skip to main content
10.1145/1808885.1808896acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

A context-driven adaptation process for service-based applications

Published: 01 May 2010 Publication History

Abstract

When building service-oriented systems the evolution of requirements and context is the norm rather than the exception. Therefore, it is important to make sure that the system is able to evolve as well without necessarily starting a completely new development process, and possibly on the fly. In this paper we specifically focus on the role of the context in the adaptation activities. For us context has various different facets as it includes information ranging from the situation in which users exploit a service-based application to the conditions under which the component services can be exploited. We elaborate on how and when the context should be defined, exploited, and evolved, and on the impact it has on the various activities related to adaptation of service-based applications. We use a case study to exemplify our first findings on this subject.

References

[1]
L. Baresi and S. Guinea. Dynamo: Dynamic monitoring of ws-bpel processes. In ICSOC, pages 478--483, 2005.
[2]
A. Bucchiarone, C. Cappiello, E. di Nitto, R. Kazhamiakin, V. Mazza, and M. Pistore. Design for adaptation of Service-Based applications: Main issues and requirements. In International Workshop on Engineering Service-Oriented Applications (to appear), 2009.
[3]
P.-C. David and T. Ledoux. Wildcat: a generic framework for context-aware applications. In MPAC, pages 1--7, 2005.
[4]
A. K. Dey. Understanding and using context. Personal Ubiquitous Comput., 5(1):4--7, 2001.
[5]
A. K. Dey and G. D. Abowd. Towards a Better Understanding of Context and Context-Awareness. CHI 2000 Workshop on the What, Who, Where, When, and How of Context-Awareness, 2000.
[6]
C. Efstratiou, K. Cheverst, N. Davies, and A. Friday. An architecture for the effective support of adaptive context-aware applications. In MDM '01: Proceedings of the Second International Conference on Mobile Data Management, pages 15--26, London, UK, 2001. Springer-Verlag.
[7]
R. Kazhamiakin, P. Bertoli, M. Paolucci, M. Pistore, and M. Wagner. Having Services "YourWay!": Towards User-Centric Composition of Mobile Services. In Future Internet Symposium, 2008.
[8]
J. Keeney and V. Cahill. Chisel: A policy-driven, context-aware, dynamic adaptation framework. Policies for Distributed Systems and Networks, IEEE International Workshop on, 0:3, 2003.
[9]
J. Keeney and V. Cahill. Chisel: A policy-driven, context-aware, dynamic adaptation framework. In POLICY, pages 3--14, 2003.
[10]
M. Moez, C. Tadj, and C. ben Amar. Context modeling and context-aware service adaptation for pervasive computing systems. International Journal of Computer and Information Science and Engineering, 2008.
[11]
J. Munnelly, S. Fritsch, and S. Clarke. An aspect-oriented approach to the modularisation of context. In PerCom, pages 114--124, 2007.
[12]
A. Nicoara and G. Alonso. Dynamic aop with prose. In International Workshop on Adaptive and Self-Managing Enterprise Applications (ASMEA), pages 125--138, 2005.
[13]
E. D. Nitto, V. Mazza, and A. Mocci. Collection of industrial best practices, scenarios and business cases, 2009.
[14]
J. C. Ronnie Cheung, Gang Yao and A. Chan. A fuzzy service adaptation engine for context-aware mobile computing middleware. International Journal of Pervasive Computing and Communications, 2008.
[15]
S-Cube. Codified human-computer interaction (HCI) knowledge and context factors, 2009.
[16]
T. Strang and C. L. Popien. A context modeling survey, September 2004.
[17]
L. Tanca, A. Miele, and E. Quintarelli. A methodology for preference-based personalization of contextual data. In ACM EDBT 2009, 2009.

Cited By

View all
  • (2021)Engineering Adaptive Authentication2021 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C)10.1109/ACSOS-C52956.2021.00068(275-280)Online publication date: Sep-2021
  • (2019)Achieving security-by-design through ontology-driven attribute-based access control in cloud environmentsFuture Generation Computer Systems10.1016/j.future.2018.08.04293(373-391)Online publication date: Apr-2019
  • (2018)SOAdaptInformation and Software Technology10.1016/j.infsof.2011.10.00354:3(299-316)Online publication date: 29-Dec-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
PESOS '10: Proceedings of the 2nd International Workshop on Principles of Engineering Service-Oriented Systems
May 2010
91 pages
ISBN:9781605589633
DOI:10.1145/1808885
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 May 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. adaptation
  2. context-awareness
  3. service-oriented systems

Qualifiers

  • Research-article

Funding Sources

Conference

ICSE '10
Sponsor:

Upcoming Conference

ICSE 2025

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)1
Reflects downloads up to 18 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Engineering Adaptive Authentication2021 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C)10.1109/ACSOS-C52956.2021.00068(275-280)Online publication date: Sep-2021
  • (2019)Achieving security-by-design through ontology-driven attribute-based access control in cloud environmentsFuture Generation Computer Systems10.1016/j.future.2018.08.04293(373-391)Online publication date: Apr-2019
  • (2018)SOAdaptInformation and Software Technology10.1016/j.infsof.2011.10.00354:3(299-316)Online publication date: 29-Dec-2018
  • (2017)A Generic Framework for Representing Context-Aware Security Policies in the CloudCloud Computing and Services Science10.1007/978-3-319-62594-2_17(339-359)Online publication date: 20-Jul-2017
  • (2015)Towards efficient and secure data storage in multi-tenant cloud-based CRM solutionsProceedings of the 8th International Conference on Utility and Cloud Computing10.5555/3233397.3233518(612-617)Online publication date: 7-Dec-2015
  • (2015)Towards Efficient and Secure Data Storage in Multi-tenant Cloud-Based CRM Solutions2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)10.1109/UCC.2015.107(612-617)Online publication date: Dec-2015
  • (2015)Context Management in Event MarketplacesThe Semantic Web: ESWC 2012 Satellite Events10.1007/978-3-662-46641-4_24(313-326)Online publication date: 21-Apr-2015
  • (2013)A New Method for Information System with Good PerformanceAdvanced Materials Research10.4028/www.scientific.net/AMR.753-755.3014753-755(3014-3017)Online publication date: Aug-2013
  • (2013)Research Challenges in the Maintenance and Evolution of Service-Oriented SystemsMigrating Legacy Applications10.4018/978-1-4666-2488-7.ch002(13-39)Online publication date: 2013
  • (2012)Research challenges on multi-layer and mixed-initiative monitoring and adaptation for service-based systemsProceedings of the First International Workshop on European Software Services and Systems Research: Results and Challenges10.5555/2666742.2666755(40-46)Online publication date: 5-Jun-2012
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media