{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T06:09:02Z","timestamp":1761977342042,"version":"build-2065373602"},"publisher-location":"Berlin, Heidelberg","reference-count":114,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642389566"},{"type":"electronic","value":"9783642389573"}],"license":[{"start":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T00:00:00Z","timestamp":1383004800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T00:00:00Z","timestamp":1383004800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-38957-3_5","type":"book-chapter","created":{"date-parts":[[2013,10,28]],"date-time":"2013-10-28T09:11:14Z","timestamp":1382951474000},"page":"203-260","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Dependability Infrastructure for SOA Applications"],"prefix":"10.1007","author":[{"given":"Jerzy","family":"Brzezi\u0144ski","sequence":"first","affiliation":[]},{"given":"Dariusz","family":"Dwornikowski","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Kobusi\u0144ska","sequence":"additional","affiliation":[]},{"given":"Jacek","family":"Kobusi\u0144ski","sequence":"additional","affiliation":[]},{"given":"Micha\u0142","family":"Sajkowski","sequence":"additional","affiliation":[]},{"given":"Cezary","family":"Sobaniec","sequence":"additional","affiliation":[]},{"given":"Micha\u0142","family":"Szychowiak","sequence":"additional","affiliation":[]},{"given":"Dariusz","family":"Wawrzyniak","sequence":"additional","affiliation":[]},{"given":"Pawe\u0142 T.","family":"Wojciechowski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,10,29]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Aguilera, M.K., Merchant, A., Shah, M., Veitch, A., Karamanolis, C.: Sinfonia: a new paradigm for building scalable distributed systems. In: Proceedings of SOSP\u2019 07: The 21st ACM Symposium on Operating Systems Principles (SOSP), pp. 159\u2013174 (2007)","DOI":"10.1145\/1323293.1294278"},{"issue":"2","key":"5_CR2","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1109\/32.666828","volume":"24","author":"L Alvisi","year":"1998","unstructured":"Alvisi, L., Marzullo, K.: Message logging: pessimistic, optimistic, causal and optimal. IEEE Trans. Softw. Eng 24(2), 149\u2013159 (1998)","journal-title":"IEEE Trans. Softw. Eng"},{"key":"5_CR3","unstructured":"Alwagait, E., Ghandeharizadeh, S.: Dew: a dependable web services framework. In: Proceedings of the 14th International Workshop on Research Issues on Data Engineering: Web Services for e-Commerce and e-Government Applications (2004)"},{"key":"5_CR4","unstructured":"Amir, Y., Stanton, J.: The Spread wide area group communication system. Technical Report, CNDS-98-4, Department of Computer Science, Johns Hopkins University (1998)"},{"issue":"1","key":"5_CR5","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A. Avizienis","year":"2004","unstructured":"Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable and Secure Comput. 1(1), 11\u201333 (2004). doi:10.1109\/TDSC.2004.2","journal-title":"IEEE Trans. Dependable and Secure Comput."},{"key":"5_CR6","unstructured":"Barga, R., Chen, S., Lomet, D.: Improving logging and recovery performance in phoenix\/APP. In: International Conference on Data Engineering (ICDE) (2004)"},{"issue":"3","key":"5_CR7","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1145\/1013202.1013205","volume":"4","author":"RS Barga","year":"2004","unstructured":"Barga, R.S., Lomet, D.B., Shegalov, G., Weikum, G.: Recovery guarantees for internet applications. ACM Trans. Internet Technol. 4(3), 289\u2013328 (2004)","journal-title":"ACM Trans. Internet Technol."},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Bazyd\u0142o, M., Francuzik, S., Sobaniec, C., Wawrzyniak, D.: Combining optimistic and pessimistic replication. In: Proceedings of the 9th International Conference on Parallel Processing and Applied Mathematics (PPAM 2011). Lecture Notes in Computer Science, vol. 7203, pp. 20\u201329. Springer, Toru (2012)","DOI":"10.1007\/978-3-642-31464-3_3"},{"key":"5_CR9","unstructured":"Becker, M.Y., Fournet, C., Gordon, A.D.: SecPAL: design and semantics of a decentralized authorization language. Technical Report, MSR-TR-2006-120, Microsoft Research (2006)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Bernstein, P.A., Newcomer, E.: Principles of Transaction Processing. Morgan Kaufmann, Amsterdam (2009)","DOI":"10.1016\/B978-1-55860-623-4.00004-4"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Borg, A., Baumbach, J., Glazer., S.: A message system supporting faulttolerance. In: Proceedings of the Symposium on Operating Systems Principles, pp. 90\u201399 (1983)","DOI":"10.1145\/773379.806617"},{"issue":"2","key":"5_CR12","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/MC.2012.37","volume":"45","author":"E. Brewer","year":"2012","unstructured":"Brewer, E.: CAP twelve years later: How the \u201crules\u201d have changed. Computer 45(2), 23\u201329 (2012). doi:10.1109\/MC.2012.37","journal-title":"Computer"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Brewer, E.A.: Towards robust distributed systems (abstract). In: PODC \u201900: Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, p. 7. ACM, New York (2000). http:\/\/doi.acm.org\/10.1145\/343477.343502","DOI":"10.1145\/343477.343502"},{"key":"5_CR14","unstructured":"Brodecki, B., Brzezi\u0144ski, J., Dwornikowski, D., Kobusi\u0144ski, J., Sajkowski, M., Sasak, P., Szychowiak, M.: Selected aspects of management in SOA. In: Ambroszkiewicz, S., Brzezi\u0144ski, J., Cellary, W., Grzech, A., Zieli\u0144ski K. (eds.) SOA Infrastructure Tools: Concepts and Methods. UEP (2010)"},{"key":"5_CR15","doi-asserted-by":"publisher","unstructured":"Brodecki, B., Brzezi\u0144ski, J., Sasak, P., Szychowiak, M.: Modality conflict discovery for SOA security policies. In: Temam, O., Yew, P.C., Zang B. (eds.) Advanced Parallel Processing Technologies 2011 (APPT 2011), Lecture Notes in Computer Science, vol. 6965, pp. 112\u2013126. Springer, Shanghai (2011). doi:10.1007\/978-3-642-24151-2-9","DOI":"10.1007\/978-3-642-24151-2-9"},{"key":"5_CR16","unstructured":"Brodecki, B., Brzezi\u0144ski, J., Sasak, P., Szychowiak, M.: ModCon algorithm for discovering security policy conflicts. In: 6th Joint Workshop on Information Security\u2014JWIS 2011. Kaohsiung, Taiwan (2011)"},{"key":"5_CR17","doi-asserted-by":"publisher","unstructured":"Brodecki, B., Brzezi\u0144ski, J., Sasak, P., Szychowiak, M.: Consistency maintenance of modern security policies. In: Thilagam, P.S., Pais, A.R., Chandrasekaran, K., Balakrishnan N. (eds.) Advanced Computing, Networking and Security (ADCONS 2011), Lecture Notes in Computer Science, vol. 7135, pp. 472\u2013477. Springer, Mangalore (2012). doi:10.1007\/978-3-642-29280-4-55","DOI":"10.1007\/978-3-642-29280-4-55"},{"key":"5_CR18","doi-asserted-by":"publisher","unstructured":"Brodecki, B., Kalewski, M., Sasak, P., Szychowiak, M.: Lightweight information flow control for web services. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Wasniewski J. (eds.) Proceedings of the 9th International Conference on Parallel Processing and Applied Mathematics (PPAM 2011), vol. 7204, pp. 608\u2013617. Springer, Toru\u0144 (2012). doi:10.1007\/978-3-642-31500-8-63","DOI":"10.1007\/978-3-642-31500-8-63"},{"key":"5_CR19","doi-asserted-by":"publisher","unstructured":"Brodecki, B., Sasak, P., Szychowiak, M.: Security policy definition framework for SOA-based systems. In: Vossen, G., Long, D.D.E., Yu J.X. (eds.) 10th International Conference on Web Information Systems Engineering (WISE 2009), Lecture Notes in Computer Science, vol. 5802, pp. 589\u2013596. Springer, Pozna\u0144 (2009). doi:10.1007\/978-3-642-04409-0-57","DOI":"10.1007\/978-3-642-04409-0-57"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Brzezi\u0144ski, J., Dwornikowski, D., Kalewski, M., Sajkowski, M., Pawlak, T.: MDL: metrics definition language. In: Nguyen, N.T., Kim, C.G., Janiak A. (eds.) Proceedings of 3rd International Conference, ACIIDS 2011, Lecture Notes in Artificial Intelligence, vol. 6591\/2011, pp. 248\u2013257. Springer, Pozna\u0144 (2011)","DOI":"10.1007\/978-3-642-20039-7_25"},{"key":"5_CR21","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-642-23178-0_21","volume-title":"Parallel Computing Technologies, Lecture Notes in Computer Science","author":"J Brzezi\u0144ski","year":"2011","unstructured":"Brzezi\u0144ski, J., Dwornikowski, D., Kobusi\u0144ski, J.: FADE: RESTful service for failure detection in SOA environment. In: Malyshkin, V. (ed.) Parallel Computing Technologies, Lecture Notes in Computer Science, vol. 6873, pp. 238\u2013243. Springer, Berlin (2011)"},{"key":"5_CR22","unstructured":"Brzezi\u0144ski, J., Dwornikowski, D., Sajkowski, M.: Koncepcje zarza\u0327dzania w SOA. In: Niemir, D., Stroi\u0144ski, M., W\u0229glarz J. (eds.) Nauka w obliczu spo\u0142ecze\u0144stwa cyfrowego. I Konferencja i3: internet\u2014infrastruktury\u2014innowacje, pp. 222\u2013232. O\u015brodek Wydawnictw Naukowych (2010)"},{"key":"5_CR23","unstructured":"Budhiraja, N., Marzullo, K., Schneider, F.B., Toueg, S.: The primary-backup approach. In: Mullender, S. (ed.) Distributed Systems, 2nd edn., pp. 199\u2013216. Addison-Wesley, Reading (1993)"},{"key":"5_CR24","unstructured":"Carlyle, B.: The REST statelessness constraint. http:\/\/soundadvice.id.au\/blog\/2009\/06\/13\/#stateless (2009)"},{"issue":"2","key":"5_CR25","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1145\/226643.226647","volume":"43","author":"TD Chandra","year":"1996","unstructured":"Chandra, T.D., Toueg, S.: Unreliable failure detectors for reliable distributed systems. J. ACM 43(2), 225\u2013267 (1996)","journal-title":"J. ACM"},{"key":"5_CR26","unstructured":"Chen, Y.: WS-mediator for improving dependability of service composition. Ph.D. thesis, Newcastle University, Newcastle upon Tyne, UK (2008)"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Chen, J.Y., Wang, Y.J., Xiao, Y.: SOA-based service recovery framework. In: Proceedings of the 9th International Conference on Web-Age, Information Management, pp. 629\u2013635 (2008)","DOI":"10.1109\/WAIM.2008.67"},{"key":"5_CR28","unstructured":"Damianou, N.C., Dulay, N., Lupu, E., Sloman, M.: Ponder: A language for specifying security and management policies for distributed system. Technical Report, Imperial College of Science, Technology and Medicine; Department of Computing, London (2000)"},{"key":"5_CR29","unstructured":"Danilecki, A., Ho\u0142enko, M., Kobusi\u0144ska, A., Szychowiak, M., Zierhoffer, P.: The reliability service for service oriented architectures. In: Proceedings of the 3rd Workshop on Design for Reliability (DFR\u201911), pp. 33\u201338. Heraklion, Crete (2011)"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Danilecki, A., Ho\u0142enko, M., Kobusi\u0144ska, A., Szychowiak, M., Zierhoffer, P.: ReServE service: An approach to increase reliability in service oriented systems. In: Malyshkin, V. (ed.) Proceedings of the 11th International Conference on Parallel Computing Technologies, Lecture Notes in Computer Science, vol. 6873, pp. 244\u2013256. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-23178-0_22"},{"key":"5_CR31","unstructured":"Danilecki, A., Kobusi\u0144ska, A.: Message logging for external support of web services recovery. In: Proceedings of the IADIS International Conference on Collaborative Technologies, pp. 199\u2013203. Freiburg, Germany (2010)"},{"issue":"3","key":"5_CR32","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1145\/5505.5508","volume":"17","author":"SB Davidson","year":"1985","unstructured":"Davidson, S.B., Garcia-Molina, H., Skeen, D.: Consistency in partitioned networks. ACM Comput. Surv. 17(3), 341\u2013370 (1985)","journal-title":"ACM Comput. Surv."},{"key":"5_CR33","doi-asserted-by":"crossref","unstructured":"Denning, D.E.: A lattice model of secure information flow. Commun. ACM 19, 236\u2013243 (1976). http:\/\/doi.acm.org\/10.1145\/360051.360056","DOI":"10.1145\/360051.360056"},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Dialani, V., Miles, S., Moreau, L., Roure, D.D., Luck, M.: Transparent fault tolerance for web services based architectures. In: Proceedings of the 8th International Euro-Par Conference (Euro-Par 2002), Lecture Notes in Computer Science, vol. 2400, pp. 889\u2013898. Springer, Paderborn (2002)","DOI":"10.1007\/3-540-45706-2_126"},{"issue":"1","key":"5_CR35","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s11761-007-0006-z","volume":"1","author":"S Dustdar","year":"2007","unstructured":"Dustdar, S., Juszczyk, L.: Dynamic replication and synchronization of web services for high availability in mobile ad-hoc networks. SOCA 1(1), 19\u201333 (2007)","journal-title":"SOCA"},{"key":"5_CR36","doi-asserted-by":"crossref","unstructured":"Dwornikowski, D., Kobusi\u0144ska, A., Kobusi\u0144ski, J.: Failure detection in a RESTful way. In: Proceedings of the 11th International Conference on Parallel Processing and Applied Mathematics, Lecture Notes in Computer Science. Springer, Toru\u0144 (2012)","DOI":"10.1007\/978-3-642-31500-8_64"},{"key":"5_CR37","unstructured":"Moses T. (ed): eXtensible Access Control Markup Language (XACML) version 2.0, OASIS Open (2005)"},{"key":"5_CR38","doi-asserted-by":"publisher","unstructured":"Edstrom, J., Tilevich, E.: Reusable and extensible fault tolerance for RESTful applications. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 737\u2013744 (2012). doi:10.1109\/TrustCom.2012.244","DOI":"10.1109\/TrustCom.2012.244"},{"issue":"3","key":"5_CR39","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1145\/568522.568525","volume":"34","author":"N Elmootazbellah","year":"2002","unstructured":"Elmootazbellah, N., Elnozahy, L.A., Wang, Y.M., Johnson, D.: A survey of rollback-recovery protocols in message-passing systems. ACM Comput. Surv. 34(3), 375\u2013408 (2002)","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"5_CR40","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.sysarc.2006.06.001","volume":"53","author":"C.L. Fang","year":"2007","unstructured":"Fang, C.L., Liang, D., Lin, F., Lin, C.C.: Fault tolerant web services. J. Syst. Architect. 53(1), 21\u201338 (2007). doi:10.1016\/j.sysarc.2006.06.001. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1383762106000609","journal-title":"J. Syst. Architect."},{"key":"5_CR41","doi-asserted-by":"crossref","unstructured":"Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., Berners-Lee, T.: Hypertext Transfer Protocol\u2014HTTP\/1.1. Internet Engineering Task Force (1999). RFC 2616 (Draft Standard). Updated by RFC 2817","DOI":"10.17487\/rfc2616"},{"key":"5_CR42","unstructured":"Fielding, R.T.: Architectural styles and the design of network-based software architectures. Ph.D. thesis, University of California, Irvine (2000)"},{"issue":"2","key":"5_CR43","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1145\/514183.514185","volume":"2","author":"RT Fielding","year":"2002","unstructured":"Fielding, R.T., Taylor, R.N.: Principled design of the modern Web architecture. ACM Trans. Internet Technol. (TOIT) 2(2), 115\u2013150 (2002)","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"issue":"4","key":"5_CR44","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/S0020-0190(02)00498-2","volume":"86","author":"R Friedman","year":"2003","unstructured":"Friedman, R., Vitenberg, R., Chockler, G.: On the composability of consistency conditions. Inf. Process. Lett. 86(4), 169\u2013176 (2003)","journal-title":"Inf. Process. Lett."},{"key":"5_CR45","doi-asserted-by":"crossref","unstructured":"Gilbert, S., Lynch, N.: Brewer\u2019s conjecture and the feasibility of consistent, available, partition-tolerant web services. SIGACT News 33(2), 51\u201359 (2002). http:\/\/doi.acm.org\/10.1145\/564585.564601","DOI":"10.1145\/564585.564601"},{"key":"5_CR46","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: Proceedings of the IEEE Symposium on Security and Privacy (1982). http:\/\/doi.ieeecomputersociety.org\/10.1109\/SP.1982.10014","DOI":"10.1109\/SP.1982.10014"},{"key":"5_CR47","doi-asserted-by":"publisher","unstructured":"Gonalves, E., Rubira, C.: Archmeds: An infrastructure for dependable service-oriented architectures. In: 2010 17th IEEE International Conference and Workshops on Engineering of Computer Based Systems (ECBS), pp. 371\u2013378 (2010). doi:10.1109\/ECBS.2010.51","DOI":"10.1109\/ECBS.2010.51"},{"key":"5_CR48","unstructured":"Guerraoui, R., Rodrigues, L.: Introduction to Distributed Algorithms. Springer, Heidelberg (2004)"},{"issue":"4","key":"5_CR49","first-page":"320","volume":"3","author":"Y Gurevich","year":"1997","unstructured":"Gurevich, Y., Soparkar, N., Wallace, C.: Formalizing database recovery. J. Univs. Comput. Sci. 3(4), 320\u2013340 (1997)","journal-title":"J. Univs. Comput. Sci."},{"key":"5_CR50","doi-asserted-by":"publisher","unstructured":"Hardy, N.: The confused deputy. ACM SIGOPS Oper. Syst. Rev. 22(4), 36\u201338 (1988). doi:10.1145\/54289.871709","DOI":"10.1145\/54289.871709"},{"key":"5_CR51","unstructured":"Haridas, J., Nilakantan, N., Calder, B.: Windows azure table. Microsoft (2009)"},{"key":"5_CR52","doi-asserted-by":"crossref","unstructured":"Hayashibara, N., D\u00e9fago, X., Yared, R., Katayama, T.: The $$\\varphi $$ accrual failure detector. In: Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems (SRDS \u201904), pp. 66\u201378. IEEE Computer Society (2004). http:\/\/csdl.computer.org\/comp\/proceedings\/srds\/2004\/2239\/00\/22390066abs.htm","DOI":"10.1109\/RELDIS.2004.1353004"},{"key":"5_CR53","doi-asserted-by":"crossref","unstructured":"He, W.: Recovery in web service applications. IEEE International Conference on E-Technology, E-Commerce, and E-Services, pp. 25\u201328 (2004). http:\/\/doi.ieeecomputersociety.org\/10.1109\/EEE.2004.1287284","DOI":"10.1109\/EEE.2004.1287284"},{"key":"5_CR54","unstructured":"ISO 20514:2005: Health informatics\u2014Electronic health record\u2014Definition, scope, and context. International Organization for Standardization, Geneva, Switzerland"},{"key":"5_CR55","unstructured":"Health Level Seven International. http:\/\/www.hl7.org\/"},{"key":"5_CR56","unstructured":"IHE IT infrastructure technical framework, vol. 1, Integration Profiles (2009a)"},{"key":"5_CR57","unstructured":"IHE IT infrastructure technical framework, vol. 2a, Transactions Part A (2009b)"},{"key":"5_CR58","unstructured":"Integrating the healthcare enterprise. http:\/\/www.ihe.net\/"},{"key":"5_CR59","unstructured":"IT-SOA research network: Atomic REST. http:\/\/www.it-soa.eu\/atomicrest (2011)"},{"key":"5_CR60","unstructured":"IT-SOA research network: MProxy\u2014modular proxy server (2011). http:\/\/www.it-soa.eu\/mproxy\/"},{"key":"5_CR61","unstructured":"IT-SOA research network: RESTGroups. http:\/\/www.it-soa.eu\/restgroups (2011)"},{"key":"5_CR62","unstructured":"Jayasinghe, D.: FAWS for SOAP-based web services (2005). http:\/\/www.ibm.com\/developerworks\/webservices\/library\/ws-faws\/"},{"key":"5_CR63","unstructured":"Johnson, D., Zwaenepoel, W.: Sender-based message logging. 17th Annual International Symposium on Fault-Tolerant, Computing, pp. 14\u201319 (1987)"},{"key":"5_CR64","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1016\/0196-6774(90)90022-7","volume":"11","author":"D Johnson","year":"1990","unstructured":"Johnson, D., Zwaenepoel, W.: Recovery in distributed systems using optimistic message logging and checkpointing. J. Algorithms 11, 462\u2013491 (1990)","journal-title":"J. Algorithms"},{"key":"5_CR65","doi-asserted-by":"crossref","unstructured":"Juang, T., Venkatesan, S.: Crash recovery with little overhead. In: Proceedings of the 11th Conference on Distributed, Computing Systems, pp. 454\u2013461 (1991)","DOI":"10.1109\/ICDCS.1991.148709"},{"key":"5_CR66","doi-asserted-by":"crossref","unstructured":"Khare, R., Taylor, R.N.: Extending the representational state transfer (REST) architectural style for decentralized systems. In: ICSE \u201904: Proceedings of the 26th International Conference on Software Engineering, pp. 428\u2013437. IEEE Computer Society, Washington (2004)","DOI":"10.1109\/ICSE.2004.1317465"},{"issue":"8","key":"5_CR67","doi-asserted-by":"publisher","first-page":"955","DOI":"10.1109\/71.238629","volume":"4","author":"JL Kim","year":"1993","unstructured":"Kim, J.L., Park, T.: An efficient protocol for checkpointing recovery in distributed systems. IEEE Trans. Parallel Distrib. Syst. 4(8), 955\u2013960 (1993)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"5_CR68","doi-asserted-by":"crossref","unstructured":"Kobus, T., Wojciechowski, P.T.: A 90\u00a0% RESTful group communication service. In: Proceedings of DCDP \u201910: The 1st International Workshop on Decentralized Coordination of Distributed Processes, Amsterdam, The Netherlands (2010). An extended abstract appeared in EPTCS, vol. 27. A full version published as Technical Report RA-2\/10, Institute of Computing Science, Pozna\u0144 University of Technology","DOI":"10.4204\/EPTCS.27.5"},{"key":"5_CR69","doi-asserted-by":"crossref","unstructured":"Kobus, T., Wojciechowski, P.T.: RESTGroups for resilient Web services. In: Proceedings of SOFSEM \u201912: The 38th International Conference on Current Trends in Theory and Practice of Computer Science: Software & Web Engineering Track, vol. 7147, LNCS, pp. 505\u2013517 (2012)","DOI":"10.1007\/978-3-642-27660-6_41"},{"key":"5_CR70","doi-asserted-by":"crossref","unstructured":"Kochman, S., Wojciechowski, P.T., Kmieciak, M.: Batched transactions for RESTful web services. In: Harth, A., Koch N. (eds.) Proceedings of Composable Web \u201911: The 3rd International Workshop on Lightweight Integration on the Web (co-located with ICWE \u201911: The 11th International Conference on Web Engineering, Paphos, Cyprus), Lecture Notes in Computer Science, vol. 7059, pp. 86\u201398. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-27997-3_8"},{"issue":"1","key":"5_CR71","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/TSE.1987.232562","volume":"13","author":"R Koo","year":"1987","unstructured":"Koo, R., Toueg, S.: Checkpointing and rollback-recovery for distributed systems. IEEE Trans. Softw. Eng. 13(1), 23\u201331 (1987)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"5_CR72","doi-asserted-by":"publisher","unstructured":"Li, J., Karp, A.H.: Access control for the services oriented architecture. In: Proceedings of the 2007 ACM Workshop on Secure Web Services, pp. 9\u201317. ACM (2007). doi:10.1145\/1314418.1314421","DOI":"10.1145\/1314418.1314421"},{"key":"5_CR73","doi-asserted-by":"crossref","unstructured":"Li, W., He, J., Ma, Q., Yen, I.L., Bastani, F., Paul, R.: A framework to support survivable web services. In: IPDPS \u201905: Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS\u201905)\u2014Papers, p. 93.2. IEEE Computer Society, Washington (2005). http:\/\/dx.doi.org\/10.1109\/IPDPS.2005.27","DOI":"10.1109\/IPDPS.2005.27"},{"key":"5_CR74","doi-asserted-by":"publisher","unstructured":"Liang, D., Fang, C.L., Chen, C., Lin, F.: Fault tolerant web service. In: Proceedings of 10th Asia-Pacific Software Engineering Conference, pp. 310\u2013319 (2003). doi:10.1109\/APSEC.2003.1254385","DOI":"10.1109\/APSEC.2003.1254385"},{"key":"5_CR75","doi-asserted-by":"publisher","unstructured":"Liu, L., Wu, Z., Ma, Z., Wei, W.: A fault-tolerant framework for web services. In: WRI World Congress on Software Engineering, WCSE \u201909, vol. 3, pp. 138\u2013142 (2009). doi:10.1109\/WCSE.2009.211","DOI":"10.1109\/WCSE.2009.211"},{"issue":"6","key":"5_CR76","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1109\/71.595580","volume":"8","author":"D Mannivanan","year":"1997","unstructured":"Mannivanan, D., Netzer, R., Singhal, M.: Finding consistent global checkpoints in a distributed computation. IEEE Trans. Parallel Distrib. Syst. 8(6), 623\u2013627 (1997)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"5_CR77","doi-asserted-by":"crossref","unstructured":"Marinos, A., Razavi, A., Moschoyiannis, S., Krause, P.: RETRO: A consistent and recoverable RESTful transaction model. In: Proceedings of ICWS \u201909: The 7th IEEE International Conference on Web Services (2009)","DOI":"10.1109\/ICWS.2009.99"},{"key":"5_CR78","doi-asserted-by":"crossref","unstructured":"Maymounkov, P., Mazi\u00e8res, D.: Kademlia: A peer-to-peer information system based on the xor metric. In: Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS \u201901, pp. 53\u201365. Springer, London (2002)","DOI":"10.1007\/3-540-45748-8_5"},{"key":"5_CR79","doi-asserted-by":"crossref","unstructured":"Mena, S., Schiper, A., Wojciechowski, P.T.: A step towards a new generation of group communication systems. In: Endler, M., Schmidt D. (eds.) Proceedings of Middleware \u201903: The 4th ACM\/IFIP\/USENIX International Middleware Conference (Rio de Janeiro, Brazil), Lecture Notes in Computer Science, vol. 2672, pp. 414\u2013432. Springer, Heidelberg (2003)","DOI":"10.1007\/3-540-44892-6_21"},{"key":"5_CR80","unstructured":"Merideth, M.G., Iyengar, A., Mikalsen, T.A., Tai, S., Rouvellou, I., Narasimhan, P.: Thema: byzantine-fault-tolerant middleware for web-service applications. In: SRDS, pp. 131\u2013142. IEEE Computer Society (2005). http:\/\/dblp.uni-trier.de\/db\/conf\/srds\/srds2005.html#MeridethIMTRN05"},{"key":"5_CR81","unstructured":"Microsoft: Windows Azure\u2014team blog. http:\/\/blogs.msdn.com\/windowsazure (2008\u201311)"},{"key":"5_CR82","unstructured":"Musgrove, M.: Transactional support for JAX RS based applications. http:\/\/community.jboss.org\/wiki\/TransactionalsupportforJAXRSbasedapplications (2009)"},{"key":"5_CR83","doi-asserted-by":"crossref","unstructured":"Myers, A.C., Liskov, B.: Protecting privacy using the decentralized label model. ACM Trans. Softw. Eng. Methodol. 9, 410\u2013442 (2000). http:\/\/doi.acm.org\/10.1145\/363516.363526","DOI":"10.1145\/363516.363526"},{"key":"5_CR84","unstructured":"OASIS: Web Services Base Notification 1.3 (WS-BaseNotification) (2006)"},{"key":"5_CR85","unstructured":"OASIS: Web Services Brokered Notification 1.3 (WS-BrokeredNotification) (2006)"},{"key":"5_CR86","unstructured":"OASIS: Web services reliable messaging (WS-ReliableMessaging) version 1.1 (2008).http:\/\/docs.oasis-open.org\/ws-rx\/wsrm\/v1.1\/wsrm.html"},{"key":"5_CR87","unstructured":"Oracle Corporation: Oracle BPEL Process Manager (2009). http:\/\/www.oracle.com\/technology\/products\/ias\/bpel\/"},{"key":"5_CR88","unstructured":"Plank, J., Beck, M., Kingsley, G.: Compiler assisted memory exclusion for fast checkpointing, pp. 62\u201367. IEEE Technical Committee on Operating Systems Newsletter, Fault Tolerance (1995, special issue)"},{"issue":"2","key":"5_CR89","first-page":"221","volume":"1","author":"B Randell","year":"1975","unstructured":"Randell, B.: System structure for software fault tolerance. IEEE Trans. Software Eng. 1(2), 221\u2013232 (1975)","journal-title":"IEEE Trans. Software Eng."},{"key":"5_CR90","unstructured":"Red Hat: JGroups\u2014a toolkit for reliable multicast communication. http:\/\/www.jgroups.org\/ (2009)"},{"key":"5_CR91","unstructured":"Richardson, L., Ruby, S.: RESTful Web Services. O\u2019Reilly, Media (2007)"},{"key":"5_CR92","unstructured":"Rotem-Gal-Oz, A.: Transactions are bad for REST. http:\/\/www.rgoarchitects.com\/nblog\/2009\/06\/15\/TransactionsAreBadForREST.aspx (2009)"},{"key":"5_CR93","unstructured":"Rotem-Gal-Oz, A., Bruno, E., Dahan, U.: SOA Patterns, chapter 5.4 Saga. Manning Publications Co., Greenwich (2007)"},{"key":"5_CR94","doi-asserted-by":"crossref","unstructured":"Salas, J., Perez-Sorrosal, F., Mart\u00ednez, M.P., Jim\u00e9nez-Peris, R.: WS-Replication: a framework for highly available web services (Edinburgh, Scotland). In: Proceedings of the 15th International Conference on World Wide Web, pp. 357\u2013366. ACM Press, New York (2006)","DOI":"10.1145\/1135777.1135831"},{"key":"5_CR95","doi-asserted-by":"crossref","unstructured":"Santos, G.T., Lung, L.C., Montez, C.: FTWeb: a fault tolerant infrastructure for web services. In: Proceedings of 9th IEEE International EDOC Enterprise Computing Conference, pp. 95\u2013105 (2005)","DOI":"10.1109\/EDOC.2005.15"},{"issue":"4","key":"5_CR96","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1145\/98163.98167","volume":"22","author":"F Schneider","year":"1990","unstructured":"Schneider, F.: Implementing fault tolerant services using the state machine approach: a tutorial. ACM Comput. Surv. 22(4), 299\u2013319 (1990)","journal-title":"ACM Comput. Surv."},{"key":"5_CR97","doi-asserted-by":"crossref","unstructured":"She, W., Yen, I.L., Thuraisingham, B., Bertino, E.: The SCIFC model for information flow control in web service composition. In: Proceedings of the 2009 IEEE International Conference on Web Services, ICWS \u201909, pp. 1\u20138. IEEE Computer Society, Washington (2009). http:\/\/dx.doi.org\/10.1109\/ICWS.2009.13","DOI":"10.1109\/ICWS.2009.13"},{"key":"5_CR98","doi-asserted-by":"crossref","unstructured":"Smith, G., Volpano, D.: Secure information flow in a multi-threaded imperative language. In: Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL \u201998, pp. 355\u2013364. ACM, New York (1998). http:\/\/doi.acm.org\/10.1145\/268946.268975","DOI":"10.1145\/268946.268975"},{"key":"5_CR99","doi-asserted-by":"crossref","unstructured":"Souza, J.L.R., Siqueira, F.: Providing dependability for web services. In: SAC \u201908: Proceedings of the 2008 ACM Symposium on Applied Computing, pp. 2207\u20132211. ACM, Fortaleza (2008)","DOI":"10.1145\/1363686.1364212"},{"key":"5_CR100","unstructured":"Spread Concepts LLC: The Spread toolkit. http:\/\/www.spread.org\/ (2006)"},{"issue":"3","key":"5_CR101","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1145\/3959.3962","volume":"3","author":"R Storm","year":"1985","unstructured":"Storm, R., Yemini, S.: Optimistic recovery in distributed systems. ACM Trans. Comput. Syst. 3(3), 204\u2013226 (1985)","journal-title":"ACM Trans. Comput. Syst."},{"issue":"2","key":"5_CR102","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/BF02280832","volume":"8","author":"S Venkatesan","year":"1994","unstructured":"Venkatesan, S.: Efficient algorithms for optimistic crash recovery. Distrib. Comput. 8(2), 105\u2013114 (1994)","journal-title":"Distrib. Comput."},{"issue":"3","key":"5_CR103","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1109\/71.584092","volume":"8","author":"S Venkatesan","year":"1997","unstructured":"Venkatesan, S., Juang, T., Alagar, S.: Optimistic crash recovery without changing application messages. IEEE Trans. Parallel Distrib. Syst. 8(3), 263\u2013271 (1997)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"5_CR104","doi-asserted-by":"crossref","unstructured":"Volpano, D.M., Smith, G.: A type-based approach to program security. In: Proceedings of the 7th International Joint Conference CAAP\/FASE on Theory and Practice of Software Development, TAPSOFT \u201997, pp. 607\u2013621. Springer, London (1997)","DOI":"10.1007\/BFb0030629"},{"key":"5_CR105","doi-asserted-by":"crossref","unstructured":"Wang, M., Fuchs, W.: Optimistic message logging for independent checkpointing in message-passing systems. In: Proceedings of the Symposium on Reliable Distributed Systems, pp. 147\u2013154 (1992)","DOI":"10.1109\/RELDIS.1992.235132"},{"key":"5_CR106","unstructured":"Wang, Y.M.: Maximum and minimum consistent global checkpoints and their applications. In: Proceedings of IEEE the 14th Symposium on Reliable Distributed Systems, pp. 86\u201395 (1995)"},{"key":"5_CR107","doi-asserted-by":"crossref","unstructured":"Wang, Y.M.: Consistent global checkpoints that contain a given set of local checkpoints. IEEE Trans. Comput. 46(4), 456\u2013468 (1997). http:\/\/dx.doi.org\/10.1109\/12.588059","DOI":"10.1109\/12.588059"},{"issue":"4","key":"5_CR108","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1109\/12.588059","volume":"46","author":"YM Wang","year":"1997","unstructured":"Wang, Y.M.: Consistent global checkpoints that contain a given set of local checkpoints. IEEE Trans. Comput. 46(4), 456\u2013468 (1997)","journal-title":"IEEE Trans. Comput."},{"key":"5_CR109","doi-asserted-by":"crossref","unstructured":"Wiesmann, M., Pedone, F., Schiper, A., Kemme, B., Alonso, G.: Understanding replication in databases and distributed systems. In: Proceedings of ICDCS \u201900: the 20th IEEE International Conference on Distributed, Computing Systems, pp. 464\u2013474 (2000)","DOI":"10.1109\/ICDCS.2000.840959"},{"key":"5_CR110","doi-asserted-by":"crossref","unstructured":"Ye, X., Shen, Y.: A middleware for replicated web services. In: Proceedings of the IEEE International Conference on Web Services (ICWS\u201905), pp. 631\u2013638. IEEE Computer Society, Washington (2005)","DOI":"10.1109\/ICWS.2005.8"},{"key":"5_CR111","doi-asserted-by":"crossref","unstructured":"Yildiz, U., Godard, C.: Information flow control with decentralized service composition. In: 2009 IEEE International Conference on Web Services (ICWS 2009), pp. 9\u201317 (2007)","DOI":"10.1109\/ICWS.2007.109"},{"key":"5_CR112","doi-asserted-by":"publisher","unstructured":"Yin, J., Chen, H., Deng, S., Wu, Z., Pu, C.: A dependable esb framework for service integration. Internet Computing, IEEE 13(2), 26\u201334 (2009). doi:10.1109\/MIC.2009.26","DOI":"10.1109\/MIC.2009.26"},{"key":"5_CR113","doi-asserted-by":"crossref","unstructured":"Zhao, W.: A lightweight fault tolerance framework for web services. In: Proceedings of IEEE\/WIC\/ACM International Conference on Web, Intelligence, pp. 542\u2013548 (2007)","DOI":"10.1109\/WI.2007.18"},{"key":"5_CR114","doi-asserted-by":"publisher","unstructured":"Zhao, W., Zhang, H., Chai, H.: A lightweight fault tolerance framework for web services. Web Intell. Agent Syst. 7(3), 255\u2013268 (2009). doi:10.3233\/WIA-2009-0167, http:\/\/dx.doi.org\/10.3233\/WIA-2009-0167","DOI":"10.3233\/WIA-2009-0167"}],"container-title":["Studies in Computational Intelligence","Advanced SOA Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38957-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T18:30:38Z","timestamp":1746037838000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-38957-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,29]]},"ISBN":["9783642389566","9783642389573"],"references-count":114,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38957-3_5","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2013,10,29]]},"assertion":[{"value":"29 October 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}