Abstract
We propose the use of Soft Constraints as a natural way to model Service Oriented Architecture. In the framework, constraints are used to model components and connectors and constraint aggregation is used to represent their interactions. Moreover, a specific constraint projection operator is used to highlight the service interface. The quality of a service is measured and considered when performing queries to service providers. In particular, we are here interested to aspect of dependability, that is to the trustworthiness of a computing system on the service it delivers. In our framework, the dependability score is represented by the softness level of the constraint and the measure of complex (web) services is computed by combining the levels of the components. The framework takes also in account the interaction of software agents representing distributed services, by using a constraint based concurrent language able to also decide the collaboration taking care of the required dependability score.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Avizienis, A., Laprie, J.-C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 1(1), 11–33 (2004)
Bhoj, P., Singhal, S., Chutani, S.: SLA management in federated environments. Comput. Networks 35(1), 5–24 (2001)
Bistarelli, S., Foley, S.N.: A constraint framework for the qualitative analysis of dependability goals: Integrity. In: Anderson, S., Felici, M., Littlewood, B. (eds.) SAFECOMP 2003. LNCS, vol. 2788, pp. 130–143. Springer, Heidelberg (2003)
Bistarelli, S., Gabbrielli, M., Meo, M.C., Santini, F.: Timed soft concurrent constraint programs. In: Lea, D., Zavattaro, G. (eds.) COORDINATION 2008. LNCS, vol. 5052, pp. 50–66. Springer, Heidelberg (2008)
Bistarelli, S., Gadducci, F.: Enhancing constraints manipulation in semiring-based formalisms. In: European Conference on Artificial Intelligence (ECAI), August 2006, pp. 63–67 (2006)
Bistarelli, S., Montanari, U., Rossi, F.: Semiring-based constraint satisfaction and optimization. J. ACM 44(2), 201–236 (1997)
Bistarelli, S., Montanari, U., Rossi, F.: Soft concurrent constraint programming. ACM Trans. Comput. Logic 7(3), 563–589 (2006)
Bistarelli, S., Montanari, U., Rossi, F.: Semiring-based Constraint Solving and Optimization. Journal of the ACM 44(2), 201–236 (1997)
Bistarelli, S., Rossi, F.: Semiring-based soft constraints. In: Degano, P., De Nicola, R., Meseguer, J. (eds.) Concurrency, Graphs and Models. LNCS, vol. 5065, pp. 155–173. Springer, Heidelberg (2008)
Bistarelli, S., Santini, F.: Propagating multitrust within trust networks. In: SAC 2008: Proceedings of the 2008 ACM symposium on Applied computing, pp. 1990–1994. ACM, New York (2008)
Bistarelli, S., Santini, F.: A nonmonotonic soft concurrent constraint language for sla negotiation. Electr. Notes Theor. Comput. Sci. 236, 147–162 (2009)
Bistarelli, S.: Semirings for Soft Constraint Solving and Programming. In: Bistarelli, S. (ed.) Semirings for Soft Constraint Solving and Programming. LNCS, vol. 2962. Springer, Heidelberg (2004)
Bradbury, J.S., Cordy, J.R., Dingel, J., Wermelinger, M.: A survey of self-management in dynamic software architecture specifications. In: WOSS 2004: Proceedings of the 1st ACM SIGSOFT workshop on Self-managed systems, pp. 28–33. ACM, New York (2004)
Breban, S., Vassileva, J.: A coalition formation mechanism based on inter-agent trust relationships. In: AAMAS 2002: Proceedings of the first international joint conference on Autonomous agents and multiagent systems, pp. 306–307. ACM, New York (2002)
de Boer, F.S., Kok, J.N., Palamidessi, C., Rutten, J.J.M.M.: Non-monotonic concurrent constraint programming. In: ILPS, pp. 315–334 (1993)
Foley, S.N.: Evaluating system integrity. In: NSPW 1998: Proceedings of the 1998 workshop on New security paradigms, pp. 40–47. ACM, New York (1998)
Foley, S.N.: A non-functional approach to system integrity. IEEE Journal on Selected Areas in Commications (2003) (forthcoming)
Gacek, C., de Lemos, R.: Architectural description of dependable software systems. In: Besnard, D., Gacek, C., Jones, C. (eds.) Structure for Dependability: Computer-Based Systems from an Interdisciplinary Perspective, January 2006, pp. 127–142. Springer, Heidelberg (2006)
Garlan, D., Cheng, S.-W., Kompanek, A.J.: Reconciling the needs of architectural description with object-modeling notations. Sci. Comput. Program. 44(1), 23–49 (2002)
Griffiths, N., Luck, M.: Coalition formation through motivation and trust. In: AAMAS 2003: Proceedings of the second international joint conference on Autonomous agents and multiagent systems, pp. 17–24. ACM, New York (2003)
IFIP. IFIP WG 10.4 on dependable computing and fault tolerance. Technical report, International Federation For Information Processing (1998)
Lan, B.C.W., Chung, J.-Y., Yang, S.J.H.: Extending trust computing with service oriented architecture. Information Assurance and Computer Security 6, 69–83 (2006)
Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618–644 (2007)
Keller, A., Ludwig, H.: The WSLA framework: Specifying and monitoring service level agreements for web services. J. Netw. Syst. Manage. 11(1), 57–81 (2003)
Lazovik, A., Aiello, M., Gennari, R.: Encoding requests to web service compositions as constraints. In: van Beek, P. (ed.) CP 2005. LNCS, vol. 3709, pp. 782–786. Springer, Heidelberg (2005)
Lee, K., Lee, W., Jeon, J., Jeong, S.-H., Park, S.W.: Qos for web services: Requirements and possible approaches. W3C Note (2003), http://www.w3c.or.kr/kr-office/TR/2003/ws-qos/
Lerman, K., Shehory, O.: Coalition formation for large-scale electronic markets. In: ICMAS, pp. 167–174. IEEE Computer Society, Los Alamitos (2000)
Papazoglou, M.P.: Service -oriented computing: Concepts, characteristics and directions. In: International Conference on Web Information Systems Engineering, p.3 (2003)
Papazoglou, M.P., Georgakopoulos, D.: Service-oriented computing. Commun. ACM 46(10) (2003)
Peltz, C.: Web services orchestration and choreography. Computer 36(10), 46–52 (2003)
Rossi, F., van Beek, P., Walsh, T.: Handbook of Constraint Programming (Foundations of Artificial Intelligence). Elsevier Science Inc., New York (2006)
Rugina, A.-E., Kanoun, K., Kaâniche, M.: A system dependability modeling framework using aadl and gspns. In: de Lemos, R., Gacek, C., Romanovsky, A. (eds.) Architecting Dependable Systems IV. LNCS, vol. 4615, pp. 14–38. Springer, Heidelberg (2007)
Schulte, C.: Programming Constraint Services. LNCS (LNAI), vol. 2302. Springer, Heidelberg (2002)
Serhani, M.A., Dssouli, R., Hafid, A., Sahraoui, H.: A qos broker based architecture for efficient web services selection. In: ICWS 2005: Proceedings of the IEEE International Conference on Web Services, Washington, DC, USA, pp. 113–120. IEEE Computer Society, Los Alamitos (2005)
Theodorakopoulos, G., Baras, J.S.: Trust evaluation in ad-hoc networks. In: WiSe 2004: Proceedings of the 3rd ACM workshop on Wireless security, pp. 1–10. ACM, New York (2004)
Yu, T., Lin, K.-J.: A broker-based framework for qos-aware web service composition. In: EEE 2005: Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE 2005) on e-Technology, e-Commerce and e-Service, Washington, DC, USA, pp. 22–29. IEEE Computer Society, Los Alamitos (2005)
Zarras, A., Vassiliadis, P., Issarny, V.: Model-driven dependability analysis of webservices. In: Meersman, R., Tari, Z. (eds.) OTM 2004. LNCS, vol. 3291, pp. 1608–1625. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Bistarelli, S., Santini, F. (2009). Soft Constraints for Dependable Service Oriented Architectures. In: de Lemos, R., Fabre, JC., Gacek, C., Gadducci, F., ter Beek, M. (eds) Architecting Dependable Systems VI. Lecture Notes in Computer Science, vol 5835. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10248-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-10248-6_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10247-9
Online ISBN: 978-3-642-10248-6
eBook Packages: Computer ScienceComputer Science (R0)