Analysis and Verification of Time Requirements Applied to the Web Services Composition

  • Gregorio Díaz
  • María-Emilia Cambronero
  • M. Llanos Tobarra
  • Valentín Valero
  • Fernando Cuartero
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4184)


This work presents a new approach to the analysis and verification of the time requirements of Web Services compositions via goal-driven models and model checking techniques. The goal-driven model used is an extension of the goal model KAOS and the model checker engine is the UPPAAL tool. The goal model specifies the properties that the system must satisfy and how they should be verified by using the model checker engine. In order to illustrate this approach, we apply these techniques to a basic Internet purchase process.


Model Check Goal Model Symbolic Model Check Time Automaton Model Check Technique 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    van Lamsweerde, A., Dardenne, A., Fickas, S.: Goal-directed requirements acquisition, p. 350Google Scholar
  2. 2.
    Alur, R., Dill, D.: Automata for modeling real–time systems. In: Paterson, M. (ed.) ICALP 1990. LNCS, vol. 443. Springer, Heidelberg (1990)CrossRefGoogle Scholar
  3. 3.
    Bengtsson, J., Yi, W.: Timed automata: Semantics, algorithms and tools. In: Reisig, W., Rozenberg, G. (eds.) Lecture Notes on Concurrency and Petri Nets. Springer, Heidelberg (2004)Google Scholar
  4. 4.
    Bravetti, M., Guidi, C., Lucchi, R., Zavattaro, G.: Supporting e-commerce systems formalization with choreography languages. In: SAC 2005, pp. 831–835. ACM Press, New York (2005)CrossRefGoogle Scholar
  5. 5.
    Bravetti, M., Lucchi, R., Zavattaro, G., Gorrieri, R.: Web services for e-commerce: guaranteeing security access and quality of service. In: SAC 2004, pp. 800–806. ACM Press, New York (2004)CrossRefGoogle Scholar
  6. 6.
    Rifaut, A., Molderez, J.F., van Lamsweerde, A., Ponsard, C., Massonet, P., Tran Van, H.: Early verification and validation of mission critical systems. In: Ninth International Workshop on Formal Methods for Industrial Critical Systems (2004)Google Scholar
  7. 7.
    Clarke Jr., E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press, Cambridge (1999)Google Scholar
  8. 8.
    Darimont, R., van Lamsweerde, A.: Formal refinement patterns for goaldriven requirements elaboration. In: Ninth International Workshop on Formal Methods for Industrial Critical Systemse, FSE-4 - 4th ACM Symp. on the Foundations of Software Engineering (October 1996)Google Scholar
  9. 9.
    Díaz, G., Cuartero, F., Ruiz, V.V., Pelayo, F.L.: Automatic verification of the tls handshake protocol. In: SAC 2004: Proceedings of the 2004 ACM symposium on Applied computing, pp. 789–794. ACM Press, New York (2004)CrossRefGoogle Scholar
  10. 10.
    Díaz, G., Larsen, K.G., Pardo, J.J., Cuartero, F., Valero, V.: An approach to handle real time and probabilistic behaviors in e-commerce: validating the set protocol. In: SAC 2005: Proceedings of the 2005 ACM symposium on Applied computing, pp. 815–820. ACM Press, New York (2006)Google Scholar
  11. 11.
    Diaz, G., Pardo, J.-J., Cambronero, M.-E., Valero, V., Cuartero, F.: Automatic translation of WS-CDL choreographies to timed automata. In: Bravetti, M., Kloul, L., Zavattaro, G. (eds.) EPEW/WS-FM 2005. LNCS, vol. 3670, pp. 230–242. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  12. 12.
    Kavantzas, N., et al.: Web service choreography description language (wscdl) 1.0,
  13. 13.
    Heitmeyer, C., Mandrioli, D.: Formal Methods for Real-Time Computing. John Wiley & Sons, Chichester (1996)Google Scholar
  14. 14.
    Hoare, T.: The verifying compiler: A grand challenge for computing research. J. ACM 50(1), 63–69 (2003)CrossRefGoogle Scholar
  15. 15.
    Larsen, K., Pettersson, P., Yi, W.: Uppaal in a nutshell. Journal on Software Tools for Technology Transfer 1 (1997)Google Scholar
  16. 16.
    Larsen, K.G., Pettersson, P., Yi, W.: Compositional and Symbolic Model-Checking of Real-Time Systems. In: Proc. of the 16th IEEE Real-Time Systems Symposium, pp. 76–87. IEEE Computer Society Press, Los Alamitos (1995)CrossRefGoogle Scholar
  17. 17.
    Navarro, E., Sanchez, P., Letelier, P., Pastor, J.A., Ramos, I.: A goal-oriented approach for safety requirements specification. In: 13th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS 2006), pp. 319–326. IEEE Computer Society, Los Alamitos (2006)Google Scholar
  18. 18.
    Alur, C.C.R., Dill, D.L.: Model-checking in dense real-time. Journal of Information and Computation (1993)Google Scholar
  19. 19.
    Sifakis, J., Henzinger, T.A., Nicollin, X., Yovine, S.: Symbolic model checking for real-time systems. In: Proceedings of the IEEE Conference on Logics in Computer Science (LICS) (1992)Google Scholar
  20. 20.
    van Lamsweerde, A.: Requirements engineering in the year 2000: a research perspective. In: International Conference on Software Engineering, p. 519 (2000)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Gregorio Díaz
    • 1
  • María-Emilia Cambronero
    • 1
  • M. Llanos Tobarra
    • 1
  • Valentín Valero
    • 1
  • Fernando Cuartero
    • 1
  1. 1.Department of Computer ScienceUniversity of Castilla-La ManchaSpain

Personalised recommendations