An Inconsistency Free Formalization of B/S Architecture

Nowadays the B/S (browser/server) architecture has become one of the most popular approaches to implement the Web service. Because of the instability of the Web environment, keeping the consistency of the data is of essential importance. Consequently we turn to formal methods intending to avoid inconsistencies in the B/S architecture. This paper describes a service-oriented system with the B/S architecture using the CSP (communicating sequential processes) method. We define the processes in the system and the behaviors of them. After the definition, we analyze the causes of inconsistencies and demonstrate that the formal definition and mechanism we made can implement an inconsistency free system, which means the inconsistency can be avoided or fixed.

[1]  Santosh K. Shrivastava,et al.  Constructing Reliable Web Applications Using Atomic Actions , 1997, Comput. Networks.

[2]  Andrew P. Martin,et al.  A Taxonomy of Web Services Using CSP , 2006, WLFM@FM.

[3]  Leslie Lamport,et al.  Formal specification of a Web services protocol , 2007, J. Log. Algebraic Methods Program..

[4]  Andrew William Roscoe,et al.  The Theory and Practice of Concurrency , 1997 .

[5]  Mario Bravetti,et al.  Formal Techniques for Computer Systems and Business Processes, European Performance Engineering Workshop, EPEW 2005 and International Workshop on Web Services and Formal Methods, WS-FM 2005, Versailles, France, September 1-3, 2005, Proceedings , 2005, EPEW/WS-FM.

[6]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[7]  Andrew D. Gordon,et al.  Validating a web service security abstraction by typing , 2002, XMLSEC '02.

[8]  Roberto Bruni,et al.  From Theory to Practice in Transactional Composition of Web Services , 2005, EPEW/WS-FM.

[9]  Marco Pistore,et al.  Requirements-Driven Verification of Web Services , 2004, Electron. Notes Theor. Comput. Sci..

[10]  Steve A. Schneider,et al.  Verifying Security Protocols: An Application of CSP , 2004, 25 Years Communicating Sequential Processes.

[11]  Michael Goldsmith,et al.  Modelling and analysis of security protocols , 2001 .

[12]  Steve A. Schneider,et al.  Formal verification of fault-tolerant software design: the CSP approach , 2005, Microprocess. Microsystems.

[13]  C. A. R. Hoare,et al.  Communicating sequential processes , 1978, CACM.

[14]  Stephen Gilmore,et al.  Choreographing Security and Performance Analysis for Web Services , 2005, EPEW/WS-FM.

[15]  A. W. Roscoe,et al.  Verifying Statemate Statecharts Using CSP and FDR , 2006, ICFEM.

[16]  Richard Monson-Haefel,et al.  Enterprise JavaBeans , 1999, Java series.

[17]  Carlisle Adams,et al.  Understanding PKI: Concepts, Standards, and Deployment Considerations , 1999 .

[18]  Steve A. Schneider,et al.  An Operational Semantics for Timed CSP , 1995, Inf. Comput..

[19]  Gustavo Alonso,et al.  Web Services: Concepts, Architectures and Applications , 2009 .