Web service business protocol mining based on message logs

被引:0
|
作者
Li X. [1 ]
Huai J.-P. [1 ]
Liu X.-D. [1 ]
Sun H.-L. [1 ]
Qu X.-Y. [1 ]
机构
[1] School of Computer Science and Engineering, BeiHang University
来源
Ruan Jian Xue Bao/Journal of Software | 2011年 / 22卷 / 07期
关键词
Business protocol; Process mining; Protocol discovery; Web service;
D O I
10.3724/SP.J.1001.2011.03820
中图分类号
学科分类号
摘要
A Web service business protocol is used to describe the external behavior of a service and plays an important role in the service discovery, composition, verification, runtime service trustworthy guarantee, and so on. Presently, some research has been done on discovering the Web service business protocol from the invocation logs. Most of these works focused on the control-flow of Web service business protocols that give a temporal constraint among the operations of Web service. However, the data constraints and the consistency between the data-flow and the control-flow are also important and have not received enough attention. This paper studies the Web service business protocol from the service invocation logs and focuses on mining the relations, or the constraints between the message values and service operations. This paper proposes a Petri-net based model, called Business Protocol Net (simply, BPN), to describe the behavior of a service. Based on this model, a mining framework is proposed to automatically generate the BPN model from message traces. Experimental results illustrate that the method is effective in discovering the Web service business protocol from invocation logs. © Copyright 2011, Institute of Software, the Chinese Academy of Sciences.
引用
收藏
页码:1413 / 1425
页数:12
相关论文
共 19 条
  • [1] Zhang L.J., Zhang J., Cai H., Services Computing, (2007)
  • [2] Berardi D., Calvanese D., de Giacomo G., Lenzerini M., Mecella M., Automatic service composition based on behavioral descriptions, Int'l Journal of Computational Intelligence Systems, 14, 4, pp. 333-376, (2005)
  • [3] Bonchi F., Brogi A., Corfini S., Gadducci F., A behavioral congruence for Web services, Proc. of the Fundamentals of Software Engineering, pp. 240-256, (2007)
  • [4] Desai N., Singh M.P., Protocol-Based business process modeling and enactment, Proc. of the IEEE Int'l Conf. on Web Services (ICWS 2004), pp. 35-42, (2004)
  • [5] Fan W.F., Geerts F., Gelade W., Neven F., Poggi A., Complexity and composition of synthesized Web services, Proc. of the PODS, pp. 231-240, (2008)
  • [6] Al-Masri E., Mahmoud Q.H., Investigating Web services on the World Wide Web, Proc. of the WWW, (2008)
  • [7] Beyer D., Chakrabarti A., Henzinger T.A., Web service interfaces, Proc. of the WWW, (2005)
  • [8] Ammons G., Bodik R., Larus J.R., Mining specification, Proc. of the POPL, (2002)
  • [9] Serrour B., Gasparotto D.P., Kheddouci H., Benatallah B., Message correlation and business protocol discovery in service interaction logs, Proc. of the CAISE, pp. 405-419, (2008)
  • [10] Shoham S., Yahav E., Fink S., Pistoia M., Static specification mining using automata-based abstractions, Proc. of the ISSTA, pp. 174-184, (2007)