical information entropy model of system, service, and software as a whole, using machine learning and artificial intelligence methods [66,67], so as to reveal essential features of the entropy of TWfMS, from physics to information sciences [68,69].
In summary, there is no denying the fact that as long as there are human activities, Business Process Management (BPM) will always exist, supported by BPM System (BPMS), and, underlying the progress of automation and informatization on BPMS, WfMS will always exist, whether we study it from the viewpoint of physical informatics or not, and with the convenience of service computing, the ultimately realized TWfMS functions by computer software and hardware will be continuously brought to both companies and home users in the foreseeable future.

Author Contributions

In this paper, Qiang Han made contribution on the conceptualization, formal analysis, funding acquisition and validation research works. In addition, Qiang Han and Deren Yang made contribution on the methodology research works.

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Grant No.61862001, No.61363001, No.61563001) and the 13th Five-year Plan on the Key Construction Major of Network Engineering of Ningxia Hui Autonomous Region. The author would like to thank the anonymous reviewers and editors for their suggestions.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Qian, X.S. On Systems Engineering (Revised Edition), Series of Systems Science and Systems Engineering; Hunan Science and Technology Press: Changsha, China, 1998. [Google Scholar]
  2. Zhang, L.J.; Cai, H.; Zhang, J. Service Computing; Tsinghua University Press: Beijing, China, 2005. [Google Scholar]
  3. Buxton, J.N.; Randell, B. Software Engineering Techniques. In Proceedings of the NATO Science Committee, Rome, Italy, 27–31 October 1969. [Google Scholar]
  4. Naur, P.; Randell, B.; NATO Science Committee. Software engineering. In Proceedings of the NATO Science Committee, Garmisch, Germany, 7–11 October 1968. [Google Scholar]
  5. Mendling, J.; Weber, I.; Aalst, W.V.D.; Brocke, J.B.; Cabanillas, C.; Daniel, F.; Debois, S.; Ciccio, C.D.; Dumas, D.; Dustdar, S.; et al. Blockchains for Business Process Management—Challenges and Opportunities. ACM Trans. Manag. Inf. Syst. 2017, 9, 16. [Google Scholar] [CrossRef]
  6. Ministry of Industry and Information of China. China Blockchain Industry White Paper. Available online: http://www.miit.gov.cn/n1146290/n1146402/n1146445/c6180238/part/6180297.pdf (accessed on 24 September 2018).
  7. Wu, X.J. Negentropy of Dissipative Structure System and Its Realizing Process. J. Syst. Dialect. 1995, 3, 74–77. [Google Scholar]
  8. Chen, Z. Entropy interpretation of the irreversible process of the earth system. Chin. J. Nat. 1990, 13, 156–160. (In Chinese) [Google Scholar]
  9. Perelson, A.S. Book Review: Self-Organization in Nonequilibrium Systems. From Dissipative Structures to Order Through Fluctuations. Quart. Rev. Biol. 1978, 53. [Google Scholar] [CrossRef]
  10. Nicolis, G.; Prigogine, I. Self-Organization in Nonequilibrium Systems: From Dissipative Structures to Order through Fluctuations; John Wiley & Sons: New York, NY, USA, 1977. [Google Scholar]
  11. Qian, X.S.; Yu, J.Y.; Dai, R.W. A new discipline of science—The study of open complex giant system and its methodology. Nat. Mag. 1990, 13, 3–10. [Google Scholar]
  12. Moore, G.E. Cramming More Components onto Integrated Circuits. Proc. IEEE 2002, 86, 82–85. [Google Scholar] [CrossRef]
  13. Landauer, R. Irreversibility and Heat Generation in the Computing Process. IBM J. Res. Dev. 1961, 5, 261–269. [Google Scholar] [CrossRef]
  14. Bérut, A.; Arakelyan, A.; Petrosyan, A.; Ciliberto, S.; Dillenschneider, R.; Lutz, E. Experimental verification of Landauer’s principle linking information and thermodynamics. Nature 2012, 483, 187–189. [Google Scholar] [CrossRef] [PubMed]
  15. Singh, V.P.; Rajagopal, A.K. Some recent advances in the application of the principle of maximum entropy (POME) in hydrology. IAHS Publ. 1987, 164, 353–364. [Google Scholar]
  16. Weaver, W.; Shannon, C.E. The Mathematical Theory of Communication; University of Illinois Press: Illinois, IL, USA, 1949. [Google Scholar]
  17. Cai, C.N. Information theory in the last thirty years. J. Commun. 1980, 1, 2–10. [Google Scholar]
  18. Zhong, Y.X. Information Science and Information Theory. J. Commun. 1990, 1, 45–51. [Google Scholar]
  19. Lopes, A.M.; Machado, J.T. Complex Systems and Fractional Dynamics. Entropy 2018, 20, 507. [Google Scholar] [CrossRef]
  20. Chen, M.; Golan, A. What May Visualization Processes Optimize? IEEE Trans. Visual. Comput. Graphics 2016, 22, 2619–2632. [Google Scholar] [CrossRef] [PubMed]
  21. Wen, Z.; Cała, J.; Watson, P.; Romanovsky, A. Cost Effective, Reliable and Secure Workflow Deployment over Federated Clouds. IEEE Trans. Serv. Comput. 2017, 10, 929–941. [Google Scholar] [CrossRef] [Green Version]
  22. Li, H.; Liu, D.; Dai, Y.; Luan, T.H.; Yu, S. Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds. IEEE Trans. Emerging Top. Comput. 2018, 6, 97–109. [Google Scholar] [CrossRef]
  23. Viriyasitavat, W.; Xu, L.D.; Bi, Z. Extension of specification language for soundness and completeness of service workflow. Int. J. Enterp. Inf. Syst. 2018, 1, 1–20. [Google Scholar] [CrossRef]
  24. Viriyasitavat, W.; Xu, L.; Bi, Z. The Extension of Semantic Formalization of Service Workflow Specification Language. IEEE Trans. Ind. Inf. 2018, 1, 1. [Google Scholar] [CrossRef]
  25. Wang, J.; Liu, Y.H. Modeling software faults propagation. Europhys. Lett. 2011, 92, 60009. [Google Scholar] [CrossRef]
  26. Li, H.; Hao, L.-Y.; Chen, R. Multi-Level Formation of Complex Software Systems. Entropy 2016, 18, 178. [Google Scholar] [CrossRef]
  27. Hu, W.; Yen, G.G.; Zhang, X. Multiobjective particle swarm optimization based on Pareto entropy. J. Softw. 2014, 25, 1025–1050. [Google Scholar]
  28. Zhang, D.P.; Nie, C.H.; Xu, B.W. Cross-Entropy method based on Markov decision process for optimal software testing. J. Softw. 2008, 19, 2770–2779. [Google Scholar] [CrossRef]
  29. Zuo, L.Y.; Cao, Z.B.; Dong, S.B. Virtual resource evaluation model based on entropy optimized and dynamic weighted in cloud computing. J. Softw. 2013, 24, 1937–1946. [Google Scholar] [CrossRef]
  30. Dennis, A.; Wixom, B.H.; Roth, R.M. Systems Analysis and Design; John Wiley & Sons: New York, NY, USA, 2010. [Google Scholar]
  31. Medina, R.; Winograd, T.; Flores, R.; Flores, F. The action workflow approach to workflow management technology. Inf. Soc. 1993, 9, 391–404. [Google Scholar] [CrossRef] [Green Version]
  32. Lollai, S.A. Quality Systems. A Thermodynamics-Related Interpretive Model. Entropy 2017, 19, 418–437. [Google Scholar] [CrossRef]
  33. Han, Q. Trustworthiness Measurement Algorithm for TWfMS Based on Software Behaviour. Entropy 2018, 20, 195. [Google Scholar] [CrossRef]
  34. Jaynes, E.T. Information Theory and Statistics Mechanics. Phys. Rev. 1957, 108, 171. [Google Scholar] [CrossRef]
  35. Madni, A.M.; Jackson, S. Towards a Conceptual Framework for Resilience Engineering. IEEE Syst. J. 2009, 3, 181–191. [Google Scholar] [CrossRef]
  36. Han, Q.; Yuan, Y.Y. Research on trustworthiness measurement approaches of component based BPRAS. J. Commun. 2014, 35, 47–57. [Google Scholar]
  37. Velasco, R.M.; Scherer, L.G.C.; Uribe, F.J. Entropy Production: Its Role in Non-Equilibrium Thermodynamics. Entropy 2011, 13, 82–116. [Google Scholar] [CrossRef] [Green Version]
  38. Clausius, R. The Mechanical Theory of Heat; Macmillan and Co.: London, UK, 1879. [Google Scholar]
  39. Boltzmann, L. On some problems of the mechanical theory of heat. Philos. Mag. 1878, 5, 236–237. [Google Scholar] [CrossRef]
  40. Schrödinger, E. What is Life? The Physical Aspect of a Living Cell; Cambridge University Press: Cambridge, UK, 1992. [Google Scholar]
  41. Huang, K. Statistical Mechanics, 2nd ed.; John Wiley & Sons: New York, NY, USA, 1987. [Google Scholar]
  42. Qu, R. Case-Based Reasoning for Course Timetabling Problems. Ph.D. Thesis, University of Nottingham, Nottingham, UK, 2002. [Google Scholar]
  43. Fleischmann, A.; Schmidt, W.; Stary, C. S-BPM in the Wild; Springer International Publishing: New York, NY, USA, 2015. [Google Scholar]
  44. Pillay, N.; Qu, R.; Srinivasan, D. Automated Design of Machine Learning and Search Algorithms. IEEE Comput. Intell. Mag. 2018, 13, 16–17. [Google Scholar] [CrossRef]
  45. Kendall, G. Is Evolutionary Computation Evolving Fast Enough? IEEE Comput. Intell. Mag. 2018, 13, 42–51. [Google Scholar] [CrossRef] [Green Version]
  46. Wolpert, D.H.; Macready, W.G. No free lunch theorems for optimization. IEEE Trans. Evol. Comput. 1997, 1, 67–82. [Google Scholar] [CrossRef] [Green Version]
  47. Fayyad, U.; Piatetskyshapiro, G.; Smyth, P. The KDD process for extracting useful knowledge from volumes of data. Commun. ACM. 1996, 39, 27–34. [Google Scholar] [CrossRef] [Green Version]
  48. Brooks, F.P. The Mythical Man-Month; Addison-Wesley: New Jersey, NJ, USA, 1975. [Google Scholar]
  49. Hong, M.; Jian, L. A Software Architecture Centric Engineering Approach for Internetware. Internetware 2016, 49, 702–730. [Google Scholar]
  50. Xu, M.; Wu, J.; Liu, M.; Xiao, Y.; Wang, H.; Hu, D. Discovery of Critical Nodes in Road Networks Through Mining from Vehicle Trajectories. IEEE Trans. Intell. Transp. Syst. 2018, 99, 1–11. [Google Scholar] [CrossRef]
  51. Xiao, Y.; Li, N.; Xu, M. A user behavior influence model of social hotspot under implicit link. Inf. Sci. 2017, 396, 114–126. [Google Scholar] [CrossRef]
  52. Rong, J. A Trustworthiness Evaluation Method for Software Architectures Based on the Principle of Maximum Entropy (POME) and the Grey Decision-Making Method (GDMM). Entropy 2014, 16, 4818–4838. [Google Scholar] [Green Version]
  53. Liu, K.; Shan, Z.; Wang, J.; He, J.; Zhang, Z.; Qin, Y. Overview on Major Research Plan of Trustworthy Software. Bull. Natl. Sci. Found. China 2008, 22, 145–151. [Google Scholar]
  54. Yuan, Y.Y.; Han, Q. A Software Behavior Trustworthiness Measurement Method based on Data Mining. Int. J. Comput. Intell. Syst. 2011, 4, 817–825. [Google Scholar] [CrossRef]
  55. Yuan, Y.Y.; Han, Q. A Data Mining Based Measurement Method for Software Trustworthiness. Chin. J. Electro. 2012, 21, 293–296. [Google Scholar] [CrossRef]
  56. Han, Q. TWfMS: A Framework of Trustworthy Workflow Management System. In Proceedings of the International Conference on Subject-Oriented Business Process Management (S-BPM) ONE, Darmstadt, Germany, 30–31 March 2017. [Google Scholar]
  57. Han, Q. Resilience Engineering for Trustworthy Workflow Management System. In Proceedings of the IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), Prague, Czech Republic, 25–25 July 2017. [Google Scholar]
  58. Mikhailovsky, G. From Identity to Uniqueness: The Emergence of Increasingly Higher Levels of Hierarchy in the Process of the Matter Evolution. Entropy 2018, 20, 533. [Google Scholar] [CrossRef]
  59. Palazzo, P. Hierarchical Structure of Generalized Thermodynamic and Informational Entropy. Entropy 2018, 20, 553. [Google Scholar] [CrossRef]
  60. Kafri, O. The Second Law and Informatics. arXiv, 2007; arXiv:cs/0701016. [Google Scholar]
  61. Sadi-Carnot, N. Reflections on the Motive Power of Fire: And Other Papers on the Second Law of Thermodynamics; Dover Publications: New York, NY, USA, 1954. [Google Scholar]
  62. Zhang, M.; Li, H.; Liu, L. An adaptive multi-objective evolutionary algorithm for constrained workflow scheduling in Clouds. Distribu. Parallel Databases 2018, 36, 339–368. [Google Scholar] [CrossRef]
  63. Fang, Y.L.; Sun, H.L.; Chen, P.P. Improving the quality of crowdsourced image labeling via label similarity. J. Comput. Sci. Technol. 2017, 32, 877–889. [Google Scholar] [CrossRef]
  64. Selin, A.; Santos, V. An Architecture for a Viable Information System. In Proceedings of the WorldCist’18 – 6th World Conference on Information Systems and Technologies, Naples, Italy, 27–29 March 2018. [Google Scholar]
  65. Kapur, J. Maximum-Entropy Models in Science and Engineering; John Wiley & Sons: New York, NY, USA, 1989. [Google Scholar]
  66. Lecun, Y.; Bengio, Y.; Hinton, G. Deep learning. Nature 2015, 521, 436. [Google Scholar] [CrossRef] [PubMed]
  67. Mnih, V.; Kavukcuoglu, K.; Silver, D. Human-level control through deep reinforcement learning. Nature 2015, 518, 529. [Google Scholar] [CrossRef] [PubMed]
  68. Wang, Z.J.; Xie, L.L. Cyber-Physical Systems: A Survey. Acta Autom. Sin. 2011, 37, 1157–1166. [Google Scholar]
  69. Lee, E. Computing Foundations and Practice for Cyber Physical Systems: A Preliminary Report, Technical Report. Available online: https://www2.eecs.berkeley.edu/Pubs/TechRpts/2007/EECS-2007-72 (accessed on 24 September 2018).
Figure 1. The trustworthy workflow of services in the Real and Information World.
Figure 1. The trustworthy workflow of services in the Real and Information World.
Entropy 20 00732 g001
Figure 2. The application scenario of Trustworthy Workflow Management System (TWfMS) for ordering books.
Figure 2. The application scenario of Trustworthy Workflow Management System (TWfMS) for ordering books.
Entropy 20 00732 g002
Figure 3. The reference model for TWfMS with RE.
Figure 3. The reference model for TWfMS with RE.
Entropy 20 00732 g003
Figure 4. TWfMS state transition diagram.
Figure 4. TWfMS state transition diagram.
Entropy 20 00732 g004

Share and Cite

MDPI and ACS Style

Han, Q.; Yang, D. Hierarchical Information Entropy System Model for TWfMS. Entropy 2018, 20, 732. https://doi.org/10.3390/e20100732

AMA Style

Han Q, Yang D. Hierarchical Information Entropy System Model for TWfMS. Entropy. 2018; 20(10):732. https://doi.org/10.3390/e20100732

Chicago/Turabian Style

Han, Qiang, and Deren Yang. 2018. "Hierarchical Information Entropy System Model for TWfMS" Entropy 20, no. 10: 732. https://doi.org/10.3390/e20100732

APA Style

Han, Q., & Yang, D. (2018). Hierarchical Information Entropy System Model for TWfMS. Entropy, 20(10), 732. https://doi.org/10.3390/e20100732

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop