In order to improve the design and implementation quality of web service compositions,formal methods are used to model them and certain properties are verified.WCFA (web service interface control flow automata)is us...In order to improve the design and implementation quality of web service compositions,formal methods are used to model them and certain properties are verified.WCFA (web service interface control flow automata)is used to model web services,especially the control flow and possible interactions with other web services.A web service composition consists of a set of interacting WCFA.The global behavior of web service compositions is captured by NWA(nested word automata).A variation of the depth-first search algorithm is used to transform a set of WCFA into an NWA.State formulae and call stacks at each node of NWA are computed by a path-sensitive reachability analysis.Safety properties,call stack inspection properties and pre/post-conditions of service invocations are described by assertions.Then verification of these assertions is carried out by an automated SAT tool.展开更多
基金The National Key Technology R&D Program of Chinaduring the 11th Five-Year Plan Period(No.2006BAH02A12)the National High Technology Research and Development Program of China(863 Program)(No.2006AA010101)
文摘In order to improve the design and implementation quality of web service compositions,formal methods are used to model them and certain properties are verified.WCFA (web service interface control flow automata)is used to model web services,especially the control flow and possible interactions with other web services.A web service composition consists of a set of interacting WCFA.The global behavior of web service compositions is captured by NWA(nested word automata).A variation of the depth-first search algorithm is used to transform a set of WCFA into an NWA.State formulae and call stacks at each node of NWA are computed by a path-sensitive reachability analysis.Safety properties,call stack inspection properties and pre/post-conditions of service invocations are described by assertions.Then verification of these assertions is carried out by an automated SAT tool.