{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:25Z","timestamp":1750306585529,"version":"3.41.0"},"reference-count":165,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2015,6,24]],"date-time":"2015-06-24T00:00:00Z","timestamp":1435104000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2015,6,24]]},"abstract":"<jats:p>Service Oriented Architecture (SOA) enables the creation of distributed applications from independently developed and deployed services. As with any component-based system, the overall performance and quality of the system is an aggregate function of its component services. In this article, we present a novel approach for managing bottom-up faults in service-based systems. Bottom-up faults are a special case of system-wide exceptions that are defined as abnormal conditions or defects occurring in component services, which if not detected and\/or managed, may lead to runtime failures. Examples of bottom-up faults include network outage, server disruption, and changes to service provisioning (e.g., new operation parameter required) that may have an impact on the way component services are consumed. We propose a soft-state signaling-based approach to propagate these faults from participants to composite services. Soft-state refers to a class of protocols where the state of a service is constantly refreshed by periodic messages, and user\/service takes up the responsibility of communicating and maintaining its state. Soft-state-based protocols have a number of advantages including implicit error recovery and easier fault management, resulting in high availability for systems. Although soft-state has been widely used in various Internet protocols, this work is the first (to the best of our knowledge) to adopt soft-state for fault management in composite services. The proposed approach includes protocols for fault propagation (pure soft-state and soft-state with explicit removal) and fault reaction (rule-based). We also present experiment results to assess the performance and applicability of our approach.<\/jats:p>","DOI":"10.1145\/2739045","type":"journal-article","created":{"date-parts":[[2015,6,25]],"date-time":"2015-06-25T14:36:19Z","timestamp":1435242979000},"page":"1-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Bottom-Up Fault Management in Service-Based Systems"],"prefix":"10.1145","volume":"15","author":[{"given":"Amal","family":"Alhosban","sequence":"first","affiliation":[{"name":"University of Michigan - Flint"}]},{"given":"Khayyam","family":"Hashmi","sequence":"additional","affiliation":[{"name":"Wayne State University"}]},{"given":"Zaki","family":"Malik","sequence":"additional","affiliation":[{"name":"Wayne State University"}]},{"given":"Brahim","family":"Medjahed","sequence":"additional","affiliation":[{"name":"University of Michigan - Dearborn"}]},{"given":"Salima","family":"Benbernou","sequence":"additional","affiliation":[{"name":"Universit\u00e8 Paris Descartes"}]}],"member":"320","published-online":{"date-parts":[[2015,6,24]]},"reference":[{"volume-title":"Proceedings of ICSOC. 319--334","author":"Akram M. S.","key":"e_1_2_1_1_1","unstructured":"Akram , M. S. , Medjahed , B. , and Bouguettaya , A . 2003. Supporting dynamic changes in Web service environments . In Proceedings of ICSOC. 319--334 . Akram, M. S., Medjahed, B., and Bouguettaya, A. 2003. Supporting dynamic changes in Web service environments. In Proceedings of ICSOC. 319--334."},{"volume-title":"Proceedings of ICWE. 59--73","author":"Alhosban A.","key":"e_1_2_1_2_1","unstructured":"Alhosban , A. , Hashmi , K. , Malik , Z. , and Medjahed , B . 2011. Assessing fault occurrence likelihood for service-oriented systems . In Proceedings of ICWE. 59--73 . Alhosban, A., Hashmi, K., Malik, Z., and Medjahed, B. 2011. Assessing fault occurrence likelihood for service-oriented systems. In Proceedings of ICWE. 59--73."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2012.50"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.154"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69534-9_28"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.1011"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.20"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/511446.511509"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89897-9_1"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294904.1294906"},{"key":"e_1_2_1_12_1","first-page":"340","article-title":"Policies and aspects for the supervision of BPEL processes","author":"Baresi L.","year":"2007","unstructured":"Baresi , L. , Guinea , S. , and Plebani , P. 2007 b. Policies and aspects for the supervision of BPEL processes . In Advanced Information Systems Engineering , Spring er, 340 -- 354 . Baresi, L., Guinea, S., and Plebani, P. 2007b. Policies and aspects for the supervision of BPEL processes. In Advanced Information Systems Engineering, Springer, 340--354.","journal-title":"Advanced Information Systems Engineering"},{"key":"e_1_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Becker S. Brogi A. Gorton I. Overhage S. Romanovsky A. and Tivoli M. 2006. Towards an Engineering Approach to Component Adaptation. Springer.  Becker S. Brogi A. Gorton I. Overhage S. Romanovsky A. and Tivoli M. 2006. Towards an Engineering Approach to Component Adaptation . Springer.","DOI":"10.1007\/11786160_11"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2008.113"},{"volume-title":"Proceedings of TES. 155--174","author":"Benatallah B.","key":"e_1_2_1_15_1","unstructured":"Benatallah , B. , Medjahed , B. , Bouguettaya , A. , Elmagarmid , A. K. , and Beard , J . 2000. Composing and maintaining Web-based virtual enterprises . In Proceedings of TES. 155--174 . Benatallah, B., Medjahed, B., Bouguettaya, A., Elmagarmid, A. K., and Beard, J. 2000. Composing and maintaining Web-based virtual enterprises. In Proceedings of TES. 155--174."},{"volume-title":"Proceedings of the IFIP\/IEEE International Symposium on Integrated Network Management.","author":"Benharref A.","key":"e_1_2_1_16_1","unstructured":"Benharref , A. , Glitho , R. , and Dssouli , R . 2005. A Web service based architecture for detecting faults in Web services . In Proceedings of the IFIP\/IEEE International Symposium on Integrated Network Management. Benharref, A., Glitho, R., and Dssouli, R. 2005. A Web service based architecture for detecting faults in Web services. In Proceedings of the IFIP\/IEEE International Symposium on Integrated Network Management."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336534"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2009.31"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2009.12.002"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.102"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060773"},{"volume-title":"Proceedings of Software Engineering (Workshops). 225--232","author":"Braune S.","key":"e_1_2_1_22_1","unstructured":"Braune , S. , Brucker , A. D. , Kleser , G. , Li , K. , Meijler , T. D. , Paulheim , H. , and Probst , F . 2011. A service-oriented architecture for emergency management systems . In Proceedings of Software Engineering (Workshops). 225--232 . Braune, S., Brucker, A. D., Kleser, G., Li, K., Meijler, T. D., Paulheim, H., and Probst, F. 2011. A service-oriented architecture for emergency management systems. In Proceedings of Software Engineering (Workshops). 225--232."},{"key":"e_1_2_1_23_1","unstructured":"Brown K. and Ellis M. 2004. Best practices for Web services versioning. IBM Developer Works White Paper.  Brown K. and Ellis M. 2004. Best practices for Web services versioning. IBM Developer Works White Paper."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11853107_4"},{"key":"e_1_2_1_25_1","unstructured":"Burns A. and Wellings A. J. 2001. Real-Time Systems and Programming Languages: ADA 95 Real-Time Java and Real-Time POSIX. Addison-Wesley Longman Publishing Co. Inc. Boston MA.   Burns A. and Wellings A. J. 2001. Real-Time Systems and Programming Languages: ADA 95 Real-Time Java and Real-Time POSIX . Addison-Wesley Longman Publishing Co. Inc. Boston MA."},{"key":"e_1_2_1_26_1","volume-title":"JAGR: An autonomous self-recovering application server. In Active Middleware Services, 168--178.","author":"Candea G.","year":"2003","unstructured":"Candea , G. , Kiciman , E. , Zhang , S. , Keyani , P. , and Fox , A . 2003 . JAGR: An autonomous self-recovering application server. In Active Middleware Services, 168--178. Candea, G., Kiciman, E., Zhang, S., Keyani, P., and Fox, A. 2003. JAGR: An autonomous self-recovering application server. In Active Middleware Services, 168--178."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2005.65"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.879813"},{"key":"e_1_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Casati F. Ceri S. Pernici B. and Pozzi G. 1996a. Deriving active rules for workflow enactment. In Database and Expert Systems Applications Springer 94--115.   Casati F. Ceri S. Pernici B. and Pozzi G. 1996a. Deriving active rules for workflow enactment. In Database and Expert Systems Applications Springer 94--115.","DOI":"10.1007\/BFb0034673"},{"key":"e_1_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Casati F. Ceri S. Pernici B. and Pozzi G. 1996b. Workflow evolution. In Data and Knowledge Engineering Springer Verlag 438--455.   Casati F. Ceri S. Pernici B. and Pozzi G. 1996b. Workflow evolution. In Data and Knowledge Engineering Springer Verlag 438--455.","DOI":"10.1007\/BFb0019939"},{"volume-title":"Proceedings of the 15th International Conference on Conceptual Modeling (ER). 438--455","author":"Casati F.","key":"e_1_2_1_31_1","unstructured":"Casati , F. , Ceri , S. , Pernici , B. , and Pozzi , G . 1996c. Workflow evolution . In Proceedings of the 15th International Conference on Conceptual Modeling (ER). 438--455 . Casati, F., Ceri, S., Pernici, B., and Pozzi, G. 1996c. Workflow evolution. In Proceedings of the 15th International Conference on Conceptual Modeling (ER). 438--455."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(99)00018-6"},{"volume-title":"Proceedings of the 12th International Conference on Advanced Information Systems Engineering (CAiSE). 13--31","author":"Casati F.","key":"e_1_2_1_33_1","unstructured":"Casati , F. , Ilnicki , S. , Jin , L.-J. , Krishnamoorthy , V. , and Shan , M . -C. 2000b. Adaptive and dynamic service composition in eflow . In Proceedings of the 12th International Conference on Advanced Information Systems Engineering (CAiSE). 13--31 . Casati, F., Ilnicki, S., Jin, L.-J., Krishnamoorthy, V., and Shan, M.-C. 2000b. Adaptive and dynamic service composition in eflow. In Proceedings of the 12th International Conference on Advanced Information Systems Engineering (CAiSE). 13--31."},{"volume-title":"Proceedings of the 11th International IEEE Conference on Data Engineering. 341--348","author":"Chakravarthy S.","key":"e_1_2_1_34_1","unstructured":"Chakravarthy , S. , Krishnaprasad , V. , Tamizuddin , Z. , and Badani , R . 1995a. ECA rule integration into an OODBMS: Architecture and implementation . In Proceedings of the 11th International IEEE Conference on Data Engineering. 341--348 . Chakravarthy, S., Krishnaprasad, V., Tamizuddin, Z., and Badani, R. 1995a. ECA rule integration into an OODBMS: Architecture and implementation. In Proceedings of the 11th International IEEE Conference on Data Engineering. 341--348."},{"key":"e_1_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Chakravarthy S. Tamizuddin Z. and Zhou J. 1995b. A visualization and explanation tool for debugging ECA rules in active databases. In Rules in Database Systems Springer 197--209.   Chakravarthy S. Tamizuddin Z. and Zhou J. 1995b. A visualization and explanation tool for debugging ECA rules in active databases. In Rules in Database Systems Springer 197--209.","DOI":"10.1007\/3-540-60365-4_128"},{"key":"e_1_2_1_36_1","volume-title":"Lecture Notes in Computer Science Series","volume":"985","author":"Chakravarthy S.","unstructured":"Chakravarthy , S. , Tamizuddin , Z. , and Zhou , J . 1995c. A visualization and explanation tool for debugging ECA rules in active databases. In Rules in Database Systems, T. Sellis (Ed) . Lecture Notes in Computer Science Series , vol. 985 , Springer Berlin, 197--209. Chakravarthy, S., Tamizuddin, Z., and Zhou, J. 1995c. A visualization and explanation tool for debugging ECA rules in active databases. In Rules in Database Systems, T. Sellis (Ed). Lecture Notes in Computer Science Series, vol. 985, Springer Berlin, 197--209."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2009.5069070"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04425-0_36"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1139922.1139945"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(99)00010-1"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(01)00012-6"},{"key":"e_1_2_1_42_1","unstructured":"Council U. N. R. 2005. Council U. N. R. 2005. Using information technology to enhance disaster management. Committee on Using Information Technology---Computer Science and Telecommunications Board. 1--39.  Council U. N. R. 2005. Council U. N. R. 2005. Using information technology to enhance disaster management. Committee on Using Information Technology---Computer Science and Telecommunications Board. 1--39."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/93605.98730"},{"volume-title":"At Your Service: Service-Oriented Computing from an EU Perspective","author":"Di Nitto E.","key":"e_1_2_1_44_1","unstructured":"Di Nitto , E. 2009. At Your Service: Service-Oriented Computing from an EU Perspective . MIT Press . Di Nitto, E. 2009. At Your Service: Service-Oriented Computing from an EU Perspective. MIT Press."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/844316.844320"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031570.1031575"},{"key":"e_1_2_1_47_1","volume-title":"Proceedings of the 30th International Conference on Very Large Data Bases (VLDB).","volume":"30","author":"Dong X.","unstructured":"Dong , X. , Halevy , A. , Madhavan , J. , Nemes , E. , and Zhang , J . 2004. Similarity search for Web services . In Proceedings of the 30th International Conference on Very Large Data Bases (VLDB). Vol. 30 , 372--383. Dong, X., Halevy, A., Madhavan, J., Nemes, E., and Zhang, J. 2004. Similarity search for Web services. In Proceedings of the 30th International Conference on Very Large Data Bases (VLDB). Vol. 30, 372--383."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/11841760_6"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2005.43"},{"key":"e_1_2_1_50_1","first-page":"87","article-title":"The workflow activity model wamo","volume":"15","author":"Eder J.","year":"1995","unstructured":"Eder , J. and Liebhart , W. 1995 . The workflow activity model wamo . In Proceedings of CoopIS. Vol. 15 , 87 -- 98 . Eder, J. and Liebhart, W. 1995. The workflow activity model wamo. In Proceedings of CoopIS. Vol. 15, 87--98.","journal-title":"Proceedings of CoopIS."},{"key":"e_1_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Ellis C. A. and Keddara K. 2000. A workflow change is a workflow. In Business Process Management Models Techniques and Empirical Studies Springer-Verlag London UK 201--217.   Ellis C. A. and Keddara K. 2000. A workflow change is a workflow. In Business Process Management Models Techniques and Empirical Studies Springer-Verlag London UK 201--217.","DOI":"10.1007\/3-540-45594-9_13"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2010.198"},{"key":"e_1_2_1_53_1","unstructured":"Foster I. and Kesselman C. 2003. The Grid 2: Blueprint for a New Computing Infrastructure. Morgan Kaufmann Publishers Inc. San Francisco CA.   Foster I. and Kesselman C. 2003. The Grid 2: Blueprint for a New Computing Infrastructure . Morgan Kaufmann Publishers Inc. San Francisco CA."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.8"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31967-2_8"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272366.1272407"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.421.0005"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/582128.582134"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/582128.582135"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(98)00011-8"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.06.011"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0954-1810(00)00028-5"},{"volume-title":"Proceedings of the ICSE Workshop on Software Engineering for Adaptive and Self-Managing Systems (SEAMS). 53--62","author":"Grassi V.","key":"e_1_2_1_63_1","unstructured":"Grassi , V. , Marzolla , M. , and Mirandola , R . 2013. QoS-aware fully decentralized service assembly . In Proceedings of the ICSE Workshop on Software Engineering for Adaptive and Self-Managing Systems (SEAMS). 53--62 . Grassi, V., Marzolla, M., and Mirandola, R. 2013. QoS-aware fully decentralized service assembly. In Proceedings of the ICSE Workshop on Software Engineering for Adaptive and Self-Managing Systems (SEAMS). 53--62."},{"volume-title":"Architecting Dependable Systems II","author":"Guerra P. A. D. C.","key":"e_1_2_1_64_1","unstructured":"Guerra , P. A. D. C. , Rubira , C. M. F. , Romanovsky , A. , and De Lemos , R. 2004. A dependable architecture for cots-based software systems using protective wrappers . In Architecting Dependable Systems II , Springer , 144--166. Guerra, P. A. D. C., Rubira, C. M. F., Romanovsky, A., and De Lemos, R. 2004. A dependable architecture for cots-based software systems using protective wrappers. In Architecting Dependable Systems II, Springer, 144--166."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062589"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083069"},{"volume-title":"Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications (SOCA). 1--7.","author":"Haghighi P.","key":"e_1_2_1_67_1","unstructured":"Haghighi , P. , Burstein , F. , Al Taiar , H. , Arbon , P. , and Krishnaswamy , S . 2010. Ontology-based service-oriented architecture for emergency management in mass gatherings . In Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications (SOCA). 1--7. Haghighi, P., Burstein, F., Al Taiar, H., Arbon, P., and Krishnaswamy, S. 2010. Ontology-based service-oriented architecture for emergency management in mass gatherings. In Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications (SOCA). 1--7."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-007-7020-1"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2011.55"},{"volume-title":"Proceedings of the IEEE International Conference on Cybernetics (CYBCONF). 110--115","author":"Hashmi K.","key":"e_1_2_1_70_1","unstructured":"Hashmi , K. , Alhosban , A. , Najmi , E. , and Malik , Z . 2013. Dependency modeling in automated Web services quality component negotiations . In Proceedings of the IEEE International Conference on Cybernetics (CYBCONF). 110--115 . Hashmi, K., Alhosban, A., Najmi, E., and Malik, Z. 2013. Dependency modeling in automated Web services quality component negotiations. In Proceedings of the IEEE International Conference on Cybernetics (CYBCONF). 110--115."},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2014.77"},{"key":"e_1_2_1_72_1","volume-title":"Proceedings of the W3C XML Schema Working Group.","author":"Hoylen S.","year":"2010","unstructured":"Hoylen , S. 2010 . XML schema versioning use cases . In Proceedings of the W3C XML Schema Working Group. Hoylen, S. 2010. XML schema versioning use cases. In Proceedings of the W3C XML Schema Working Group."},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2005.21"},{"volume-title":"Problem frames: Analysing and Structuring Software Development Problems","author":"Jackson M.","key":"e_1_2_1_74_1","unstructured":"Jackson , M. 2001. Problem frames: Analysing and Structuring Software Development Problems . Addison-Wesley . Jackson, M. 2001. Problem frames: Analysing and Structuring Software Development Problems. Addison-Wesley."},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863984"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.892849"},{"key":"e_1_2_1_77_1","unstructured":"Joeris G. and Herzog O. 1999. Managing evolving workflow specifications with schema versioning and migration rules. TZI Tech. Rep. 15 University of Bremen.  Joeris G. and Herzog O. 1999. Managing evolving workflow specifications with schema versioning and migration rules. TZI Tech. Rep. 15 University of Bremen."},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1188966.1188997"},{"key":"e_1_2_1_79_1","doi-asserted-by":"crossref","unstructured":"Kantere V. Kiringa I. Mylopoulos J. Kementsietsidis A. and Arenas M. 2004. Coordinating peer databases using ECA rules. In Databases Information Systems and Peer-to-Peer Computing Springer 108--122.  Kantere V. Kiringa I. Mylopoulos J. Kementsietsidis A. and Arenas M. 2004. Coordinating peer databases using ECA rules. In Databases Information Systems and Peer-to-Peer Computing Springer 108--122.","DOI":"10.1007\/978-3-540-24629-9_9"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/1619258.1619271"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/SDSOA.2007.12"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168260.2168261"},{"volume-title":"Proceedings of the 4th IECIS International Conference on Cooperative Information Systems (COOPIS).","author":"Kradolfer M.","key":"e_1_2_1_83_1","unstructured":"Kradolfer , M. and Geppert , A . 1999. Dynamic workflow schema evolution based on workflow type versioning and workflow migration . In Proceedings of the 4th IECIS International Conference on Cooperative Information Systems (COOPIS). Kradolfer, M. and Geppert, A. 1999. Dynamic workflow schema evolution based on workflow type versioning and workflow migration. In Proceedings of the 4th IECIS International Conference on Cooperative Information Systems (COOPIS)."},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/1188966.1188976"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/11596141_2"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2012.109"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASWEC.2006.6"},{"key":"e_1_2_1_88_1","volume-title":"Proceedings of the International Conference on Machine Learning and Cybernetics.","author":"Liao B.-S.","year":"2004","unstructured":"Liao , B.-S. , Gao , J. , Hu , J. , and Jun Chen , J. 2004 . A federated multi-agent system: Autonomic control of Web services . In Proceedings of the International Conference on Machine Learning and Cybernetics. Liao, B.-S., Gao, J., Hu, J., and Jun Chen, J. 2004. A federated multi-agent system: Autonomic control of Web services. In Proceedings of the International Conference on Machine Learning and Cybernetics."},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2009.28"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11761-010-0074-3"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCTD.2009.171"},{"volume-title":"Proceedings of the IEEE International Conference on Web Services (ICWS). 767--774","author":"Marconi A.","key":"e_1_2_1_92_1","unstructured":"Marconi , A. , Pistore , M. , and Poccianti , P . 2007a. Automated Web service composition at work: The Amazon\/MPS case study . In Proceedings of the IEEE International Conference on Web Services (ICWS). 767--774 . Marconi, A., Pistore, M., and Poccianti, P. 2007a. Automated Web service composition at work: The Amazon\/MPS case study. In Proceedings of the IEEE International Conference on Web Services (ICWS). 767--774."},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1007\/11948148_40"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEFM.2006.34"},{"volume-title":"Proceedings of the 3rd South-East European Workshop on Formal Methods. 36","author":"Marconi A.","key":"e_1_2_1_95_1","unstructured":"Marconi , A. , Pistore , M. , and Traverso , P . 2007b. An iterative approach for the process-level composition of Web services . In Proceedings of the 3rd South-East European Workshop on Formal Methods. 36 . Marconi, A., Pistore, M., and Traverso, P. 2007b. An iterative approach for the process-level composition of Web services. In Proceedings of the 3rd South-East European Workshop on Formal Methods. 36."},{"key":"e_1_2_1_96_1","first-page":"23","article-title":"Automated composition of Web services: The astro approach","volume":"31","author":"Marconi A.","year":"2008","unstructured":"Marconi , A. , Pistore , M. , and Traverso , P. 2008 . Automated composition of Web services: The astro approach . IEEE Data Eng. Bull. 31 , 3, 23 -- 26 . Marconi, A., Pistore, M., and Traverso, P. 2008. Automated composition of Web services: The astro approach. IEEE Data Eng. Bull. 31, 3, 23--26.","journal-title":"IEEE Data Eng. Bull."},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2009.5069068"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/1035167.1035198"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-006-7003-7"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218843004000924"},{"volume-title":"Proceedings of CAiSE. 597--611","author":"Medjahed B.","key":"e_1_2_1_101_1","unstructured":"Medjahed , B. and Malik , Z . 2011. Bottom-up fault management in composite Web services . In Proceedings of CAiSE. 597--611 . Medjahed, B. and Malik, Z. 2011. Bottom-up fault management in composite Web services. In Proceedings of CAiSE. 597--611."},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/337180.337201"},{"volume-title":"Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS35)","author":"Meng J.","key":"e_1_2_1_103_1","unstructured":"Meng , J. , Su , S. Y. W. , Lam , H. , and Helal , A . 2002. Achieving dynamic inter-organizational workflow management by integrating business processes, events, and rules . In Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS35) . Meng, J., Su, S. Y. W., Lam, H., and Helal, A. 2002. Achieving dynamic inter-organizational workflow management by integrating business processes, events, and rules. In Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS35)."},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/582128.582138"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/235968.280350"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370018.1370021"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242706"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213866"},{"volume-title":"Proceedings of the IEEE International Conference on Web Services (ICWS). 398--345","author":"Naccache H.","key":"e_1_2_1_109_1","unstructured":"Naccache , H. and Gannod , G . 2007. A self-healing framework for Web services . In Proceedings of the IEEE International Conference on Web Services (ICWS). 398--345 . Naccache, H. and Gannod, G. 2007. A self-healing framework for Web services. In Proceedings of the IEEE International Conference on Web Services (ICWS). 398--345."},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1109\/SASOW.2008.35"},{"key":"e_1_2_1_111_1","doi-asserted-by":"crossref","unstructured":"Nakagawa H. Ohsuga A. and Honiden S. 2010. Cooperative behaviors description for self-* systems implementation. In Advances in Practical Applications of Agents and Multiagent Systems Springer 69--74.  Nakagawa H. Ohsuga A. and Honiden S. 2010. Cooperative behaviors description for self-* systems implementation. In Advances in Practical Applications of Agents and Multiagent Systems Springer 69--74.","DOI":"10.1007\/978-3-642-12384-9_9"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/1988008.1988015"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGC.2012.123"},{"key":"e_1_2_1_114_1","unstructured":"OASIS-TC W. S. Q. M. 2011. Quality model for Web services.  OASIS-TC W. S. Q. M. 2011. Quality model for Web services."},{"volume-title":"Harnessing the Power of Disruptive Technologies","author":"Oram A.","key":"e_1_2_1_115_1","unstructured":"Oram , A. 2001. Peer -to-Peer : Harnessing the Power of Disruptive Technologies . O\u2019Reilly Media Inc ., Sebastopol, CA. Oram, A. 2001. Peer-to-Peer : Harnessing the Power of Disruptive Technologies. O\u2019Reilly Media Inc., Sebastopol, CA."},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2010.02.004"},{"key":"e_1_2_1_117_1","unstructured":"Papazoglou M. P. Traverso P. Dustdar S. and Leymann F. 2006. Service-oriented computing research roadmap. http:\/\/infolab.uvt.nl\/pub\/papazogloump-2006-96.pdf.  Papazoglou M. P. Traverso P. Dustdar S. and Leymann F. 2006. Service-oriented computing research roadmap. http:\/\/infolab.uvt.nl\/pub\/papazogloump-2006-96.pdf."},{"volume-title":"Proceedings of BPSC. 207--222","author":"Pascalau E.","key":"e_1_2_1_118_1","unstructured":"Pascalau , E. and Giurca , A . 2009. Towards enabling SaaS for business rules . In Proceedings of BPSC. 207--222 . Pascalau, E. and Giurca, A. 2009. Towards enabling SaaS for business rules. In Proceedings of BPSC. 207--222."},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25535-9_43"},{"key":"e_1_2_1_120_1","doi-asserted-by":"crossref","unstructured":"Pistore M. Barbon F. Bertoli P. Shaparau D. and Traverso P. 2004. Planning and monitoring Web service composition. In Artificial Intelligence: Methodology Systems and Applications Springer 106--115.  Pistore M. Barbon F. Bertoli P. Shaparau D. and Traverso P. 2004. Planning and monitoring Web service composition. In Artificial Intelligence: Methodology Systems and Applications Springer 106--115.","DOI":"10.1007\/978-3-540-30106-6_11"},{"volume-title":"Proceedings of IJCAI. 1252--1259","author":"Pistore M.","key":"e_1_2_1_121_1","unstructured":"Pistore , M. , Marconi , A. , Bertoli , P. , and Traverso , P . 2005. Automated composition of Web services by planning at the knowledge level . In Proceedings of IJCAI. 1252--1259 . Pistore, M., Marconi, A., Bertoli, P., and Traverso, P. 2005. Automated composition of Web services by planning at the knowledge level. In Proceedings of IJCAI. 1252--1259."},{"volume-title":"Proceedings of the 5th ACM\/IFIP\/USENIX International Conference on Middleware. 331--351","author":"Ponnekanti S. R.","key":"e_1_2_1_122_1","unstructured":"Ponnekanti , S. R. and Fox , A . 2004. Interoperability among independently evolving Web services . In Proceedings of the 5th ACM\/IFIP\/USENIX International Conference on Middleware. 331--351 . Ponnekanti, S. R. and Fox, A. 2004. Interoperability among independently evolving Web services. In Proceedings of the 5th ACM\/IFIP\/USENIX International Conference on Middleware. 331--351."},{"key":"e_1_2_1_123_1","unstructured":"Poulin M. 2006. Poulin M. 2006. Service versioning for SOA. SOAWorld Mag.  Poulin M. 2006. Poulin M. 2006. Service versioning for SOA. SOAWorld Mag ."},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1007\/11896548_64"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1145\/1244002.1244120"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1145\/316194.316202"},{"key":"e_1_2_1_127_1","volume-title":"T (Eds).","author":"Rao R. R.","year":"2007","unstructured":"Rao , R. R. , Eisenberg , J. , asnd Schmitt , T (Eds). 2007 . Improving Disaster Management: The Role of IT in Mitigation, Preparedness, Response, and Recovery. The National Academies Press . Rao, R. R., Eisenberg, J., asnd Schmitt, T (Eds). 2007. Improving Disaster Management: The Role of IT in Mitigation, Preparedness, Response, and Recovery. The National Academies Press."},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.431.0032"},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008604709862"},{"key":"e_1_2_1_130_1","doi-asserted-by":"crossref","unstructured":"Rinderle S. Reichert M. and Dadam P. 2004. On dealing with structural conflicts between process type and instance changes. In Business Process Management 274--289.  Rinderle S. Reichert M. and Dadam P. 2004. On dealing with structural conflicts between process type and instance changes. In Business Process Management 274--289.","DOI":"10.1007\/978-3-540-25970-1_18"},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.5555\/942807.943906"},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.5555\/645983.675267"},{"key":"e_1_2_1_133_1","unstructured":"Russell M. 2004. Make minor backward-compatible changes to your Web services. IBM Developer Works White Paper.  Russell M. 2004. Make minor backward-compatible changes to your Web services. IBM Developer Works White Paper."},{"key":"e_1_2_1_134_1","unstructured":"Russell M. 2005. Manage message contract changes with versioning. IBM Developer Works White Paper.  Russell M. 2005. Manage message contract changes with versioning. IBM Developer Works White Paper."},{"key":"e_1_2_1_135_1","unstructured":"Russell N. Ter Hofstede A. H. and Mulyar N. 2006. Workflow controlflow patterns: A revised view. BPM Center Report BPM-06-22.  Russell N. Ter Hofstede A. H. and Mulyar N. 2006. Workflow controlflow patterns: A revised view. BPM Center Report BPM-06-22."},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346237.1346241"},{"key":"e_1_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218843000000077"},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2005.64"},{"key":"e_1_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135831"},{"volume-title":"Proceedings of 15th IEEE International Requirements Engineering Conference (RE). 211--220","author":"Salifu M.","key":"e_1_2_1_140_1","unstructured":"Salifu , M. , Yu , Y. , and Nuseibeh , B . 2007. Specifying monitoring and switching problems in context . In Proceedings of 15th IEEE International Requirements Engineering Conference (RE). 211--220 . Salifu, M., Yu, Y., and Nuseibeh, B. 2007. Specifying monitoring and switching problems in context. In Proceedings of 15th IEEE International Requirements Engineering Conference (RE). 211--220."},{"key":"e_1_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.1145\/1139922.1139944"},{"key":"e_1_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1145\/1988008.1988023"},{"key":"e_1_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-7051(99)00028-3"},{"key":"e_1_2_1_144_1","volume-title":"Proceedings of BTW. 485--494","author":"Thatte S.","year":"2005","unstructured":"Thatte , S. 2005 . Biztalk integration broker . In Proceedings of BTW. 485--494 . Thatte, S. 2005. Biztalk integration broker. In Proceedings of BTW. 485--494."},{"volume-title":"Proceedings of the Semantic Web Conference (ISWC). 380--394","author":"Traverso P.","key":"e_1_2_1_145_1","unstructured":"Traverso , P. and Pistore , M . 2004. Automated composition of semantic Web services into executable processes . In Proceedings of the Semantic Web Conference (ISWC). 380--394 . Traverso, P. and Pistore, M. 2004. Automated composition of semantic Web services into executable processes. In Proceedings of the Semantic Web Conference (ISWC). 380--394."},{"key":"e_1_2_1_146_1","volume-title":"Studies in Computational Intelligence Series","volume":"331","author":"Tsamoura E.","unstructured":"Tsamoura , E. , Gounaris , A. , and Manolopoulos , Y . 2011. Queries over Web services. In New Directions in Web Data Management 1, A. Vakali and L. Jain, (Eds) , Studies in Computational Intelligence Series , vol. 331 , Springer Berlin, 139--169. Tsamoura, E., Gounaris, A., and Manolopoulos, Y. 2011. Queries over Web services. In New Directions in Web Data Management 1, A. Vakali and L. Jain, (Eds), Studies in Computational Intelligence Series, vol. 331, Springer Berlin, 139--169."},{"key":"e_1_2_1_147_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(00)00321-2"},{"volume-title":"Formal Methods for Software Architectures","author":"Van Lamsweerde A.","key":"e_1_2_1_148_1","unstructured":"Van Lamsweerde , A. 2003. From system goals to software architecture . In Formal Methods for Software Architectures , Springer , 25--43. Van Lamsweerde, A. 2003. From system goals to software architecture. In Formal Methods for Software Architectures, Springer, 25--43."},{"key":"e_1_2_1_149_1","doi-asserted-by":"crossref","unstructured":"Vanhatalo J. V\u00f6lzer H. and Leymann F. 2007. Faster and More Focused Control-Flow Analysis for Business Process Models through SESE Decomposition. Springer.  Vanhatalo J. V\u00f6lzer H. and Leymann F. 2007. Faster and More Focused Control-Flow Analysis for Business Process Models through SESE Decomposition . Springer.","DOI":"10.1007\/978-3-540-74974-5_4"},{"key":"e_1_2_1_150_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89652-4_11"},{"key":"e_1_2_1_151_1","doi-asserted-by":"publisher","DOI":"10.1007\/11596141_1"},{"key":"e_1_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2009.22"},{"key":"e_1_2_1_153_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.66"},{"key":"e_1_2_1_154_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.421.0129"},{"key":"e_1_2_1_155_1","doi-asserted-by":"publisher","DOI":"10.1145\/1385989.1386022"},{"volume-title":"Proceedings of Service-Oriented Computing (ICSOC). 14--25","author":"Wassermann B.","key":"e_1_2_1_156_1","unstructured":"Wassermann , B. and Emmerich , W . 2007. Reliable scientific service compositions . In Proceedings of Service-Oriented Computing (ICSOC). 14--25 . Wassermann, B. and Emmerich, W. 2007. Reliable scientific service compositions. In Proceedings of Service-Oriented Computing (ICSOC). 14--25."},{"key":"e_1_2_1_157_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2008.05.001"},{"key":"e_1_2_1_158_1","doi-asserted-by":"publisher","DOI":"10.1145\/1867713.1867717"},{"key":"e_1_2_1_159_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2009.36"},{"key":"e_1_2_1_160_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISME.2010.72"},{"key":"e_1_2_1_161_1","volume-title":"Proceedings of the IEEE International Symposium on Requirements Engineering. 34--41","author":"Yu E. S.","year":"1993","unstructured":"Yu , E. S. 1993 . Modeling organizations for information systems requirements engineering . In Proceedings of the IEEE International Symposium on Requirements Engineering. 34--41 . Yu, E. S. 1993. Modeling organizations for information systems requirements engineering. In Proceedings of the IEEE International Symposium on Requirements Engineering. 34--41."},{"key":"e_1_2_1_162_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0020-3"},{"key":"e_1_2_1_163_1","doi-asserted-by":"crossref","unstructured":"Yu Y. Lapouchnian A. Liaskos S. Mylopoulos J. and Leite J. C. 2008b. From goals to high-variability software design. In Foundations of Intelligent Systems Springer 1--16.   Yu Y. Lapouchnian A. Liaskos S. Mylopoulos J. and Leite J. C. 2008b. From goals to high-variability software design. In Foundations of Intelligent Systems Springer 1--16.","DOI":"10.1007\/978-3-540-68123-6_1"},{"key":"e_1_2_1_164_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2010.70"},{"key":"e_1_2_1_165_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806809"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2739045","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2739045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:23Z","timestamp":1750227383000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2739045"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,24]]},"references-count":165,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,6,24]]}},"alternative-id":["10.1145\/2739045"],"URL":"https:\/\/doi.org\/10.1145\/2739045","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"type":"print","value":"1533-5399"},{"type":"electronic","value":"1557-6051"}],"subject":[],"published":{"date-parts":[[2015,6,24]]},"assertion":[{"value":"2013-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-06-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}