Detecting implied scenarios in message sequence chart specifications
Proceedings of the 8th European software engineering conference held jointly with 9th ACM SIGSOFT international symposium on Foundations of software engineering
Component Software: Beyond Object-Oriented Programming
Component Software: Beyond Object-Oriented Programming
Building Reliable Component-Based Software Systems
Building Reliable Component-Based Software Systems
Introduction To Automata Theory, Languages, And Computation
Introduction To Automata Theory, Languages, And Computation
A distributed intrusion detection approach for secure software architecture
EWSA'05 Proceedings of the 2nd European conference on Software Architecture
Runtime monitoring of web service conversations
CASCON '07 Proceedings of the 2007 conference of the center for advanced studies on Collaborative research
Behavioral adaptation of component compositions based on process algebra encodings
Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering
DESERT: a decentralized monitoring tool generator
Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering
Distributed Intrusion Detection Systems for Enhancing Security in Mobile Wireless Sensor Networks
International Journal of Distributed Sensor Networks - Advances on Heterogeneous Wireless Sensor Networks
Journal of Systems and Software
Property Patterns for Runtime Monitoring of Web Service Conversations
Runtime Verification
A Case Study in Goal-Driven Architectural Adaptation
Software Engineering for Self-Adaptive Systems
Exploring Multi-Paradigm Modeling Techniques
Simulation
Protocol-aware matching of web service interfaces for adapter development
Proceedings of the 19th international conference on World wide web
Monitoring and recovery of web service applications
The smart internet
Monitoring and recovery of web service applications
The smart internet
Synthesis of concurrent and distributed adaptors for component-based systems
EWSA'06 Proceedings of the Third European conference on Software Architecture
Distributed fault tolerant controllers
DAIS'10 Proceedings of the 10th IFIP WG 6.1 international conference on Distributed Applications and Interoperable Systems
Interactive specification and verification of behavioral adaptation contracts
Information and Software Technology
Test-and-adapt: An approach for improving service interchangeability
ACM Transactions on Software Engineering and Methodology (TOSEM) - Testing, debugging, and error handling, formal methods, lifecycle concerns, evolution and maintenance
PWWM: a personal web workflow methodology
The Personal Web
Hi-index | 0.01 |
Building a distributed system from third-party components introduces a set of problems, mainly related to compatibility and communication. Our approach to solve these problems is to build an adaptor which forces the system to exhibit only a set of safe or desired behaviors. By exploiting an abstract and partial specification of the global behavior that must be enforced, we automatically build a centralized adaptor. It mediates the interaction among components by both performing the specified behavior and, simultaneously, avoiding possible deadlocks. However in a distributed environment it is not always possible or convenient to insert a centralized adaptor. In contrast, building a distributed adaptor might increase the applicability of the approach in a real-scale context. In this paper we show how it is possible to automatically generate a distributed adaptor by exploiting an approach to the definition of distributed IDS (Intrusion Detection Systems) filters developed by us to increase security measures in component based systems. Firstly, by taking into account a high level specification of the global behavior that must be enforced, we synthesize a behavioral model of a centralized adaptor that allows the composed system to only exhibit the specified behavior and, simultaneously, avoid possible unspecified deadlocks. This model represents a lower level specification of the global behavior that is enforced by the adaptor. Secondly, by taking into account the synthesized adaptor model, we generate a set of component filters that validate the centralized adaptor behavior by simply looking at local information. In this way we address the problem of mechanically generating correct and distributed adaptors for real-scale component-based systems.