Modeling, verifying and reasoning about web services
نویسنده
چکیده
This paper describes the research activities carried out in the context of the Italian MIUR Project PRIN 2005 “Specification and verification of agent interaction protocols”, concerning the area of modeling, verification and reasoning about web services. Web services are an emergent paradigm for implementing business collaborations over the web. Each service has an interface that is accessible through standard protocols and that describes the interaction capabilities of the service. It is possible to develop new applications by combining and integrating existing web services. In this scenario, various languages have been developed for modeling processes and their interaction protocols. In particular, the language WS-BPEL has emerged as the standard for specifying the business processes of single services, while the global view of the interaction is captured by the concept of choreography, expressed by using specific languages like WS-CDL. Nowadays, in many application domains it is getting more and more common describing and realizing the offered services by means of a set of communicating agents. Techniques for the specification and verification of the interactive behavior of open agent systems find an immediate application in web services. The goal of our project is to prove the usefulness and the applicability of techniques based on declarative approaches for tackling issues typical of the web service application area. Our claim is that web service interactions should be represented according to some formalism which relies on well-founded models with a clear semantics. Furthermore, automated tools for reasoning about such a description and performing tasks of interest must be developed. The goal of the project is pursued through three main steps:
منابع مشابه
Formalizing and Verifying Authenticity over Assertion Changes for An Interaction Protocol
The Semantic Web techniques, like OWL, bring more semantic to the static information about functionalities and non-functionalities of Web services. However, it is not smooth to faithfully describe some dynamic aspects and support reasoning tasks. When discussing the security of interactions of Web services, we should solve such problems like how to describe interactive behaviors, static informa...
متن کاملAutomata-Based Verification of Non-Functional Requirements in Web Service Composition
We address the problem of how to provide guarantees to a user that an automatically generated composition of independently developed web services meets the non-functional requirements (NFR). The user-specified NFR are in the form of hard constraints. We introduce an automata-based model for representing and reasoning about non-functional requirements for verifying the conformance to NFR. The ap...
متن کاملWeb Service Composition - Current Solutions and Open Problems
Composition of Web services has received much interest to support business-to-business or enterprise application integration. On the one side, the business world has developed a number of XML-based standards to formalize the specification of Web services, their flow composition and execution. This approach is primarily syntactical: Web service interfaces are like remote procedure call and the i...
متن کاملSemantic Annotation of Web Service
In this technical report, we propose a new approach to the discovery, the selection, and the automated composition of distributed processes described as semantic web services through a new semantic annotation. In existing approaches, the importance of describing web services at the process-level is widely recognized, as witnessed by standard languages for describing business processes, like BPE...
متن کاملReasoning about XACML Policy Descriptions in Answer Set Programming (Preliminary Report)
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from unintended security leakages by unauthorized services while providing more convenient services to Internet users through such a cuttingedge technological growth. Furthermore, desig...
متن کامل