Service-Cloud Model of Composed Web Services

Author(s):  
Yanping Chen ◽  
Zengzhi Li ◽  
Li Wang ◽  
Huaizhou Yang
Author(s):  
V. Mareeswari ◽  
E. Sathiyamoorthy

Everyday activities are equipped with smart intellectual possessions in the modern Internet domain for which a wide range of web services are deployed in business, health-care systems, and environmental solutions. Entire services are accessed through web applications or hand-held computing devices. The recommender system is more prevalent in commercial applications. This research predicts the preference of consumers and lists the recommended services in order of ranking for consumers to choose services in a short time span. This proposed approach aims to offer the exact prediction of missing QoS (quality of service) value of web services at a specified time slice. The uncertainty of QoS value has been predicted using the cloud model theory. The focus is to give the global ranking using the aggregated ranking of the consumer's ranking list, which has been obtained through the Kemeny optimal aggregation algorithm. In this work, multidimensional QoS data of web services have experimented and given an accurate prediction and ranking in the web environment.


Author(s):  
Weijia Song ◽  
Zhen Xiao

Cloud computing allows business customers to elastically scale up and down their resource usage based on needs. This feature eliminates the dilemma of planning IT infrastructures for Cloud users, where under-provisioning compromises service quality while over-provisioning wastes investment as well as electricity. It offers virtually infinite resource. It also made the desirable “pay as you go” accounting model possible. The above touted gains in the Cloud model come from on-demand resource provisioning technology. In this chapter, the authors elaborate on such technologies incorporated in a real IaaS system to exemplify how Cloud elasticity is implemented. It involves the resource provisioning technologies in hypervisor, Virtual Machine (VM) migration scheduler and VM replication. The authors also investigate the load prediction algorithm for its significant impacts on resource allocation.


2014 ◽  
Vol 1 (1) ◽  
pp. 9-34
Author(s):  
Bobby Suryajaya

SKK Migas plans to apply end-to-end security based on Web Services Security (WS-Security) for Sistem Operasi Terpadu (SOT). However, there are no prototype or simulation results that can support the plan that has already been communicated to many parties. This paper proposes an experiment that performs PRODML data transfer using WS-Security by altering the WSDL to include encryption and digital signature. The experiment utilizes SoapUI, and successfully loaded PRODML WSDL that had been altered with WSP-Policy based on X.509 to transfer a SOAP message.


2004 ◽  
Vol 124 (1) ◽  
pp. 176-181
Author(s):  
Tomoaki Maruo ◽  
Keinosuke Matsumoto ◽  
Naoki Mori ◽  
Masashi Kitayama ◽  
Yoshio Izumi

Sign in / Sign up

Export Citation Format

Share Document