<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Self-organization and SOA for networked enterprises</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Elisabetta Di Nitto</string-name>
          <email>dinitto@elet.polimi.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gianluca Ripa</string-name>
          <email>ripa@cefriel.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Cefriel</institution>
          ,
          <addr-line>Via Fucini, 2, 20133 Milano</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Politecnico di Milano, DEI</institution>
          ,
          <addr-line>Via Golgi 40, 20133 Milano</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>The needs for exibility and globalisation force enterprises to both decentralise
their activities and continuously (re)structure their network of relationships,
regarding their productive processes, their \supply chain", and their design and
innovation processes.</p>
      <p>This demands for new innovative technological solutions, which must support
unprecedented levels of dynamism. In particular, the overall architecture of the
information system must evolve as requirements and context change. Typical
cases of context changes occur when new services become available, existing
services become less competitive, or even when they are discontinued. As soon
as deviations from the desired or acceptable quality of service are discovered,
or new opportunities are devised, the information system should be able to
recon gure itself in an autonomic manner. SOAs naturally t in this context
as they inherently support the concept of service, which represents one of the
typical items organizations exchange, and also because SOAs are suitable to be
equipped with self-adaptation mechanisms that enable them to evolve on the y.</p>
      <p>In this context, our research work is focusing on addressing the challenges
presented below.</p>
    </sec>
    <sec id="sec-2">
      <title>Recognizing network evolutions and actuating the needed actions</title>
      <p>
        Networked enterprises usually are created on the basis of some need and trust
relationships between stakeholders. Of course, networks that are created in the
rst place are not necessarily optimal. Also their performance can evolve over
time. Thus, it is important to equip the underlying SOA infrastructure with
monitoring mechanisms able not only to identify issues at the technical level,
but also to spot potential places for improvement and optimization of the
network performance. Consider, for example, a simple network where there is a
Service Provider and a User. The User needs a service and the Provider
provides the service to the User for a fee. This network works quite well, but it does
not provide to the User any knowledge about the reliability of the Provider,
the possible mismatches between the advertised quality for that service and the
actual one, and the correct pricing. Thus, it may happen that the lack of
knowledge for the User with respect to the existence of competing providers and to the
reputation of the known ones may result in a reduced satisfaction or in paying
more for having less. In this speci c situation, the introduction of a third-party
broker could improve the situation and allow the User to receive the required
feedback and also to extend the number of its Providers [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. While the decision
on how to recon gure the service network is intrinsically a task for humans,
still the IT infrastructure can help in identifying possible recon gurations as a
result of a continuous monitoring and analysis activity. Monitoring should be
built in a recon gurable way so that the data to be gathered are decided
dynamically, depending on the situation of the network. We imagine experts in the
service network domain identifying the relevant data and properly instructing
the monitoring infrastructure through a simple to use, still rich language. Part
of the data analysis tasks could be automated as well through the de nition of
proper invariants and predicates that should be checked on the basis of the data
acquired by monitoring.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Enabling self-evolution of the underlying SOA infrastructure</title>
      <p>Dynamic evolution of the networked enterprises clearly results in the need for
evolving the SOA infrastructure as well. In the literature, various approaches
have been identi ed, but most of them are still focusing on the speci c
mechanisms to use more than on the de nition of a rigorous design approach that
leads to a SOA system able to evolve at runtime in a controlled way. In [1{3]
we propose some preliminary approaches that are currently being extended and
validated. Figure 1 shows the life-cycle we have identi ed for adaptable SOA
systems. It highlights the fact that adaptation happens at runtime and goes
through various phases (see the left hand side of the gure) where activities
devoted to the identi cation of adaptation needs and strategies are followed by
the one devoted to the execution of the adaptation, which makes the system
returning back in its operation phase in an evolved con guration. Even though
we have contributed to the identi cation of these phases and are working on
clarifying their purposes, still speci c techniques and approaches are needed to
allow designers to design the system for adaptation and evolution.
4</p>
      <p>On the</p>
      <p>
        y revision of SLAs
In [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] we have presented a framework that supports design-time and runtime
negotiation of SLAs in a SOA context where the negotiation participants are
essentially service providers and service consumers. The framework also o ers the
possibility to replace (part of) these participants with software agents that act
on behalf of them and to design new negotiation processes, possibly including
multi-parties, which are then interpreted by the runtime infrastructure. Di
erently from many works in literature that support speci c negotiation processes,
Monitored
events
      </p>
      <sec id="sec-3-1">
        <title>Identify adaptation needs</title>
        <p>Monitored
properties</p>
        <p>Context
Adaptation
requirements
Suitable
strategies</p>
      </sec>
      <sec id="sec-3-2">
        <title>Identify adaptation strategy</title>
        <p>Strategy
instance</p>
      </sec>
      <sec id="sec-3-3">
        <title>Enact adaptation</title>
        <p>Adaptation
mechanisms
Decide between
adaptation and
evolution
Run-time
monitoring</p>
      </sec>
      <sec id="sec-3-4">
        <title>Operation &amp; management</title>
      </sec>
      <sec id="sec-3-5">
        <title>Deployment &amp; provisioning</title>
      </sec>
      <sec id="sec-3-6">
        <title>Requirements</title>
      </sec>
      <sec id="sec-3-7">
        <title>Engineering &amp;</title>
      </sec>
      <sec id="sec-3-8">
        <title>Design</title>
        <p>Deploy adaptation
and monitoring
mechanisms
Deployment-time
adaptation</p>
      </sec>
      <sec id="sec-3-9">
        <title>Early Requirements</title>
      </sec>
      <sec id="sec-3-10">
        <title>Engineering</title>
        <p>Define adaptation and
monitoring requirements
Design for monitoring
and adaptation</p>
      </sec>
      <sec id="sec-3-11">
        <title>Construction</title>
        <p>Construction of
monitors and
adaptation
mechanisms
actions</p>
      </sec>
      <sec id="sec-3-12">
        <title>Design artifacts</title>
        <p>our framework can be tailored depending on the multiplicity, work ow,
protocol, and decision model that t a speci c application domain. The evolution in
the networked enterprise or in the underlying IT infrastructure may determine
the need for revising the SLAs established between the involved stakeholders.
Consequently, approaches to identify needs for revision and to renegotiate SLAs
are required.
5</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Conclusions</title>
      <p>In this position paper we shortly describe the research challenges we are
currently focusing on. These concern, in particular, the need for identifying and
applying potential changes in a network of enterprises, the need for supporting
self-evolution as a result of changes in the network, the need for revising during
the operation process the already agreed SLA. We envisage that new innovative
technological solutions in these areas are necessary for addressing the service
requirements of networked enterprises in the Future Internet.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgements</title>
      <p>Our research is partially funded by the European Community, Seventh
Framework Programme FP7/2007-2013 under grant agreements 215483 (S-Cube), 216556
(SLA@SOI) and 215219 (SOA4All).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>A.</given-names>
            <surname>Bucchiarone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Cappiello</surname>
          </string-name>
          ,
          <string-name>
            <surname>E. di Nitto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kazhamiakin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Mazza</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Pistore</surname>
          </string-name>
          .
          <article-title>Design for adaptation of Service-Based applications: Main issues and requirements</article-title>
          . In International Workshop on Engineering Service-Oriented
          <string-name>
            <surname>Applications</surname>
          </string-name>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>A.</given-names>
            <surname>Bucchiarone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kazhamiakin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Cappiello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. Di</given-names>
            <surname>Nitto</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Mazza</surname>
          </string-name>
          .
          <article-title>A context-driven adaptation process for service-based applications</article-title>
          .
          <source>In PESOS</source>
          <year>2010</year>
          { 2nd International Workshop on Principles of Engineering Service-Oriented
          <string-name>
            <surname>Systems</surname>
          </string-name>
          , Cape Town, South Africa,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>L.</given-names>
            <surname>Cavallaro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. Di</given-names>
            <surname>Nitto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Furia</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Pradella</surname>
          </string-name>
          .
          <article-title>A Tile-based Approach for Self-assembling Service Compositions</article-title>
          . In
          <source>In Proceedings of International Conference on Engineering of Complex Computer Systems</source>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>D.</given-names>
            <surname>Dubois</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Nikolaou</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Voskakis</surname>
          </string-name>
          .
          <article-title>A model transformation for increasing value in service networks through intangible value exchanges</article-title>
          .
          <source>In International Conference on Service Science, ICSS2010</source>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>E. D.</given-names>
            <surname>Nitto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. D.</given-names>
            <surname>Penta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gambi</surname>
          </string-name>
          , G. Ripa, and
          <string-name>
            <given-names>M. L.</given-names>
            <surname>Villani</surname>
          </string-name>
          .
          <article-title>Negotiation of service level agreements: An architecture and a search-based approach</article-title>
          . In B. J. Kramer,
          <string-name>
            <surname>K.-J. Lin</surname>
          </string-name>
          , and P. Narasimhan, editors,
          <source>ICSOC</source>
          , volume
          <volume>4749</volume>
          of Lecture Notes in Computer Science, pages
          <volume>295</volume>
          {
          <fpage>306</fpage>
          . Springer,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>