<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Architecture Support for Flexible Chain Management</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>R. Seguel</string-name>
          <email>r.e.seguel@tue.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>R. Eshuis</string-name>
          <email>h.eshuis@tue.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>P. Grefen</string-name>
          <email>p.w.p.j.grefen@tue.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Information Systems Group, School of Industrial Engineering, Eindhoven University of Technology</institution>
          ,
          <country country="NL">The Netherlands</country>
        </aff>
      </contrib-group>
      <fpage>85</fpage>
      <lpage>94</lpage>
      <abstract>
        <p>In competitive markets, organizations collaborate in business chains using dynamic service outsourcing to deliver complex products and services. To enable the flexible formation of business chains, organizations can use protocol adaptation to ensure that their business protocols are compatible. In this paper, we present three different software architectures that enable the flexible formation and enactment of different chain structures, in which the protocol adaptation component is a key enabler. We show the feasibility of the approach by extending software architecture definitions from the literature for each flexible chain formation case.</p>
      </abstract>
      <kwd-group>
        <kwd>Business Chains</kwd>
        <kwd>Dynamic Service Outsourcing</kwd>
        <kwd>Interacting Services</kwd>
        <kwd>Protocol Adaptor</kwd>
        <kwd>Service Adaptation</kwd>
        <kwd>Software Architecture</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Nowadays, the production of complex products and services in competitive
markets involves a number of autonomous organizations [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] that collaborate in
business chains. By locating the customer order decoupling point (CODP) in the
business chain we identify three chain structures: demand chain, supply chain
and hybrid demand/supply chain [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. The CODP indicates how deeply the
customer order penetrates into a business chain. Due to the shorter life-cycles and
increasing complexity of products and services [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], the organizations in a business
chain collaborate in a just-in-time fashion, using dynamic service outsourcing.
In dynamic service outsourcing, an organization outsources a part of its
business process, for instance order fulfillment, to a partner that is selected at the
last possible moment from the marketplace [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. This way, the organizations
collaborate by invoking functionalities from each other according to their business
protocols in their public process view [
        <xref ref-type="bibr" rid="ref2 ref4">2, 4</xref>
        ]. Each public process view abstracts
an underlying private business processes that is executed by the organization.
      </p>
      <p>
        In current dynamic service outsourcing approaches [
        <xref ref-type="bibr" rid="ref7 ref8">7,8</xref>
        ], the tacit assumption
is made that interacting protocols are compatible: each sent message is received
and processed by the other party, and thus no deadlocks occur. However,
collaborating organizations have their own protocol that specifies their own way of
working and they may easily have incompatible protocols. Since organizations
collaborate in a just-in-time fashion, incompatible business protocols hinder the
flexible formation of business chains. To configure business chains in a flexible
way the organizations can use protocol adaptation to ensure that their business
protocols are compatible [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p>
        The goal of this paper is to present a supporting software architecture for
each flexible chain formation case that we described in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. The software
architectures are an extension and integration of two software architectures from the
literature [
        <xref ref-type="bibr" rid="ref7 ref8">7,8</xref>
        ] that support the formation and enactment of supply and demand
chain networks. The presented software architectures include business protocol
adaptation as a key component to support the flexible configuration and
enactment of business chains. The protocol adaptation component constructs an
adaptor to resolve (if possible) incompatibilities between interacting services
during chain formation, using any existing adaptation method [
        <xref ref-type="bibr" rid="ref1 ref10 ref11 ref12 ref14 ref15 ref16">1, 10–12, 14–16</xref>
        ].
      </p>
      <p>
        Although there is some work on cross-organizational workflow collaboration
using process views [
        <xref ref-type="bibr" rid="ref2 ref8 ref9">2, 8, 9</xref>
        ] they do not include adaptation in their architecture
definitions. In this paper, we focus on adaptation of behavioral mismatches rather
than interface mismatches. An interface mismatch is due to differences in the
formats and specifications of messages exchanged that can be resolved using
schema mapping and transformation tools [
        <xref ref-type="bibr" rid="ref11 ref15">11, 15</xref>
        ]. We will extend our approach
adding interface adaptation in future work. However, we do not expect that this
actually impacts the presented software architectures.
      </p>
      <p>
        The contributions of this paper are three software architectures to support
the flexible formation of business chain [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], in which the protocol adaptation
component is a key enabler.
      </p>
      <p>The remainder of this paper is organized as follows. Section 2 describes the
three flexible chain formation cases. Section 3 presents the architecture support
for flexible formation of demand chains. Section 4 details the architecture to
enable the flexible configuration of supply chains. Section 5 describes the
architecture for flexible hybrid demand/supply chain formation. Section 6 discusses a
third-party adaptation factory and Section 7 presents the conclusions and future
work.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Flexible Business Chain Management</title>
      <p>
        There are three scenarios for flexible formation of business chains [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Each
scenario defines the responsibility of a partner to construct a protocol adaptor
to resolve (if possible) incompatibilities between their business protocols. We
show in Figure 1 a business chain to illustrate the adaptation responsibility
for each business chain formation scenario. The letters outside the services in
Figure 1 represent the place where the protocol adaptor is constructed.
      </p>
      <p>
        This way, in a flexible demand chain formation scenario [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], the service
consumer defines its business protocol according to the customer business
requirements. Since the CODP is moved to the last provider in the demand chain,
the responsibility of constructing an adaptor is always of the provider; see b
and d in Figure 1. In a flexible supply chain formation scenario [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], the service
      </p>
      <sec id="sec-2-1">
        <title>Service</title>
        <p>Consumer a
b</p>
      </sec>
      <sec id="sec-2-2">
        <title>Service</title>
      </sec>
      <sec id="sec-2-3">
        <title>Provider</title>
        <p>c
d</p>
      </sec>
      <sec id="sec-2-4">
        <title>2nd-tier</title>
      </sec>
      <sec id="sec-2-5">
        <title>Provider</title>
        <p>
          provider sets its business protocol in conformance with market standards like
SCOR [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] or eTOM [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. For example, the service provider can be a big retail
vendor like Dell. The service consumer searches the standard service provider in
the marketplace to define its business protocol. In the supply chain the CODP
is moved to the service consumer, and thus the responsibility of building an
adaptor is always of the service consumer; see a and c in Figure 1. In a flexible
hybrid demand/supply chain formation scenario [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ], the service consumer and
service provider form a demand chain while the service (1st-tier) provider and
the 2nd-tier provider form a supply chain. Then, the CODP is at the service
provider. This way, the responsibility of building an adaptor is always of the
service (1st-tier) provider: it has to build an adaptor to resolve mismatches with
the service consumer and 2nd-tier provider; see b and c in Figure 1.
        </p>
        <p>
          To describe the flexible formation of a business chain, we explain the hybrid
demand/supply chain case since it includes the other two business chain cases.
We illustrate this case in Figure 2, in which the companies W and X operate
in demand chain mode and companies X and Y operate in supply chain mode.
Then, the company X constructs a protocol adaptor to resolve the mismatches
with companies W and Y, using one of the adaptation methods presented in [
          <xref ref-type="bibr" rid="ref1 ref10 ref11 ref12 ref14 ref15 ref16">1,
10–12, 14–16</xref>
          ]. In this example we use the method presented in [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. Note that
the communication of messages is shown in the figure by the arrows crossing the
organization borders, indicating send (source) and receive (target) actions. The
company X constructs the protocol adaptors at the public process view and it
deploys each adaptor in front of its business protocols. Then, the company X
offers the protocol adaptors and its business protocol in the marketplace. Next,
the companies W and Y select X, and then they deploy the business protocols
in the architecture components.
3
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Architecture for Flexible Demand Chain Formation</title>
      <p>
        The CrossWork architecture [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] was developed to support the dynamic
formation and enactment of a Network of Automotive Excellence. In the CrossWork
business scenario, the service consumer is an Original Equipment Manufacturer
(OEM) organization like BMW or MAN. The OEM defines a certain goal or
solution objective that is sent to the service provider. Then, the provider forms the
chain by selecting the 2nd-tier providers from the marketplace to meet the goal.
The provider composes a global business protocol with the local protocols of
the 2nd-tier providers to coordinate them. Then, the provider enacts the global
process that enacts the local protocols in the 2nd-tier providers to later send the
      </p>
      <p>Company W
Fulfil ment Service</p>
      <p>Consumer
Public Process View</p>
      <p>Protocol Adaptor Fulfil ment ServiceCPoromvpidaenry X SeDrveiclieveCroItnesmumser Protocol Adaptor</p>
      <p>Public Process View Public Process View Private Process View Public Process View Public Process View
SendProduct</p>
      <p>Order
SendDelivery</p>
      <p>Details
RecItem
Shipment</p>
      <p>RecProduct</p>
      <p>Order
RecDelivery</p>
      <p>Details
SendDelivery</p>
      <p>Details
SendProduct</p>
      <p>Order</p>
      <p>RecDelivery</p>
      <p>Details
RecProduct</p>
      <p>Order
SendItem
Shipment</p>
      <p>Set
ItemList</p>
      <p>Put
Items
RecTx</p>
      <p>Info
Receive
Order
Get
Items
Send</p>
      <p>Items
International</p>
      <p>Countryside</p>
      <p>Send
ItemList
Rec
TxInfo
Put
Items</p>
      <p>Rec
ItemList
Rec
Items
Send
Items
Send
ItemList</p>
      <p>Company Y
Deliver Items
Service Provider
Public Process View</p>
      <p>Send
TxInfo
Rec
Items
Rec
ItemList
result back to the OEM. We extend the CrossWork architecture by adding the
architecture components to support protocol adaptation. In Figure 3, we
illustrate the CrossWork architecture (white boxes) plus the extension (grey boxes).
The extended CrossWork architecture enables the flexible formation of a demand
chain at design-time and at run-time.</p>
      <p>
        At design-time, the extended CrossWork architecture is triggered by the
service consumer that defines the solution objective in the goal support
module according to the customer business requirements. The consumer defines its
business protocol according to the goal. Then, the consumer selects the
service provider from the marketplace that meets the goal. The consumer sends
the goal definition and its business protocol to the service provider. Then, the
service provider checks the compatibility between its business protocol and the
consumer protocol. If the protocols are incompatible, the adaptor factory
module constructs a protocol adaptor to resolve mismatches. The adaptor factory
implements the adaptation method for tightly and loosely coupled interacting
services [
        <xref ref-type="bibr" rid="ref1 ref10 ref11 ref12 ref14 ref15 ref16">1, 10–12, 14–16</xref>
        ]. Then, the provider deploys the business protocol in
the protocol enactment module and the protocol adaptor in the adaptor
enactment module. Similarly, the service consumer deploys its business protocol in
the protocol enactment module.
      </p>
      <p>Next, the service provider decomposes the goal into a required set of protocols
(component services) in the goal support module. Then, the team formation
module finds the 2nd-tier providers in the marketplace according to the set of
protocols. Next, the composition module composes the set of protocols into a
global business protocol. Note that the 2nd-tier providers are not only selected
by protocol compatibility. It means that while there are parts of the global
trepa EPnraocttomceonlt
m
itn
u
R</p>
      <p>Adaptor
Enactment
Protocol</p>
      <p>Enactment
tr
a
p
it-unem InLteeggraactiyon
R
Service Consumer</p>
      <p>Service Provider
protocol that are compatible with the 2nd-tier providers, there are other parts
that are incompatible with the 2nd-tier provider protocols. This way, the
2ndtier providers check the compatibility between their business protocols and the
set of protocols that compose the global protocol. If they are incompatible, the
adaptor factory at the 2nd-tier providers generates a protocol adaptor. Next,
each 2nd-tier provider deploys the business protocol in the protocol enactment
module and the adaptor in the adaptor enactment module. Finally, the service
provider deploys the global protocol in the protocol enactment module. This
way, the protocols can be later executed by the service consumer and provider,
enacting the demand chain with the 2nd-tier providers.</p>
      <p>
        At run-time, the extended CrossWork architecture enables the formation of
the demand chain when the consumer business protocol is being enacted. This is
illustrated with the ‘reverse’ dotted arrow from the protocol enactment module
to the goal support module in Figure 3. This way, the consumer stops the
business protocol execution to configure the demand chain (at design-time) to later
continue the enactment of the business protocols. Similarly, the service provider
can configure the demand chain with 2nd-tier providers when its protocol is
being executed. Note that if the service provider acts as integrator only [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], then
the adaptation is only needed at the 2nd-tier provider. The service provider uses
the protocol sent by the consumer as global business protocol. Then, the service
provider is protocol compatible with the service consumer since they interact
to only synchronize the control flow of the global business protocol. The global
business protocol interacts with the 2nd-tier providers, which can need
adaptation. In the basic CrossWork architecture, if the global protocol cannot be
      </p>
      <p>Service Consumer</p>
      <p>Service Provider</p>
      <p>Protocol
Compatibility</p>
      <p>
        Check
composed then the system backs up to the team formation or even to the goal
support module to correct it [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. However, in the extended architecture, these
backtrack steps are needed only if the adaptor factory module at the 2nd-tier
provider indicates the mismatch cannot be resolved and no adaptor can be
constructed [
        <xref ref-type="bibr" rid="ref12 ref14">12, 14</xref>
        ]. Note that technically the business protocols and the adaptor
can be enacted using the same enactment engine or two different enactment
engines.
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>Architecture for Flexible Supply Chain Formation</title>
      <p>
        The CrossFlow architecture [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] was developed to support the configuration of
a supply chain, using dynamic service outsourcing. In the CrossFlow business
scenario, the service consumer outsources a non-core part of its business
protocol to a service provider. The service consumer takes the decision of outsourcing
during the execution of its business protocol, and thus it selects the provider at
the last possible moment. This way, the basic CrossFlow architecture is mainly
focused on run-time supply chain configuration. Note that the architecture was
developed in the pre web services era, but it conceptually supports the
collaboration of two interacting services which share the business protocols at the public
process view. We extend the CrossFlow architecture to support the flexible
configuration of a supply chain at design-time and at run-time. We illustrate the
basic architecture (white boxes) plus the extension (grey boxes) in Figure 4.
      </p>
      <p>At design-time, the extended CrossFlow architecture is triggered by the
consumer that selects the service provider from the marketplace to outsource its
protocol. Then, the provider sends its standard business protocol to the
consumer that checks the compatibility with its protocol. If the business protocols
are incompatible, then the service consumer constructs a protocol adaptor. Next,
the service consumer couples the outsourced protocol part with its business
protocol in the composition module for later deployment in the enactment module.
Then, the consumer deploys the coupled business protocol in the protocol
enactment module and the adaptor in the adaptor enactment module. Finally, the
service provider deploys its business protocol in the enactment module after it
sent the protocol definition. Similarly, the service provider can outsource part
of its protocol by selecting 2nd-tier providers from the marketplace. Then, the
2nd-tier providers send their standard business protocol to the provider that
checks the compatibility with its protocol. If the protocols are incompatible,
then the provider adaptor factory module generates the protocol adaptor. Then,
the provider couples the outsourced protocol part with its business protocol in
the composition module. Next, the provider deploys the coupled protocol and
the adaptor in the enactment modules while the 2nd-tier providers deploy their
protocols too. This way, the protocols can be later executed by the service
consumer and provider, enacting the supply chain with the 2nd-tier providers.</p>
      <p>
        At run-time, the extended CrossFlow architecture supports the configuration
of the supply chain when the consumer business protocol is being enacted. This
is illustrated with the ‘reverse’ dotted arrow from the protocol enactment
module to the partner selection module in Figure 4. Therefore, the consumer stops
the business protocol execution to configure the supply chain (at design-time) to
later continue the enactment of the business protocols. Then, the service provider
can also configure a supply chain with 2nd-tier providers when its protocol is
being enacted. Note that if the service provider acts as integrator only [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], then
the adaptation is only needed at the service consumer. The service provider
preselects the 2nd-tier providers before it is selected by the consumer. Once the
provider is selected, it sends the standard protocol to the consumer. The service
provider is protocol compatible with the 2nd-tier providers since they interact
to only synchronize the control flow of the business protocol. On the other hand,
the consumer protocol interacts with the standard business protocol, which can
need adaptation. Like the extended CrossWork architecture, the CrossFlow
architecture technically support the enactment of the business protocols and the
adaptor using the same enactment engine or two different enactment engines.
5
      </p>
    </sec>
    <sec id="sec-5">
      <title>Architecture for Flexible Hybrid Demand/Supply</title>
    </sec>
    <sec id="sec-6">
      <title>Chain Formation</title>
      <p>To support the flexible configuration of a hybrid demand/supply chain, we define
the architecture as an extension of the CrossWork (demand chain) and CrossFlow
(supply chain) architectures. We illustrate the architecture for flexible formation
of a hybrid demand/supply chain in Figure 5. It supports the configuration of
the hybrid chain at design-time and at run-time.</p>
      <p>Service Consumer</p>
      <p>Service Provider</p>
      <p>At design-time, the architecture is triggered by the service consumer that
configures a demand chain with the provider. The consumer defines the
solution objective in the goal support module according to the customer business
requirements. Then, the consumer defines its business protocol according to the
goal and selects the service provider from the marketplace that meets the goal.
Then, the consumer sends the goal definition and its business protocol to the
service provider. Next, the service provider checks the compatibility between its
business protocol and the consumer protocol. If the protocols are incompatible,
the adaptor factory module constructs a protocol adaptor to resolve mismatches.
Then, the provider deploys the business protocol in the protocol enactment
module and the protocol adaptor in the adaptor enactment module while the service
consumer deploys its business protocol in the protocol enactment module.</p>
      <p>At this stage, the service provider configures a supply chain with 2nd-tier
providers. Next, the service provider decomposes the goal into a required set
of protocols (component services) in the goal support module. Then, the team
formation module finds the 2nd-tier providers in the marketplace according to
the set of protocols. Next, the composition module composes the set of protocols
into a global business protocol. Then, the 2nd-tier providers send their standard
business protocol to the provider that checks the compatibility with its protocol.
If the protocols are incompatible, then the provider adaptor factory module
generates the corresponding protocol adaptors. Finally, the service provider deploys
the global protocol and the adaptors in the enactment modules while each
2ndtier provider deploys its protocol in the enactment module too. This way, the
protocols can be later executed by the services by enacting the demand chain
between the consumer and provider and the supply chain between the provider
and 2nd-tier providers.</p>
      <p>At run-time, the extended architecture supports the configuration of the
hybrid demand/supply chain when the consumer and provider protocols are being
enacted. This is illustrated with the ‘reverse’ dotted arrow in Figure 4. The
consumer stops the business protocol execution to configure the demand chain (at
design-time) to later continue the enactment of the business protocols. Similarly,
the service provider stops the protocol execution to configure the supply chain
(at design-time) with the 2nd-tier providers to later continue with the protocol
enactment.</p>
      <p>
        Note that if the service provider acts as integrator only [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], then the
adaptation is needed for compatibility with either the 2nd-tier providers or the service
consumer. In both cases the adaptor is constructed and deployed by the
service provider. In the first case, like in the extended CrossWork case, the service
provider uses the protocol sent by the consumer as global business protocol.
Then, the provider and consumer protocols are compatible since they interact
to only synchronize the control flow. Thus, the global business protocol parts
interact with the 2nd-tier providers, which can need adaptation. In the second
case, like in the extended CrossFlow case, the service provider pre-selects the
2nd-tier providers before it is selected by the consumer. Then, the provider has
to generate an adaptor if the consumer and provider protocols are
incompatible. The service provider and the 2nd-tier providers are compatible since they
interact to only synchronize the control flow of the global business protocol parts.
6
      </p>
    </sec>
    <sec id="sec-7">
      <title>Third-party Adaptor Factory</title>
      <p>The architectures that we defined for flexible formation of business chains
support the participation of a trusted third-party that provides adaptation as a
service (AaaS). The third-party is an adaptor factory that constructs and enacts
protocol adaptors to support the flexible configuration of business chains. This
way, the service consumer, service provider or 2nd-tier providers can buy the
adaptation service from the trusted third-party, and thus they do not need to
add the adaptor factory module in their architectures themselves. The
participation of the third-party does not cause conceptual changes to the architectures
defined previously, but technically it needs to add the technology to ensure
quality of services and security, which are outside the scope of this paper.
7</p>
    </sec>
    <sec id="sec-8">
      <title>Conclusions and Future Work</title>
      <p>We have presented three software architectures that considers protocol
adaptation component as a key enabler of flexible chain formation. Any existing protocol
adaptation approach can be used to realize the actual adaptation. The presented
architectures enables the flexible formation of business chains between
organizations that collaborate in a just-in-time fashion to meet a solution objective,
which is very important in competitive markets.</p>
      <p>There are several directions for future work. We plan to extend our approach
adding interface adaptation to the adaptor factory. We are currently extending
our approach to define a reference architecture in which the presented three
software architectures can be described. Moreover, we will extend our approach
to deal with adaptation of running business chains that deadlock due to the
propagation of changes on the partner business protocols.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>A.</given-names>
            <surname>Brogi</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Popescu</surname>
          </string-name>
          .
          <article-title>Automated generation of BPEL adapters</article-title>
          .
          <source>In Proc. ICSOC'06</source>
          , pages
          <fpage>27</fpage>
          -
          <lpage>39</lpage>
          . Springer,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>D.</given-names>
            <surname>Chiu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Cheung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Till</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Karlapalem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and E.</given-names>
            <surname>Kafeza</surname>
          </string-name>
          .
          <article-title>Workflow view driven cross-organizational interoperability in a web service environment</article-title>
          .
          <source>Information Technology and Management</source>
          ,
          <volume>5</volume>
          (
          <issue>3</issue>
          -4):
          <fpage>221</fpage>
          -
          <lpage>250</lpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Supply</given-names>
            <surname>Chain</surname>
          </string-name>
          <article-title>Council</article-title>
          .
          <source>SCOR: Supply-Chain Operations Reference model; version 9</source>
          .0,
          <year>2008</year>
          . http://www.supply-chain.org.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>R.</given-names>
            <surname>Eshuis</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Grefen</surname>
          </string-name>
          .
          <article-title>Constructing customized process views</article-title>
          .
          <source>Data and Knowledge Engineering</source>
          ,
          <volume>64</volume>
          (
          <issue>2</issue>
          ):
          <fpage>419</fpage>
          -
          <lpage>438</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>TM</given-names>
            <surname>Forum</surname>
          </string-name>
          .
          <source>eTOM: enhanced Telecom Operations Map; release 8.0</source>
          ,
          <year>2008</year>
          . http://www.tmforum.org/.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>P.</given-names>
            <surname>Grefen. Mastering E-Business. Routledge</surname>
          </string-name>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>P.</given-names>
            <surname>Grefen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Aberer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Hoffner</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Ludwig</surname>
          </string-name>
          . CrossFlow:
          <article-title>Cross-Organizational Workflow Management in Dynamic Virtual Enterprises</article-title>
          .
          <source>Computer Systems Science &amp; Engineering</source>
          ,
          <volume>1</volume>
          (
          <issue>5</issue>
          ):
          <fpage>277</fpage>
          -
          <lpage>290</lpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>P.</given-names>
            <surname>Grefen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Eshuis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Mehandjiev</surname>
          </string-name>
          , G. Kouvas, and
          <string-name>
            <given-names>G.</given-names>
            <surname>Weichhart</surname>
          </string-name>
          .
          <article-title>Internet-based support for process-oriented instant virtual enterprises</article-title>
          .
          <source>IEEE Internet Computing</source>
          ,
          <volume>13</volume>
          (
          <issue>6</issue>
          ):
          <fpage>65</fpage>
          -
          <lpage>73</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>D-R. Liu</surname>
            and
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Shen</surname>
          </string-name>
          .
          <article-title>Business-to-business workflow interoperation based on process-views</article-title>
          .
          <source>Decision Support Systems</source>
          ,
          <volume>38</volume>
          (
          <issue>3</issue>
          ):
          <fpage>399</fpage>
          -
          <lpage>419</lpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>R.</given-names>
            <surname>Mateescu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Poizat</surname>
          </string-name>
          , and
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>Salau¨n. Adaptation of service protocols using process algebra and on-the-fly reduction techniques</article-title>
          .
          <source>In Proc. ICSOC'08</source>
          , pages
          <fpage>84</fpage>
          -
          <lpage>99</lpage>
          . Springer,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>H.R. Motahari Nezhad</surname>
            ,
            <given-names>G.Y.</given-names>
          </string-name>
          <string-name>
            <surname>Xu</surname>
            , and
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Benatallah</surname>
          </string-name>
          .
          <article-title>Protocol-aware matching of web service interfaces for adapter development</article-title>
          .
          <source>In Proc. WWW'10</source>
          , pages
          <fpage>731</fpage>
          -
          <lpage>740</lpage>
          . ACM,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>R.</given-names>
            <surname>Seguel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Eshuis</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Grefen</surname>
          </string-name>
          .
          <article-title>Constructing minimal protocol adaptors for service composition</article-title>
          .
          <source>In Proc. WEWST '09</source>
          , pages
          <fpage>29</fpage>
          -
          <lpage>38</lpage>
          . ACM,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>R.</given-names>
            <surname>Seguel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Eshuis</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Grefen</surname>
          </string-name>
          .
          <article-title>Business protocol adaptation for flexible chain management</article-title>
          .
          <source>In Robert Meersman</source>
          , Tharam Dillon, and Pilar Herrero, editors,
          <source>On the Move to Meaningful Internet Systems: OTM</source>
          <year>2010</year>
          , volume
          <volume>6426</volume>
          of Lecture Notes in Computer Science, pages
          <fpage>438</fpage>
          -
          <lpage>445</lpage>
          . Springer,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>R.</given-names>
            <surname>Seguel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Eshuis</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Grefen</surname>
          </string-name>
          .
          <article-title>Minimal protocol adaptors for loosely coupled services</article-title>
          .
          <source>In Proc. ICWS'10</source>
          , pages
          <fpage>417</fpage>
          -
          <lpage>424</lpage>
          . IEEE,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>Z.</given-names>
            <surname>Shan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kumar</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Grefen</surname>
          </string-name>
          .
          <article-title>Towards integrated service adaptation - a new approach combining message and control flow adaptation</article-title>
          .
          <source>In Proc. ICWS '10</source>
          , pages
          <fpage>385</fpage>
          -
          <lpage>392</lpage>
          . IEEE,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>D.M. Yellin</surname>
            and
            <given-names>R.E.</given-names>
          </string-name>
          <string-name>
            <surname>Strom</surname>
          </string-name>
          .
          <article-title>Protocol specifications and component adaptors</article-title>
          .
          <source>ACM Transactions on Programming Languages and Systems (TOPLAS)</source>
          ,
          <volume>19</volume>
          :
          <fpage>292</fpage>
          -
          <lpage>333</lpage>
          ,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>