• Article
  • | |
  • Metrics
  • |
  • Reference [23]
  • |
  • Related
  • |
  • Cited by
  • | |
  • Comments
    Abstract:

    This paper is concerned with trustworthy software constructed through service composition and is especially emphasizes guaranteeing the trustworthiness of networked software through dynamic evolution of composite services. First of all, a set of evolution operations preserving soundness of composite services is proposed so as to avoid the complex verification process. Second, a composite service evolution method with availability guarantee is provided, the main idea of which is to create redundant execution path to improve the availability of a composite service. Third, to deal with runtime instances after dynamic composite service evolution, a live instance migration algorithm is designed to support the correct evolution enforcement. Finally, a composite service execution engine supporting dynamic evolution is developed and the effectiveness of the proposed method is showed through a set of experiments.

    Reference
    [1] Chen HW, Wang J, Dong W. High confidence software engineering technologies. Chinese Journal of Electronics, 2003,31(12A): 1933-1938 (in Chinese with English abstract).
    [2] Yang FQ. Thinking on the development of software engineering technology. Journal of Software, 2005,16(1):1-7 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/16/1.htm
    [3] von de Aalst WMP, Jablonski S. Dealing with workflow change: Identification of issues and solutions. Int’l Journal of Computer Systems Science & Engineering, 2000,15(5):267-276.
    [4] Papazoglou MP. The challenges of service evolution. In: Bellahsene Z, Leonard M, eds. Proc. of the 20th Int’l Conf. on Advanced Information Systems Engineering. Berlin, Heidelberg: Springer-Verlag, 2008. 1-15.
    [5] von de Aalst WMP, Basten T, Verbeek HMW, Verkoulen PAC, Voorhoeve M. Adaptive workflow—On the interplay between flexibility and support. In: Filipe J, Cordeiro J, eds. Proc. of the 1st Int’l Conf. on Enterprise Information Systems. 1999. 353-360.
    [6] Rinderle S, Reichert M, Dadam P. Correctness criteria for dynamic changes in workflow systems—A survey. Data & Knowledge Engineering, 2004,50(1):9-34.
    [7] Andrikopoulos V, Benbernou S, Papazoglou MP. Managing the evolution of service specifications. In: Bellahsene Z, Leonard M, eds. Proc. of the 20th Int’l Conf. on Advanced Information Systems Engineering. Berlin, Heidelberg: Springer-Verlag, 2008. 359-374.
    [8] Ryu SH, Casati F, Skogsrud H, Benatallah B, Saint-Paul R. Supporting the dynamic evolution of Web service protocols in service-oriented architectures. ACM Trans. on the Web, 2008,2(2):1-46.
    [9] von de Aalst WMP, von Hee K. Workflow Management Models, Methods, and Systems. Cambridge: The MIT Press, 2002.
    [10] Cheng A, Esparza J, Palsberg J. Complexity results for 1-safe nets. Theoretical Computer Science, 1995,147(1-2):117-136.
    [11] Cardoso J, Sheth A, Miller J, Arnold J, Kochut K. Quality of service for workflows and Web service processes. Journal of Web Semantics, 2004,1(3):281-308.
    [12] Zeng LZ, Benatallah B, Ngu AHH, Dumas M, Kalagnanam J, Chang H. QoS-Aware middleware for Web services composition. IEEE Trans. on Software Engineering, 2004,30(5):311-327.
    [13] Charfi A, Mezini M. AO4BPEL: An aspect-oriented extension to BPEL. World Wide Web Journal, 2007,10(3):309-344.
    [14] Canfora G, Penta MD, Esposito R, Villani ML. A framework for QoS-aware binding and re-binding of composite Web services. The Journal of Systems and Software, 2008,81(10):1754-1769.
    [15] Ellis C, Keddara K, Rozenberg G. Dynamic change within workflow systems. In: Comstock N, Ellis C, eds. Proc. of the ACM Conf. on Organizational Computing Systems (ACM SIGOIS). New York: ACM Press, 1995. 10-21.
    [16] von de Aalst WMP. Exterminating the dynamic change bug: A concrete approach to support workflow change. Information Systems Frontiers, 2001,3(3):297-317.
    [17] von de Aalst WMP, Basten T. Inheritance of workflows: An approach to tackling problems related to change. Theoretical Computer Science, 2002,270(1-2):125-203.
    [18] Sun P, Jiang CJ, Li XM. Workflow process analysis responding to structural changes. Journal of System Simulation, 2008,20(7): 1856-1863 (in Chinese with English abstract).
    [19] von de Aalst WMP. Workflow verification: Finding control-flow errors using Petri-net-based techniques. In: van der Aalst W, Desel J, Oberweis A, eds. Proc. of the Business Process Management: Models, Techniques, and Empirical Studies. Berlin: Springer-Verlag, 2000. 161-183.
    [20] Ye XM, Zhou JT, Song XY. On reachability graphs of Petri nets. Computers & Electrical Engineering, 2003,29(2):263-272.
    附中文参考文献: [1] 陈火旺,王戟,董威.高可信软件工程技术.电子学报,2003,31(12A):1933-1938.
    [2] 杨芙清.软件工程技术发展思索.软件学报,2005,16(1):1-7. http://www.jos.org.cn/1000-9825/16/1.htm
    [18] 孙萍,蒋昌俊,李湘梅.工作流过程的结构变化分析.系统仿真学报,2008,20(7):1856-1863.
    Related
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

曾晋,孙海龙,刘旭东,邓婷,怀进鹏.基于服务组合的可信软件动态演化机制.软件学报,2010,21(2):261-276

Copy
Share
Article Metrics
  • Abstract:10208
  • PDF: 13741
  • HTML: 0
  • Cited by: 0
History
  • Received:June 15,2009
  • Revised:September 11,2009
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063