The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A major advantage offered by Web services technologies is the ability to dynamically discover and invoke services. This ability is particularly important for operations of many applications executing in open dynamic environments. The QoS properties of the required and provided services play a significant role in dynamic discovery and invocation of services in open dynamic environments. In this paper,...
Service composition and service statefulness are key concepts in Web Service system programming. In this paper we present JOLIE, which is the full implementation of our formal calculus for service orchestration calledSOCK. JOLIE inherits all the formal semantics of SOCK and provides a C-like syntax which allows the programmer to design the service behaviour and the service deployment information separately...
Automated discovery and composition of Web services and the representation of service semantics required to automate these tasks are active research areas that play a large role in current work on service oriented architectures. In this paper, we investigate the feasibility of service composition powered by a consistency-based approach for candidate selection during composition. The modeling restraints...
Being regarded as the new paradigm for Internet communication, Web Services have introduced a large number of new standards and technologies. Though founding on decades of networking experience, Web Services are not more resistant to security attacks than other open network systems. Quite the opposite is true: Web Services are exposed to attacks well-known from common Internet protocols and additionally...
An architecture of a hosting system is presented, where a number of servers are used to provide different types of web services to paying customers. There are charges for running jobs and penalties for failing to meet agreed QualityofService requirements. The objective is to maximize the total average revenue per unit time. Dynamic policies for making server allocation and job admission decisions...
The semantic annotation of Web services capabilities with ontological information aims at providing the necessary infrastructure for facilitating efficient and accurate service discovery. The main idea is to apply reasoning techniques over semantically enhanced Web service requests and advertisements in order to determine Web services that meet certain requirements. In this paper we present our work...
With the rapid proliferation of Web services as the medium of choice to securely publish application services beyond the firewall, the importance of accurate, yet flexible matchmaking of similar services gains importance both for the human user and for dynamic composition engines. In this paper, we present a novel approach that utilizes the case based reasoning methodology for modelling dynamic Web...
The current Web service technology brought a new potential to the Web of services. However, the success of Web services still depends on resolving three fundamental challenges, namely search, integration and mediation. In this paper we define an extended Web service stack enabling total or partial automation of web service provisioning process. With the goal of a maximal Web standards compliance,...
Execution monitoring of complex web service process models is critical for effective management and control of web services based systems. During the composite process model execution or as part of the after-execution analysis complex event patterns (called composite events) consisting of various primitive events need to be detected. In this paper we introduce the concept of primitive semantic events...
MASC (Manageable and Adaptive Service Compositions)1* is a policy-based middleware for monitoring and control of composite Web services execution. The monitorable requirements are specified in the WS-Policy4MASC language that extends WS-Policy by defining new types of monitoring and control policy assertions. This paper focuses on MASC monitoring capabilities to detect business exceptions and runtime...
This paper presents a study evaluation of the SOAP [13] protocol performance between two different implementations: Java (Axis2) [2] and Erlang. This comparison has been carried out using several testbeds with input and output data of different sizes. More concretely, we developed three different web services representing typical scenarios likely to be found in real environments. The evaluation is...
The process of repairing Web Service failures may be connected to the nature of the fault that caused the error generating the failure. The selection strategy for composed services repair may be drawn from an analysis on temporal behavior of the fault, assessing if fault is transient, intermittent or permanent. The repair process strictly depends on the permanence type of faults, as substitution is...
Cryptographically signed email has been widely used to provide the end-to-end authentication, integrity and non-repudiation. PGP mail and S/MIME have the significant drawback that the headers are unauthentic. DKIM protects specified headers, however, only between the sending server and the receiver. These lead to possible impersonation attacks and profiling of the email communication, and encourage...
Web service discovery requires matching techniques for comparing and selecting web service descriptions based on user constraints. Semantic-based approaches achieve higher recall than other approaches (such as syntax-based approaches), because they employ ontological reasoning mechanisms to match syntactically heterogeneous descriptions. However, existing semantic-based approaches are not scalable...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.