Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2491411.2491441acmconferencesArticle/Chapter ViewAbstractPublication PagesfseConference Proceedingsconference-collections
research-article

Adequate monitoring of service compositions

Published: 18 August 2013 Publication History

Abstract

Monitoring is essential to validate the runtime behaviour of dynamic distributed systems. However, monitors can inform of relevant events as they occur, but by their very nature they will not report about all those events that are not happening. In service-oriented applications it would be desirable to have means to assess the thoroughness of the interactions among the services that are being monitored. In case some events or message sequences or interaction patterns have not been observed for a while, in fact, one could timely check whether this happens because something is going wrong. In this paper, we introduce the novel notion of monitoring adequacy, which is generic and can be defined on different entities. We then define two adequacy criteria for service compositions and implement a proof-of-concept adequate monitoring framework. We validate the approach on two case studies, the Travel Reservation System and the Future Market choreographies.

References

[1]
Web service choreography interface (WSCI) 1.0. http://www.w3.org/TR/wsci/.
[2]
L. Ardissono, R. Furnari, A. Goy, G. Petrone, and M. Segnan. Monitoring choreographed services. In Innovations and Advanced Techniques in Computer and Information Sciences and Engineering, pages 283–288. Springer Netherlands, 2007.
[3]
R. Aschoff and A. Zisman. QoS-driven proactive adaptation of service composition. In ICSOC, pages 421–435, 2011.
[4]
C. Bartolini, A. Bertolino, A. Ciancone, G. De Angelis, and R. Mirandola. Apprehensive QoS monitoring of service choreographies. In Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC ’13. ACM, 2013.
[5]
A. Benharref, R. Dssouli, M. Serhani, A. En-Nouaary, and R. Glitho. New approach for EFSM-based passive testing of web services. In A. Petrenko, M. Veanes, J. Tretmans, and W. Grieskamp, editors, Testing of Software and Communicating Systems, volume 4581 of Lecture Notes in Computer Science, pages 13–27. Springer Berlin Heidelberg, 2007.
[6]
A. Bertolino, A. Calabrò, F. Lonetti, and A. Sabetta. Glimpse: a generic and flexible monitoring infrastructure. In Proceedings of the 13th European Workshop on Dependable Computing, EWDC ’11, pages 73–78, New York, NY, USA, 2011. ACM.
[7]
A. Bertolino and A. Polini. The audition framework for testing web services interoperability. In Proceedings of the 31st EUROMICRO Conference on Software Engineering and Advanced Applications, pages 134 – 142, aug.-3 sept. 2005.
[8]
A. R. Cavalli, C. Gervy, and S. Prokopenko. New approaches for passive testing using an extended finite state machine specification. Information & Software Technology, 45(12):837––852, 2003.
[9]
G. Dai, X. Bai, Y. Wang, and F. Dai. Contract-based testing for web services. In Proceedings of the 31st International Computer Software and Applications Conference (COMPSAC), volume 1, pages 517 –526, July 2007.
[10]
N. Delgado, A. Gates, and S. Roach. A taxonomy and catalog of runtime software-fault monitoring tools. IEEE Transactions on Software Engineering, 30(12):859 – 872, dec. 2004.
[11]
Drools Fusion: Complex Event Processor. http://www.jboss.org/drools/drools-fusion.html.
[12]
C. Ghezzi and S. Guinea. Run-time monitoring in service-oriented architectures. In L. Baresi and E. Di Nitto, editors, Test and Analysis of Web Services, pages 237–264. Springer, 2007.
[13]
J. Goodenough and S. Gerhart. Toward a theory of test data selection. IEEE Transactions on Software Engineering, SE-1(2):156 –173, 1975.
[14]
D. Ivanovic, M. Carro, and M. V. Hermenegildo. Constraint-based runtime prediction of sla violations in service orchestrations. In ICSOC, pages 62–76, 2011.
[15]
J. Joyce, G. Lomow, K. Slind, and B. Unger. Monitoring distributed systems. ACM Trans. Comput. Syst., 5(2):121–150, 1987.
[16]
D. Lee, A. Netravali, K. Sabnani, B. Sugla, and A. John. Passive testing and applications to network management. In Proceedings of the International Conference on Network Protocols, pages 113 –122, 1997.
[17]
P. Leitner, A. Michlmayr, F. Rosenberg, and S. Dustdar. Monitoring, prediction and prevention of sla violations in composite services. Proceedings of the IEEE International Conference on Web Services, 0:369–376, 2010.
[18]
M. Mansouri-Samani and M. Sloman. Monitoring distributed systems. In Network and distributed systems management, pages 303–347. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1994.
[19]
A. Metzger, O. Sammodi, K. Pohl, and M. Rzepka. Towards pro-active adaptation with confidence: augmenting service monitoring with online testing. In Proceedings of the 2010 ICSE Workshop on Software Engineering for Adaptive and Self-Managing Systems, SEAMS ’10, pages 20–28, New York, NY, USA, 2010. ACM.
[20]
J. D. Musa, A. Iannino, and K. Okumoto. Software reliability. McGraw-Hill New York, 1987.
[21]
M. P. Papazoglou, P. Traverso, S. Dustdar, and F. Leymann. Service-oriented computing: State of the art and research challenges. IEEE Computer, 40(11):38–45, 2007.
[22]
B. Plattner and J. Nievergelt. Special feature: Monitoring program execution: A survey. Computer, 14(11):76 –93, nov. 1981.
[23]
S. Rapps and E. Weyuker. Selecting software test data using data flow information. IEEE Transactions on Software Engineering, SE-11(4):367–375, 1985.
[24]
O. Sammodi, A. Metzger, X. Franch, M. Oriol, J. Marco, and K. Pohl. Usage-based online testing for proactive adaptation of service-based applications. In Proceedings of the IEEE 35th Annual Computer Software and Applications Conference (COMPSAC), pages 582–587, July 2011.
[25]
M. Winkler, J. Cardoso, and G. Scheithauer. Challenges of business service monitoring in the internet of services. In Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services, iiWAS ’’08, pages 613–616, New York, NY, USA, 2008. ACM.
[26]
P. Zhang, H. Muccini, A. Polini, and X. Li. Run-time systems failure prediction via proactive monitoring. In Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering, ASE’11, pages 484–487, Washington, DC, USA, 2011. IEEE Computer Society.
[27]
H. Zhu, P. A. V. Hall, and J. H. R. May. Software unit test coverage and adequacy. ACM Comput. Surv., pages 366–427, 1997.

Cited By

View all
  • (2019)Walking Through the Semantics of Exclusive and Event-Based Gateways in BPMN ChoreographiesThe Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy10.1007/978-3-030-31175-9_10(163-181)Online publication date: 4-Nov-2019
  • (2019)Enabling Auditing of Smart Contracts Through Process MiningFrom Software Engineering to Formal Methods and Tools, and Back10.1007/978-3-030-30985-5_27(467-480)Online publication date: 9-Oct-2019
  • (2017)Monitoring of Access Control Policy for Refinement and ImprovementsSoftware Quality: Methods and Tools for Better Software and Systems10.1007/978-3-319-71440-0_2(17-36)Online publication date: 19-Nov-2017
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ESEC/FSE 2013: Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering
August 2013
738 pages
ISBN:9781450322379
DOI:10.1145/2491411
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 August 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Adequacy criteria
  2. Branch coverage
  3. Choreography
  4. Monitoring
  5. Operation coverage

Qualifiers

  • Research-article

Conference

ESEC/FSE'13
Sponsor:

Acceptance Rates

Overall Acceptance Rate 112 of 543 submissions, 21%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)1
Reflects downloads up to 04 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2019)Walking Through the Semantics of Exclusive and Event-Based Gateways in BPMN ChoreographiesThe Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy10.1007/978-3-030-31175-9_10(163-181)Online publication date: 4-Nov-2019
  • (2019)Enabling Auditing of Smart Contracts Through Process MiningFrom Software Engineering to Formal Methods and Tools, and Back10.1007/978-3-030-30985-5_27(467-480)Online publication date: 9-Oct-2019
  • (2017)Monitoring of Access Control Policy for Refinement and ImprovementsSoftware Quality: Methods and Tools for Better Software and Systems10.1007/978-3-319-71440-0_2(17-36)Online publication date: 19-Nov-2017
  • (2016)Security by Insurance for Services2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)10.1109/QRS-C.2016.53(344-351)Online publication date: Aug-2016
  • (2015)Towards Business Process Execution Adequacy CriteriaSoftware Quality. The Future of Systems- and Software Development10.1007/978-3-319-27033-3_3(37-48)Online publication date: 10-Dec-2015

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media