Abstract:Abstract. Web services are emerging as a promising technology for the effective automation of inter-organizational interactions. However, despite the growing interest, several issues still need to be addressed to provide Web services with benefits similar to what traditional middleware brings to intra-organizational application integration. In this paper, we present a framework that supports the model-driven development of Web services. Specifically, we show how, starting from the external specifications of a … Show more
“…Obvious applications of process mining exist in model driven business process software engineering, both for bottom up approaches used in business process alignment [22,23], and for top down approaches used in workflow generation [24]. A number of research efforts in the area of workflow management have been directed for mining workflows models.…”
There is no doubt that SOA and BPM will continue to evolve dependently for the next ten years. Preparing common research infrastructures will require most important efforts of web service community researchers. Web services composition is becoming more and more chaotic, involving numerous interacting ad-hoc services through huge business processes. Analysing and Reengineering of complex Web Service Compositions will enable them to be well understood, controlled, and redesigned. Our contribution to this problem is a patterns mining algorithm which is based on a statistical technique to discover patterns from execution log. Our approach is characterised by a "local" patterns discovery that allows to cover partial results through a dynamic programming algorithm. Those local discovered patterns are then composed iteratively until discovering the Composite Web Service. The analysis of the disparities between the discovered model and the initial ad-hoc CS model (delta-analysis) enables initial design gaps to be detected and thus the Web service composition to be re-engineered.
“…Obvious applications of process mining exist in model driven business process software engineering, both for bottom up approaches used in business process alignment [22,23], and for top down approaches used in workflow generation [24]. A number of research efforts in the area of workflow management have been directed for mining workflows models.…”
There is no doubt that SOA and BPM will continue to evolve dependently for the next ten years. Preparing common research infrastructures will require most important efforts of web service community researchers. Web services composition is becoming more and more chaotic, involving numerous interacting ad-hoc services through huge business processes. Analysing and Reengineering of complex Web Service Compositions will enable them to be well understood, controlled, and redesigned. Our contribution to this problem is a patterns mining algorithm which is based on a statistical technique to discover patterns from execution log. Our approach is characterised by a "local" patterns discovery that allows to cover partial results through a dynamic programming algorithm. Those local discovered patterns are then composed iteratively until discovering the Composite Web Service. The analysis of the disparities between the discovered model and the initial ad-hoc CS model (delta-analysis) enables initial design gaps to be detected and thus the Web service composition to be re-engineered.
“…Therefore, it can be used for describing and analyzing the behavior of web services, specifically those including time restrictions. Previoulsy, a model for business protocols and a framework for protocol-based analysis had been presented by Benatallah et al [8,9,10] and Karim Baina et al [11]. They studied the compatibility and replaceability issues.…”
Section: Web Service Business Protocols Modeling and Analyzingmentioning
Abstract. Recently, describing behavior of web services is becoming more and more important. This behavior can be described by business protocols representing the possible sequences of message exchanges. Since a lot of web services use access control policies to restrict the access to authorized consumers, these policies should be part of the service description. Studying the behavior of web services by analyzing their business protocol after assigning the access control policies is the main contribution of this work. Access control policies will be presented using ontology which eases policy specification and management and add some flexibility in the policy comparison. This paper introduces notions of compatibility and replaceability w.r.t. business protocols with access control policies annotations, together with the corresponding verification algorithms.
“…Some services, for example in the area of electronic commerce, possess inherent transactional properties [1]. This is the case in particular of services associated with the management of resources with limited capacity (e.g.…”
Section: H Duarte Is Financially Supported By the European Union Promentioning
confidence: 99%
“…Firstly, the proposed approach takes into account services that do not provide the operations required by the 2PC protocol. For a number of reasons as outlined above, such non-transactional services are numerous in the area of electronic commerce and business process management which are prominent application areas of SOC [12,1]. Because of this, we do not use the traditional 2PC protocol but rather an extension of it.…”
Abstract. The development of new services by composition of existing ones has gained considerable momentum as a means of integrating heterogeneous applications and realising business collaborations. Services that enter into compositions with other services may have transactional properties, especially those in the broad area of resource management (e.g. booking services). These transactional properties may be exploited in order to derive composite services which themselves exhibit certain transactional properties. This paper presents a model for composing services that expose transactional properties and more specifically, services that support tentative holds and/or atomic execution. The proposed model is based on a high-level service composition operator that produces composite services that satisfy specified atomicity constraints. The model supports the possibility of selecting the services that enter into a composition at runtime, depending on their ability to provide resource reservations at a given point in time and taking into account user preferences.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.