Eighth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC'05)
DOI: 10.1109/isorc.2005.16
|View full text |Cite
|
Sign up to set email alerts
|

Automated Model Checking and Testing for Composite Web Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
40
0
3

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 90 publications
(43 citation statements)
references
References 10 publications
0
40
0
3
Order By: Relevance
“…The tests also demonstrated that a Web service monitoring system can accumulate significant costs in the form of a [13] Probe No n/a QoS Guarantee via resource allocation and monitoring [17] Probe n/a n/a WS Robustness testing [18], [19] Probe n/a n/a Automated test case generation and distributed testing of WS [20] Probe n/a n/a Classification of monitors for runtime testing [21] Probe n/a n/a Generation of test cases for web service QoS [22] Probe n/a n/a Distributed performance testing [23] Probe n/a n/a Automatic conformance testing of WS [24] Probe n/a n/a Automatic testing of WS compositions [15] Proxy No n/a QoS of BPEL processes via interaction monitoring and dynamic service replacement [25] Proxy No n/a Adaptation of WS for QoS of WS and Composition at runtime using AOP [8] Proxy No negligible Verifying QoS of WS using timed automata [26] Proxy No n/a Management layer for WS based on AOP [27] Proxy No n/a Monitoring of run-time interactions of WS [28] Proxy No n/a Creation and monitoring of policies for WS transactions [2] Proxy No n/a Dynamic monitoring of BPEL processes using SOAP interception [29], [30] Proxy No n/a Association and monitoring of assertions on business processes [31] Proxy Yes n/a Distributed WS SLA monitoring via SOAP Proxies [5] Proxy Yes negligible SOAP-Proxy based monitoring using logs [6] Eavesdrop n/a negligible Verification of WS interaction patterns [32] Eavesdrop n/a n/a Customer-side QoS monitoring [33], [34] Eavesdrop n/a n/a Monitoring of WS (BPEL) compositions [35] Eavesdrop n/a n/a Generation and use of monitors for monitoring requirements in WS systems [36] Eavesdrop n/a n/a Monitoring WS BPEL processes for requirements compliance [37] Probe, Eavesdrop n/a n/a P2P service recovery framework [9] Probe, Eavesdrop n/a Up to 40% Method for monitoring distributed systems using queries [38] Probe, Proxy Yes n/a Use of AOP for measuring WS QoS [39] Probe, Proxy No n/a QoS...…”
Section: Discussionmentioning
confidence: 99%
“…The tests also demonstrated that a Web service monitoring system can accumulate significant costs in the form of a [13] Probe No n/a QoS Guarantee via resource allocation and monitoring [17] Probe n/a n/a WS Robustness testing [18], [19] Probe n/a n/a Automated test case generation and distributed testing of WS [20] Probe n/a n/a Classification of monitors for runtime testing [21] Probe n/a n/a Generation of test cases for web service QoS [22] Probe n/a n/a Distributed performance testing [23] Probe n/a n/a Automatic conformance testing of WS [24] Probe n/a n/a Automatic testing of WS compositions [15] Proxy No n/a QoS of BPEL processes via interaction monitoring and dynamic service replacement [25] Proxy No n/a Adaptation of WS for QoS of WS and Composition at runtime using AOP [8] Proxy No negligible Verifying QoS of WS using timed automata [26] Proxy No n/a Management layer for WS based on AOP [27] Proxy No n/a Monitoring of run-time interactions of WS [28] Proxy No n/a Creation and monitoring of policies for WS transactions [2] Proxy No n/a Dynamic monitoring of BPEL processes using SOAP interception [29], [30] Proxy No n/a Association and monitoring of assertions on business processes [31] Proxy Yes n/a Distributed WS SLA monitoring via SOAP Proxies [5] Proxy Yes negligible SOAP-Proxy based monitoring using logs [6] Eavesdrop n/a negligible Verification of WS interaction patterns [32] Eavesdrop n/a n/a Customer-side QoS monitoring [33], [34] Eavesdrop n/a n/a Monitoring of WS (BPEL) compositions [35] Eavesdrop n/a n/a Generation and use of monitors for monitoring requirements in WS systems [36] Eavesdrop n/a n/a Monitoring WS BPEL processes for requirements compliance [37] Probe, Eavesdrop n/a n/a P2P service recovery framework [9] Probe, Eavesdrop n/a Up to 40% Method for monitoring distributed systems using queries [38] Probe, Proxy Yes n/a Use of AOP for measuring WS QoS [39] Probe, Proxy No n/a QoS...…”
Section: Discussionmentioning
confidence: 99%
“…They insisted that their approach can help to significantly reduce the number of test combinations. To verify the properties data-bound they defined, Huang et al [28] proposed the application of model checking to workflow applications. Their model checking technique for workflow applications was based on the process model of OWL-S (Web Ontology Language for Web Services) and the model checker BLAST.…”
Section: Related Workmentioning
confidence: 99%
“…As shown in recent detailed surveys on Web service's testing, such as [31], the research community has rather concentrated on testing single services, e.g., [32], [33], or composite ones, e.g., [34], [35], but has neglected too much the necessity of testbed infrastructures.…”
Section: Related Researchmentioning
confidence: 99%