This paper is concerned with trustworthy software constructed through service composition and is especially emphasizes guaranteeing the trustworthiness of networked software through dynamic evolution of composite services. First of all, a set of evolution operations preserving soundness of composite services is proposed so as to avoid the complex verification process. Second, a composite service evolution method with availability guarantee is provided, the main idea of which is to create redundant execution path to improve the availability of a composite service. Third, to deal with runtime instances after dynamic composite service evolution, a live instance migration algorithm is designed to support the correct evolution enforcement. Finally, a composite service execution engine supporting dynamic evolution is developed and the effectiveness of the proposed method is showed through a set of experiments.
[1] Chen HW, Wang J, Dong W. High confidence software engineering technologies. Chinese Journal of Electronics, 2003,31(12A): 1933-1938 (in Chinese with English abstract).
[2] Yang FQ. Thinking on the development of software engineering technology. Journal of Software, 2005,16(1):1-7 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/16/1.htm
[3] von de Aalst WMP, Jablonski S. Dealing with workflow change: Identification of issues and solutions. Int’l Journal of Computer Systems Science & Engineering, 2000,15(5):267-276.
[4] Papazoglou MP. The challenges of service evolution. In: Bellahsene Z, Leonard M, eds. Proc. of the 20th Int’l Conf. on Advanced Information Systems Engineering. Berlin, Heidelberg: Springer-Verlag, 2008. 1-15.
[5] von de Aalst WMP, Basten T, Verbeek HMW, Verkoulen PAC, Voorhoeve M. Adaptive workflow—On the interplay between flexibility and support. In: Filipe J, Cordeiro J, eds. Proc. of the 1st Int’l Conf. on Enterprise Information Systems. 1999. 353-360.
[6] Rinderle S, Reichert M, Dadam P. Correctness criteria for dynamic changes in workflow systems—A survey. Data & Knowledge Engineering, 2004,50(1):9-34.
[7] Andrikopoulos V, Benbernou S, Papazoglou MP. Managing the evolution of service specifications. In: Bellahsene Z, Leonard M, eds. Proc. of the 20th Int’l Conf. on Advanced Information Systems Engineering. Berlin, Heidelberg: Springer-Verlag, 2008. 359-374.
[8] Ryu SH, Casati F, Skogsrud H, Benatallah B, Saint-Paul R. Supporting the dynamic evolution of Web service protocols in service-oriented architectures. ACM Trans. on the Web, 2008,2(2):1-46.
[9] von de Aalst WMP, von Hee K. Workflow Management Models, Methods, and Systems. Cambridge: The MIT Press, 2002.
[10] Cheng A, Esparza J, Palsberg J. Complexity results for 1-safe nets. Theoretical Computer Science, 1995,147(1-2):117-136.
[11] Cardoso J, Sheth A, Miller J, Arnold J, Kochut K. Quality of service for workflows and Web service processes. Journal of Web Semantics, 2004,1(3):281-308.
[12] Zeng LZ, Benatallah B, Ngu AHH, Dumas M, Kalagnanam J, Chang H. QoS-Aware middleware for Web services composition. IEEE Trans. on Software Engineering, 2004,30(5):311-327.
[13] Charfi A, Mezini M. AO4BPEL: An aspect-oriented extension to BPEL. World Wide Web Journal, 2007,10(3):309-344.
[14] Canfora G, Penta MD, Esposito R, Villani ML. A framework for QoS-aware binding and re-binding of composite Web services. The Journal of Systems and Software, 2008,81(10):1754-1769.
[15] Ellis C, Keddara K, Rozenberg G. Dynamic change within workflow systems. In: Comstock N, Ellis C, eds. Proc. of the ACM Conf. on Organizational Computing Systems (ACM SIGOIS). New York: ACM Press, 1995. 10-21.
[16] von de Aalst WMP. Exterminating the dynamic change bug: A concrete approach to support workflow change. Information Systems Frontiers, 2001,3(3):297-317.
[17] von de Aalst WMP, Basten T. Inheritance of workflows: An approach to tackling problems related to change. Theoretical Computer Science, 2002,270(1-2):125-203.
[18] Sun P, Jiang CJ, Li XM. Workflow process analysis responding to structural changes. Journal of System Simulation, 2008,20(7): 1856-1863 (in Chinese with English abstract).
[19] von de Aalst WMP. Workflow verification: Finding control-flow errors using Petri-net-based techniques. In: van der Aalst W, Desel J, Oberweis A, eds. Proc. of the Business Process Management: Models, Techniques, and Empirical Studies. Berlin: Springer-Verlag, 2000. 161-183.
[20] Ye XM, Zhou JT, Song XY. On reachability graphs of Petri nets. Computers & Electrical Engineering, 2003,29(2):263-272.