Advertisement

Monitoring WS-Agreements: An Event Calculus–Based Approach

  • Khaled Mahbub
  • George Spanoudakis

abstract

In this chapter, we present a framework that we have developed to support the monitoring of service level agreements (SLAs). The agreements that can be monitored by this framework are expressed in an extension of WS-Agreement that we propose. The main characteristic of the proposed extension is that it uses an event calculus–based language, called EC-Assertion, for the specification of the service guarantee terms in a service level agreement that need to be monitored at runtime. The use of EC-Assertion for specifying service guarantee terms provides a well-defined semantics to the specification of such terms and a formal reasoning framework for assessing their satisfiability. The chapter describes also an implementation of the framework and the results of a set of experiments that we have conducted to evaluate it.

Keywords

Service Level Agreement Recorded Event Service Consumer Composition Process Monitoring Framework 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Andrews T. et al.: Business Process Execution Language for Web Services, v1.1. http://www-106.ibm.com/developerworks/library/ws-bpelGoogle Scholar
  2. 2.
    Andrieux A. et al.: Web Services Agreement Specification. Global Grid Forum, May 2004, available from: http://www.gridforum.org/Meetings/GGF11/Documents/draft-ggf-graap-agreement.pdfGoogle Scholar
  3. 3.
    Bajaj S. et al.: Web Services Policy Framework. Sep 2004, available from: ftp://www6.software.ibm.com/software/developer/library/ws-policy.pdfGoogle Scholar
  4. 4.
    Baresi L, Guinea S, and Plebani P.: WS-Policy for Service Monitoring. 6th VLDB Workshop on Technologies for E-Services (TES-05), Trondheim, Norway, September 2–3, 2005Google Scholar
  5. 5.
    Baresi L., Ghezzi C., and Guinea S.: Smart Monitors for Composed Services. Proc. of 2nd Int. Conf. on Service Oriented Computing, New York, 2004Google Scholar
  6. 6.
    BPWS4J: http://alphaworks.ibm.com/tech/bpws4jGoogle Scholar
  7. 7.
    Brorkens M. and Moller M.: Dynamic Event Generation for Runtime Checking using the JDI. In Klaus Havelund and Grigore Rosu (Eds.), Proceedings of the Federated Logic Conference Satellite Workshops, Runtime Verification. Electronic Notes in Theoretical Computer Science 70.4, Copenhagen, July 2002.Google Scholar
  8. 8.
    Brorkens M., and Moller M.: Jassda Trace Assertions, Runtime Checking the Dynamic of Java Programs. In: Ina Schieferdecker, Hartmut Konig and Adam Wolisz (Eds.), Trends in Testing Communicating Systems, International Conference on Testing of Communicating Systems, Berlin, March 2002, pp. 39–48.Google Scholar
  9. 9.
    Capra L., Emmerich W., and Mascolo C.: Reflective middleware solutions for context-aware applications. LNCS 2192, 2001Google Scholar
  10. 10.
    Chen F. and Rosu G.: Java-MOP: A Monitoring Oriented Programming Environment for Java. Proceedings of the 11th International Conference on Tools and Algorithms for the construction and analysis of systems, 2005Google Scholar
  11. 11.
    Clarke L. and Osterweil L.: Continuous Self-Evaluation for the Self-Improvement of Software. Springer Verlag Lecture Notes in Computer Science #1936, Proceedings of the 1st International Workshop on Self-Adaptive Software (IWSAS 2000), pp 27–29, April 2000, Oxford, England.Google Scholar
  12. 12.
    CRS Case Study: Available from: www.soi.city.ac.uk/ am697/monitoring/case_studies/CRS_Case_Study.htmlGoogle Scholar
  13. 13.
    Dardenne A., van Lamsweerde A., and Fickas S.: Goal-Directed Requirements Acquisition. Science of Computer Programming, 20, pp. 3–50, 1993.Google Scholar
  14. 14.
    EC-Assertion: http://www.soi.city.ac.uk/ gespan/EC-assertion.xsdGoogle Scholar
  15. 15.
    Efstratiou C., Friday A., Davies N., and Cheverst K.: Utilising the event calculus for policy driven adaptation on mobile systems. In Jorge Lobo Bret J. Michael and Naranker Duray, editors, 3rd International Workshop on Policies for Distributed Systems and Networks, pages 13–24, Monterey, Ca., U.S., 2002. IEEE Computer Society.Google Scholar
  16. 16.
    Emerging Technology Toolkit: http://www.alphaworks.ibm.com/tech/ettkGoogle Scholar
  17. 17.
    Farrell A, Sergot M., Salle M., and Bartolini C.: Using the event calculus for performance monitoring of Service Level Agreements in Utility Computing. In Proc. Workshop on Contract Languages and Architectures (CoALa2004), 8th International IEEE Enterprise Distributed Object Computing Conference, Monterey, September 2004.Google Scholar
  18. 18.
    Feather M. and Fickas S.: Requirements Monitoring in Dynamic Environments. Proceedings of IEEE International Conference on Requirements Engineering, 1995Google Scholar
  19. 19.
    Feather M.S., Fickas S., Van Lamsweerde A., and Ponsard C.: Reconciling System Requirements and Runtime Behaviour. Proc. of 9th Int. Work. on Software Specification & Design, 1998.Google Scholar
  20. 20.
    Finkelstein A. and Savigni A.: A Framework for Requirements Engineering for Context-Aware Services. In Proc. of 1st Int. Workshop From Software Requirements to Architectures (STRAW 01), Toronto, Canada, May 2001.Google Scholar
  21. 21.
    Firesmith D.: Engineering Security Requirements. Journal of Object Technology, 2(1), 53–68, Jan-Feb 2003Google Scholar
  22. 22.
    Kannan S., Kim M., Lee I., Sokolsky O., and Viswanathan M.: Runtime Monitoring and Steering based on Formal Specifications. Workshop on Modeling Software System Structures in a fastly moving scenario, June 2000.Google Scholar
  23. 23.
    Keller A. and Ludwig H.: The WSLA Framework: Specifying and Monitoring Service Level Agreements for Web Services. Technical Report RC22456 (W0205–171), IBM Research Division, T.J. Watson Research Center, May 2002.Google Scholar
  24. 24.
    Kim M., Kannan S., Lee I., Sokolsky O., and Viswanathan M.: Java-MaC: a Runtime Assurance Tool for Java Programs. In Klaus Havelund and Grigore Rosu, editors, Electronic Notes in Theoretical Computer Science, Vol. 55. Elsevier Science Publishers, 2001.Google Scholar
  25. 25.
    Lloyd J.W.: Logic for Learning: Learning Comprehensible Theories from Structured Data. Springer Verlag, ISBN 3-540-42027-4, 2003.Google Scholar
  26. 26.
    Log4j: http://logging.apache.org/log4j/docs/, September 2003Google Scholar
  27. 27.
    Ludwig H., Dan A., and Kearney R.: Cremona: An Architecture and Library for Creation and Monitoring of WS-Agreements. Proceedings of the 2nd International Conference on Service Oriented Computing, November 2004, New YorkGoogle Scholar
  28. 28.
    Ludwig H., Keller A., Dan A., King R.P., and Franck R.: Web Service Level Agreement (WSLA) Language Specification, Version 1.0. IBM Corporation (January 2003), http://www.research.ibm.com/wslaGoogle Scholar
  29. 29.
    Mahbub K. and Spanoudakis G.: Run-time Monitoring of Requirements for Systems Composed of Web-Services: Initial Implementation and Evaluation Experience. 3rd International IEEE Conference on Web Services (ICWS 2005), July 2005Google Scholar
  30. 30.
    OWL-S: http://www.daml.org/services/owl-s/Google Scholar
  31. 31.
    QTP: http://www.soi.city.ac.uk/ am697/QTP_Case_Study.htmlGoogle Scholar
  32. 32.
    Robinson W.: Monitoring Software Requirements using Instrumented Code. In Proc. of the Hawaii Int. Conf. on Systems Sciences, 2002.Google Scholar
  33. 33.
    Robinson W.N.: Monitoring Web Service Requirements. Proc. of 12th Int. Conf. on Requirements Engineering, 2003Google Scholar
  34. 34.
    Shanahan M.: The event calculus explained. In Artificial Intelligence Today, 409–430, Springer, 1999Google Scholar
  35. 35.
    Spanoudakis G., Kloukinas C., and Androutsopoulos K.: Towards Security Monitoring Patterns. 22nd Annual ACM Symposium on Applied Computing, Technical Track on Software Verification, March 2007Google Scholar
  36. 36.
    Spanoudakis G. and Mahbub K.: Non Intrusive Monitoring of Service Based Systems. International Journal of Cooperative Information Systems, 15(3): 325–358, 2006CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Khaled Mahbub
    • 1
  • George Spanoudakis
    • 1
  1. 1.Department of ComputingCity UniversityLondon

Personalised recommendations