Web service business protocol mining based on message logs

被引:0
|
作者
Li X. [1 ]
Huai J.-P. [1 ]
Liu X.-D. [1 ]
Sun H.-L. [1 ]
Qu X.-Y. [1 ]
机构
[1] School of Computer Science and Engineering, BeiHang University
来源
Ruan Jian Xue Bao/Journal of Software | 2011年 / 22卷 / 07期
关键词
Business protocol; Process mining; Protocol discovery; Web service;
D O I
10.3724/SP.J.1001.2011.03820
中图分类号
学科分类号
摘要
A Web service business protocol is used to describe the external behavior of a service and plays an important role in the service discovery, composition, verification, runtime service trustworthy guarantee, and so on. Presently, some research has been done on discovering the Web service business protocol from the invocation logs. Most of these works focused on the control-flow of Web service business protocols that give a temporal constraint among the operations of Web service. However, the data constraints and the consistency between the data-flow and the control-flow are also important and have not received enough attention. This paper studies the Web service business protocol from the service invocation logs and focuses on mining the relations, or the constraints between the message values and service operations. This paper proposes a Petri-net based model, called Business Protocol Net (simply, BPN), to describe the behavior of a service. Based on this model, a mining framework is proposed to automatically generate the BPN model from message traces. Experimental results illustrate that the method is effective in discovering the Web service business protocol from invocation logs. © Copyright 2011, Institute of Software, the Chinese Academy of Sciences.
引用
收藏
页码:1413 / 1425
页数:12
相关论文
共 19 条
  • [11] Acharya M., Xie T., Pei J., Xu J., Mining API patterns as partial orders from source code: From usage scenarios to specifications, Proc. of the ESEC/FSE, pp. 25-34, (2007)
  • [12] Ernst M.D., Cockrell J., Griswold W.G., Notkin D., Dynamically discovering likely program invariants to support program evolution, IEEE Trans. on Software Engineering, 27, 2, pp. 99-123, (2001)
  • [13] van der Aalst W.M.P., Weijters T., Maruster L., Workflow mining: Discovering process models from event logs, IEEE Trans. on Knowledge and Data Engineering, 16, 9, pp. 1128-1142, (2004)
  • [14] Business Process Modeling Notation. Vol.1.1, (2008)
  • [15] van der Aalst W.M.P., Massuthe P., Stahl C., Wolf K., Multiparty contracts: Agreeing and implementing inter-organizational processes, The Computer Journal, 53, 1, pp. 90-106, (2010)
  • [16] Motahari H., Benatallah B., Saint-Paul R., Protocol discovery from imperfect service interaction data, Proc. of the VLDB, (2006)
  • [17] Lorenzoli D., Mariani L., Pezze M., Automatic generation of software behavioral models, Proc. of the ICSE, pp. 501-510, (2008)
  • [18] (2009)
  • [19] de Medeiros A.K.A., van Dongen B.F., van der Aalst W.M.P., Weijters A.J.M.M., Process mining: Extending the α-algorithm to mine short loops, (2004)