Optimal Compensation for Hierarchical Web Services Compositions Under Restricted Visibility

Author(s):  
Debmalya Biswas ◽  
Krishnamurthy Vidyasankar

Over the years, the notion of transactions has become synonymous with providing fault-tolerance, reliability and robustness to database systems. To extend the same transactional guarantees to new and evolving paradigms, such as Web service, the transactional mechanisms must first be adapted to the distinguishing characteristics of Web services, mainly composability, long-running nature, and privacy and security concerns. Composability refers to the ability to form new composite services by combining the functionalities of existing services. Due to their long-running nature, compensation based mechanisms are usually preferred to provide transactional guarantees for Web services. Compensation requires access (visibility) over the execution details of the services in the composition. However, such visibility may not always be feasible in a compositional context where component services are provided by different providers across organizational boundaries, with very strong privacy and security constraints. This paper looks at compensation options for Web services in a hierarchical composition. Multiple compensation options may be available for a composite service both at the same level and at different levels of the hierarchy. This paper shows how to find an optimal compensation option under restricted visibility.


Author(s):  
Debmalya Biswas ◽  
Krishnamurthy Vidyasankar

Over the years, the notion of transactions has become synonymous with providing fault-tolerance, reliability and robustness to database systems. To extend the same transactional guarantees to new and evolving paradigms, such as Web service, the transactional mechanisms must first be adapted to the distinguishing characteristics of Web services, mainly composability, long-running nature, and privacy and security concerns. Composability refers to the ability to form new composite services by combining the functionalities of existing services. Due to their long-running nature, compensation based mechanisms are usually preferred to provide transactional guarantees for Web services. Compensation requires access (visibility) over the execution details of the services in the composition. However, such visibility may not always be feasible in a compositional context where component services are provided by different providers across organizational boundaries, with very strong privacy and security constraints. This paper looks at compensation options for Web services in a hierarchical composition. Multiple compensation options may be available for a composite service both at the same level and at different levels of the hierarchy. This paper shows how to find an optimal compensation option under restricted visibility.



Author(s):  
Sami Bhiri ◽  
Walid Gaaloul ◽  
Claude Godart ◽  
Olivier Perrin ◽  
Maciej Zaremba ◽  
...  

Web services are defined independently of any execution context. Due to their inherent autonomy and heterogeneity, it is difficult to examine the behaviour of composite services, especially in case of failures. This paper is interested in ensuring composite services reliability. Reliable composition is defined as a composition where all instance executions are correct from a transactional and business point of view. In this paper, the authors propose a transactional approach for ensuring reliable Web service compositions. The approach integrates the expressivity power of workflow models and the reliability of Advanced Transactional Models (ATM). This method offers flexibility for designers to specify their requirements in terms of control structure, using workflow patterns, and execution correctness. Contrary to ATM, the authors start from the designers’ specifications to define the appropriate transactional mechanisms that ensure correct executions according to their requirements.



Commercial-off-the-shelf (COTS) Simulation Packages (CSPs) are widely used in industry primarily due to economic factors associated with developing proprietary software platforms. Regardless of their widespread use, CSPs have yet to operate across organizational boundaries. The limited reuse and interoperability of CSPs are affected by the same semantic issues that restrict the inter-organizational use of software components and web services. The current representations of Web components are predominantly syntactic in nature lacking the fundamental semantic underpinning required to support discovery on the emerging Semantic Web. The authors present new research that partially alleviates the problem of limited semantic reuse and interoperability of simulation components in CSPs. Semantic models, in the form of ontologies, utilized by the authors’ Web service discovery and deployment architecture, provide one approach to support simulation model reuse. Semantic interoperation is achieved through a simulation component ontology that is used to identify required components at varying levels of granularity (i.e. including both abstract and specialized components). Selected simulation components are loaded into a CSP, modified according to the requirements of the new model and executed. The research presented here is based on the development of an ontology, connector software, and a Web service discovery architecture. The ontology is extracted from example simulation scenarios involving airport, restaurant and kitchen service suppliers. The ontology engineering framework and discovery architecture provide a novel approach to inter-organizational simulation, by adopting a less intrusive interface between participants Although specific to CSPs this work has wider implications for the simulation community. The reason being that the community as a whole stands to benefit through from an increased awareness of the state-of-the-art in Software Engineering (for example, ontology-supported component discovery and reuse, and service-oriented computing), and it is expected that this will eventually lead to the development of a unique Software Engineering-inspired methodology to build simulations in future.



Author(s):  
BIXIN LI ◽  
SHUNHUI JI ◽  
DONG QIU ◽  
JU CAI

In web service times, the techniques for composing services are based on service reuse and automatic integration. A new web service will be generated by composing some existing web services. These web services cooperate with each other to provide a new more complex function. It is necessary and very important to test the interaction behavior between any two web services during composition. In this paper, a kind of enhanced hierarchical color petri-net (or EH-CPN) is introduced to generate test cases for testing the interaction, where EH-CPN is transformed from OWL-S document, and both control flow and data flow information in EH-CPN are analyzed and used to generate an executable test sequence, and further test cases are created by combining the test sequence and test data in an XML file.



2010 ◽  
Vol 7 (1) ◽  
pp. 1-21 ◽  
Author(s):  
Wei She ◽  
I-Ling Yen ◽  
Bhavani Thuraisingham

In recent years, security issues in web service environments have been widely studied and various security standards and models have been proposed. However, most of these standards and models focus on individual web services and do not consider the security issues in composite services. In this article, the authors propose an enhanced security model to control the information flow in service chains. It extends the basic web service security models by introducing the concepts of delegation and pass-on. Based on these concepts, new certificates, certificate chains, delegation and pass-on policies, and how they are used to control the information flow are discussed. The authors also introduce a case study from a healthcare information system to illustrate the protocols.



2011 ◽  
Vol 474-476 ◽  
pp. 1617-1620
Author(s):  
Dong Yang ◽  
Lei Liu ◽  
Manuel Bernal Llinares

In this paper we first establish a dependency matrix over the inputs of web services in composition and the degree of dependency between the interface parameters for a single web service. Operating over the matrices, the ripple effect of a single service's fault at runtime has been analysed and computed. Based on this, we have looked for a method to substitute the failing service with an equivalent one at runtime. Using simulations and real examples we have confirmed the effectiveness of the method shown in this paper.



Author(s):  
Li Li ◽  
Chengfei Liu ◽  
Xiaohui Zhao ◽  
Junhu Wang

Web services have become a dominating technology for business integration. For operation reliability and robustness, transactional support is an important issue for Web service system design and development. Yet, most existing Web services protocols, like WS-BPEL which sticks to the compensation-based recovery strategy, only provide very limited supports for Web services in certain circumstances. As Web service systems are scaling up, more advanced transactional supports beyond traditional compensation-based solutions are required to catch up with the increasing complexity of composite Web services. This chapter looks into the problem of transactional support for composing and scheduling those Web services that may have different transactional properties. The transactional properties of workflow constructs, which are fundamental to the composition of Web services, are thoroughly investigated. The concept of connection point is introduced to derive the transactional properties of composite Web services. The scheduling issue of composite Web services is also discussed.



Author(s):  
Sami Bhiri ◽  
Walid Gaaloul ◽  
Claude Godart

Different from traditional software applications, Web services are defined independently from any execution context. Their consequent inherent autonomy and heterogeneity fostered by a continuous evolution in business context and requirements make ensuring the execution of a composite service as intended a challenging task. This chapter presents a reengineering approach to ensure transactional reliability of composite services. Contrary to previous approaches which check correctness properties based on the composition model, the authors start from executions’ log to improve services’ recovery mechanisms. Basically, the chapter proposes a set of mining techniques to discover the transactional behavior from an event based log. Then, based on this mining step, the authors use a set of rules in order to improve services’ reliability.



Author(s):  
Jonathan Lee ◽  
Shang-Pin Ma ◽  
Shin-Jie Lee ◽  
Chia-Ling Wu ◽  
Chiung-Hon Leon Lee

Service-Oriented Computing (SOC), a main trend in software engineering, promotes the construction of applications based on the notion of services. SOC has recently attracted a great deal of attention from researchers, and has been comprehensively adopted by industry. However, service composition enabling the aggregation of existing services into composite services still imposes a great challenge to service-oriented technology. Web service composition requires component Web services to be available in request, to behave correctly in operation, and to be replaceable flexibly in failure. Although availability of Web services plays a crucial role in building robust SOC-based applications, it has been largely neglected, especially for service composition. In this chapter, we propose a service composition framework that integrates a set of composition-based service discovery mechanisms, a user-oriented service delivery approach, as well as a service management mechanism for composite services.



2014 ◽  
pp. 1498-1520
Author(s):  
Jonathan Lee ◽  
Shang-Pin Ma ◽  
Shin-Jie Lee ◽  
Chia-Ling Wu ◽  
Chiung-Hon Leon Lee

Service-Oriented Computing (SOC), a main trend in software engineering, promotes the construction of applications based on the notion of services. SOC has recently attracted a great deal of attention from researchers, and has been comprehensively adopted by industry. However, service composition enabling the aggregation of existing services into composite services still imposes a great challenge to service-oriented technology. Web service composition requires component Web services to be available in request, to behave correctly in operation, and to be replaceable flexibly in failure. Although availability of Web services plays a crucial role in building robust SOC-based applications, it has been largely neglected, especially for service composition. In this chapter, we propose a service composition framework that integrates a set of composition-based service discovery mechanisms, a user-oriented service delivery approach, as well as a service management mechanism for composite services.



Sign in / Sign up

Export Citation Format

Share Document