By Topic

Enterprise Distributed Object Computing Conference Workshops, 2009. EDOCW 2009. 13th

Date 1-4 Sept. 2009

Filter Results

Displaying Results 1 - 25 of 55
  • [Title page]

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (151 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): ii
    Save to Project icon | Request Permissions | PDF file iconPDF (66 KB)  
    Freely Available from IEEE
  • Proceedings of the IEEE EDOC 2009 workshops and short papers: Editor's message

    Page(s): iii - iv
    Save to Project icon | Request Permissions | PDF file iconPDF (107 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Table of contents

    Page(s): v - viii
    Save to Project icon | Request Permissions | PDF file iconPDF (124 KB)  
    Freely Available from IEEE
  • Dynamic and declarative business processes

    Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (82 KB) |  | HTML iconHTML  

    This paper gives a brief overview of the international workshop on dynamic and declarative business processes held at the EDOC 2009 conference. The paper discusses the scope and key topics of the workshop, as well as provides high-lights on the program of the the workshop, including, the keynote and papers accepted for presentation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the dynamic composition of complex systems - lessons learned from component-oriented software engineering

    Page(s): 5
    Save to Project icon | Request Permissions | PDF file iconPDF (34 KB)  
    Freely Available from IEEE
  • Dealing with imprecise compliance requirements

    Page(s): 6 - 14
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (184 KB) |  | HTML iconHTML  

    Business process compliance management is a field of study involving the co-ordination of business process management and compliance systems. A compliance system is an organisation wide tool that links legislative and business rules to organization policies and processes. The objective of such a system is to promote a self sustaining level of operations that minimizes the losses caused to the business through breaches of laws or internal misappropriations. We view a compliance system in a similar fashion to that of an accounting system where each process is treated as a transaction. Each process may be monitored and valuations of costing and benefits associated to each task. Both high order policy creation as well as low order transactional histories of single processes must be considered to obtain a complete picture of current operations. In this paper we discuss benefits and shortcomings in some of the currently implemented compliance schemes and present a method for measuring the degree of compliance that each business process may achieve. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Token analysis of graph-oriented process models

    Page(s): 15 - 24
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (504 KB) |  | HTML iconHTML  

    In business process management, graph-based models are used to represent coordination protocols between collaborating partners as well as for service orchestration and composition. At runtime however, current process engines are commonly based on mainly block-structured languages, such as BPEL, that differ structurally and semantically from process graphs. Recent work has accomplished elaborate mappings between both representations. Although most mappings strongly depend on the segmentation of the graph-model into components, the necessary graph-decomposition itself is not described in these works. This paper presents a novel approach based on token analysis to automatically identify components. The technique also allows for optimizations by integrating further steps in the translation of process graphs to executable workflows. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Making processes from best practice frameworks actionable

    Page(s): 25 - 34
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (417 KB) |  | HTML iconHTML  

    Best-practice frameworks provide guidance for organizing work in business. They enable reuse of experience within a domain. However, best practice frameworks are general and usually cover broad domains. Their guidance thus is often offered at an abstract level rather than as details of actionable tasks and processes to accomplish work. This paper presents an approach to bridge the gap between the abstractions available in best practice framework and actions that have to be performed by people or systems in a repeatable manner. We identify knowledge from best practices frameworks, categorize it and represent it in the form of reusable, interpretable templates. Template interpretation guides the refinement process from general concepts of best practices frameworks into actionable concepts such as specific tasks to be performed by assigned roles. A prototype implemented to validate the approach is also described. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GSO: Designing a well-founded service ontology to support dynamic service discovery and composition

    Page(s): 35 - 44
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (189 KB) |  | HTML iconHTML  

    A pragmatic and straightforward approach to semantic service discovery is to match inputs and outputs of user requests with the input and output requirements of registered service descriptions. This approach can be extended by using pre-conditions, effects and semantic annotations (meta-data) in an attempt to increase discovery accuracy. While on one hand these additions help improve discovery accuracy, on the other hand complexity is added as service users need to add more information elements to their service requests. In this paper we present an approach that aims at facilitating the representation of service requests by service users, without loss of accuracy. We introduce a goal-based service framework (GSF) that uses the concept of goal as an abstraction to represent service requests. This paper presents the core concepts and relations of the goal-based service ontology (GSO), which is a fundamental component of the GSF, and discusses how the framework supports semantic service discovery and composition. GSO provides a set of primitives and relations between goals, tasks and services. These primitives allow a user to represent its goals, and a supporting platform to discover or compose services that fulfil them. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Process mining for semantic business process modeling

    Page(s): 45 - 53
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (285 KB) |  | HTML iconHTML  

    Business processes are captured by models that serve as a basis for communication and training purposes, but this modeling is still a time consuming manual job. Semantic annotation of process models in combination with AI planning approaches can contribute to solve this drawback enabling an automatic creation of process models. But the semantic annotated process fragments necessary for starting the planning are often missing at all or not up-to-date anymore. Therefore, this work describes an approach for the semantic annotation and semantic-based planning of process models and introduces Cystid, an integration of Process Mining algorithms and semantic-based planning. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Document Logic: Risk analysis of business processes through document authenticity

    Page(s): 54 - 63
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (472 KB) |  | HTML iconHTML  

    Document Logic is a simple yet powerful framework to infer risks in business processes. We focus on flows of documents and build a set of inference rules based on document authenticity and a simple trust model. We have built a prototype of a system that checks document authenticity in Maude. Maude is an implementation of rewriting logic. Rewriting logic is expressive and general enough to define other specialized logics, like Document Logic. In our framework, a business process is modeled as a transition system. Our prototype takes a business process and an undesired situation as its input and outputs all the possible risks in the business process. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and reconfiguration of critical business processes for the purpose of a Business Continuity Management respecting security, risk and compliance requirements at Credit Suisse using algebraic graph transformation

    Page(s): 64 - 71
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (257 KB) |  | HTML iconHTML  

    Critical business processes can fail. Therefore, continuity processes are needed as backup solutions. At the same time business processes are required to comply with security, risk and compliance requirements. In the context discussed here, they should be modeled in a decentralized, local and declarative way, including methodological support by tools. By discussing a simplified loan granting process in the context of a Business Continuity Management System at Credit Suisse, we show how algebraic graph transformation can contribute a methodologically sound solution being compatible with all these requirements in a coherent way. As a consequence significant benefits of automation and quality can be realized. The presented contribution is theoretically sound and implementable by the people in the field. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introduction to the proceedings of the EDOC 2009 workshop Middleware for Web Services (MWS) 2009

    Page(s): 72 - 73
    Save to Project icon | Request Permissions | PDF file iconPDF (54 KB)  
    Freely Available from IEEE
  • Decentralized data dependency analysis for concurrent process execution

    Page(s): 74 - 83
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (210 KB) |  | HTML iconHTML  

    This paper presents our results with the investigation of decentralized data dependency analysis among concurrently executing processes in a service-oriented environment. Distributed Process Execution Agents (PEXAs) are responsible for controlling the execution of processes that are composed of Web services. PEXAs are also associated with specific distributed sites for the purpose of capturing data changes that occur at those sites in the context of service executions using Delta-Enabled Grid Services. PEXAs then exchange this information with other PEXAs to dynamically discover data dependencies that can be used to enhance recovery activities for concurrent processes that execute with relaxed isolation properties. This paper outlines the functionality of PEXAs, describing the data structures and communication mechanisms that are used to support decentralized construction of distributed process dependency graphs, demonstrating a more dynamic and intelligent approach to identifying how the failure of one process can potentially affect other concurrently executing processes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Database synchronization as a service

    Page(s): 84 - 91
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (118 KB) |  | HTML iconHTML  

    Many distributed applications require the ability to synchronize databases over a network. Using a service oriented architecture, this poses challenges with regard to the way change information is expressed and merged. We propose a solution for a database synchronization service that is transactional, idempotent and reduces merging conflicts to a minimum. The PDStore system enables fine-grained recording of database changes and incremental synchronization, transmitting only as much data as necessary. Data instances are identified with globally unique identifiers, thus avoiding name clashes and reducing merging conflicts. Merging conflicts do not disturb the integrity of the database and can be resolved later. The approach presented in this paper is used in a municipal database system for earthquake safety assessment data of buildings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance modelling power consumption and carbon emissions for Server Virtualization of Service Oriented Architectures (SOAs)

    Page(s): 92 - 99
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1546 KB) |  | HTML iconHTML  

    Server virtualization is driven by the goal of reducing the total number of physical servers in an organisation by consolidating multiple applications on shared servers. Expected benefits include more efficient server utilisation, and a decrease in green house gas emissions. However, service oriented architectures combined with server virtualization may significantly increase risks such as saturation and service level agreement (SLA) violations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web Services-based architecture for RFID applications

    Page(s): 100 - 106
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (139 KB) |  | HTML iconHTML  

    Two crucial elements of cyber-infrastructures of the future are Web Services and Radio Frequency Identification (RFID) tags. Tags are frequently being incorporated in systems that communicate with one another. Among other things, these systems communicate individually with RFID tags that pass through their field of presence as well as share data thus collected with other systems. There is a need to link these elements to develop e-infrastructures that enable an organization to learn and evolve, be agile and flexible, and adapt to the changing requirements of the highly interconnected environment. While providing flexibility and evolvability we argue that the characteristics of information generated through Web Services and RFID tags enable us to provide services that are also stable and available. The stabilization and convergence of standards for the execution of business processes, Web Services, RFID data enable us to design cyber-infrastructures that resemble the supply chain services they support. We propose and illustrate a Web Services based architecture for such applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring safety properties of composite web services at runtime using CSP

    Page(s): 107 - 113
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (416 KB) |  | HTML iconHTML  

    Nowadays, service oriented architecture has been given strong attention as an important approach to integrate heterogeneous systems, in which complex services are created by composing simpler services offered by various systems. The correctness of composition requires techniques to verify if the composite service behaves properly. To this end, in this paper we propose a new method for runtime monitoring of composite services which uses Communicating Sequential Processes (CSP) to specify properties formally. Then, the CSP specification of properties is translated to a Labeled Transition System (LTS). In order to verify the safety of a composite service, we traverse the generated LTS at runtime. Existing methods almost use temporal logic to specify safety properties. There are two advantages in using CSP: 1) similarity of CSP operators and service composition patterns makes CSP straightforward to be used by users. 2) there are some properties which can not be specified by temporal logic, while they can be expressed using CSP. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workshop summary: Advances in quality of service management (AQuSerM) 2009

    Page(s): 114 - 115
    Save to Project icon | Request Permissions | PDF file iconPDF (49 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Flexible and reliable messaging using runtime monitoring

    Page(s): 116 - 125
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (187 KB) |  | HTML iconHTML  

    The asynchronous nature of communications in message-based systems like service-oriented architectures introduces two major issues: inability to detect lost and out-of-sequence messages, and unrealizability of some messaging protocols. We show that these problems are actually different manifestations of the same phenomenon: communicating peers ending up with divergent views of the message exchange in which they are involved. We introduce the concept of monitor-based messenger (MBM), which processes messages locally through a runtime monitor enforcing a specific protocol of interaction, and stamps them with a monitoring token. We demonstrate that: 1) some unrealizable protocols become realizable using MBMs; 2) MBMs offer protection against unreliable messaging, and can decrease delivery time and required queue size compared to strict messaging solutions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward grid workflow scheduling based on resource competition

    Page(s): 126 - 130
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (101 KB) |  | HTML iconHTML  

    Grid has become an infrastructure to support scientific research due to its ability to provide high-performance computing environment. In order to automate scientific process, workflow has been used to orchestrate tasks to be executed in grid environment. Hence, the management of the workflow execution, especially the scheduling of workflow tasks in grid under high resource competition situation, becomes an important issue to improve the quality of service. In this paper, we propose a workflow scheduling algorithm based on resource competition among the tasks in the workflow. Our preliminary result is compared with the existing Min-Min algorithm to demonstrate the advantage of our algorithm in situations where there is a high degree of resource competition in the grid workflow. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterization of Enterprise Architecture quality attributes

    Page(s): 131 - 137
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (352 KB) |  | HTML iconHTML  

    Enterprise Architecture (EA), with its numerous and pervasive models, can support decision making on enterprise-wide issues. To provide such support, EA models should be amenable to analysis of various quality attributes. The prerequisite to providing this is to define and characterize EA quality attributes explicitly. This paper proposes the idea of EA quality attributes and their characterization by using EA quality attribute general scenarios. Also a meta-model is presented for their purpose of definition. Finally, as a sample of EA quality attributes, EA maintainability has been defined and characterized. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Editorial to the Proceedings of mobile technologies in enterprise computing systems workshop (MTECS 2009)

    Page(s): 138 - 139
    Save to Project icon | Request Permissions | PDF file iconPDF (50 KB)  
    Freely Available from IEEE
  • Towards automatic behavior synthesis of a coordinator component for context-aware mobile applications

    Page(s): 140 - 147
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (371 KB) |  | HTML iconHTML  

    Although behavior modeling should play a central role in model-driven application development, it is still unclear how behavior modeling should be incorporated in model transformations. This paper presents an MDA-based approach that incorporates behavior modeling at the platform-independent model (PIM) level of the design process of a specific category of applications, i.e., context-aware mobile applications. This approach includes two model transformations. The first transformation is a refinement of the (external) observable application behavior into a (internal) structured behavior based on a reference architecture. The second transformation is the synthesis of this structured behavior into the behavior of individual architecture components. This paper focuses on the second transformation and targets the behavior of a coordinator component that orchestrates the interactions between all the other components. We propose a state machines-based approach that can be used for synthesizing the coordinator component behavior in order to cope with synchronization and concurrency issues. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.