Advertisement

Towards Runtime Migration of WS-BPEL Processes

  • Sonja Zaplata
  • Kristian Kottke
  • Matthias Meiners
  • Winfried Lamersdorf
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6275)

Abstract

The decentralized execution of business process instances is a promising approach for enabling flexible reactions to contextual changes at runtime. Most current approaches address such process distribution by physical fragmentation of processes and by dynamic assignment of resulting static process parts to different business partners.

In order to enable a more dynamic segmentation of such responsibilities at runtime, this paper proposes to use process runtime migration as a means of logical process fragmentation. Accordingly, the paper presents a general migration metadata model and a corresponding basic privacy and security mechanism for enhancing existing process models with the ability for runtime migration while respecting the intensions and privacy requirements of both process modelers and initiators. The approach is conceptually evaluated by applying it to WS-BPEL processes and comparing the results to the general concept of process fragmentation.

Keywords

Process Fragmentation Process Migration Process Engine Process Execution Migration Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    OASIS: Web Services Business Process Execution Language Version 2.0. Technical report, OASIS (2007)Google Scholar
  2. 2.
    Martin, D., Wutke, D., Leymann, F.: A Novel Approach to Decentralized Workflow Enactment. In: Enterprise Distributed Object Computing, pp. 127–136. IEEE, Los Alamitos (2008)Google Scholar
  3. 3.
    Zaplata, S., Kunze, C.P., Lamersdorf, W.: Context-based Cooperation in Mobile Business Environments: Managing the Distributed Execution of Mobile Processes. In: Business and Information Systems Engineering (BISE), vol. 2009(4) (October 2009)Google Scholar
  4. 4.
    Atluri, V., et al.: A Decentralized Execution Model for Inter-organizational Workflows. Distrib. Parallel Databases 22(1), 55–83 (2007)CrossRefGoogle Scholar
  5. 5.
    Montagut, F., Molva, R.: Enabling Pervasive Execution of Workflows. In: Collaborative Computing: Networking, Applications and Worksharing. IEEE, Los Alamitos (2005)Google Scholar
  6. 6.
    Jablonski, S., et al.: A Comprehensive Investigation of Distribution in the Context of Workflow Management. In: ICPADS 2001, pp. 187–192 (2001)Google Scholar
  7. 7.
    Khalaf, R., Leymann, F.: A Role-based Decomposition of Business Processes using BPEL. In: IEEE International Conference on Web Services, pp. 770–780. IEEE, Los Alamitos (2006)Google Scholar
  8. 8.
    Baresi, L., Maurino, A., Modafferi, S.: Towards Distributed BPEL Orchestrations. ECEASST 3 (2006)Google Scholar
  9. 9.
    Sen, R., Roman, G.C., Gill, C.D.: CiAN: A Workflow Engine for MANETs. In: Lea, D., Zavattaro, G. (eds.) COORDINATION 2008. LNCS, vol. 5052, pp. 280–295. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  10. 10.
    Muth, P., et al.: From centralized workflow specification to distributed workflow execution. J. Intell. Inf. Syst. 10(2), 159–184 (1998)CrossRefGoogle Scholar
  11. 11.
    Hackmann, G., Sen, R., Haitjema, M., Roman, G.C., Gill, C.: MobiWork: Mobile Workflow for MANETs. Technical report, Washington University (2006)Google Scholar
  12. 12.
    Cichocki, A., Rusinkiewicz, M.: Migrating Workflows. In: Advances in Workflow Management Systems and Interoperability, NATO, pp. 311–326 (1997)Google Scholar
  13. 13.
    Schuler, C., Weber, R., Schuldt, H., Schek, H.J.: Scalable Peer-to-Peer Process Management - The OSIRIS Approach. In: ICWS, pp. 26–34 (2004)Google Scholar
  14. 14.
    Bauer, T., Dadam, P.: Efficient Distributed Workflow Management Based on Variable Server Assignments. In: Wangler, B., Bergman, L.D. (eds.) CAiSE 2000. LNCS, vol. 1789, pp. 94–109. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  15. 15.
    Lotspiech, J., Nusser, S., Pestoni, F.: Broadcast Encryption’s Bright Future. Computer 35(8), 57–63 (2002)CrossRefGoogle Scholar
  16. 16.
    Bertino, E., Castano, S., Ferrari, E.: Securing XML documents with Author-X. IEEE Internet Computing 5(3), 21–31 (2001)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Sonja Zaplata
    • 1
  • Kristian Kottke
    • 1
  • Matthias Meiners
    • 1
  • Winfried Lamersdorf
    • 1
  1. 1.Distributed Systems and Information Systems, Computer Science DepartmentUniversity of HamburgHamburgGermany

Personalised recommendations