Changbao Li, B. Cheng, Junliang Chen, Pingli Gu, Na Deng, Desheng Li
Web service evaluation is one of the key problems in web service discovery and selection research fields. In this paper, we propose an approach to evaluate the web service performance. Different from traditional evaluation methods, our approach is based on users experience, and we apply the idea and result in common webs evaluation fields to help construct our evaluation system. We import the Alexa ranking to help evaluate the information providing performance of web services, we import the idea of Page Rank to help designing our evaluation method for the function sharing performance of web services.
{"title":"A Web Service Performance Evaluation Approach Based on Users Experience","authors":"Changbao Li, B. Cheng, Junliang Chen, Pingli Gu, Na Deng, Desheng Li","doi":"10.1109/ICWS.2011.29","DOIUrl":"https://doi.org/10.1109/ICWS.2011.29","url":null,"abstract":"Web service evaluation is one of the key problems in web service discovery and selection research fields. In this paper, we propose an approach to evaluate the web service performance. Different from traditional evaluation methods, our approach is based on users experience, and we apply the idea and result in common webs evaluation fields to help construct our evaluation system. We import the Alexa ranking to help evaluate the information providing performance of web services, we import the idea of Page Rank to help designing our evaluation method for the function sharing performance of web services.","PeriodicalId":118512,"journal":{"name":"2011 IEEE International Conference on Web Services","volume":"620 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131436010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Configuration management is a complex task, even for experienced system administrators, which makes self-managing systems a desirable solution. Self-management implies the need for a model based on which configuration changes may be decided. In previous work, we described a method for constructing a state-transition model of application behavior, by observing the application in simulation. This method relied on an expert to manage the (simulated) application in order to collect the necessary observations for constructing the model. However, that method was agnostic about (a) the size of the system space space as implied by the granularity of the observations, and (b) the sufficiency of the actual observations collected for understanding the application in a variety of configurations and environments. In this paper, we replace the (expensive) expert domain knowledge with automatic approaches to ensuring coverage of the application, and demonstrate the superiority of this approach. We present empirical data regarding state space and granularity to explore the use of state models for understanding applications.
{"title":"Automated State-Space Exploration for Configuration Management of Service-Oriented Applications","authors":"Michael Smit, Eleni Stroulia","doi":"10.1109/ICWS.2011.34","DOIUrl":"https://doi.org/10.1109/ICWS.2011.34","url":null,"abstract":"Configuration management is a complex task, even for experienced system administrators, which makes self-managing systems a desirable solution. Self-management implies the need for a model based on which configuration changes may be decided. In previous work, we described a method for constructing a state-transition model of application behavior, by observing the application in simulation. This method relied on an expert to manage the (simulated) application in order to collect the necessary observations for constructing the model. However, that method was agnostic about (a) the size of the system space space as implied by the granularity of the observations, and (b) the sufficiency of the actual observations collected for understanding the application in a variety of configurations and environments. In this paper, we replace the (expensive) expert domain knowledge with automatic approaches to ensuring coverage of the application, and demonstrate the superiority of this approach. We present empirical data regarding state space and granularity to explore the use of state models for understanding applications.","PeriodicalId":118512,"journal":{"name":"2011 IEEE International Conference on Web Services","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131598237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The support for non-functional concerns (NFC) is essential for the success and adoption of web services. However, state of the art works offer only a limited support for these concerns especially when it comes to the composition of multiple non-functional concerns with composite web services. In this paper, we focus on the composition of non-functional actions (NFA) with composite web services whose composition logic is made explicit using languages such as BPMN2 or WS-BPEL (gray box view). In contrast to the black box view where only the interface of the service is visible the gray box view reveals additional information on control flow, data flow, composed services, etc. NFAs can also be composite and constitute complex processes such as secure conversations or transactions which have to be integrated with composite web services. Additionally, the execution order of multiple superimposing NFA has to be declared. In our approach we introduce a model-driven approach for the integrated specification and realization of the different types of NFC composition (NFAs with composite services, execution order of superimposing NFAs and composite NFAs) as well as a set of editors and code generators supporting this approach.
{"title":"Composing Non-functional Concerns in Composite Web Services","authors":"Benjamin Schmeling, A. Charfi, M. Mezini","doi":"10.1109/ICWS.2011.111","DOIUrl":"https://doi.org/10.1109/ICWS.2011.111","url":null,"abstract":"The support for non-functional concerns (NFC) is essential for the success and adoption of web services. However, state of the art works offer only a limited support for these concerns especially when it comes to the composition of multiple non-functional concerns with composite web services. In this paper, we focus on the composition of non-functional actions (NFA) with composite web services whose composition logic is made explicit using languages such as BPMN2 or WS-BPEL (gray box view). In contrast to the black box view where only the interface of the service is visible the gray box view reveals additional information on control flow, data flow, composed services, etc. NFAs can also be composite and constitute complex processes such as secure conversations or transactions which have to be integrated with composite web services. Additionally, the execution order of multiple superimposing NFA has to be declared. In our approach we introduce a model-driven approach for the integrated specification and realization of the different types of NFC composition (NFAs with composite services, execution order of superimposing NFAs and composite NFAs) as well as a set of editors and code generators supporting this approach.","PeriodicalId":118512,"journal":{"name":"2011 IEEE International Conference on Web Services","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134027926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In service selection, an end user often has his or her personal preferences imposing on a candidate service's non-functional properties. For a service selection process promoted by a group of users, candidate services are often evaluated by a group of end users who may have different preferences or priorities. In this situation, it is often a challenging effort to make a tradeoff among various preferences or priorities of the users. In view of this challenge, a multi-criteria decision-making method, named AHP (Analytic Hierarchy Process), is introduced to transform both qualitative personal preferences and users' priorities into numeric weights. Furthermore, a QoS-aware service evaluation method is presented for a shared service's co-selection taking advantage of AHP theory. At last, a case study is presented to demonstrate the feasibility of the method.
{"title":"A QoS-Aware Service Evaluation Method for Co-selecting a Shared Service","authors":"Wanchun Dou, Chao Lv, Xuyun Zhang, Jinjun Chen","doi":"10.1109/ICWS.2011.11","DOIUrl":"https://doi.org/10.1109/ICWS.2011.11","url":null,"abstract":"In service selection, an end user often has his or her personal preferences imposing on a candidate service's non-functional properties. For a service selection process promoted by a group of users, candidate services are often evaluated by a group of end users who may have different preferences or priorities. In this situation, it is often a challenging effort to make a tradeoff among various preferences or priorities of the users. In view of this challenge, a multi-criteria decision-making method, named AHP (Analytic Hierarchy Process), is introduced to transform both qualitative personal preferences and users' priorities into numeric weights. Furthermore, a QoS-aware service evaluation method is presented for a shared service's co-selection taking advantage of AHP theory. At last, a case study is presented to demonstrate the feasibility of the method.","PeriodicalId":118512,"journal":{"name":"2011 IEEE International Conference on Web Services","volume":"34 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132118394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The performance of a service's QoS may evolve relatively frequently with its internal changes or the changes of dynamic Internet environment, especially when some"intentional" deceptions are taken into consideration. Therefore, the service providers could not always deliver their services according to their "promised" quality. In view of this challenge, a history record-based service optimization method, named Hire Some, is investigated in this paper. This method aims at enhancing the credibility of service composition plan, taking advantage of a web service's QoShistory records, rather than using the tentative QoS values advertised by the service provider. At last, a case study and an experiment is presented for validating the method.
{"title":"A History Record-Based Service Optimization Method for QoS-Aware Service Composition","authors":"Wenmin Lin, Wanchun Dou, Xiangfeng Luo, Jinjun Chen","doi":"10.1109/ICWS.2011.17","DOIUrl":"https://doi.org/10.1109/ICWS.2011.17","url":null,"abstract":"The performance of a service's QoS may evolve relatively frequently with its internal changes or the changes of dynamic Internet environment, especially when some\"intentional\" deceptions are taken into consideration. Therefore, the service providers could not always deliver their services according to their \"promised\" quality. In view of this challenge, a history record-based service optimization method, named Hire Some, is investigated in this paper. This method aims at enhancing the credibility of service composition plan, taking advantage of a web service's QoShistory records, rather than using the tentative QoS values advertised by the service provider. At last, a case study and an experiment is presented for validating the method.","PeriodicalId":118512,"journal":{"name":"2011 IEEE International Conference on Web Services","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133061353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Identity federation denotes a concept for the controlled sharing of user authentication and user attributes between independent trust domains. Using WS-Federation, service providers and identity providers can set up a Circle of Trust, a so called federation, in which each member is willing to trust on assertions made by another partner. However, if a member has to rely on information received from a foreign source, the need for assurance that the information is correct is a natural requirement prior to using it. Identity assurance frameworks exist that can be used to assess the trustworthiness of identity providers. The result of this assessment is a level of trust, that can be assigned to an identity provider. However, existing approaches for evaluating identity assurance do not allow to define trust levels for individual attributes. In our trust model, we consider both: (a) trust in an identity provider as the issuer of assertions and (b) trust in single attributes that an identity provider manages. In this paper, we show how our approach that we implemented in a logic-based framework can be used in web service scenarios to provide trust information on the level of identity attributes, especially about the verification process, and to match trust requirements of attributes during request processing.
{"title":"An Attribute Assurance Framework to Define and Match Trust in Identity Attributes","authors":"Ivonne Thomas, C. Meinel","doi":"10.1109/ICWS.2011.80","DOIUrl":"https://doi.org/10.1109/ICWS.2011.80","url":null,"abstract":"Identity federation denotes a concept for the controlled sharing of user authentication and user attributes between independent trust domains. Using WS-Federation, service providers and identity providers can set up a Circle of Trust, a so called federation, in which each member is willing to trust on assertions made by another partner. However, if a member has to rely on information received from a foreign source, the need for assurance that the information is correct is a natural requirement prior to using it. Identity assurance frameworks exist that can be used to assess the trustworthiness of identity providers. The result of this assessment is a level of trust, that can be assigned to an identity provider. However, existing approaches for evaluating identity assurance do not allow to define trust levels for individual attributes. In our trust model, we consider both: (a) trust in an identity provider as the issuer of assertions and (b) trust in single attributes that an identity provider manages. In this paper, we show how our approach that we implemented in a logic-based framework can be used in web service scenarios to provide trust information on the level of identity attributes, especially about the verification process, and to match trust requirements of attributes during request processing.","PeriodicalId":118512,"journal":{"name":"2011 IEEE International Conference on Web Services","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116875914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Automatic Service Composition (ASC) provides a new value-added service from existing services by user's request dynamically and automatically. User's requests consist of functional and nonfunctional requirements. During service composition, services that fulfill the functional requirements are located at the discovery stage. Abstract nonfunctional requirements should be identified mainly before the selection stage for service execution. Our research was motivated by the identification of abstract nonfunctional properties (NFPs) for a seamless ASC and proposes transformation from the abstract NFPs to intermediate-level NFPs based on the model of three levels of abstractness of NFPs. To solve the vagueness of the abstractness, we adapt approaches based not only on ontology but also on term similarity. The transformation between the intermediate and the concrete levels is carried out by a deterministic algorithm based on mapping of domain ontology. To evaluate the effectiveness of term similarity metrics for nonterminal terms, vector-based and large corpus-based approaches were investigated. The transformation performance based on precision over our test data set and ontology was evaluated.
自动服务组合(Automatic Service Composition, ASC)是根据用户的请求动态、自动地从已有的服务中提供新的增值服务。用户请求由功能需求和非功能需求组成。在服务组合期间,满足功能需求的服务位于发现阶段。抽象的非功能需求应该主要在服务执行的选择阶段之前确定。本研究的动机是识别无缝ASC的抽象非功能属性(NFPs),并提出基于NFPs的三个抽象级别模型从抽象NFPs到中级NFPs的转换。为了解决抽象性的模糊性,我们采用了既基于本体又基于术语相似度的方法。中间层与具体层之间的转换采用基于领域本体映射的确定性算法实现。为了评估术语相似度度量对非终结术语的有效性,研究了基于向量和基于大型语料库的方法。对基于测试数据集和本体精度的转换性能进行了评估。
{"title":"Identification of Semistructured Abstract Nonfunctional Properties for Automatic Service Composition","authors":"Incheon Paik, Wuhui Chen, R. Komiya","doi":"10.1109/ICWS.2011.63","DOIUrl":"https://doi.org/10.1109/ICWS.2011.63","url":null,"abstract":"Automatic Service Composition (ASC) provides a new value-added service from existing services by user's request dynamically and automatically. User's requests consist of functional and nonfunctional requirements. During service composition, services that fulfill the functional requirements are located at the discovery stage. Abstract nonfunctional requirements should be identified mainly before the selection stage for service execution. Our research was motivated by the identification of abstract nonfunctional properties (NFPs) for a seamless ASC and proposes transformation from the abstract NFPs to intermediate-level NFPs based on the model of three levels of abstractness of NFPs. To solve the vagueness of the abstractness, we adapt approaches based not only on ontology but also on term similarity. The transformation between the intermediate and the concrete levels is carried out by a deterministic algorithm based on mapping of domain ontology. To evaluate the effectiveness of term similarity metrics for nonterminal terms, vector-based and large corpus-based approaches were investigated. The transformation performance based on precision over our test data set and ontology was evaluated.","PeriodicalId":118512,"journal":{"name":"2011 IEEE International Conference on Web Services","volume":"298 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123192621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a prediction model for software services availability measured by the mean-time-to-repair (MTTR) and mean-time-to-failure (MTTF) of a service. The prediction model is based on the experimental identification of probabilistic prediction for variables that affect MTTR/MTTF, based on monitoring service data collected at runtime.
{"title":"Predicting Software Service Availability: Towards a Runtime Monitoring Approach","authors":"Davide Lorenzoli, G. Spanoudakis","doi":"10.1109/ICWS.2011.77","DOIUrl":"https://doi.org/10.1109/ICWS.2011.77","url":null,"abstract":"This paper presents a prediction model for software services availability measured by the mean-time-to-repair (MTTR) and mean-time-to-failure (MTTF) of a service. The prediction model is based on the experimental identification of probabilistic prediction for variables that affect MTTR/MTTF, based on monitoring service data collected at runtime.","PeriodicalId":118512,"journal":{"name":"2011 IEEE International Conference on Web Services","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123314970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents an event based functionality integration framework to approach the issue of service personalization and service mashups. In contrast to existing data integration approaches, the proposed framework addresses the mashup issue from a new perspective by extracting and reasoning the context through user generated event, while recommending and aggregating the contextual services dynamically in response to the user's functional requirements. An event hierarchy is proposed to retrieve contextual information and analyze underlying functionalities. The three layer system framework, service recommendation logic, and the functionality integration are also presented.
{"title":"An Event-Based Functionality Integration Framework","authors":"Zhenzhen Zhao, S. Bhattarai, N. Crespi","doi":"10.1109/ICWS.2011.121","DOIUrl":"https://doi.org/10.1109/ICWS.2011.121","url":null,"abstract":"This paper presents an event based functionality integration framework to approach the issue of service personalization and service mashups. In contrast to existing data integration approaches, the proposed framework addresses the mashup issue from a new perspective by extracting and reasoning the context through user generated event, while recommending and aggregating the contextual services dynamically in response to the user's functional requirements. An event hierarchy is proposed to retrieve contextual information and analyze underlying functionalities. The three layer system framework, service recommendation logic, and the functionality integration are also presented.","PeriodicalId":118512,"journal":{"name":"2011 IEEE International Conference on Web Services","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124890810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jinhui Yao, Shiping Chen, Chen Wang, D. Levy, J. Zic
In recent years, we witnessed a range of innovations in the ¡®service' related technologies, such as Software as a Service, Platform as a Service and Infrastructure as a Service. Along with the Service Oriented Architecture, companies can wrap their technological product as a service, to collaborate with others. Facing the ever-escalating global competition, such collaboration is crucial. The viability of this paradigm highly depends on the compliance and therefore the trustworthiness of all collaborators. However, it is challenging to achieve trustworthiness in such a dynamic cross-domain environment, as each participator may deceit for individual benefits. As a solution, we have proposed to enforce strong accountability to enhance the trustworthiness. With this accountability, incompliance can always be determined in a provable and undeniable way. In this paper, we extend our work by proposing a novel modeling of the collaborative business process. Based on this modeling, we thoroughly analyze the evidence and proving procedure needed for different types of compliance, and evaluate the extent to which those compliance can be indeed proved. We have implemented a demonstrative system to show its effectiveness in real practice.
{"title":"Modelling Collaborative Services for Business and QoS Compliance","authors":"Jinhui Yao, Shiping Chen, Chen Wang, D. Levy, J. Zic","doi":"10.1109/ICWS.2011.44","DOIUrl":"https://doi.org/10.1109/ICWS.2011.44","url":null,"abstract":"In recent years, we witnessed a range of innovations in the ¡®service' related technologies, such as Software as a Service, Platform as a Service and Infrastructure as a Service. Along with the Service Oriented Architecture, companies can wrap their technological product as a service, to collaborate with others. Facing the ever-escalating global competition, such collaboration is crucial. The viability of this paradigm highly depends on the compliance and therefore the trustworthiness of all collaborators. However, it is challenging to achieve trustworthiness in such a dynamic cross-domain environment, as each participator may deceit for individual benefits. As a solution, we have proposed to enforce strong accountability to enhance the trustworthiness. With this accountability, incompliance can always be determined in a provable and undeniable way. In this paper, we extend our work by proposing a novel modeling of the collaborative business process. Based on this modeling, we thoroughly analyze the evidence and proving procedure needed for different types of compliance, and evaluate the extent to which those compliance can be indeed proved. We have implemented a demonstrative system to show its effectiveness in real practice.","PeriodicalId":118512,"journal":{"name":"2011 IEEE International Conference on Web Services","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123471033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}