Monitoring for Digital Preservation of Processes

  • Martin Alexander Neumann
  • Till Riedel
  • Philip Taylor
  • Hedda R. Schmidtke
  • Michael Beigl
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6967)


Digital Preservation is an important challenge for the information society. Reliable information and communication technology is crucial for most companies and software failure, is a considerable risk. Use of technologies such as Software as a Service (SaaS) and Internet of Services (IoS) means that business processes are increasingly supported by distributed, service oriented systems. We propose a concept and methods for capturing of contextual information, event causality and timing for Digital Preservation of distributed business processes and services. The architecture is derived from an architecture for monitoring sensing systems. We add a reasoner that can check whether processes adhere to explicit contracts and detect behavior anomalies, and we sketch how an inductive learner can be used to detect anomalies not covered by these contracts.


Digital preservation context monitoring sensing systems 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bocchi, L., Honda, K., Tuosto, E., Yoshida, N.: A theory of design-by-contract for distributed multiparty interactions. In: Gastin, P., Laroussinie, F. (eds.) CONCUR 2010. LNCS, vol. 6269, pp. 162–176. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  2. 2.
    Cao, Q., Abdelzaher, T., Stankovic, J., Whitehouse, K., Luo, L.: Declarative tracepoints: a programmable and application independent debugging system for wireless sensor networks. In: Proceedings of SenSys 2008, pp. 85–98. ACM, New York (2008)Google Scholar
  3. 3.
    Chen, B.R., Peterson, G., Mainland, G., Welsh, M.: Livenet: Using passive monitoring to reconstruct sensor network dynamics. In: Nikoletseas, S.E., Chlebus, B.S., Johnson, D.B., Krishnamachari, B. (eds.) DCOSS 2008. LNCS, vol. 5067, pp. 79–98. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  4. 4.
    Krsul, I., Ganguly, A., Zhang, J., Fortes, J.A.B., Figueiredo, R.J.: VMPlants: Providing and Managing Virtual Machine Execution Environments for Grid Computing. In: Proceedings of SC 2004. IEEE, Washington, DC, USA (2004)Google Scholar
  5. 5.
    Lee, K.H., Slattery, O., Lu, R., Tang, X., Mccrary, V.: The state of the art and practice in digital preservation. Research of the National Institute of Standards and Technology 107(1), 93–106 (2002)CrossRefGoogle Scholar
  6. 6.
    Li, P., Regehr, J.: T-check: bug finding for sensor networks. In: Proceedings of IPSN 2010, pp. 174–185. ACM, New York (2010)Google Scholar
  7. 7.
    Nycum, S.H., Kenfield, D.L., Keenan, M.: Debugging software escrow: Will it work when you need it? Computer Law 4(3), 441–463 (1984)Google Scholar
  8. 8.
    Römer, K., Ringwald, M.: Increasing the visibility of sensor networks with passive distributed assertions. In: Proceedings of REALWSN 2008, pp. 36–40. ACM, New York (2008)Google Scholar
  9. 9.
    Schmidtke, H.R., Hong, D., Woo, W.: Reasoning about models of context: A context-oriented logical language for knowledge-based context-aware applications. Revue d’Intelligence Artificielle 22(5), 589–608 (2008)CrossRefGoogle Scholar
  10. 10.
    Schmidtke, H.R., Woo, W.: Towards ontology-based formal verification methods for context aware systems. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol. 5538, pp. 309–326. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  11. 11.
    Tolle, G., Culler, D.: Design of an application-cooperative management system for wireless sensor networks. In: Proceedings of EWSN 2005, pp. 121–132 (2005)Google Scholar
  12. 12.
    Woehrle, M., Plessl, C., Lim, R., Beutel, J., Thiele, L.: Evant: Analysis and checking of event traces for wireless sensor networks. In: Proceedings of SUTC 2008, pp. 201–208. IEEE, Washington, DC, USA (2008)Google Scholar
  13. 13.
    Wu, Y., Kapitanova, K., Li, J., Stankovic, J.A., Son, S.H., Whitehouse, K.: Run time assurance of application-level requirements in wireless sensor networks. In: Proceedings of IPSN 2010, pp. 197–208. ACM, New York (2010)Google Scholar
  14. 14.
    Yang, J., Soffa, M.L., Selavo, L., Whitehouse, K.: Clairvoyant: a comprehensive source-level debugger for wireless sensor networks. In: Proceedings of SenSys 2007, pp. 189–203. ACM, New York (2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Martin Alexander Neumann
    • 1
  • Till Riedel
    • 1
  • Philip Taylor
    • 2
  • Hedda R. Schmidtke
    • 1
  • Michael Beigl
    • 1
  1. 1.Karlsruhe Institute of TechnologyKarlsruheGermany
  2. 2.SAP ResearchBelfastUnited Kingdom

Personalised recommendations