Skip to main content

Soft Constraints for Dependable Service Oriented Architectures

  • Chapter
Architecting Dependable Systems VI

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 5835))

  • 374 Accesses

Abstract

We propose the use of Soft Constraints as a natural way to model Service Oriented Architecture. In the framework, constraints are used to model components and connectors and constraint aggregation is used to represent their interactions. Moreover, a specific constraint projection operator is used to highlight the service interface. The quality of a service is measured and considered when performing queries to service providers. In particular, we are here interested to aspect of dependability, that is to the trustworthiness of a computing system on the service it delivers. In our framework, the dependability score is represented by the softness level of the constraint and the measure of complex (web) services is computed by combining the levels of the components. The framework takes also in account the interaction of software agents representing distributed services, by using a constraint based concurrent language able to also decide the collaboration taking care of the required dependability score.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Avizienis, A., Laprie, J.-C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 1(1), 11–33 (2004)

    Article  Google Scholar 

  2. Bhoj, P., Singhal, S., Chutani, S.: SLA management in federated environments. Comput. Networks 35(1), 5–24 (2001)

    Article  Google Scholar 

  3. Bistarelli, S., Foley, S.N.: A constraint framework for the qualitative analysis of dependability goals: Integrity. In: Anderson, S., Felici, M., Littlewood, B. (eds.) SAFECOMP 2003. LNCS, vol. 2788, pp. 130–143. Springer, Heidelberg (2003)

    Google Scholar 

  4. Bistarelli, S., Gabbrielli, M., Meo, M.C., Santini, F.: Timed soft concurrent constraint programs. In: Lea, D., Zavattaro, G. (eds.) COORDINATION 2008. LNCS, vol. 5052, pp. 50–66. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  5. Bistarelli, S., Gadducci, F.: Enhancing constraints manipulation in semiring-based formalisms. In: European Conference on Artificial Intelligence (ECAI), August 2006, pp. 63–67 (2006)

    Google Scholar 

  6. Bistarelli, S., Montanari, U., Rossi, F.: Semiring-based constraint satisfaction and optimization. J. ACM 44(2), 201–236 (1997)

    Article  MATH  MathSciNet  Google Scholar 

  7. Bistarelli, S., Montanari, U., Rossi, F.: Soft concurrent constraint programming. ACM Trans. Comput. Logic 7(3), 563–589 (2006)

    Article  MathSciNet  Google Scholar 

  8. Bistarelli, S., Montanari, U., Rossi, F.: Semiring-based Constraint Solving and Optimization. Journal of the ACM 44(2), 201–236 (1997)

    Article  MATH  MathSciNet  Google Scholar 

  9. Bistarelli, S., Rossi, F.: Semiring-based soft constraints. In: Degano, P., De Nicola, R., Meseguer, J. (eds.) Concurrency, Graphs and Models. LNCS, vol. 5065, pp. 155–173. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  10. Bistarelli, S., Santini, F.: Propagating multitrust within trust networks. In: SAC 2008: Proceedings of the 2008 ACM symposium on Applied computing, pp. 1990–1994. ACM, New York (2008)

    Chapter  Google Scholar 

  11. Bistarelli, S., Santini, F.: A nonmonotonic soft concurrent constraint language for sla negotiation. Electr. Notes Theor. Comput. Sci. 236, 147–162 (2009)

    Article  Google Scholar 

  12. Bistarelli, S.: Semirings for Soft Constraint Solving and Programming. In: Bistarelli, S. (ed.) Semirings for Soft Constraint Solving and Programming. LNCS, vol. 2962. Springer, Heidelberg (2004)

    Google Scholar 

  13. Bradbury, J.S., Cordy, J.R., Dingel, J., Wermelinger, M.: A survey of self-management in dynamic software architecture specifications. In: WOSS 2004: Proceedings of the 1st ACM SIGSOFT workshop on Self-managed systems, pp. 28–33. ACM, New York (2004)

    Chapter  Google Scholar 

  14. Breban, S., Vassileva, J.: A coalition formation mechanism based on inter-agent trust relationships. In: AAMAS 2002: Proceedings of the first international joint conference on Autonomous agents and multiagent systems, pp. 306–307. ACM, New York (2002)

    Chapter  Google Scholar 

  15. de Boer, F.S., Kok, J.N., Palamidessi, C., Rutten, J.J.M.M.: Non-monotonic concurrent constraint programming. In: ILPS, pp. 315–334 (1993)

    Google Scholar 

  16. Foley, S.N.: Evaluating system integrity. In: NSPW 1998: Proceedings of the 1998 workshop on New security paradigms, pp. 40–47. ACM, New York (1998)

    Chapter  Google Scholar 

  17. Foley, S.N.: A non-functional approach to system integrity. IEEE Journal on Selected Areas in Commications (2003) (forthcoming)

    Google Scholar 

  18. Gacek, C., de Lemos, R.: Architectural description of dependable software systems. In: Besnard, D., Gacek, C., Jones, C. (eds.) Structure for Dependability: Computer-Based Systems from an Interdisciplinary Perspective, January 2006, pp. 127–142. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  19. Garlan, D., Cheng, S.-W., Kompanek, A.J.: Reconciling the needs of architectural description with object-modeling notations. Sci. Comput. Program. 44(1), 23–49 (2002)

    Article  MATH  Google Scholar 

  20. Griffiths, N., Luck, M.: Coalition formation through motivation and trust. In: AAMAS 2003: Proceedings of the second international joint conference on Autonomous agents and multiagent systems, pp. 17–24. ACM, New York (2003)

    Chapter  Google Scholar 

  21. IFIP. IFIP WG 10.4 on dependable computing and fault tolerance. Technical report, International Federation For Information Processing (1998)

    Google Scholar 

  22. Lan, B.C.W., Chung, J.-Y., Yang, S.J.H.: Extending trust computing with service oriented architecture. Information Assurance and Computer Security 6, 69–83 (2006)

    Google Scholar 

  23. Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618–644 (2007)

    Article  Google Scholar 

  24. Keller, A., Ludwig, H.: The WSLA framework: Specifying and monitoring service level agreements for web services. J. Netw. Syst. Manage. 11(1), 57–81 (2003)

    Article  Google Scholar 

  25. Lazovik, A., Aiello, M., Gennari, R.: Encoding requests to web service compositions as constraints. In: van Beek, P. (ed.) CP 2005. LNCS, vol. 3709, pp. 782–786. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  26. Lee, K., Lee, W., Jeon, J., Jeong, S.-H., Park, S.W.: Qos for web services: Requirements and possible approaches. W3C Note (2003), http://www.w3c.or.kr/kr-office/TR/2003/ws-qos/

  27. Lerman, K., Shehory, O.: Coalition formation for large-scale electronic markets. In: ICMAS, pp. 167–174. IEEE Computer Society, Los Alamitos (2000)

    Google Scholar 

  28. Papazoglou, M.P.: Service -oriented computing: Concepts, characteristics and directions. In: International Conference on Web Information Systems Engineering, p.3 (2003)

    Google Scholar 

  29. Papazoglou, M.P., Georgakopoulos, D.: Service-oriented computing. Commun. ACM 46(10) (2003)

    Google Scholar 

  30. Peltz, C.: Web services orchestration and choreography. Computer 36(10), 46–52 (2003)

    Article  Google Scholar 

  31. Rossi, F., van Beek, P., Walsh, T.: Handbook of Constraint Programming (Foundations of Artificial Intelligence). Elsevier Science Inc., New York (2006)

    Google Scholar 

  32. Rugina, A.-E., Kanoun, K., Kaâniche, M.: A system dependability modeling framework using aadl and gspns. In: de Lemos, R., Gacek, C., Romanovsky, A. (eds.) Architecting Dependable Systems IV. LNCS, vol. 4615, pp. 14–38. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  33. Schulte, C.: Programming Constraint Services. LNCS (LNAI), vol. 2302. Springer, Heidelberg (2002)

    MATH  Google Scholar 

  34. Serhani, M.A., Dssouli, R., Hafid, A., Sahraoui, H.: A qos broker based architecture for efficient web services selection. In: ICWS 2005: Proceedings of the IEEE International Conference on Web Services, Washington, DC, USA, pp. 113–120. IEEE Computer Society, Los Alamitos (2005)

    Google Scholar 

  35. Theodorakopoulos, G., Baras, J.S.: Trust evaluation in ad-hoc networks. In: WiSe 2004: Proceedings of the 3rd ACM workshop on Wireless security, pp. 1–10. ACM, New York (2004)

    Chapter  Google Scholar 

  36. Yu, T., Lin, K.-J.: A broker-based framework for qos-aware web service composition. In: EEE 2005: Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE 2005) on e-Technology, e-Commerce and e-Service, Washington, DC, USA, pp. 22–29. IEEE Computer Society, Los Alamitos (2005)

    Google Scholar 

  37. Zarras, A., Vassiliadis, P., Issarny, V.: Model-driven dependability analysis of webservices. In: Meersman, R., Tari, Z. (eds.) OTM 2004. LNCS, vol. 3291, pp. 1608–1625. Springer, Heidelberg (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Bistarelli, S., Santini, F. (2009). Soft Constraints for Dependable Service Oriented Architectures. In: de Lemos, R., Fabre, JC., Gacek, C., Gadducci, F., ter Beek, M. (eds) Architecting Dependable Systems VI. Lecture Notes in Computer Science, vol 5835. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10248-6_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10248-6_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10247-9

  • Online ISBN: 978-3-642-10248-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics