Home > Research > Publications & Outputs > Automated verification of proper choreography i...

Links

Text available via DOI:

View graph of relations

Automated verification of proper choreography implementation

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Automated verification of proper choreography implementation. / Jansen, E.; Yang, H.-I.; Helal, Sumi.
2006 International Symposium on Applications and the Internet, SAINT 2006. IEEE, 2006. p. 180-189.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Jansen, E, Yang, H-I & Helal, S 2006, Automated verification of proper choreography implementation. in 2006 International Symposium on Applications and the Internet, SAINT 2006. IEEE, pp. 180-189. https://doi.org/10.1109/SAINT.2006.16

APA

Jansen, E., Yang, H.-I., & Helal, S. (2006). Automated verification of proper choreography implementation. In 2006 International Symposium on Applications and the Internet, SAINT 2006 (pp. 180-189). IEEE. https://doi.org/10.1109/SAINT.2006.16

Vancouver

Jansen E, Yang HI, Helal S. Automated verification of proper choreography implementation. In 2006 International Symposium on Applications and the Internet, SAINT 2006. IEEE. 2006. p. 180-189 doi: 10.1109/SAINT.2006.16

Author

Jansen, E. ; Yang, H.-I. ; Helal, Sumi. / Automated verification of proper choreography implementation. 2006 International Symposium on Applications and the Internet, SAINT 2006. IEEE, 2006. pp. 180-189

Bibtex

@inproceedings{d534b5718d1c4b2bbaece6f5bc33038d,
title = "Automated verification of proper choreography implementation",
abstract = "As business transactions become more complex it is important that all participants obey the so called rules of engagement. These rules of engagement can be captured in an interaction protocol or choreography. A choreography provides rules on how various webservices act together, in terms of observable behavior. We investigate how we can extract a protocol from a program and verify whether or not the implementation adheres to the protocol. We derive an algorithm to verify whether a program is operationally compatible with a protocol, meaning the program does not violate the protocol. This guarantees that a program will be from anomalies suchs as dead lock or failure due to unexpected messages. {\textcopyright} 2006 IEEE.",
keywords = "Brokering, Cooperation, Infrastructure for e-services, Internet workflow, Smart home, Webservice, Business transactions, Choreography, Web services, Algorithms, Automation, Behavioral research, Computer system recovery, Data acquisition, Network protocols, Interactive computer systems",
author = "E. Jansen and H.-I. Yang and Sumi Helal",
year = "2006",
doi = "10.1109/SAINT.2006.16",
language = "English",
isbn = "0769525083",
pages = "180--189",
booktitle = "2006 International Symposium on Applications and the Internet, SAINT 2006",
publisher = "IEEE",

}

RIS

TY - GEN

T1 - Automated verification of proper choreography implementation

AU - Jansen, E.

AU - Yang, H.-I.

AU - Helal, Sumi

PY - 2006

Y1 - 2006

N2 - As business transactions become more complex it is important that all participants obey the so called rules of engagement. These rules of engagement can be captured in an interaction protocol or choreography. A choreography provides rules on how various webservices act together, in terms of observable behavior. We investigate how we can extract a protocol from a program and verify whether or not the implementation adheres to the protocol. We derive an algorithm to verify whether a program is operationally compatible with a protocol, meaning the program does not violate the protocol. This guarantees that a program will be from anomalies suchs as dead lock or failure due to unexpected messages. © 2006 IEEE.

AB - As business transactions become more complex it is important that all participants obey the so called rules of engagement. These rules of engagement can be captured in an interaction protocol or choreography. A choreography provides rules on how various webservices act together, in terms of observable behavior. We investigate how we can extract a protocol from a program and verify whether or not the implementation adheres to the protocol. We derive an algorithm to verify whether a program is operationally compatible with a protocol, meaning the program does not violate the protocol. This guarantees that a program will be from anomalies suchs as dead lock or failure due to unexpected messages. © 2006 IEEE.

KW - Brokering

KW - Cooperation

KW - Infrastructure for e-services

KW - Internet workflow

KW - Smart home

KW - Webservice

KW - Business transactions

KW - Choreography

KW - Web services

KW - Algorithms

KW - Automation

KW - Behavioral research

KW - Computer system recovery

KW - Data acquisition

KW - Network protocols

KW - Interactive computer systems

U2 - 10.1109/SAINT.2006.16

DO - 10.1109/SAINT.2006.16

M3 - Conference contribution/Paper

SN - 0769525083

SP - 180

EP - 189

BT - 2006 International Symposium on Applications and the Internet, SAINT 2006

PB - IEEE

ER -