Advertisement

Assessment of Service Protocols Adaptability Using a Novel Path Computation Technique

  • Zhangbing Zhou
  • Sami Bhiri
  • Armin Haller
  • Hai Zhuge
  • Manfred Hauswirth
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5870)

Abstract

In this paper we propose a new kind of adaptability assessment that determines whether service protocols of a requestor and a provider are adaptable, computes their adaptation degree, and identifies conditions that determine when they can be adapted. We also propose a technique that implements this adaptability assessment: (1) we construct a complete adaptation graph that captures all service interactions adaptable between these two service protocols. The emptiness or non-emptiness of this graph corresponds to the fact that whether or not they are adaptable; (2) we propose a novel path computation technique to generate all instance sub-protocols which reflect valid executions of a particular service protocol, and to derive all instance sub-protocol pairs captured by the complete adaptation graph. An adaptation degree is computed as a ratio between the number of instance sub-protocols captured by these instance sub-protocol pairs with respect to a service protocol and that of this service protocol; (3) and finally we identify a set of conditions based on these instance sub-protocol pairs. A condition is the conjunction of all conditions specified on the transitions of a given pair of instance sub-protocols. This assessment is a comprehensive means of selecting the suitable service protocol among functionally-equivalent candidates according to the requestor’s business requirements.

Keywords

Message Exchange Price Processing Path Computation Service Interaction Adaptation Graph 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Backer, M.D., Snoeck, M., Monsieur, G., Lemahieu, W., Dedene, G.: A scenario-based verification technique to assess the compatibility of collaborative business processes. Data & Knowledge Engineering 68(6), 531–551 (2009)CrossRefGoogle Scholar
  2. 2.
    Benatallah, B., Casati, F., Toumani, F.: Representing, analysing and managing web service protocols. Data & Knowledge Engineering 58(3), 327–357 (2006)CrossRefGoogle Scholar
  3. 3.
    Benatallah, B., Casati, F., Grigori, D., Nezhad, H.R.M., Toumani, F.: Developing Adapters for Web Services Integration. In: Pastor, Ó., Falcão e Cunha, J. (eds.) CAiSE 2005. LNCS, vol. 3520, pp. 415–429. Springer, Heidelberg (2005)Google Scholar
  4. 4.
    Dumas, M., Spork, M., Wang, K.: Adapt or perish: Algebra and visual notation for service interface adaptation. In: Dustdar, S., Fiadeiro, J.L., Sheth, A.P. (eds.) BPM 2006. LNCS, vol. 4102, pp. 65–80. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  5. 5.
    Dumas, M., Benatallah, B., Nezhad, H.R.M.: Web Service Protocols: Compatibility and Adaptation. IEEE Data Engineering Bulletin 31(3), 40–44 (2008)Google Scholar
  6. 6.
    Ioannidis, Y., Ramakrishnan, R., Winger, L.: Transitive closure algorithms based on graph traversal. ACM Trans. on Database Systems 18(3), 512–576 (1993)CrossRefGoogle Scholar
  7. 7.
    Nezhad, H.R.M., Benatallah, B., Martens, A., Curbera, F., Casati, F.: Semi-Automated Adaptation of Service Interactions. In: Proc. of WWW, pp. 993–1002 (2007)Google Scholar
  8. 8.
    Nezhad, H.R.M., Saint-Paul, R., Benatallah, B., Casati, F.: Deriving Protocol Models from Imperfect Service Conversation Logs. IEEE Trans. on Knowledge and Data Engineering 12, 1683–1698 (2008)CrossRefGoogle Scholar
  9. 9.
    Tan, W., Fan, Y., Zhou, M.: A Petri Net-Based Method for Compatibility Analysis and Composition of Web Services in Business Process Execution Language. IEEE Trans. on Automation Science and Engineering 6(1), 94–106 (2009)CrossRefGoogle Scholar
  10. 10.
    van der Aalst, W.M.P., Weijters, T., Maruster, L.: Workflow Mining: Discovering Process Models from Event Logs. IEEE Trans. on Knowledge and Data Engineering 16(9), 1128–1142 (2004)CrossRefGoogle Scholar
  11. 11.
    Wu, Q., Pul, C., Sahai, A., Barga, R.: Categorization and Optimization of Synchronization Dependencies in Business Processes. In: Proc. of ICDE, pp. 306–315 (2007)Google Scholar
  12. 12.
    Yellin, D.M., Strom, R.E.: Protocol Specifications and Component Adaptors. ACM Trans. on Programming Languages and Systems 19(2), 292–333 (1997)CrossRefGoogle Scholar
  13. 13.
    Zhou, Z., Bhiri, S., Gaaloul, W., Hauswirth, M.: Developing Process Mediator for Supporting Mediated Service Interactions. In: Proc. of ECOWS, pp. 155–164 (2008)Google Scholar
  14. 14.
    Zhou, Z., Bhiri, S., Hauswirth, M.: Control and Data Dependencies in Business Processes Based on Semantic Business Activities. In: Proc. of iiWAS, pp. 257–263 (2008)Google Scholar
  15. 15.
    Zhou, Z., Bhiri, S., Zhuge, H., Hauswirth, M.: Assessing Service Protocols Adaptability Using Protocol Reduction and Graph-Search with Backtracking Techniques. In: Proc. of SKG (2009)Google Scholar
  16. 16.
    Zhou, Z., Bhiri, S.: Assessment of Service Protocols Adaptability (2009) DERI technical report, http://www.deri.ie/fileadmin/documents/DERI-TR-2009-06-10.pdf
  17. 17.
    Zhuge, H., Cheung, T.Y., Pung, H.P.: A timed workflow process model. Journal of Systems and Software 55(3), 231–243 (2001)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Zhangbing Zhou
    • 1
  • Sami Bhiri
    • 1
  • Armin Haller
    • 1
  • Hai Zhuge
    • 2
  • Manfred Hauswirth
    • 1
  1. 1.Digital Enterprise Research InstituteNational University of Ireland at Galway 
  2. 2.Institute of Computing TechnologyChinese Academy of Sciences 

Personalised recommendations