Reference Hub1
A Reengineering Approach for Ensuring Transactional Reliability of Composite Services

A Reengineering Approach for Ensuring Transactional Reliability of Composite Services

Sami Bhiri, Walid Gaaloul, Claude Godart
ISBN13: 9781615206841|ISBN10: 1615206841|ISBN13 Softcover: 9781616922641|EISBN13: 9781615206858
DOI: 10.4018/978-1-61520-684-1.ch013
Cite Chapter Cite Chapter

MLA

Bhiri, Sami, et al. "A Reengineering Approach for Ensuring Transactional Reliability of Composite Services." Web Services Research for Emerging Applications: Discoveries and Trends, edited by Liang-Jie Zhang, IGI Global, 2010, pp. 290-316. https://doi.org/10.4018/978-1-61520-684-1.ch013

APA

Bhiri, S., Gaaloul, W., & Godart, C. (2010). A Reengineering Approach for Ensuring Transactional Reliability of Composite Services. In L. Zhang (Ed.), Web Services Research for Emerging Applications: Discoveries and Trends (pp. 290-316). IGI Global. https://doi.org/10.4018/978-1-61520-684-1.ch013

Chicago

Bhiri, Sami, Walid Gaaloul, and Claude Godart. "A Reengineering Approach for Ensuring Transactional Reliability of Composite Services." In Web Services Research for Emerging Applications: Discoveries and Trends, edited by Liang-Jie Zhang, 290-316. Hershey, PA: IGI Global, 2010. https://doi.org/10.4018/978-1-61520-684-1.ch013

Export Reference

Mendeley
Favorite

Abstract

Different from traditional software applications, Web services are defined independently from any execution context. Their consequent inherent autonomy and heterogeneity fostered by a continuous evolution in business context and requirements make ensuring the execution of a composite service as intended a challenging task. This chapter presents a reengineering approach to ensure transactional reliability of composite services. Contrary to previous approaches which check correctness properties based on the composition model, the authors start from executions’ log to improve services’ recovery mechanisms. Basically, the chapter proposes a set of mining techniques to discover the transactional behavior from an event based log. Then, based on this mining step, the authors use a set of rules in order to improve services’ reliability.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.