Shopping Cart | Login | Register | Language: English

A Reengineering Approach for Ensuring Transactional Reliability of Composite Services

Copyright © 2010. 27 pages.
OnDemand Chapter PDF Download
Download link provided immediately after order completion
$30.00
List Price: $37.50
Current Promotions:
20% Online Bookstore Discount*
Available. Instant access upon order completion.
DOI: 10.4018/978-1-61520-684-1.ch013
Sample PDFCite

MLA

Bhiri, Sami, Walid Gaaloul and Claude Godart. "A Reengineering Approach for Ensuring Transactional Reliability of Composite Services." Web Services Research for Emerging Applications: Discoveries and Trends. IGI Global, 2010. 290-316. Web. 25 Oct. 2014. doi:10.4018/978-1-61520-684-1.ch013

APA

Bhiri, S., Gaaloul, W., & Godart, C. (2010). A Reengineering Approach for Ensuring Transactional Reliability of Composite Services. In L. Zhang (Ed.), Web Services Research for Emerging Applications: Discoveries and Trends (pp. 290-316). Hershey, PA: Information Science Reference. doi:10.4018/978-1-61520-684-1.ch013

Chicago

Bhiri, Sami, Walid Gaaloul and Claude Godart. "A Reengineering Approach for Ensuring Transactional Reliability of Composite Services." In Web Services Research for Emerging Applications: Discoveries and Trends, ed. Liang-Jie Zhang, 290-316 (2010), accessed October 25, 2014. doi:10.4018/978-1-61520-684-1.ch013

Export Reference

Mendeley
Favorite
A Reengineering Approach for Ensuring Transactional Reliability of Composite Services
Access on Platform
Browse by Subject
Top

Abstract

Different from traditional software applications, Web services are defined independently from any execution context. Their consequent inherent autonomy and heterogeneity fostered by a continuous evolution in business context and requirements make ensuring the execution of a composite service as intended a challenging task. This chapter presents a reengineering approach to ensure transactional reliability of composite services. Contrary to previous approaches which check correctness properties based on the composition model, the authors start from executions’ log to improve services’ recovery mechanisms. Basically, the chapter proposes a set of mining techniques to discover the transactional behavior from an event based log. Then, based on this mining step, the authors use a set of rules in order to improve services’ reliability.
Chapter Preview

Introduction

Nowadays, enterprises are able to outsource their internal business processes as services and make them accessible via the Web. Then, they can dynamically combine individual services to provide new added-value composite services (CS for short). Due to the inherent autonomy and heterogeneity of Web services, a fundamental problem concerns the guarantee of correct executions of a CS. An execution is correct if it reaches its objectives or fails (properly) according to the designers requirements.

Motivating example Let us consider an application for Online Travel Arrangement (OTA for short) carried out by a composite service as illustrated in Figure 1. The customer specifies its requirements in terms of destination and hotel through the CRS service. The application launches in parallel flight and hotel reservation (FR and HR respectively) (after a study of the local transport accommodations

Figure 1.

A composite Web service for Online Travel Arrangement (OTA for short)

(LTA)). The ADC service disposes administrative documents. Then, the customer is requested to pay by credit card (PCC), by check (PCh), or by TIP (PTIP). The Send Documents (SD) service ensures the delivery of documents to the customer. To deal with exceptions, designers specify additional mechanisms for failure handling and recovery. First, they specify that the hotel reservation can be compensated (by cancellation for instance) when the service FR fails to book a flight, and reciprocally. Second, in order to ensure the payment they specify that the service PCh is a payment alternative to the service PCC. Similarly, they specify that the service PTIP is a payment alternative to the service PCh with the assumption that the service PTIP always succeeds. Finally, designers specify that CRS, LTA, ADC and SD services are sure to complete. The main problem at this stage is how to ensure that the specified composition model guaranties reliable executions.

Generally, previous approaches develop based on their modeling formalisms a set of techniques to analyze the composition model and check “correctness” properties. Although powerful, these approaches may fail in some cases to ensure reliable executions even if they validate the composition model formally. This is because properties specified in the studied composition model remains assumptions that may not coincide with reality.

Back to our example, let us suppose for instance that in reality (by observation of sufficient execution cases) FR and PCh services never fail and the service PTIP is not sure to complete. That means, among others, (i) there is no need for the service HR to support compensation policies (which can be costly), and (ii) the payment can fail while the hotel and flight reservations are maintained. Formal approaches cannot deal with such anomalies.

Mining the effective transactional behavior enables to detect these gaps and thereafter improve the application reliability. For instance, mining the transactional behavior enables to improve the OTA service composition model by specifying the service PCh as a payment alternative to the service PTIP (since we notice that PCh is sure to complete).

Overview of our approach As explained in section 2, we distinguish between the control flow and the transactional flow of a composite service. The former specifies a partial ordering between the executions of component services. The latter defines the recovery mechanisms. In this paper we present an approach to improve CS recovery mechanisms based on the analysis of their execution history. Figure 2 gives an overview of the main steps of our approach:

Figure 2.

Overview of our approach

Top

Complete Chapter List

Search this Book: Reset
Table of Contents
Chapter 1
Liang-Jie Zhang, Jia Zhang
SOA Reference Architecture (SOA-RA) aims to provide a normative guidance for software engineers to design and develop enterprise-level Service... Sample PDF
SOA Reference Architecture
$30.00
List Price: $37.50
Chapter 2
M. Comerio, F. De Paoli, S. Grega, A. Maurino, Carlo Batini
Web services are increasingly used as an effective means to create and streamline processes and collaborations among governments, businesses, and... Sample PDF
WSMoD: A Methodology for Qos-Based Web Services Design
$30.00
List Price: $37.50
Chapter 3
W. K. Chan, S. C. Cheung, Karl R.P.H. Leung
Testing the correctness of service integration is a step toward assurance of the quality of applications. These applications however may bind... Sample PDF
A Metamorphic Testing Methodology for Online SOA Application Testing
$30.00
List Price: $37.50
Chapter 4
Tony C. Shan, Winnie W. Hua
This chapter describes a service-oriented framework for integrated design of eBanking architecture (IDEA) in the financial services industry. A... Sample PDF
Integrated Design of eBanking Architecture
$30.00
List Price: $37.50
Chapter 5
Joonsoo Bae, Ling Liu, James Caverlee, Liang-Jie Zhang, Hyerim Bae
Business processes continue to play an important role in today’s service-oriented enterprise computing systems. Mining, discovering, and integrating... Sample PDF
A Similarity Measure for Process Mining in Service Oriented Architecture
$30.00
List Price: $37.50
Chapter 6
S.S. Yau, S. Mukhopadhyay, H. Davulcu, D. Huang, R. Bharadwaj, K. Shenai
Service-based systems have many applications, such as collaborative research and development, e-business, health care, military applications and... Sample PDF
Rapid Development of Adaptable Situation-Aware Service-based Systems
$30.00
List Price: $37.50
Chapter 7
Krzysztof Ostrowski, Ken Birman, Danny Dolev
Existing web service notification and eventing standards are useful in many applications, but they have serious limitations that make them... Sample PDF
Object-Oriented Architecture for Web Services Eventing
$30.00
List Price: $37.50
Chapter 8
Frederic Montagut, Refik Molva, Silvan Tecumseh Golega
Composite applications leveraging the functionalities offered by Web services are today the underpinnings of enterprise computing. However, current... Sample PDF
Composing and Coordinating Transactional Web Services
$30.00
List Price: $37.50
Chapter 9
George Yee, Larry Korba
The growth of the Internet has been accompanied by the growth of Internet services (e.g., e-commerce, e-health). This proliferation of services and... Sample PDF
Security Personalization for Internet and Web Services
$30.00
List Price: $37.50
Chapter 10
Jaakko Kangasharju, Tancred Lindholm, Sasu Tarkoma
In the wireless world, there has recently been much interest in alternate serialization formats for XML data, mostly driven by the weak capabilities... Sample PDF
XML Security with Binary XML for Mobile Web Services
$30.00
List Price: $37.50
Chapter 11
Christian Werner, Carsten Buschmann, Ylva Brandt, Stefan Fischer
Compared to other middleware approaches like CORBA or Java RMI the protocol overhead of SOAP is very high. This fact is not only disadvantageous for... Sample PDF
Efficient and Effective XML Encoding
$30.00
List Price: $37.50
Chapter 12
Richi Nayak
The business needs, the availability of huge volumes of data and the continuous evolution in Web services functions derive the need of application... Sample PDF
Data Mining in Web Services Discovery and Monitoring
$30.00
List Price: $37.50
Chapter 13
Sami Bhiri, Walid Gaaloul, Claude Godart
Different from traditional software applications, Web services are defined independently from any execution context. Their consequent inherent... Sample PDF
A Reengineering Approach for Ensuring Transactional Reliability of Composite Services
$30.00
List Price: $37.50
Chapter 14
Yogesh L. Simmhan, Beth Plale, Dennis Gannon
The increasing ability for the sciences to sense the world around us is resulting in a growing need for datadriven e-Science applications that are... Sample PDF
Karma2: Provenance Management for Data-Driven Workflows
$30.00
List Price: $37.50
Chapter 15
Yanzhen Zou, Lu Zhang, Yan Li, Bing Xie, Hong Mei
Web services retrieval is a critical step for reusing existing services in the SOA paradigm. In the UDDI registry, traditional category-based... Sample PDF
Result Refinement in Web Services Retrieval Based on Multiple Instances Learning
$30.00
List Price: $37.50
Chapter 16
Hiroshi Wada, Junichi Suzuki, Katsuya Oba
Service oriented architecture (SOA) is an emerging style of software architectures to reuse and integrate existing systems for designing new... Sample PDF
A Model-Driven Development Framework for Non-Functional Aspects in Service Oriented Architecture
$30.00
List Price: $37.50
Chapter 17
Aphrodite Tsalgatidou, George Athanasopoulos, Michael Pantazoglou
Service-oriented computing (SOC) has been marked as the technology trend that caters for interoperability among the components of a distributed... Sample PDF
Interoperability Among Heterogeneous Services: The Case of Integration of P2P Services with Web Services
$30.00
List Price: $37.50
Chapter 18
Masahide Nakamura, Hiroshi Igaki, Akihiro Tanaka, Haruaki Tamada, Ken-ichi Matsumoto
This chapter presents a practical framework that adapts the conventional home electric appliances with the infrared remote controls (legacy... Sample PDF
Service-Oriented Architecture for Migrating Legacy Home Appliances to Home Network System: Principle and Applications
$30.00
List Price: $37.50
Chapter 19
Paolo Falcarin, Claudio Venezia, José Felipe Mejia Bernal
Meshing up telecommunication and IT resources seems to be the real challenge for supporting the evolution towards the next generation of Web... Sample PDF
Broadening JAIN-SLEE with a Service Description Language and Asynchronous Web Services
$30.00
List Price: $37.50
Chapter 20
Antoon Goderis, Peter Li, Carole Goble
Much has been written on the promise of Web service discovery and (semi-) automated composition. In this discussion, the value to practitioners of... Sample PDF
Workflow Discovery: Requirements from E-Science and a Graph-Based Solution
$30.00
List Price: $37.50
Chapter 21
Federica Paci, Elisa Bertino, Jason Crampton
Business processes –the next generation workflows- have attracted considerable research interest in the last fifteen years. More recently, several... Sample PDF
An Access Control Framework for WS-BPEL processes
$30.00
List Price: $37.50
Chapter 22
Jorge Cardoso
Organizations are increasingly faced with the challenge of managing business processes, workflows, and recently, Web processes. One important aspect... Sample PDF
Business Process Control-Flow Complexity: Metric, Evaluation, and Validation
$30.00
List Price: $37.50
Chapter 23
Chun Ouyang, Marlon Dumas, Arthur H.M. ter Hofstede, Wil M.P. van der Aalst
The business process modeling notation (BPMN) is a graph-oriented language primarily targeted at domain analysts and supported by many modeling... Sample PDF
Pattern-Based Translation of BPMN Process Models to BPEL Web Services
$30.00
List Price: $37.50
Chapter 24
Qinyi Wu, Calton Pu, Akhil Sahai, Roger Barga
Correct synchronization among activities is critical in a business process. Current process languages such as BPEL specify the control flow of... Sample PDF
DSCWeaver: Synchronization-Constraint Aspect Extension to Procedural Process Specification Languages
$30.00
List Price: $37.50
Chapter 25
Wenbing Zhao, Firat Kart, L. E. Moser, P. M. Melliar-Smith
This chapter describes a novel reservation-based extended transaction protocol for coordination of tasks within a business activity. With the... Sample PDF
A Reservation-Based Extended Transaction Protocol for Coordination of Web Services within Business Activities
$30.00
List Price: $37.50