Skip to main navigation Skip to search Skip to main content

Behavioral verification of service component architecture

  • Wael Chargui
  • , Taoufik Sakka Rouis
  • , Mourad Kmimech
  • , Mohamed Tahar Bhiri
  • , Layth Sliman
  • , Badran Raddaoui

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Currently,much research looks at treating the behavior properties beginning with the architectural design phase in SCA (Software Component Architectures) based applications. In this paper,we propose to map SCA onto the Wright ADL in order to verifythe behavioral consistency of SCA software architectures. To achieve this goal, we suggesttranslating this source software architecture into a Wright configuration. Using Wr2fdrtool, this Wright configuration can be automatically translated to a CSP specificationacceptable by the FDR2 model-checker.

Original languageEnglish
Title of host publicationProceedings - 2017 IEEE 26th International Conference on Enabling Technologies
Subtitle of host publicationInfrastructure for Collaborative Enterprises, WETICE 2017
EditorsWojciech Cellary, MariaGrazia Fugini, Sumitra Reddy
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages239-241
Number of pages3
ISBN (Electronic)9781538617588
DOIs
Publication statusPublished - 7 Aug 2017
Event26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2017 - Poznan, Poland
Duration: 21 Jun 201723 Jun 2017

Publication series

NameProceedings - 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2017

Conference

Conference26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2017
Country/TerritoryPoland
CityPoznan
Period21/06/1723/06/17

Keywords

  • ADL
  • Behavior
  • FDR2
  • Model-checker
  • SCA
  • Software architecture
  • Verification

Fingerprint

Dive into the research topics of 'Behavioral verification of service component architecture'. Together they form a unique fingerprint.

Cite this