This demo displays the use of the prototypical ARTEMIS middleware system, which is developed at Nanjing University to support the construction, execution and evolution of applications in the open, dynamic and decentralized network environment of the Internet. To adapt to such a new environment, software application systems must be more flexible, more reactive, and more evolvable than before [1]. Built upon services from autonomous external sources, these application systems also have to explicitly consider the trustworthiness of the services. With these considerations, this version of ARTEMIS middleware is featured by its support for (1) multiple coordination modes based on various software architecture styles; (2) dynamic software architecture-based online reconfigurations, in reaction to the runtime changes in the environment and requirements; (3) trustworthiness evaluation at both the service level and the system level, which helps users to ensure and improve user's satisfaction on the system constructed.
{"title":"ARTEMIS: an open coordination middleware system","authors":"Ping Yu, Chun Cao, Xiaoxing Ma, Jian Lu","doi":"10.1145/1640206.1640226","DOIUrl":"https://doi.org/10.1145/1640206.1640226","url":null,"abstract":"This demo displays the use of the prototypical ARTEMIS middleware system, which is developed at Nanjing University to support the construction, execution and evolution of applications in the open, dynamic and decentralized network environment of the Internet. To adapt to such a new environment, software application systems must be more flexible, more reactive, and more evolvable than before [1]. Built upon services from autonomous external sources, these application systems also have to explicitly consider the trustworthiness of the services. With these considerations, this version of ARTEMIS middleware is featured by its support for (1) multiple coordination modes based on various software architecture styles; (2) dynamic software architecture-based online reconfigurations, in reaction to the runtime changes in the environment and requirements; (3) trustworthiness evaluation at both the service level and the system level, which helps users to ensure and improve user's satisfaction on the system constructed.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":"19 1","pages":"20"},"PeriodicalIF":0.0,"publicationDate":"2009-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85567120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pervasive Computing plays an integral role in our daily life. Due to the mobility and resource limit of devices in pervasive computing environments, the design and implementation of service composition will be a more complex and challenging task. In this paper, an approach based on behavioral modeling and analysis techniques for modeling service composition is proposed. A service behavior model is represented as Concurrent Regular Expressions and then is modeled as a Labelled Transition System by transforming Concurrent Regular Expressions into Finite State Process notation. Verification of the service behavior against specified system properties, (i.e. behavior consistency, safety) is becoming more flexible and effective.
{"title":"Formal verification of service composition in pervasive computing environments","authors":"Junqing Chen, Linpeng Huang","doi":"10.1145/1640206.1640225","DOIUrl":"https://doi.org/10.1145/1640206.1640225","url":null,"abstract":"Pervasive Computing plays an integral role in our daily life. Due to the mobility and resource limit of devices in pervasive computing environments, the design and implementation of service composition will be a more complex and challenging task. In this paper, an approach based on behavioral modeling and analysis techniques for modeling service composition is proposed. A service behavior model is represented as Concurrent Regular Expressions and then is modeled as a Labelled Transition System by transforming Concurrent Regular Expressions into Finite State Process notation. Verification of the service behavior against specified system properties, (i.e. behavior consistency, safety) is becoming more flexible and effective.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":"1 1","pages":"19"},"PeriodicalIF":0.0,"publicationDate":"2009-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90172569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Researches on Internetware have gained daily expanding attentions and interests. Internetware intends to be a framework of Web-based software development. A key issue in this framework is how these Internetware entities aggregate to form a coalition to fulfill the newly occurred requirements. This paper assumes that the Internetware entities distributed in Internet are autonomous and builds a mechanism for the aggregation of autonomous Internetware entities driven by requirements. A function ontology has been constructed for allowing the requirements to be understandable by these Interenetware entities so that these entities can recognize the requirements and realize that they are able to contribute for the realization of the requirements. After that, the requester and the contributors will negotiate to form an effective coalition.
{"title":"Aggregation of autonomous Internetware entities","authors":"Jian Tang, Liwei Zheng, Zhi Jin","doi":"10.1145/1640206.1640224","DOIUrl":"https://doi.org/10.1145/1640206.1640224","url":null,"abstract":"Researches on Internetware have gained daily expanding attentions and interests. Internetware intends to be a framework of Web-based software development. A key issue in this framework is how these Internetware entities aggregate to form a coalition to fulfill the newly occurred requirements. This paper assumes that the Internetware entities distributed in Internet are autonomous and builds a mechanism for the aggregation of autonomous Internetware entities driven by requirements. A function ontology has been constructed for allowing the requirements to be understandable by these Interenetware entities so that these entities can recognize the requirements and realize that they are able to contribute for the realization of the requirements. After that, the requester and the contributors will negotiate to form an effective coalition.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":"26 1","pages":"18"},"PeriodicalIF":0.0,"publicationDate":"2009-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76885557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chunyang Ye, S. Cheung, Jun Wei, Hua Zhong, Tao Huang
In context-ware computing paradigm, context-aware middleware plays a key role. The middleware collects and manipulates contexts from environments, providing context-aware applications well-defined interfaces to adapt their behaviors when environments change. However, some minor difference in the implementation of context-aware middleware may cause the same context-aware application behave differently. Such behavior deviation may lead to serious problems or even disasters for a context-aware application. It is thus desirable to check whether a mobile context-aware application behaves consistently before moving it from one middleware to another, or whether a context-aware application still works correctly when upgrading the underlying middleware? Existing approaches for context-aware applications are not adequate for detecting such behavior deviation because these approaches do not consider the impacts of the difference in the middleware implementation. In this paper, we study the strategies in the implementation of context-aware middleware and their impacts on the behavior of context-aware applications. By exploring the implied scenarios where a context-aware application may behave differently, new testing approach is proposed to detect the behavior deviation of a context-aware application running on different middleware by generating test cases to cover these implied scenarios.
{"title":"A study on the replaceability of context-aware middleware","authors":"Chunyang Ye, S. Cheung, Jun Wei, Hua Zhong, Tao Huang","doi":"10.1145/1640206.1640210","DOIUrl":"https://doi.org/10.1145/1640206.1640210","url":null,"abstract":"In context-ware computing paradigm, context-aware middleware plays a key role. The middleware collects and manipulates contexts from environments, providing context-aware applications well-defined interfaces to adapt their behaviors when environments change. However, some minor difference in the implementation of context-aware middleware may cause the same context-aware application behave differently. Such behavior deviation may lead to serious problems or even disasters for a context-aware application. It is thus desirable to check whether a mobile context-aware application behaves consistently before moving it from one middleware to another, or whether a context-aware application still works correctly when upgrading the underlying middleware? Existing approaches for context-aware applications are not adequate for detecting such behavior deviation because these approaches do not consider the impacts of the difference in the middleware implementation. In this paper, we study the strategies in the implementation of context-aware middleware and their impacts on the behavior of context-aware applications. By exploring the implied scenarios where a context-aware application may behave differently, new testing approach is proposed to detect the behavior deviation of a context-aware application running on different middleware by generating test cases to cover these implied scenarios.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":"90 1","pages":"4"},"PeriodicalIF":0.0,"publicationDate":"2009-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76335454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Internetwares [1] are a new type of software oriented to Internet. How to guarantee the QoS (Quality of Service) of Internetwares in highly open Internet is a challenge problem. This problem is especially important for e-commerce applications, because the users of e-commerce business are sensitive to QoS, such as the accessibility and responsiveness, and consequently the QoS of e-commerce applications are vital to their successes. Therefore, it is critical to evaluate and optimize the QoS of an e-commerce site by benchmarks off-line.
{"title":"Bench4Q: a QoS-oriented e-commerce benchmark for Internetwares","authors":"Wenbo Zhang, Wei Wang, Zhi-quan Duan","doi":"10.1145/1640206.1640229","DOIUrl":"https://doi.org/10.1145/1640206.1640229","url":null,"abstract":"Internetwares [1] are a new type of software oriented to Internet. How to guarantee the QoS (Quality of Service) of Internetwares in highly open Internet is a challenge problem. This problem is especially important for e-commerce applications, because the users of e-commerce business are sensitive to QoS, such as the accessibility and responsiveness, and consequently the QoS of e-commerce applications are vital to their successes. Therefore, it is critical to evaluate and optimize the QoS of an e-commerce site by benchmarks off-line.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":"70 1","pages":"23"},"PeriodicalIF":0.0,"publicationDate":"2009-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73458239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
By looking over the performance benchmarks, we found that test systems are becoming more and more complex [1]. It is expensive for academe to implement every benchmark systems from scratch, as well as the customized benchmarks, to measure particular system under test (SUT). We propose a configurable benchmark test management framework, which gives a structure intended to serve as a support or guide for the building of testbed benchmark systems that expands the reference architecture into something useful in internetware components benchmark and real system performance evaluation.
{"title":"A configurable benchmark test management framework","authors":"Naiqiao Du, Xiaojun Ye, Jianmin Wang","doi":"10.1145/1640206.1640231","DOIUrl":"https://doi.org/10.1145/1640206.1640231","url":null,"abstract":"By looking over the performance benchmarks, we found that test systems are becoming more and more complex [1]. It is expensive for academe to implement every benchmark systems from scratch, as well as the customized benchmarks, to measure particular system under test (SUT). We propose a configurable benchmark test management framework, which gives a structure intended to serve as a support or guide for the building of testbed benchmark systems that expands the reference architecture into something useful in internetware components benchmark and real system performance evaluation.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":"19 1","pages":"25"},"PeriodicalIF":0.0,"publicationDate":"2009-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85281315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Internetware is envisioned as a new software paradigm for resource integration and sharing in the open, dynamic and autonomous network environment. In this paper we discuss our visions and explorations of this new paradigm, with focus placed on the methodological perspective. A set of enabling techniques on flexible coordination of autonomous services, automatic adaptation to changing environment and trust management-based assurance of dependability are proposed to help the development of Internetware applications.
{"title":"Internetware: a shift of software paradigm","authors":"Jian Lü, Xiaoxing Ma, Yu Huang, Chun Cao, Feng Xu","doi":"10.1145/1640206.1640213","DOIUrl":"https://doi.org/10.1145/1640206.1640213","url":null,"abstract":"Internetware is envisioned as a new software paradigm for resource integration and sharing in the open, dynamic and autonomous network environment. In this paper we discuss our visions and explorations of this new paradigm, with focus placed on the methodological perspective. A set of enabling techniques on flexible coordination of autonomous services, automatic adaptation to changing environment and trust management-based assurance of dependability are proposed to help the development of Internetware applications.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":"33 1","pages":"7"},"PeriodicalIF":0.0,"publicationDate":"2009-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91172706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Service-oriented computing is a promising approach to software system construction by selecting and composing autonomous services under the open, dynamic and non-deterministic Internet environment. Appropriate selection of high quality services used in from numerous candidates declaring similar functionalities is crucial to the overall quality of the composed system. As authority centers are not generally available in open environments, reputation-based mechanisms must be adopted to evaluate services. With more and more reputation systems proposed in the literature, there is an increasing need to evaluate and compare them objectively and systematically with a common controlled experiment of trust network environment. In this paper we propose a general simulation framework based on dynamic trust network for this purpose. Especially, the framework is capable to simulate the dynamic evolutions of the trust network, in addition to the static snapshots of the trust relationships. With this framework, some case studies are made to evaluate the effectiveness of several representative reputation mechanisms, and some interesting characters are revealed.
{"title":"A dynamic trust network based simulation framework for reputation-based service selection","authors":"Jing Pan, Feng Xu, Yuan Yao, Jian Lü","doi":"10.1145/1640206.1640220","DOIUrl":"https://doi.org/10.1145/1640206.1640220","url":null,"abstract":"Service-oriented computing is a promising approach to software system construction by selecting and composing autonomous services under the open, dynamic and non-deterministic Internet environment. Appropriate selection of high quality services used in from numerous candidates declaring similar functionalities is crucial to the overall quality of the composed system. As authority centers are not generally available in open environments, reputation-based mechanisms must be adopted to evaluate services. With more and more reputation systems proposed in the literature, there is an increasing need to evaluate and compare them objectively and systematically with a common controlled experiment of trust network environment. In this paper we propose a general simulation framework based on dynamic trust network for this purpose. Especially, the framework is capable to simulate the dynamic evolutions of the trust network, in addition to the static snapshots of the trust relationships. With this framework, some case studies are made to evaluate the effectiveness of several representative reputation mechanisms, and some interesting characters are revealed.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":"30 1","pages":"14"},"PeriodicalIF":0.0,"publicationDate":"2009-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85907079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kun You, Zhuzhong Qian, Bin Tang, Sanglu Lu, Daoxu Chen
Service composition is a useful technique to assemble light, independent services to meet the complicated and dynamic requirements. Previous research has addressed the quality-of-service (QoS) aware composition path selection problem. However, as the requests growing, the selected service composition path may violate the QoS requirements. In this case, more service replicas should be deployed on suitable nodes to improve the QoS. But which service component should be selected and where these service replicas should be deployed is a challenge. In this paper, we make a deep study on this service replication problem. We give a detailed description of service replication triggering time. And then, we propose LDCS (Longest Delay Service Component Selection) to select the bottle-neck service component by evaluating the real-time performance of all these components. Finally, we employ MACP (Maximum Available Capacity Path) algorithm to select a suitable node to deploy this service replica. Simulation results approve that our approach is effective and efficient.
服务组合是一种有用的技术,用于组装轻量级、独立的服务,以满足复杂和动态的需求。以往的研究已经解决了服务质量(QoS)感知的组合路径选择问题。然而,随着请求的增长,所选择的服务组合路径可能会违反QoS要求。在这种情况下,应该在合适的节点上部署更多的服务副本,以提高QoS。但是应该选择哪个服务组件以及应该在哪里部署这些服务副本是一个挑战。本文对该服务复制问题进行了深入的研究。详细描述了服务复制触发时间。然后,我们提出了LDCS(最长延迟服务组件选择),通过评估所有组件的实时性能来选择瓶颈服务组件。最后,我们采用MACP (Maximum Available Capacity Path)算法选择合适的节点来部署该服务副本。仿真结果证明了该方法的有效性和高效性。
{"title":"QoS-aware service replication","authors":"Kun You, Zhuzhong Qian, Bin Tang, Sanglu Lu, Daoxu Chen","doi":"10.1145/1640206.1640214","DOIUrl":"https://doi.org/10.1145/1640206.1640214","url":null,"abstract":"Service composition is a useful technique to assemble light, independent services to meet the complicated and dynamic requirements. Previous research has addressed the quality-of-service (QoS) aware composition path selection problem. However, as the requests growing, the selected service composition path may violate the QoS requirements. In this case, more service replicas should be deployed on suitable nodes to improve the QoS. But which service component should be selected and where these service replicas should be deployed is a challenge. In this paper, we make a deep study on this service replication problem. We give a detailed description of service replication triggering time. And then, we propose LDCS (<u>L</u>ongest <u>D</u>elay Service <u>C</u>omponent <u>S</u>election) to select the bottle-neck service component by evaluating the real-time performance of all these components. Finally, we employ MACP (<u>M</u>aximum <u>A</u>vailable <u>C</u>apacity <u>P</u>ath) algorithm to select a suitable node to deploy this service replica. Simulation results approve that our approach is effective and efficient.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":"129 1","pages":"8"},"PeriodicalIF":0.0,"publicationDate":"2009-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76544724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As the quick development and application of technology such as Web Service, software or programs with special feature exist as public services in internet. They are queried and assembled under specific requirement. Being a passive control technique for data security, access control should have the ability to work synergistically across different organizations to prevent unauthorized access to special data, while these services or organizations share same role hierarchy and resource hierarchy, there may be conflicts on the overall security policies. XACML can be used to describe security policies by these public services, as it is a standardized expressive language for access control policies. Whereas Description Logics has the capability of representing knowledge and reasoning, a method that maps XACML policies to Description Logics Knowledge Base was proposed, and then the conflict detection problem is transformed into a problem of consistency in ABox.
{"title":"A DL-based method for access control policy conflict detecting","authors":"Feng Huang, Zhiqiu Huang, Linyuan Liu","doi":"10.1145/1640206.1640222","DOIUrl":"https://doi.org/10.1145/1640206.1640222","url":null,"abstract":"As the quick development and application of technology such as Web Service, software or programs with special feature exist as public services in internet. They are queried and assembled under specific requirement. Being a passive control technique for data security, access control should have the ability to work synergistically across different organizations to prevent unauthorized access to special data, while these services or organizations share same role hierarchy and resource hierarchy, there may be conflicts on the overall security policies. XACML can be used to describe security policies by these public services, as it is a standardized expressive language for access control policies. Whereas Description Logics has the capability of representing knowledge and reasoning, a method that maps XACML policies to Description Logics Knowledge Base was proposed, and then the conflict detection problem is transformed into a problem of consistency in ABox.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":"3 1","pages":"16"},"PeriodicalIF":0.0,"publicationDate":"2009-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79052564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}