The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Hiking a relevant web service in the current environment full of various options is similar to looking for a needle in a haystack. The best possible web service is the one that completely fulfills the required functions while satisfying the QoS requested by a user. In this paper, we introduce a new context-based solution based on QoS (Quality of Service) exploiting both functional and non-functional...
One of the main concerns of Cloud storage solutions is to offer the availability to the end user. Thus, addressing the mobility needs and device's variety has emerged as a major challenge. At first, data should be synchronized automatically and continuously when the user moves from one equipment to another. Secondly, the Cloud service should offer to the owner the possibility to share data with specific...
Pervasive computing offers environments in which user needs or tasks are fulfilled without demanding their attention. Context-aware service composition is a central aspect to achieving this, in which services are discovered and composed in response to context to meet user needs. Since pervasive computing environments are inherently dynamic and heterogeneous, context-aware service composition is a...
Trust Negotiation, as a complex access control approach, can enable two unknown entities to establish a bilateral trust relationship. The complexity of Trust Negotiation may be ascribed to its support for the use of different strategies. Currently, a variety of strategies have been designed for Trust Negotiation, and the majority can support the exchange of authorisation policies during the conduction...
After the vision of Mark Wieser, and the advent of 3G connection with a large number of mobile computing devices(PDAs, Smartphones, Tablet, etc.) that have democratized access to information anywhere, we live in a new era of ubiquity where a set of services are offered in our environments. In this work we try to review the conception, discovery and composition of these services called pervasive in...
One of the challenges in working with heterogeneous Web services is the need to ensure their interoperability and compatibility. Service specifications constantly evolve. In the context of Web service interaction via an adapter, it is important to understand and cope with the potential impacts of the changes arising from the evolution of service business protocol on the adapter. We present an approach...
We present a lightweight Byzantine fault tolerance (BFT) algorithm, which can be used to render the coordination of web services business activities (WS-BA) more trustworthy. The lightweight design of the BFT algorithm is the result of a comprehensive study of the threats to the WS-BA coordination services and a careful analysis of the state model of WS-BA. The lightweight BFT algorithm uses source...
QoS-aware service composition intends to integrate services from different providers and maximize the global QoS in order to increase the user's satisfaction degree while subjecting to dynamic context constraints. Current composition approaches only focus on optimizing a single process to maximize the satisfaction degree for one party. When multiple processes are performed concurrently by their selfish...
We first sketch a prototype implementation of a battlefield command and control system that maintains shared situation awareness among units. We then analyze the conditions for coordination among units. Common knowledge is critical here and is achieved in the prototype by an arrangement with the formal structure suggested by one account of the notion of theory of mind in psychology. Common knowledge...
Service based business applications are built through the interaction of Web services. The behaviours of these Web services can be described by service protocols representing acceptable sequences of message exchanges. In order to guarantee the correct interaction between Web services, one can check the compatibility of their service protocols. Recent research efforts address the impact of non-functional...
The information processing of user situation (or user's context) is one of the most significant paradigms in end user telecommunication services development. There are many actors that will play a role, from context providers, acquiring context, to context consumers, context-aware services. Telco operators are the most adequate player to take the role of context aggregators and processors. That is...
Reputation systems offer web service consumers an effective solution for selecting web service providers who meet their Quality of Service (QoS) expectations. A reputation system computes the reputation of a provider as an aggregate of the feedback submitted by consumers. Truthful feedback is clearly a pre-requisite for accurate reputation scores. However, it has been observed that users of a reputation...
In this article we focus on the modelization of the Bonjour Grid protocol which is based on the Publish-Subscribe (Pub-Sub) paradigm, a paradigm for asynchronous communication that is useful for implementing some approaches in distributed programming. The aim of this paper is to isolate the generic mechanisms of construction for the publish-subscribe approach then to model and verify, based on those...
Service cloud provides added value to customers by allowing them to compose services from multiple providers. Most existing web service security models focus on the protection of individual web services. When multiple services from different domains are composed together, it is critical to ensure the proper information flow on the chain of services. In a service chain, each service needs to determine...
In order to loose the tight relationship between management system and the managed IT resources, applying SOA in the system a resource management field is a promising way, as web service can increase the interoperability among multiple resources, application and systems. WS-Management is a general Web Services-based protocol for managing system and network resources. Wiseman is an open source project...
In service-based systems, service evolution might raise critical communication issues since the client cannot be aware of the changes that have occurred on the black-box services side. In this paper, we propose an automated process to adapt the client to the changes that have occurred. Our approach relies on a compatibility measuring method, and changes the client interface to ensure the system compatibility...
In this paper we propose a technique called replaceability assessment where, according to the adaptation mechanisms of a certain adapter, it provides a set of condition pairs that determine when one protocol can be replaced by another, and computes a replacement degree that specifies how replaceable two protocols are. The set of condition pairs and the replacement degree are complementary criteria...
In this paper, we specify a global service level guarantee including not only QoS but also security and taking into account user mobility. This global service level could be guaranteed within several autonomic computing systems managed by different autonomic domain managers. For that purpose, we propose an end-to-end Service Level Negotiation Protocol, called SLNP, to provide those autonomic managers...
Much larger flexibility of software adaptability is necessary to the destination platform and the user requirement in distributed systems. Component-based models are becoming increasingly ubiquitous as enabling technology for modern distributed system applications. Software modules and components have always played a key role in the systems. The fundamental contribution of component-based models lies...
There are more sensors connected to the Internet today and corporations predict that there will be billions of sensors within the decade. With billions of sensors, there is an opportunity for new behavior from applications in mobile devices based on sensor input. But such applications require a mechanism to provide a manageable subset of sensors, relevant to the user's current situation; since no...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.