A petri net theory-based method for modeling web service-based systems

Rendong Han*, Ju Yanbing, Liu Kecheng, Zhao Jinghua

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Citations (Scopus)

Abstract

With the proliferation of researches on web services and their increasing applications in industries comes the opportunity to study the analysis and design method of web service-based systems systematically. Our objective is to propose a method for modeling web service-based systems to conduct the practice of developing the application systems. In this paper, we introduce the relevant research on web services. We propose a method for modeling web service-based systems. We also present the Petri net theory and take it as theoretical foundation of the modeling method. Next, we present the analysis method to assess the correctness of the model constructed by the method. Finally, we present a case study on modeling the web service-based airport emergency management information system via the modeling method and verify the correctness of the model.

Original languageEnglish
Title of host publication2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008
DOIs
Publication statusPublished - 2008
Event2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008 - Dalian, China
Duration: 12 Oct 200814 Oct 2008

Publication series

Name2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008

Conference

Conference2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008
Country/TerritoryChina
CityDalian
Period12/10/0814/10/08

Keywords

  • Airport emergency management
  • Business process
  • Correctness
  • Modeling
  • Petri net
  • Web service

Fingerprint

Dive into the research topics of 'A petri net theory-based method for modeling web service-based systems'. Together they form a unique fingerprint.

Cite this