=Paper= {{Paper |id=None |storemode=property |title=Architecture Support for Flexible Chain Management |pdfUrl=https://ceur-ws.org/Vol-662/paper_7.pdf |volume=Vol-662 |dblpUrl=https://dblp.org/rec/conf/eis/SeguelEG10 }} ==Architecture Support for Flexible Chain Management== https://ceur-ws.org/Vol-662/paper_7.pdf
                                 5th SIKS/BENAIS Conference on Enterprise Information Systems




       Architecture Support for Flexible Chain
                    Management

                      R. Seguel, R. Eshuis, and P. Grefen

           Information Systems Group, School of Industrial Engineering,
               Eindhoven University of Technology, The Netherlands.
                 {r.e.seguel,h.eshuis,p.w.p.j.grefen}@tue.nl



      Abstract. In competitive markets, organizations collaborate in busi-
      ness chains using dynamic service outsourcing to deliver complex prod-
      ucts and services. To enable the flexible formation of business chains,
      organizations can use protocol adaptation to ensure that their business
      protocols are compatible. In this paper, we present three different soft-
      ware architectures that enable the flexible formation and enactment of
      different chain structures, in which the protocol adaptation component is
      a key enabler. We show the feasibility of the approach by extending soft-
      ware architecture definitions from the literature for each flexible chain
      formation case.

      Keywords: Business Chains, Dynamic Service Outsourcing, Interacting
      Services, Protocol Adaptor, Service Adaptation, Software Architecture


1   Introduction
Nowadays, the production of complex products and services in competitive mar-
kets involves a number of autonomous organizations [8] that collaborate in busi-
ness chains. By locating the customer order decoupling point (CODP) in the
business chain we identify three chain structures: demand chain, supply chain
and hybrid demand/supply chain [13]. The CODP indicates how deeply the cus-
tomer order penetrates into a business chain. Due to the shorter life-cycles and
increasing complexity of products and services [6], the organizations in a business
chain collaborate in a just-in-time fashion, using dynamic service outsourcing.
In dynamic service outsourcing, an organization outsources a part of its busi-
ness process, for instance order fulfillment, to a partner that is selected at the
last possible moment from the marketplace [6]. This way, the organizations col-
laborate by invoking functionalities from each other according to their business
protocols in their public process view [2, 4]. Each public process view abstracts
an underlying private business processes that is executed by the organization.
    In current dynamic service outsourcing approaches [7,8], the tacit assumption
is made that interacting protocols are compatible: each sent message is received
and processed by the other party, and thus no deadlocks occur. However, col-
laborating organizations have their own protocol that specifies their own way of
working and they may easily have incompatible protocols. Since organizations




                                          85
Proceedings




              collaborate in a just-in-time fashion, incompatible business protocols hinder the
              flexible formation of business chains. To configure business chains in a flexible
              way the organizations can use protocol adaptation to ensure that their business
              protocols are compatible [13].
                  The goal of this paper is to present a supporting software architecture for
              each flexible chain formation case that we described in [13]. The software archi-
              tectures are an extension and integration of two software architectures from the
              literature [7,8] that support the formation and enactment of supply and demand
              chain networks. The presented software architectures include business protocol
              adaptation as a key component to support the flexible configuration and en-
              actment of business chains. The protocol adaptation component constructs an
              adaptor to resolve (if possible) incompatibilities between interacting services
              during chain formation, using any existing adaptation method [1, 10–12, 14–16].
                  Although there is some work on cross-organizational workflow collaboration
              using process views [2, 8, 9] they do not include adaptation in their architecture
              definitions. In this paper, we focus on adaptation of behavioral mismatches rather
              than interface mismatches. An interface mismatch is due to differences in the
              formats and specifications of messages exchanged that can be resolved using
              schema mapping and transformation tools [11, 15]. We will extend our approach
              adding interface adaptation in future work. However, we do not expect that this
              actually impacts the presented software architectures.
                  The contributions of this paper are three software architectures to support
              the flexible formation of business chain [13], in which the protocol adaptation
              component is a key enabler.
                  The remainder of this paper is organized as follows. Section 2 describes the
              three flexible chain formation cases. Section 3 presents the architecture support
              for flexible formation of demand chains. Section 4 details the architecture to
              enable the flexible configuration of supply chains. Section 5 describes the archi-
              tecture for flexible hybrid demand/supply chain formation. Section 6 discusses a
              third-party adaptation factory and Section 7 presents the conclusions and future
              work.


              2   Flexible Business Chain Management

              There are three scenarios for flexible formation of business chains [13]. Each
              scenario defines the responsibility of a partner to construct a protocol adaptor
              to resolve (if possible) incompatibilities between their business protocols. We
              show in Figure 1 a business chain to illustrate the adaptation responsibility
              for each business chain formation scenario. The letters outside the services in
              Figure 1 represent the place where the protocol adaptor is constructed.
                  This way, in a flexible demand chain formation scenario [13], the service
              consumer defines its business protocol according to the customer business re-
              quirements. Since the CODP is moved to the last provider in the demand chain,
              the responsibility of constructing an adaptor is always of the provider; see   b
              and d in Figure 1. In a flexible supply chain formation scenario [13], the service




                                                      86
                                5th SIKS/BENAIS Conference on Enterprise Information Systems




                  Service             Service              2nd-tier
                 Consumer             Provider             Provider
                            a     b              c     d




              Fig. 1: Business Chain to Identify Adaptation Cases


provider sets its business protocol in conformance with market standards like
SCOR [3] or eTOM [5]. For example, the service provider can be a big retail
vendor like Dell. The service consumer searches the standard service provider in
the marketplace to define its business protocol. In the supply chain the CODP
is moved to the service consumer, and thus the responsibility of building an
adaptor is always of the service consumer; see   a and c in Figure 1. In a flexible
hybrid demand/supply chain formation scenario [13], the service consumer and
service provider form a demand chain while the service (1st-tier) provider and
the 2nd-tier provider form a supply chain. Then, the CODP is at the service
provider. This way, the responsibility of building an adaptor is always of the
service (1st-tier) provider: it has to build an adaptor to resolve mismatches with
the service consumer and 2nd-tier provider; see    b and  c in Figure 1.
    To describe the flexible formation of a business chain, we explain the hybrid
demand/supply chain case since it includes the other two business chain cases.
We illustrate this case in Figure 2, in which the companies W and X operate
in demand chain mode and companies X and Y operate in supply chain mode.
Then, the company X constructs a protocol adaptor to resolve the mismatches
with companies W and Y, using one of the adaptation methods presented in [1,
10–12, 14–16]. In this example we use the method presented in [14]. Note that
the communication of messages is shown in the figure by the arrows crossing the
organization borders, indicating send (source) and receive (target) actions. The
company X constructs the protocol adaptors at the public process view and it
deploys each adaptor in front of its business protocols. Then, the company X
offers the protocol adaptors and its business protocol in the marketplace. Next,
the companies W and Y select X, and then they deploy the business protocols
in the architecture components.


3   Architecture for Flexible Demand Chain Formation
The CrossWork architecture [8] was developed to support the dynamic forma-
tion and enactment of a Network of Automotive Excellence. In the CrossWork
business scenario, the service consumer is an Original Equipment Manufacturer
(OEM) organization like BMW or MAN. The OEM defines a certain goal or so-
lution objective that is sent to the service provider. Then, the provider forms the
chain by selecting the 2nd-tier providers from the marketplace to meet the goal.
The provider composes a global business protocol with the local protocols of
the 2nd-tier providers to coordinate them. Then, the provider enacts the global
process that enacts the local protocols in the 2nd-tier providers to later send the




                                         87
Proceedings




                  Company W                                                           Company X                                                              Company Y
               Fulfillment Service                                                                                Deliver Items
                                      Protocol Adaptor             Fulfillment Service Provider                                     Protocol Adaptor       Deliver Items
                   Consumer                                                                                     Service Consumer
                                                                                                                                                          Service Provider
              Public Process View    Public Process View Public Process View    Private Process View           Public Process View Public Process View
                                                                                                                                                         Public Process View



                                        RecProduct                                      Receive                                             Rec
                                          Order                                          Order
                                                                                                                     Send                ItemList
                                                                                                                                                               Send
                  SendProduct                                RecDelivery                                           ItemList
                                                                                                                                                               TxInfo
                     Order                                     Details
                                        RecDelivery
                                                                                    Set               Put            Rec
                                          Details                                ItemList           Items
                                                                                                                    TxInfo                 Rec
                                                                                                                                          Items
                                                                                                    RecTx                                                       Rec
                                       SendDelivery                                                  Info             Put                                      Items
                                         Details                                                                    Items
                 SendDelivery                                RecProduct                                                                   Send
                   Details                                     Order                                                                      Items

                                        SendProduct                                          Get
                                           Order                                            Items                                          Send                  Rec
                                                                                                                                         ItemList             ItemList



                                                                                 Interna-           Country-
                   RecItem                                    SendItem            tional              side
                   Shipment                                   Shipment



                                                                                            Send
                                                                                            Items




              Fig. 2: Adaptation Case for Flexible Hybrid Demand/Supply Chain Formation


              result back to the OEM. We extend the CrossWork architecture by adding the
              architecture components to support protocol adaptation. In Figure 3, we illus-
              trate the CrossWork architecture (white boxes) plus the extension (grey boxes).
              The extended CrossWork architecture enables the flexible formation of a demand
              chain at design-time and at run-time.
                  At design-time, the extended CrossWork architecture is triggered by the
              service consumer that defines the solution objective in the goal support mod-
              ule according to the customer business requirements. The consumer defines its
              business protocol according to the goal. Then, the consumer selects the ser-
              vice provider from the marketplace that meets the goal. The consumer sends
              the goal definition and its business protocol to the service provider. Then, the
              service provider checks the compatibility between its business protocol and the
              consumer protocol. If the protocols are incompatible, the adaptor factory mod-
              ule constructs a protocol adaptor to resolve mismatches. The adaptor factory
              implements the adaptation method for tightly and loosely coupled interacting
              services [1, 10–12, 14–16]. Then, the provider deploys the business protocol in
              the protocol enactment module and the protocol adaptor in the adaptor enact-
              ment module. Similarly, the service consumer deploys its business protocol in
              the protocol enactment module.
                  Next, the service provider decomposes the goal into a required set of protocols
              (component services) in the goal support module. Then, the team formation
              module finds the 2nd-tier providers in the marketplace according to the set of
              protocols. Next, the composition module composes the set of protocols into a
              global business protocol. Note that the 2nd-tier providers are not only selected
              by protocol compatibility. It means that while there are parts of the global




                                                                                              88
                                            5th SIKS/BENAIS Conference on Enterprise Information Systems




                                Service Consumer                     Service Provider


                                                                                                                              Protocol
      Goal         Protocol      Protocol                                 Adaptor        Adaptor
                                                                                                                            Compatibility
     Support       Definition   Enactment                                Enactment       Factory
                                                                                                                               Check


Design-time part                  Run-time part




                                                   Run-time part
                                                                          Protocol       Protocol                               Team             Goal
                                                                         Enactment      Composition                           Formation         Support



                                                                                                                                            Design-time part
                                                                                                 2nd-tier Provider
                                                                                              2nd-tier Provider
                                                                                            2nd-tier Provider
                                                                                          2nd-tier Provider


                                                                          Adaptor         Adaptor
                                                                         Enactment        Factory



                                                                                          Protocol
                                                                          Protocol
                                                                                        Compatibility
                                                                         Enactment
                                                                                           Check




                                                                                                         Design-time part
                                                     Run-time part




                                                                           Legacy
                                                                         Integration




Fig. 3: Architecture Extension of CrossWork [8] for Flexible Demand Chain Man-
agement


protocol that are compatible with the 2nd-tier providers, there are other parts
that are incompatible with the 2nd-tier provider protocols. This way, the 2nd-
tier providers check the compatibility between their business protocols and the
set of protocols that compose the global protocol. If they are incompatible, the
adaptor factory at the 2nd-tier providers generates a protocol adaptor. Next,
each 2nd-tier provider deploys the business protocol in the protocol enactment
module and the adaptor in the adaptor enactment module. Finally, the service
provider deploys the global protocol in the protocol enactment module. This
way, the protocols can be later executed by the service consumer and provider,
enacting the demand chain with the 2nd-tier providers.
    At run-time, the extended CrossWork architecture enables the formation of
the demand chain when the consumer business protocol is being enacted. This is
illustrated with the ‘reverse’ dotted arrow from the protocol enactment module
to the goal support module in Figure 3. This way, the consumer stops the busi-
ness protocol execution to configure the demand chain (at design-time) to later
continue the enactment of the business protocols. Similarly, the service provider
can configure the demand chain with 2nd-tier providers when its protocol is be-
ing executed. Note that if the service provider acts as integrator only [6], then
the adaptation is only needed at the 2nd-tier provider. The service provider uses
the protocol sent by the consumer as global business protocol. Then, the service
provider is protocol compatible with the service consumer since they interact
to only synchronize the control flow of the global business protocol. The global
business protocol interacts with the 2nd-tier providers, which can need adap-
tation. In the basic CrossWork architecture, if the global protocol cannot be




                                                                         89
Proceedings




                                                Service Consumer               Service Provider




                                                                                                                                                                      Design-time part
                    Protocol                      Protocol                                                                          Partner             Protocol
                                    Partner
                  Compatibility                  Enactment                                                                         Selection            Definition
                                   Selection
                     Check



                    Adaptor        Protocol       Adaptor                                           Protocol                       Protocol
                    Factory       Composition    Enactment                                         Enactment                      Composition




                                                                   Run-time part
                                                                                                                                                        Protocol
                                                                                                    Adaptor                        Adaptor
               Design-time part                   Run-time part                                                                                       Compatibility
                                                                                                   Enactment                       Factory
                                                                                                                                                         Check


                                                                                                                                           2nd-tierProvider
                                                                                                                                         2nd-tier   Provider
                                                                                                                                        2nd-tier Provider
                                                                                                                                       2nd-tier Provider


                                                                                                    Protocol                             Partner
                                                                                                   Enactment                            Selection




                                                                                                               Design-time part
                                                                                   Run-time part




                                                                                                                                       Protocol
                                                                                                                                       Definition




              Fig. 4: Architecture Extension of CrossFlow [7] for Flexible Supply Chain Man-
              agement


              composed then the system backs up to the team formation or even to the goal
              support module to correct it [8]. However, in the extended architecture, these
              backtrack steps are needed only if the adaptor factory module at the 2nd-tier
              provider indicates the mismatch cannot be resolved and no adaptor can be con-
              structed [12, 14]. Note that technically the business protocols and the adaptor
              can be enacted using the same enactment engine or two different enactment
              engines.


              4      Architecture for Flexible Supply Chain Formation
              The CrossFlow architecture [7] was developed to support the configuration of
              a supply chain, using dynamic service outsourcing. In the CrossFlow business
              scenario, the service consumer outsources a non-core part of its business proto-
              col to a service provider. The service consumer takes the decision of outsourcing
              during the execution of its business protocol, and thus it selects the provider at
              the last possible moment. This way, the basic CrossFlow architecture is mainly
              focused on run-time supply chain configuration. Note that the architecture was
              developed in the pre web services era, but it conceptually supports the collabora-
              tion of two interacting services which share the business protocols at the public
              process view. We extend the CrossFlow architecture to support the flexible con-
              figuration of a supply chain at design-time and at run-time. We illustrate the
              basic architecture (white boxes) plus the extension (grey boxes) in Figure 4.
                  At design-time, the extended CrossFlow architecture is triggered by the con-
              sumer that selects the service provider from the marketplace to outsource its




                                                                                   90
                                5th SIKS/BENAIS Conference on Enterprise Information Systems




protocol. Then, the provider sends its standard business protocol to the con-
sumer that checks the compatibility with its protocol. If the business protocols
are incompatible, then the service consumer constructs a protocol adaptor. Next,
the service consumer couples the outsourced protocol part with its business pro-
tocol in the composition module for later deployment in the enactment module.
Then, the consumer deploys the coupled business protocol in the protocol en-
actment module and the adaptor in the adaptor enactment module. Finally, the
service provider deploys its business protocol in the enactment module after it
sent the protocol definition. Similarly, the service provider can outsource part
of its protocol by selecting 2nd-tier providers from the marketplace. Then, the
2nd-tier providers send their standard business protocol to the provider that
checks the compatibility with its protocol. If the protocols are incompatible,
then the provider adaptor factory module generates the protocol adaptor. Then,
the provider couples the outsourced protocol part with its business protocol in
the composition module. Next, the provider deploys the coupled protocol and
the adaptor in the enactment modules while the 2nd-tier providers deploy their
protocols too. This way, the protocols can be later executed by the service con-
sumer and provider, enacting the supply chain with the 2nd-tier providers.
     At run-time, the extended CrossFlow architecture supports the configuration
of the supply chain when the consumer business protocol is being enacted. This
is illustrated with the ‘reverse’ dotted arrow from the protocol enactment mod-
ule to the partner selection module in Figure 4. Therefore, the consumer stops
the business protocol execution to configure the supply chain (at design-time) to
later continue the enactment of the business protocols. Then, the service provider
can also configure a supply chain with 2nd-tier providers when its protocol is
being enacted. Note that if the service provider acts as integrator only [6], then
the adaptation is only needed at the service consumer. The service provider pre-
selects the 2nd-tier providers before it is selected by the consumer. Once the
provider is selected, it sends the standard protocol to the consumer. The service
provider is protocol compatible with the 2nd-tier providers since they interact
to only synchronize the control flow of the business protocol. On the other hand,
the consumer protocol interacts with the standard business protocol, which can
need adaptation. Like the extended CrossWork architecture, the CrossFlow ar-
chitecture technically support the enactment of the business protocols and the
adaptor using the same enactment engine or two different enactment engines.


5   Architecture for Flexible Hybrid Demand/Supply
    Chain Formation

To support the flexible configuration of a hybrid demand/supply chain, we define
the architecture as an extension of the CrossWork (demand chain) and CrossFlow
(supply chain) architectures. We illustrate the architecture for flexible formation
of a hybrid demand/supply chain in Figure 5. It supports the configuration of
the hybrid chain at design-time and at run-time.




                                        91
Proceedings




                                              Service Consumer                           Service Provider


                                                                                                                                     Protocol
                   Goal          Protocol      Protocol                                           Adaptor    Adaptor
                                                                                                                                   Compatibility
                  Support        Definition   Enactment                                          Enactment   Factory
                                                                                                                                      Check


              Design-time part                  Run-time part
                                                                                                  Protocol       Protocol              Team                   Goal
                                                                                                 Enactment      Composition          Formation               Support




                                                                 Run-time part
                                                                                                  Adaptor
                                                                                                 Enactment
                                                                                                                                                          Design-time part

                                                                                                                            2nd-tier Provider
                                                                                                                           2nd-tier Provider
                                                                                                                          2nd-tier Provider
                                                                                                                         2nd-tier Provider




                                                                                                                                       Design-time part
                                                                                                                  Partner
                                                                                                  Protocol
                                                                                                                 Selection
                                                                                                 Enactment
                                                                                 Run-time part




                                                                                                                 Protocol
                                                                                                                 Definition




               Fig. 5: Architecture for Flexible Hybrid Demand/Supply Chain Management



                  At design-time, the architecture is triggered by the service consumer that
              configures a demand chain with the provider. The consumer defines the solu-
              tion objective in the goal support module according to the customer business
              requirements. Then, the consumer defines its business protocol according to the
              goal and selects the service provider from the marketplace that meets the goal.
              Then, the consumer sends the goal definition and its business protocol to the
              service provider. Next, the service provider checks the compatibility between its
              business protocol and the consumer protocol. If the protocols are incompatible,
              the adaptor factory module constructs a protocol adaptor to resolve mismatches.
              Then, the provider deploys the business protocol in the protocol enactment mod-
              ule and the protocol adaptor in the adaptor enactment module while the service
              consumer deploys its business protocol in the protocol enactment module.
                  At this stage, the service provider configures a supply chain with 2nd-tier
              providers. Next, the service provider decomposes the goal into a required set
              of protocols (component services) in the goal support module. Then, the team
              formation module finds the 2nd-tier providers in the marketplace according to
              the set of protocols. Next, the composition module composes the set of protocols
              into a global business protocol. Then, the 2nd-tier providers send their standard
              business protocol to the provider that checks the compatibility with its protocol.
              If the protocols are incompatible, then the provider adaptor factory module gen-
              erates the corresponding protocol adaptors. Finally, the service provider deploys
              the global protocol and the adaptors in the enactment modules while each 2nd-
              tier provider deploys its protocol in the enactment module too. This way, the
              protocols can be later executed by the services by enacting the demand chain




                                                                                                   92
                                5th SIKS/BENAIS Conference on Enterprise Information Systems




between the consumer and provider and the supply chain between the provider
and 2nd-tier providers.
    At run-time, the extended architecture supports the configuration of the hy-
brid demand/supply chain when the consumer and provider protocols are being
enacted. This is illustrated with the ‘reverse’ dotted arrow in Figure 4. The con-
sumer stops the business protocol execution to configure the demand chain (at
design-time) to later continue the enactment of the business protocols. Similarly,
the service provider stops the protocol execution to configure the supply chain
(at design-time) with the 2nd-tier providers to later continue with the protocol
enactment.
    Note that if the service provider acts as integrator only [6], then the adapta-
tion is needed for compatibility with either the 2nd-tier providers or the service
consumer. In both cases the adaptor is constructed and deployed by the ser-
vice provider. In the first case, like in the extended CrossWork case, the service
provider uses the protocol sent by the consumer as global business protocol.
Then, the provider and consumer protocols are compatible since they interact
to only synchronize the control flow. Thus, the global business protocol parts
interact with the 2nd-tier providers, which can need adaptation. In the second
case, like in the extended CrossFlow case, the service provider pre-selects the
2nd-tier providers before it is selected by the consumer. Then, the provider has
to generate an adaptor if the consumer and provider protocols are incompati-
ble. The service provider and the 2nd-tier providers are compatible since they
interact to only synchronize the control flow of the global business protocol parts.


6   Third-party Adaptor Factory
The architectures that we defined for flexible formation of business chains sup-
port the participation of a trusted third-party that provides adaptation as a
service (AaaS). The third-party is an adaptor factory that constructs and enacts
protocol adaptors to support the flexible configuration of business chains. This
way, the service consumer, service provider or 2nd-tier providers can buy the
adaptation service from the trusted third-party, and thus they do not need to
add the adaptor factory module in their architectures themselves. The partici-
pation of the third-party does not cause conceptual changes to the architectures
defined previously, but technically it needs to add the technology to ensure qual-
ity of services and security, which are outside the scope of this paper.


7   Conclusions and Future Work
We have presented three software architectures that considers protocol adapta-
tion component as a key enabler of flexible chain formation. Any existing protocol
adaptation approach can be used to realize the actual adaptation. The presented
architectures enables the flexible formation of business chains between organi-
zations that collaborate in a just-in-time fashion to meet a solution objective,
which is very important in competitive markets.




                                         93
Proceedings




                  There are several directions for future work. We plan to extend our approach
              adding interface adaptation to the adaptor factory. We are currently extending
              our approach to define a reference architecture in which the presented three
              software architectures can be described. Moreover, we will extend our approach
              to deal with adaptation of running business chains that deadlock due to the
              propagation of changes on the partner business protocols.

              References
               1. A. Brogi and R. Popescu. Automated generation of BPEL adapters. In Proc.
                  ICSOC’06, pages 27–39. Springer, 2006.
               2. D. Chiu, S. Cheung, S. Till, K. Karlapalem, Q. Li, and E. Kafeza. Workflow view
                  driven cross-organizational interoperability in a web service environment. Infor-
                  mation Technology and Management, 5(3-4):221–250, 2004.
               3. Supply Chain Council. SCOR: Supply-Chain Operations Reference model; version
                  9.0, 2008. http://www.supply-chain.org.
               4. R. Eshuis and P. Grefen. Constructing customized process views. Data and Knowl-
                  edge Engineering, 64(2):419–438, 2008.
               5. TM Forum. eTOM: enhanced Telecom Operations Map; release 8.0, 2008.
                  http://www.tmforum.org/.
               6. P. Grefen. Mastering E-Business. Routledge, 2010.
               7. P. Grefen, K. Aberer, Y. Hoffner, and H. Ludwig. CrossFlow: Cross-Organizational
                  Workflow Management in Dynamic Virtual Enterprises. Computer Systems Sci-
                  ence & Engineering, 1(5):277–290, 2000.
               8. P. Grefen, R. Eshuis, N. Mehandjiev, G. Kouvas, and G. Weichhart. Internet-based
                  support for process-oriented instant virtual enterprises. IEEE Internet Computing,
                  13(6):65–73, 2009.
               9. D-R. Liu and M. Shen. Business-to-business workflow interoperation based on
                  process-views. Decision Support Systems, 38(3):399–419, 2004.
              10. R. Mateescu, P. Poizat, and G. Salaün. Adaptation of service protocols using
                  process algebra and on-the-fly reduction techniques. In Proc. ICSOC’08, pages
                  84–99. Springer, 2008.
              11. H.R. Motahari Nezhad, G.Y. Xu, and B. Benatallah. Protocol-aware matching of
                  web service interfaces for adapter development. In Proc. WWW’10, pages 731–740.
                  ACM, 2010.
              12. R. Seguel, R. Eshuis, and P. Grefen. Constructing minimal protocol adaptors for
                  service composition. In Proc. WEWST ’09, pages 29–38. ACM, 2009.
              13. R. Seguel, R. Eshuis, and P. Grefen. Business protocol adaptation for flexible chain
                  management. In Robert Meersman, Tharam Dillon, and Pilar Herrero, editors, On
                  the Move to Meaningful Internet Systems: OTM 2010, volume 6426 of Lecture
                  Notes in Computer Science, pages 438–445. Springer, 2010.
              14. R. Seguel, R. Eshuis, and P. Grefen. Minimal protocol adaptors for loosely coupled
                  services. In Proc. ICWS’10, pages 417–424. IEEE, 2010.
              15. Z. Shan, A. Kumar, and P. Grefen. Towards integrated service adaptation - a new
                  approach combining message and control flow adaptation. In Proc. ICWS ’10,
                  pages 385–392. IEEE, 2010.
              16. D.M. Yellin and R.E. Strom. Protocol specifications and component adaptors.
                  ACM Transactions on Programming Languages and Systems (TOPLAS), 19:292–
                  333, 1997.




                                                         94