Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Software Engineering

Series

2014

Service Composition

Articles 1 - 3 of 3

Full-Text Articles in Physical Sciences and Mathematics

Automated Runtime Recovery For Qos-Based Service Composition, Tian Huat Tan, Manman Chen, Étienne André, Jun Sun, Yang Liu, Jin Song Dong Nov 2014

Automated Runtime Recovery For Qos-Based Service Composition, Tian Huat Tan, Manman Chen, Étienne André, Jun Sun, Yang Liu, Jin Song Dong

Research Collection School Of Computing and Information Systems

Service composition uses existing service-based applications as components to achieve a business goal. The composite service operates in a highly dynamic environment; hence, it can fail at any time due to the failure of component services. Service composition languages such as BPEL provide a compensation mechanism to rollback the error. But such a compensation mechanism has several issues. For instance, it cannot guarantee the functional properties of the composite service after compensation. In this work, we propose an automated approach based on a genetic algorithm to calculate the recovery plan that could guarantee the satisfaction of functional properties of the …


Event Analytics, Jin Song Dong, Jun Sun, Yang Liu, Yuan-Fang Li Sep 2014

Event Analytics, Jin Song Dong, Jun Sun, Yang Liu, Yuan-Fang Li

Research Collection School Of Computing and Information Systems

The process analysis toolkit (PAT) integrates the expressiveness of state, event, time, and probability-based languages with the power of model checking. PAT is a self-contained reasoning system for system specification, simulation, and verification. PAT currently supports a wide range of 12 different expressive modeling languages with many application domains and has attracted thousands of registered users from hundreds of organizations. In this invited talk, we will present the PAT system and its vision on “Event Analytics” (EA) which is beyond “Data Analytics”. The EA research is based on applying model checking to event planning, scheduling, prediction, strategy analysis and decision …


Tauth: Verifying Timed Security Protocols, Li Li, Jun Sun, Yang Liu, Jin Song Dong May 2014

Tauth: Verifying Timed Security Protocols, Li Li, Jun Sun, Yang Liu, Jin Song Dong

Research Collection School Of Computing and Information Systems

Quantitative timing is often relevant to the security of systems, like web applications, cyber-physical systems, etc. Verifying timed security protocols is however challenging as both arbitrary attacking behaviors and quantitative timing may lead to undecidability. In this work, we develop a service framework to support intuitive modeling of the timed protocol, as well as automatic verification with an unbounded number of sessions. The partial soundness and completeness of our verification algorithms are formally defined and proved. We implement our method into a tool called TAuth and the experiment results show that our approach is efficient and effective in both finding …