Advertisement

A Graph Grammar Approach to Behavior Verification of Web Services

  • Chunying Zhao
  • Kang Zhang
Chapter

Abstract

Recently, service-oriented architecture (SOA) gains great interest in the software engineering community. SOA allows enterprise applications to be built on loosely-coupled existing services, which are autonomous and platform independent. The ad-hoc property of service-oriented systems challenges the verification and validation of an application’s behavior due to the dynamic composition of Web services. This chapter reviews current verification and validation approaches to the composition of Web services, and analyzes techniques for conventional behavior checking that can be migrated to service-oriented systems. It then presents a visual language approach to behavior verification for composite Web services aiming at quality assurance.

Keywords

Service Composition Composite Service Graph Grammar Call Graph Service Behavior 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Reference

  1. [1]
    W.M. van der Aalst, M. Dumas, C. Ouyang, A. Rozinat, and E. Verbeek, “Conformance Checking of Service Behavior”, ACM Transactions on Internet Technology, Vol. 8, No. 3, Article 13, 2008, pp. 13:1-13:30.Google Scholar
  2. [2]
    K. Ates, J.P. Kukluk, L.B. Holder, D.J. Cook, K. Zhang, “Graph Grammar Induction on Structural Data for Visual Programming”, Proc. 18th IEEE International Conference on Tools with Artificial Intelligence(ICTAI/06), Washington D.C. USA, 13-15 November 2006, pp. 232-242.Google Scholar
  3. [3]
    A. Charfi and M. Mezini, “Aspect-Oriented Web Service Composition with AO4BPEL”,Proc. 2 nd IEEE Europe Conference on Web Services(ECOWS’04), Erfurt, Germany, 27-30 September 2004, pp. 168-182.Google Scholar
  4. [4]
    A. Charfi and M. Mezini, “Using Aspects for Security Engineering of Web Services Compositions”, Proc. 2005 IEEE International Conference on Web Services (ICWS’05), Orlando, Florida, USA, 11-15 July 2005, pp. 59-66.Google Scholar
  5. [5]
    W. De Pauw, M. Lei, E. Pring, L. Villard, M. Arnold, and J.F. Morar, “Web Service Navigator: Visualizing the Execution of Web Services”, IBM System Journal, Vol. 44, No. 4, 2005, pp. 821-845.CrossRefGoogle Scholar
  6. [6]
    A. Ferrara, “Web Service: A Process Algebra Approach”,Proc. 2 nd International Conference on Service Oriented Computing (ICSOC’04), New York City, NY, USA, 15-18 November 2004, pp. 242-251.Google Scholar
  7. [7]
    H. Foster, S. Uchitel, J. Magee, and J. Kramer, “Model-based Verification of Web Service Composition”, Proc. 18th IEEE International Conference on Automated Software Engineering (ASE’03), Montreal, Canada, 6-10 October 2003, pp. 152-163.Google Scholar
  8. [8]
    R. Heckel and L. Mariani, “Automatic Conformance Testing of Web Services”, Proc. 8 th International Conference on Fundamental Approaches to Software Engineering (FASE’05), Edinburgh, Scotland, 2-10 April 2005, pp. 34-48.Google Scholar
  9. [9]
    J. Kong, K. Zhang, and X. Q. Zeng, “Spatial Graph Grammars for Graphical User Interfaces”, ACM Transactions on Computer-Human Interaction, Vol.13, No.2, 2006, pp. 268-307.CrossRefGoogle Scholar
  10. [10]
    M. Koshkina and F. van Breugel, “Modeling and Verification of Web Service Orchestration by Means of the Concurrent Workbench”, ACM SIGSOFT Software Engineering Note, Vol. 29, No. 5, 2004, pp. 1-10.CrossRefGoogle Scholar
  11. [11]
    Z. Liu, A. Ranganathan, and A. Riabov, “Modeling Web Services Using Semantic Graph Transformation to Aid Automatic Composition”, Proc. 2007 IEEE International Conference on Web Services (ICWS’07), Salt Lake City, Utah, USA, 9-13 July 2007, pp. 78-85.Google Scholar
  12. [12]
    K. Mahbub and G. Spanoudakis, “Run-time Monitoring of Requirements for System Composed of Web-Services: Initial Implementation and Evaluation Experience”, Proc. 2005 IEEE International Conference on Web Services (ICWS’05), Orlando, Florida, USA, 11-15 July 2005, pp. 257-265.Google Scholar
  13. [13]
    A. Martens, “Analysis and Re-Engineering of Web Services”, Enterprise Information System VI, Springer Press, 2006, pp. 169-176.Google Scholar
  14. [14]
    S. Nakajima, “Verification of Web Service Flows with Model-Checking Techniques”, Proc. 1st International Symposium on Cyber World: Theories and Practice, Tokyo, Japan, 6-8 November 2002, pp. 378-385.Google Scholar
  15. [15]
    K. Ono, Y. Nakamura, and T. Tateishi, “Verifying the Consistency of Security Policies by Abstracting into Security Types”, Proc. 2007 IEEE International Conference on Web Services (ICWS’07), Salt Lake City, Utah, USA, 9-13 July 2007, pp. 497-504.Google Scholar
  16. [16]
    M.P. Papazoqlou, P. Traverso, S. Dustdar, and F. Leymann, “Service-Oriented Computing: State of the Art and Research Challenges”, IEEE Computer, Vol. 40, No.11, 2007, pp. 38-45.Google Scholar
  17. [17]
    C.K. Patrick, C.K. Fung, “Web Services Security and Privacy”, Proc. of 2007 IEEE International Conference on Web Services (ICWS’07), Salt Lake City, Utah, USA, 9-13 July 2007, pp. xxxii-xxxiii.Google Scholar
  18. [18]
    M. Rouached and C. Godart, “Requirement-Driven Verification of WSBPEL Process”, Proc. 2007 IEEE International Conference on Web Services (ICWS’07), Salt Lake City, Utah, USA, 9-13 July 2007, pp. 354-363.Google Scholar
  19. [19]
    M. Rouached, W. Gaaloul, W.M.P. van der Aalst, S. Bhiri, and C. Godart, “Web Service Mining and Verification of Properties: An Approach Based on Event Calculus”, Proc. 2006 International Conference on Cooperative Information Systems (CoopIS’06), LNCS 4275 Springer, Montpellier, France, October 29 -November 3, 2006, pp. 408-425.Google Scholar
  20. [20]
    A. Rozinat and W.M. P. van der Aalst, “Conformance Checking of Process based on Monitoring Real Behavior”, Information Systems, Vol. 22, No. 1, 2008, pp. 64-95.CrossRefGoogle Scholar
  21. [21]
    M. Srivatsa, A. Iyengar, T. Mikalsen, I. Rouvellow, and J. Yin, “An Access Control System for Web Service Compositions”, Proc. 2007 IEEE International Conference on Web Services (ICWS’07), Salt Lake City, Utah, USA, 9-13 July 2007, pp. 1-8.Google Scholar
  22. [22]
    V. Terziyan and O. Komonenko, “Semantic Web Enabled Web Services: State-Of-Art and Industrial Challenges”, Proc. 1 st IEEE Europe Conference on Web Services (ECOWS’04), LNCS 2853, Erfurt, Germany, September 23-24, 2003, pp. 183-197.Google Scholar
  23. [23]
    C. Zhao and K. Zhang, “A Grammar-Based Reverse Engineering Framework for Behavior Verification”, Accepted in Proc. of 11 th IEEE High Assurance Systems Engineering Symposium (HASE’08), Nanjing, China, 3-5 December 2008.Google Scholar
  24. [24]
  25. [25]
  26. [26]

Copyright information

© Springer-Verlag US 2009

Authors and Affiliations

  • Chunying Zhao
    • 1
  • Kang Zhang
    • 1
  1. 1.Department of Computer ScienceThe University of Texas at Dallas

Personalised recommendations