The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is accepted that domain based development is playing an important role on IT projects today. Following such idea, this paper presents preliminary study results of a prototype architecture created with the purpose of using a domain-driven approach to shorten the development of software projects. Our discussion presents a way of sharing business domain models, developed in different project sites,...
Some of the characteristics that make service-oriented architectures appealing for enterprise applications also make them vulnerable to security breaches. The vulnerabilities are primarily due to the openness of the service-execution environment, to the dynamic run-time selection and composition of services, and to the autonomy of the individual services. In this paper, we describe these vulnerabilities...
The distribution of services spanning across organizational boundaries raises problems related to intellectual value that are less explored in current service oriented research. Being a way to manage the intellectual rights between service consumers and service providers, licenses are critical to be considered in services. A service license describes the terms and conditions for the use and access...
Service-Oriented Architecture (SOA) is an effective paradigm for publishing common features as services and reusing the published services in building applications. Therefore, reusability of services is a key criterion for evaluating the quality of services. The evaluation target for reusability in our model is the service, applied to both atomic and composite service. Reusability models for conventional...
The paper describes ways to support outsourcing arrangements using collaborative technologies. It identifies outsourcing falling into the general class of socio-technical systems. It then suggests any supporting systems must emphasize both the social arrangements as well as any functionality needed to carry out the outsourcing goal. At the same time they should provide the dynamic capability to change...
The capabilities of organizations can be openly exposed, easily searched and discovered, and made readily-accessible to humans and particularly to machines, using service-oriented computing approaches. Artificial intelligence and software engineering researchers alike are tantalized by the promise of ubiquitously discovering and incorporating services into their own business processes (i.e. composition...
Identifying proper business processes, formalizing and documenting them has always been a challenge. Maintaining them in synchronization with changing business needs makes the problem harder. It becomes even harder when business processes are fully or partially implemented in IT systems where changes to the business cause changes in IT configurations. This paper presents an approach how IT configurations...
We investigate the structures of collaboration in software development groups by analyzing the data derived from the versioning system SVN (subversion) for several open source projects of different types and sizes. The goal of the work presented here is to investigate specific properties of the network topology in the collaboration groups of open source developer communities. For this purpose we developed...
Various approaches to automate the observance of compliance requirements have recently been proposed. Since there is no all-round solution available within the foreseeable future, we propose a classification scheme for existing approaches that address different aspects of automating compliance. A layer model is used for linking laws and regulations with a company's IT system. The "policy layer"...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.