Identifying, modifying, creating, and removing monitor rules for service oriented computing

Monitoring of service-based systems is considered an important activity to support service-oriented computing. Monitoring can be used to verify the behavior of a service-based system, and the quality and contextual aspects of the services participating in the system. Existing approaches for monitoring service-based systems assume that monitor rules are pre-defined and known in advance, which is not always the case. We present a pattern-based HCI-aware monitor adaptation framework to support identification, modification, creation, and removal of monitor rules based on user's interaction with a service-based system and different types of user context. A prototype tool has been implemented to demonstrate the framework.

[1]  Claudio Bettini,et al.  Distributed Context Monitoring for the Adaptation of Continuous Services , 2007, World Wide Web.

[2]  Fuyuki Ishikawa,et al.  Physical interaction in pervasive computing: formal modeling, analysis and verification , 2009, ICPS '09.

[3]  George Spanoudakis,et al.  Non-Intrusive Monitoring of Service-Based Systems , 2006, Int. J. Cooperative Inf. Syst..

[4]  Murray Shanahan,et al.  The Event Calculus Explained , 1999, Artificial Intelligence Today.

[5]  Anne-Marie Pinna-Dery,et al.  Component Model and Programming: A First Step to Manage Human Computer Interaction Adaptation , 2003, Mobile HCI.

[6]  Klaus Pohl,et al.  Towards pro-active adaptation with confidence: augmenting service monitoring with online testing , 2010, SEAMS '10.

[7]  Barry Smith,et al.  A user profiling component with the aid of user ontologies , 2003 .

[8]  Luciano Baresi,et al.  Towards Dynamic Monitoring of WS-BPEL Processes , 2005, ICSOC.

[9]  Paola Inverardi,et al.  Context-Aware Adaptive Services: The PLASTIC Approach , 2009, FASE.

[10]  George S. Avrunin,et al.  Patterns in property specifications for finite-state verification , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).

[11]  Akrivi Katifori,et al.  Creating an Ontology for the User Profile: Method and Applications , 2007, RCIS.

[12]  Schahram Dustdar,et al.  Non-intrusive monitoring and service adaptation for WS-BPEL , 2008, WWW.

[13]  Jocelyn Simmonds,et al.  Property Patterns for Runtime Monitoring of Web Service Conversations , 2008, RV.

[14]  Marco Pistore,et al.  Assumption-Based Composition and Monitoring of Web Services , 2007, Test and Analysis of Web Services.

[15]  Abdelkarim Erradi,et al.  WS-Policy based Monitoring of Composite Web Services , 2007, Fifth European Conference on Web Services (ECOWS'07).

[16]  D. Salber,et al.  The Context Toolkit : Aiding the Development of Context-Aware Applications , 2000 .

[17]  Danilo Ardagna,et al.  PAWS: A Framework for Executing Adaptive Web-Service Processes , 2007, IEEE Software.

[18]  Carlo Ghezzi,et al.  Model evolution by run-time parameter adaptation , 2009, 2009 IEEE 31st International Conference on Software Engineering.

[19]  Keith Farkas,et al.  Adaptive Monitoring Automated Change Management for Monitoring Systems , .

[20]  Gregory D. Abowd,et al.  The context toolkit: aiding the development of context-enabled applications , 1999, CHI '99.

[21]  George Spanoudakis,et al.  Towards security monitoring patterns , 2007, SAC '07.

[22]  Asit Dan,et al.  Cremona: an architecture and library for creation and monitoring of WS-agreents , 2004, ICSOC '04.

[23]  Marco Pistore,et al.  Run-Time Monitoring of Instances and Classes of Web Service Compositions , 2006, 2006 IEEE International Conference on Web Services (ICWS'06).

[24]  Rogério de Lemos,et al.  Proceedings of the 7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems , 2012, ICSE 2012.

[25]  Mark Ryan,et al.  Context-Aware Monitoring of Untrusted Mobile Applications , 2009, MobiSec.

[26]  Harry Chen,et al.  An ontology for context-aware pervasive computing environments , 2003, The Knowledge Engineering Review.

[27]  Michael Anthony Bauer,et al.  Automatic Policy Mapping to Management System Configurations , 2010, 2010 IEEE International Symposium on Policies for Distributed Systems and Networks.

[28]  Luciano Baresi,et al.  Towards Self-healing Composition of Services , 2007, Contributions to Ubiquitous Computing.

[29]  Guanling Chen,et al.  A Survey of Context-Aware Mobile Computing Research , 2000 .