Á. J. Varela-Vaca, R. M. Gasca, D. Borrego, S. Pozo
{"title":"Towards Dependable Business Processes with Fault-Tolerance Approach","authors":"Á. J. Varela-Vaca, R. M. Gasca, D. Borrego, S. Pozo","doi":"10.1109/DEPEND.2010.24","DOIUrl":"https://doi.org/10.1109/DEPEND.2010.24","url":null,"abstract":"The management and automation of business processes have become an essential tasks within IT organizations. Companies could deploy business process management systems to automatize their business processes. BPMS needs to ensure that those are as dependable as possible. Fault tolerance techniques provide mechanisms to decrease the risk of possible faults in systems. In this paper, a framework for developing business processes with fault tolerance capabilities is provided. The framework presents different solutions in the fault tolerance scope. The solutions have been developed using a practical example and some results have been obtained, compared and discussed.","PeriodicalId":447746,"journal":{"name":"2010 Third International Conference on Dependability","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122434528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Trust-Based Web Service Provision Approaches","authors":"N. Dragoni","doi":"10.1109/DEPEND.2010.21","DOIUrl":"https://doi.org/10.1109/DEPEND.2010.21","url":null,"abstract":"The basic tenet of Service-Oriented Computing (SOC) is the possibility of building distributed applications on the Web by using Web Services as fundamental building blocks. The proliferation of such services is considered the second wave of evolution in the Internet age, moving the Web from a collection of pages to a collections of services. Consensus is growing that this Web Service “revolution” won’t eventuate until we resolve trust-related issues. Indeed, the intrinsic openness of the SOC vision makes crucial to locate useful services and recognize them as trustworthy. In this paper we review the field of trust-based Web Service selection, providing a structured classification of current approaches and highlighting the main limitations of each class and of the overall field. As a result, we claim that a soft notion of trust lies behind such weaknesses and we advocate the need of a new approach based on a stronger (semantics-based) notion of trust.","PeriodicalId":447746,"journal":{"name":"2010 Third International Conference on Dependability","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129971464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yanxiang Gao, Bin Zhang, S. Shi, Hong-ning Zhu, Jun Na, Fu-cai Zhou
{"title":"A User Requirement-Driven Service Dynamic Personalized QoS Model","authors":"Yanxiang Gao, Bin Zhang, S. Shi, Hong-ning Zhu, Jun Na, Fu-cai Zhou","doi":"10.1109/DEPEND.2010.11","DOIUrl":"https://doi.org/10.1109/DEPEND.2010.11","url":null,"abstract":"In Web Services composition, effectively appraising of QoS of Web Services is a main method of service selecting. Most of current QoS models do not consider the uncertainty, subjectivity, interacting and business relativity of the non-functional attributes of services. And they lack of the deep and thorough analysis of user requirements. Thus they are not able to provide sufficient support to service personalization, and they are lack of dynamic adaptability of constraints. By efficiently considering the impact on QoS model of the non-functional attributes of Web Services, this paper generates a personalized QoS model of a single service, and a dynamic personalized QoS appraise model, based on service effectiveness. The user requirement-driven service dynamic personalized QoS model proposed by this paper provides exquisite and appropriate appraise for the QoS of the whole composition flow. The analysis of the scenario shows that the method proposed in this paper is able to appraise Web Services more accurately and effectively.","PeriodicalId":447746,"journal":{"name":"2010 Third International Conference on Dependability","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129257356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jun Na, Yanxiang Gao, Bin Zhang, Liping Huang, Zhiliang Zhu
{"title":"Improved Adaptation of Web Service Composition Based on Change Impact Probability","authors":"Jun Na, Yanxiang Gao, Bin Zhang, Liping Huang, Zhiliang Zhu","doi":"10.1109/DEPEND.2010.30","DOIUrl":"https://doi.org/10.1109/DEPEND.2010.30","url":null,"abstract":"Due to the dynamic nature of environment in service computing, it becomes more important to make the Web service composition able to self-adapt to changes in its environment. Achieving this goal is a challenging task, as the performance of a composite Web service will be decreased if the adaptation happens frequently in runtime. In this paper, we improve adaptation of Web service composition by predicting the probability that a change will actual affect the running composite service, which is named change impact probability (CIP), and provide a methodology based on a comprehensive QoS model of a QoS change and an execution state model of an executing composite service for computing the CIP. To bring the proposed approach to fruition, we develop a prototype system and apply the approach to a loan rate query service for illustration.","PeriodicalId":447746,"journal":{"name":"2010 Third International Conference on Dependability","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121309609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Vulnerability Ontology for Information Risk Assessment and Dependability Management","authors":"M. Aime, Fabio Guasconi","doi":"10.1109/DEPEND.2010.22","DOIUrl":"https://doi.org/10.1109/DEPEND.2010.22","url":null,"abstract":"Security vulnerabilities play an increasing role within dependability procedures for information systems. However, traditional vulnerability models present several general shortcomings when matched with today requirements. To overcome these limits, we propose a vulnerability ontology based on three main enhancements: deeper integration with system asset ontology, better modelling of cause-effect relationships, and deeper integration with dependability control ontology.","PeriodicalId":447746,"journal":{"name":"2010 Third International Conference on Dependability","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133245706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performability Comparison of Schedulability Conditions in Real-Time Embedded Systems","authors":"M. Bashiri, S. Miremadi","doi":"10.1109/DEPEND.2010.19","DOIUrl":"https://doi.org/10.1109/DEPEND.2010.19","url":null,"abstract":"In modern safety-critical real-time embedded systems, performance and reliability are two most important parameters. The joint consideration of these two parameters is called performability. This paper evaluates and compares different schedulability conditions, which are used for scheduling tasks with fault-tolerant Rate-Monotonic (RM) algorithm, with respect to their performability. The task re-execution scheme is used to implement fault tolerance in the RM scheduling algorithm. To evaluate the schedulability conditions, a software tool is developed to simulate an embedded processor with m schedulable periodic tasks. The results show that among five different schedulability conditions used in this evaluation, the best schedulability condition has on average 3.5% higher performability than the time the other conditions are used. Also, the simulation results show that the next best schedulability condition can on average increase the performability of the embedded processor 2.5% more than the other conditions.","PeriodicalId":447746,"journal":{"name":"2010 Third International Conference on Dependability","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133771458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Computational Approach to Multi-level Analysis of Network Resilience","authors":"C. Doerr, Javier Martín Hernández","doi":"10.1109/DEPEND.2010.27","DOIUrl":"https://doi.org/10.1109/DEPEND.2010.27","url":null,"abstract":"As communication and network technology has advanced into all areas of human life, large-scale failures of such infrastructures can have a drastic impact on its users, the economy and society in general. Significant attention has been paid to study and improve the dependability of such systems, intending to augment their resilience against challenges. This paper presents a computational approach for a multi-level multi-dimensional study of network robustness, providing hard performance guarantees for networks and helping to assess risk and uncertainty associated with threats. We demonstrate in a case study that such approach is well suited to understood the root causes and subsequent effects of network challenges and therefore obtain deeper insights into the resilience of a network under stress.","PeriodicalId":447746,"journal":{"name":"2010 Third International Conference on Dependability","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126914489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}