Towards Pattern-Based Reliability Certification of Services

  • Ingrid Buckley
  • Eduardo B. Fernandez
  • Marco Anisetti
  • Claudio A. Ardagna
  • Masoud Sadjadi
  • Ernesto Damiani
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7045)


On Service-Oriented Architectures (SOAs), the mechanism for run-time discovery and selection of services may conflict with the need to make sure that business process instances satisfy their reliability requirements. In this paper we describe a certification scheme based on machine-readable reliability certificates that will enable run-time negotiation. Service reliability is afforded by means of reliability patterns. Our certificates describe the reliability mechanism implemented by a service and the reliability pattern used to implement such a mechanism. Digital signature is used to associate the reliability claim contained in each certificate with the party (service supplier or accredited third-party) taking responsibility for it.


Sequence Diagram Reliability Requirement Reliability Mechanism Mean Time Between Failure Triple Modular Redundancy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Anisetti, M., Ardagna, C.A., Damiani, E.: Fine-grained modeling of web services for test-based security certification. In: Proc. of the 8th International Conference on Service Computing (SCC 2011), Washington, DC, USA (July 2011)Google Scholar
  2. 2.
    Becker, S., Koziolek, K., Reussner, R.: The palladio component model for model-driven performance prediction. Journal of Systems and Software (JSS) 82(1), 3–22 (2009)CrossRefGoogle Scholar
  3. 3.
    Bernardi, S., Merseguer, J., Petriu, D.: A dependability profile within marte. Journal of Software and Systems Modeling 10(3), 313–336 (2009)CrossRefGoogle Scholar
  4. 4.
    Buckley, I., Fernandez, E., Rossi, G., Sadjadi, M.: Web services reliability patterns. In: Proc. of the 21st International Conference on Software Engineering and Knowledge Engineering (SEKE 2009), Boston, MA, USA (July 2009), short paper Google Scholar
  5. 5.
    Buckley, I., Fernandez, E.: Three patterns for fault tolerance. In: Proc. of the International Workshop OOPSLA MiniPLoP, Orlando, FL, USA (October 2009)Google Scholar
  6. 6.
    Cardellini, V., Casalicchio, E., Grassi, V., Presti, F.L., Mirandola, R.: Towards self-adaptation for dependable service-oriented systems. In: Proc. of the Workshop on Architecting Dependable Systems (WADS 2008), Anchorage, AK, USA (June 2009)Google Scholar
  7. 7.
    Challagulla, V., Bastani, F., Paul, R., Tsai, W., Yinong Chen, Y.: A machine learning-based reliability assessment model for critical software systems. In: Proc. of the 31st Annual International Computer Software and Applications Conference (COMPSAC), Beijing, China (July 2007)Google Scholar
  8. 8.
    Challagulla, V., Bastani, F., Yen, I.L.: High-confidence compositional reliability assessment of soa-based systems using machine learning techniques. In: Tsai, J., Yu, P. (eds.) Machine Learning in Cyber Trust: Reliability, Security, Privacy, pp. 279–322. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  9. 9.
    Cortellessa, V., Grassi, V.: Test and analysis of web services. In: Baresi, L. (ed.) Reliability Modeling and Analysis of Service-Oriented Architectures, vol. 154, pp. 339–362. Springer, Heidelberg (2007)Google Scholar
  10. 10.
    Damiani, E., Ardagna, C.A., El Ioini, N.: Open source systems security certification. Springer, New York (2009)CrossRefGoogle Scholar
  11. 11.
    Grassi, V., Patella, S.: Reliability prediction for service-oriented computing environments. IEEE Internet Computing 10(3), 43–49 (2006)CrossRefGoogle Scholar
  12. 12.
    Herrmann, D.: Using the Common Criteria for IT security evaluation. Auerbach Publications (2002)Google Scholar
  13. 13.
    Holzmann, G.J., Joshi, R.: Reliable Software Systems Design: Defect Prevention, Detection, and Containment. In: Meyer, B., Woodcock, J. (eds.) VSTTE 2005. LNCS, vol. 4171, pp. 237–244. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  14. 14.
    Iyer, S., Nakayama, M., Gerbessiotis, A.: A markovian dependability model with cascading failures. IEEE Transactions on Computers 58(9), 1238–1249 (2009)MathSciNetCrossRefzbMATHGoogle Scholar
  15. 15.
    Koopman, P.: Toward a scalable method for quantifying aspects of fault tolerance, software assurance, and computer security. In: Proc. of the Computer Security, Dependability, and Assurance: From Needs to Solutions (CSDA 1998), York, U.K (July 1998)Google Scholar
  16. 16.
    Kopp, C.: System reliability and metrics of reliability, (accessed in date July 2011)
  17. 17.
    Lyu, M.: Handbook of Software Reliability Engineering. McGraw-Hill (1995)Google Scholar
  18. 18.
    Microsoft: Using Reliability Monitor, (accessed in date July 2011)Google Scholar
  19. 19.
    Muppala, J., Malhotra, M., Trivedi, K.: Markov dependability models of complex systems: Analysis techniques. In: Ozekici, S. (ed.) Reliability and Maintenance of Complex Systems. NATO ASI Series F: Computer and Systems Sciences, vol. 154, pp. 442–486. Springer, Berlin (1996)CrossRefGoogle Scholar
  20. 20.
    Mustafiz, S., Sun, X., Kienzle, J., Vangheluwe, H.: Model-driven assessment of system dependability. Journal of Software and Systems Modeling 7(4), 487–502 (2008)CrossRefGoogle Scholar
  21. 21.
    O’Brien, L., Merson, P., Bass, L.: Quality attributes for service-oriented architectures. In: Proc. of the IEEE International Workshop on Systems Development in SOA Environments (SDSOA 2007), Minneapolis, MN, USA (June 2007)Google Scholar
  22. 22.
    Pan, J.: Software reliability.18-849b dependable embedded systems. Tech. rep., Carnegie Mellon University, (accessed in date July 2011)
  23. 23.
    Saridakis, T.: A system of patterns for fault tolerance. In: Proc. of the EuroPLoP Conference, Kloster Irsee, Germany (2002)Google Scholar
  24. 24.
    Saridakis, T.: Design patterns for fault containment. In: Proc. of the EuroPLoP Conference, Kloster Irsee, Germany (2003)Google Scholar
  25. 25.
    Spanoudakis, G., Kloukinas, C., Mahbub, K.: The serenity runtime monitoring framework. In: Spanoudakis, G., Kokolakis, S. (eds.) Security and Dependability for Ambient Intelligence, pp. 213–238. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  26. 26.
    Tsai, W., Paul, R., Cao, Z., Yu, L., Saimi, A., Xiao, B.: Verification of Web services using an enhanced UDDI server. In: Proc. of the 8th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2003), Guadalajara, Mexico (January 2003)Google Scholar
  27. 27.
    Walter, M., Schneeweiss, W.: The modeling world of reliabiliy of reliability/safety engineering. LiLoLe Verlag (2005)Google Scholar
  28. 28.
    Walter, M., Trinitis, C.: Automatic generation of state-based dependability models: from availability to safety. In: Proc. of the 20th International Conference Architecture of Computing Systems (ARCS 2007), Zurich, Switzerland (March 2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Ingrid Buckley
    • 1
  • Eduardo B. Fernandez
    • 1
  • Marco Anisetti
    • 2
  • Claudio A. Ardagna
    • 2
  • Masoud Sadjadi
    • 3
  • Ernesto Damiani
    • 2
  1. 1.Department of Electrical Engineering and Computer ScienceFlorida Atlantic UniversityBoca RatonUSA
  2. 2.Dipartimento di Tecnologie dell’InformazioneUniversità degli Studi di MilanoCremaItaly
  3. 3.School of Computing and Information SciencesFlorida International UniversityMiamiUSA

Personalised recommendations