The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The accelerating progress of network speed, reliability and security creates an increasing demand to move software and services from being stored and processed locally on users' machines to being managed by third parties that are accessible through the network. This has created the need to develop new software development methods and software architectural styles that meet these new demands. One such...
Traditional monolithic services fail to scale efficiently when a certain task within the service is flooded. They also have a long software release cycle due to the system complexity. Microservices, as a new architectural style, are built upon the idea of breaking a large service into a set of single-responsibility (along with other properties) services that are communicating over network. In such...
This document examines the OData protocol as a new service oriented approach for distributed IT architectures. The main features of OData were compared with properties of well-established solutions like: REST, DCOM and Java RMI. OData's protocol is presented in the context of its application in Service-Oriented Architectures.
Cyber Physical Society (CPS) feature a tight integration between computation, communication, and control in their operation and interactions with the environment in which they are deployed. The concept of capability, which is the semantics of an action or specific functionality, is therefore a cornerstone in modern Cyber Physical Society, especially those service or process aware. In this track, we...
This paper presents an efficient anti-money laundering warning system. With the development of science and technology, money laundering is becoming more and more intelligent. Since the existing anti-money-laundering process cannot handle this kind of crime effectively, we build a system based on mainframe with SOA architectures. For one thing, as mainframes pioneer massive data processing capacity...
Service-oriented architectures are increasingly deployed in open, distributed and dynamic environments, which require an end-to-end security awareness security at each phase of the service's lifecycle. Moreover, the security should not only focus on services without considering the risks and threats that might be caused by elements from business activities or underlying hardware and software infrastructure...
With the rapid adoption of the concepts of Service Oriented Architecture (SOA), sophisticated business processes and tasks are increasingly realized through composing distributed software components offered by different providers. Though such practices offer advantages in terms of cost-effectiveness and flexibility, those components are not immune to vulnerabilities. It is therefore important for...
This paper presents an approach for incorporating data integrity and data confidentiality into the model-driven development (MDD) of process-driven service-oriented architectures (SOAs) based on the OMG SoaML. Specifications for service interfaces are extended by UML activities to model invocation protocols. An invocation protocol makes the control and the object flows between service invocations...
Business-to-Business (B2B) interactions can be defined in terms of the exchange of documents. Such exchanges must be regulated to comply with obligations including service agreements, contracts and law. It is fundamental to such regulation that participants are held accountable for their actions. This can be achieved through the deployment of support services to produce a verifiable audit trail of...
Business process modelling is very crucial for enterprises because it give an idea how the business would be operated in the real world and it is important for every stakeholder. Along with increased connectivity in SOA environment, security risks rise exponentially. MDS frameworks are presented to systematically developed security enabled SOA based software applications, where security is modelled...
Since data sharing mechanism between the various business systems lacks of specification and standardization, information shares hardly and data exchange are inefficient, the paper proposes a data exchange platform for power enterprise based on ESB, which is based on SOA architecture, unified data exchange standards by using XML, used SOAP/HTTP(S) as the data transfer protocol between business systems...
Web services enable the collaboration across organizational boundaries and, thus, are a powerful technology for implementing global Service-oriented Architectures, i.e., the Internet of Services. Despite typical security mechanisms such as message encryption, attackers can create detailed profiles of service consumers, providers, and market places by merely monitoring communication endpoints. In a...
Business-process-management systems are increasingly used in service-oriented architectures (SOA), coordinating activities of loosely coupled information systems, of web services, and of human actors. This often requires exchanging and processing sensitive, personally-identifiable information, e.g., in e-employability and e-health applications. Supporting security in such a service-oriented environment...
This paper introduces context-aware adaptation as an important part of power distribution architectures. In our view context-awareness is a necessary part of administering the business policies concerning power distribution and is orthogonal to the core engineering aspects of power distribution. By decoupling the engineering logic from the business aspects we can plug in different adaptation strategies...
Aspect-oriented programming (AOP) is a programming paradigm that increases modularity by enabling improved separation of concerns. Implementing modern Service-Oriented Architecture (SOA) systems requires expertise from people in a variety of roles, including application developers and security experts. Ideally, the application developers should be fully isolated from, and independent of, security...
As the frequent change of online shopping business, the single application program of corporate shopping site can't meet users' expanding demands, even if new user requirements are appended to the existing framework. In this paper, a new implement method based on SOA architecture for the development of shopping sites is proposed. This architecture can solve the Service integration and extension problems...
Industrial adoption of cloud computing for collaborative business processes is limited by their ability to meet inter-enterprise security requirements. Although some clouds offerings comply with security standards, no solution today allows businesses to assess security compliance of applications at the business level and dynamically link to security countermeasures on-demand. In this paper, we present...
SOA concept of service-oriented architecture and related technologies are described in this paper. With the current development of computer technology, a software and hardware architecture design of product data management system is given, and it bases on object-oriented technology and distributed database technology with service-oriented, furthermore it includes the security architecture and education...
Secure access to information for any business is a fundamental need. In the service-oriented environment due to loose coupling of services and applications, and their functions across enterprise boundaries, provisioning security becomes more critical. Therefore required authorization by an authenticated identity and applying confidentiality techniques which ordinarily are gained via encryption, are...
The issue of difficult interoperations among existing power systems cause by their heterogeneous hardware platform, developed language and supported communication protocols has hampered the development of power dispatching business, which is one of most important part of smart grid. A flexible, scalable and reliable architecture is required to be designed aiming at developing new functionalities through...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.