The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Hiking a relevant web service in the current environment full of various options is similar to looking for a needle in a haystack. The best possible web service is the one that completely fulfills the required functions while satisfying the QoS requested by a user. In this paper, we introduce a new context-based solution based on QoS (Quality of Service) exploiting both functional and non-functional...
In Web service composition, operating environment information and user requirement information change constantly. To better adapt these dynamic changes, this paper provides adaptive mechanism of service composition. An adaptive Web service composition framework is presented. The main function modules of this framework including Execution Engine, Monitor, Analyzer and Planner are implemented using...
Personalization or privacy control? is a question one frequently asks himself/herself nowadays with the wide spread of service provision for users on the move. The right to protect intimacy or the right of privacy is a permanent and genuine right of any person. Context-awareness, offering to users services that react proactively to user environment and service conditions, although desirable, breaks...
Today, information systems rely largely on web services and XML as their payloads. Every information system also depends on checking and preserving integrity constraints. In the world of conceptual modeling, they can be expressed using Object Constraint Language (OCL) expressions over class diagrams. However, the expressions defined in the conceptual model of the system must be rewritten to the form...
Distributed systems such as SOA are typically heterogeneous systems that are opened to a wide variety of partners, customers,clients and resources, which introduce a new security threats. The organizations must protect their information assets from attacks. Their information assets would be accessed typically through services, which come in different technologies. Therefore in order to obtain security...
With the rapid development of computer technology, programming methods have changed a lot. Nowadays, software developing based on SOA (Service Oriented Architecture) is more and more popular due to its autonomous, distributed and reusable. And at the same time, user requirements are also changing, they are anxious for the information they want from the vast data, regardless of the time and space....
An important aspect in the design of pervasive/ubiquitous applications is to evaluate them before their deployment in real scenarios. A possible strategy to assess them is to perform simulations that provide useful insights and results to the application designer. However, the simulation of pervasive/ubiquitous applications and environments has proven to be a considerable challenge for several reasons...
Testing Service Oriented Architecture applications is a challenging task due to the high dynamism, the low coupling and the low testability of services. Web services, a popular implementation of services, are usually provided as black box and using testing techniques based on implementation is limited. This paper presents an approach to support the use of the structural testing technique on web service...
A workflow can weave independent jobs into a chain of work processes, based on a scenario. The uWDL is an XML-based workflow language that can supply web services to users with various contexts that can be dynamically occurring in real world. With the uWDL, users can easily make context-aware workflow services in the various computing environments. In this paper we design and develop a workflow scenario...
The service-oriented approach is becoming more and more popular to integrate highly heterogeneous systems. Web services are the natural evolution of conventional middleware technologies to support Web-based and enterprise level integration. Formal testing of such Web-based technology is a key point to guarantee its reliability. In this paper, we choose a non-intrusive approach based on monitoring...
Through the research of the existing security mechanisms and security technologies, combined with the actual security requirements of Web communications, this paper proposes a Web services security communication model. The model not only can meet the basic requirements for secure communications, and can achieve better results in the Web service application with higher security requirements. Compared...
Constraints are considered to be the principal motivation for RBAC model. XACML profile for RBAC can not meet the need of expressing static and dynamic RBAC constraints well. We give the XACML syntax of common static and dynamic Separation of Duty constraints and cardinality constraints of RBAC. We also complement Role Enablement Authority to extend this profile in order to enforce these constraints.
Business documents exchanged in a service-oriented context play a crucial role in the definition of service interfaces. Only if both partners have a common agreement on the data exchanged, automated business interactions are possible. The United Nations Center for Trade Facilitation and Electronic Business (UN/CEFACT) provides a reliable and interoperable solution for conceptual business document...
Web service discovery is a mechanism which facilitates an access to the Web service descriptions. UDDI facilitates the discovery based on the service functionality through keyword and category matching. Such discovery techniques do not consider the semantics and user context as they are too syntactic in nature. In this paper, we propose a well formed functional semantics to describe an operation of...
Theoretically, multi-language clients invocating web services is no longer a problem due to XML-based interface descriptions by WSDL, but the reality is not so good. Some implementation level difficulties still exist when invoking web services from clients in different programming languages. These difficulties are caused by involving complex data structures in the service interface, carrying additional...
Attribute Based Access Control can define permissions based on just about any security relevant characteristics of requestors, actions, resources, and environment, known as attributes. XACML is an access control OASIS standard compliant to this approach. Although XACML seems to allow the specification and enforcement of any access control policy, current tools can require modifying the source code...
Resource-Oriented Architecture is a new Web service modeling method. Based on Capability-Injection (CI) pattern, ROA could be extended for telecommunication value-added service description and creation. With the CI based ROA requirements analysis, a Pub/Sub based capability injection method is proposed in this paper. The Pub/Sub capability utilization will transform the value-added service control...
Future multimedia applications in complex domains such as cultural heritage management demand the ongoing semantization of multimedia artifacts in communities of practice. These semantization tasks will be realized as web services. In this paper, we present an XMPP-based communication and web service architecture which is able (a) to create, store, annotate, adapt, share, and consume multimedia materials...
Modern Smartphones are the fastest growing computing platforms capable of consuming Web services. However, due to their form factor these mobile computing devices face many challenges and constrains when engaging service providers. How to overcome these challenges and how to link smartphones to the service cloud is one of the key issues that will have a major impact on the further growth of the software-as-a-service...
Current realization techniques for service-oriented architectures (SOA) and business process management (BPM) cannot be efficiently applied to any kind of application scenario. For example, an important requirement in the finance sector is the continuous evaluation of stock prices to automatically trigger business processes-e.g. the buying or selling of stocks-with regard to several strategies. In...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.