F(I)MEA-Technique of Web Services Analysis and Dependability Ensuring

  • Anatoliy Gorbenko
  • Vyacheslav Kharchenko
  • Olga Tarasyuk
  • Alexey Furmanov
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4157)


Dependability analysis of the Web Services (WSs), dsclosure of possible failure modes and their effects are open problems. This paper gives results of the Web Services dependability analysis using standardized FMEA- (Failure Modes and Effects Analysis) technique and its proposed modification IMEA- (Intrusion Modes and Effects Analysis) technique. Obtained results of FMEA-technique application were used for determining the necessary means of error recovery, fault prevention, fault-tolerance ensuring and fault removal. Systematization and analysis of WS intrusions and means of intrusion-tolerance were fulfilled by use of IMEA-technique. We also propose the architectures of the fault and intrusion-tolerant Web Services based on the components diversity and dynamical reconfiguration as well as discuss principles and results of dependable and secure Web Services development and deployment by use of F(I)MEA-technique and multiversion approach.


Intrusion Detection System Error Recovery Fault Removal Fault Prevention Service Component Architecture 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    W3C Working Group.: Web Services Architecture (2004),
  2. 2.
    Ferguson, D.F., Storey, T., Lovering, B., Shewchuk, J.: Secure, Reliable, Transacted Web Services: Architecture and Composition. Microsoft and IBM Technical Report (2003),
  3. 3.
    Tartanoglu, F., Issarny, V., Romanovsky, A., Levy, N.: Dependability in the Web Service Architecture. In: de Lemos, R., Gacek, C., Romanovsky, A. (eds.) Architecting Dependable Systems. LNCS, vol. 2677, pp. 89–108. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  4. 4.
    IEC 812. Analysis Techniques for System Reliability – Procedure for Failure Modes and Effects Analysis (FMEA). International Electrotechnical Commission, Geneva (1985)Google Scholar
  5. 5.
    Avizienis, A., Laprie, J.-C., Randell, B., Landwehr, C.: Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Transactions on Dependable and Secure Computing 1(1), 11–33 (2004)CrossRefGoogle Scholar
  6. 6.
    Chandra, S., Chen, P.M.: Whither Generic Recovery From Application Faults? A Fault Study using Open-Source Software. In: Proc. Int. Conf. on Dependable Systems and Networks, pp. 97–106 (2000)Google Scholar
  7. 7.
    Deswarte, Y., Kanoun, K., Laprie, J.-C.: Diversity against Accidental and Deliberate Faults. In: Proc. of Computer Security, Dependability, and Assurance (SCDA): From Needs to Solutions, York, England, pp. 171–181 (1998)Google Scholar
  8. 8.
    Gorbenko, A., Kharchenko, V., Popov, P., Romanovsky, A.: Dependable Composite Web Services with Components Upgraded Online. In: de Lemos, R., Gacek, C., Romanovsky, A. (eds.) Architecting Dependable Systems III. LNCS, vol. 3549, pp. 92–121. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  9. 9.
    Vaidyanathan, K., Harper, R., et al.: Analysis and Implementation of Software Rejuvenation in Cluster Systems. In: Proc. Joint Intl. Conf. Measurement and Modeling of Computer Systems, ACM Sigmetrics and IFIP WG 7.3, Cambridge, pp. 62–71 (2001)Google Scholar
  10. 10.
    Tartanoglu, F., Issarny, V., Romanovsky, A., Levy, N.: Coordinated Forward Error Recovery for Composite Web Services. In: Proc. 22nd IEEE Symposium on Reliable Distributed Systems (2003)Google Scholar
  11. 11.
    Tsai, W.-T., Chen, Y., Paul, R., Liao, N., Huang, H.: Cooperative and Group Testing in Verification of Dynamic Composite Web Services. In: Proc. COMPSAC Workshops, pp. 170–173 (2004)Google Scholar
  12. 12.
    Valdes, A., Almgren, M., Cheung, S., Deswarte, Y., Dutertre, B., Levy, J., Saïdi, H., Stavridou, V., Uribe, T.E.: An Architecture for an Adaptive Intrusion-Tolerant Server. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2002. LNCS, vol. 2845, pp. 158–178. Springer, Heidelberg (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Anatoliy Gorbenko
    • 1
  • Vyacheslav Kharchenko
    • 1
  • Olga Tarasyuk
    • 1
  • Alexey Furmanov
    • 1
  1. 1.Department of Computer Systems and Networks (503)National Aerospace University “KhAI”KharkivUkraine

Personalised recommendations