scholarly journals Reputation Bootstrapping for Composite Services using CP-nets

Author(s):  
Sajib Mistry ◽  
Athman Bouguettaya
Keyword(s):  
Author(s):  
Takaaki Moriya ◽  
Yuichi Nakatani ◽  
Hiroyuki Ohnishi ◽  
Makoto Yoshida ◽  
Miki Hirano

2016 ◽  
Vol 9 (3) ◽  
pp. 394-407 ◽  
Author(s):  
Shuiguang Deng ◽  
Longtao Huang ◽  
Daning Hu ◽  
J. Leon Zhao ◽  
Zhaohui Wu

Author(s):  
Alessandro Bellucci ◽  
Valeria Cardellini ◽  
Valerio Di Valerio ◽  
Stefano Iannucci
Keyword(s):  

2015 ◽  
pp. 2323-2353
Author(s):  
Pethuru Raj

There are hordes of data-driven, context-aware, and people-centric applications and services for smarter environments such as smarter homes, governments, buildings, cities, and organizations. With the exponential growth of smart phones, there are service repositories and application stores in remote mobile clouds. Similarly, with the ceaseless advancements in the device ecosystem and in the IT field, government-specific applications will flourish and be deployed and maintained in special cloud stores, platforms, and infrastructures to be found, bound, and used by any input/output devices for a variety of everyday personal and professional purposes. Smart, sustainable, intuitive, and citizen-aware services can be dynamically created from the ground up as well as orchestrated or choreographed out of multiple atomic and discrete software services. Such composite services are directly fulfilling government activities. Thus, clouds emerge as the most common and minimum requirement for not only producing and stocking services but also for hosting application platforms. Further, clouds facilitate provisioning and renting out their configurable and customizable assets on demand. Through self-service portals, the cloud usage is to pick up fast in the days to unfold. In this chapter, the authors write about how cloud adoption is to ring in delectable transformations for worldwide governments as well as their citizens, that is, how governments can accomplish more with less, how people can experience high quality, technology-sponsored digital living, how the cloud idea becomes a centre of attraction for more ingenuity towards newer and nimbler service conceptualization, concretization, and delivery.


Author(s):  
Sami Bhiri ◽  
Walid Gaaloul ◽  
Claude Godart ◽  
Olivier Perrin ◽  
Maciej Zaremba ◽  
...  

Web services are defined independently of any execution context. Due to their inherent autonomy and heterogeneity, it is difficult to examine the behaviour of composite services, especially in case of failures. This paper is interested in ensuring composite services reliability. Reliable composition is defined as a composition where all instance executions are correct from a transactional and business point of view. In this paper, the authors propose a transactional approach for ensuring reliable Web service compositions. The approach integrates the expressivity power of workflow models and the reliability of Advanced Transactional Models (ATM). This method offers flexibility for designers to specify their requirements in terms of control structure, using workflow patterns, and execution correctness. Contrary to ATM, the authors start from the designers’ specifications to define the appropriate transactional mechanisms that ensure correct executions according to their requirements.


Author(s):  
Hailong Sun ◽  
Jin Zeng ◽  
Huipeng Guo ◽  
Xudong Liu ◽  
Jinpeng Huai

Service composition is a widely accepted method to build service-oriented applications. However, due to the uncertainty of infrastructure environments, service performance and user requests, service composition faces a great challenge to guarantee the dependability of the corresponding composite services. In this chapter, we provide an insightful analysis of the dependability issue of composite services. And we present a solution based on two-level redundancy: component service redundancy and structural redundancy. With component service redundancy, we study how to determine the number of backup services and how to guarantee consistent dependability of a composite service. In addition, structural redundancy aims at further improving dependability at business process level through setting up backup execution paths.


Author(s):  
Ghazi Alkhatib ◽  
Zakaria Maamar

Nowadays, Web services are emerging as a major technology for achieving automated interactions between distributed and heterogeneous applications (Benatallah, Sheng, & Dumas, 2003). Various technologies are behind this achievement including WSDL, UDDI, and SOAP1. (Curbera, Duftler, Khalaf et. al. 2002) These technologies aim at supporting the definition of services2, their advertisement, and their binding for triggering purposes. The advantages of Web services have already been demonstrated and highlight their capacity to be composed into high-level business process (Benatallah et al., 2003). Usually, composite services (CS) denote business processes and are meant to be offered to users who have needs to satisfy.


2013 ◽  
Vol 4 (2) ◽  
pp. 1-18 ◽  
Author(s):  
Per Håkon Meland ◽  
Erlend Andreas Gjære

The Business Process Modeling Notation (BPMN) has become a popular standard for expressing high level business processes as well as technical specifications for software systems. However, the specification does not contain native support to express security information, which should not be overlooked in today’s world where every organization is exposed to threats and has assets to protect. Although a substantial amount of work enhancing BPMN 1.x with security related information already exists, the opportunities provided by version 2.0 have not received much attention in the security community so far. This paper gives an overview of security in BPMN and investigates several possibilities of representing threats in BPMN 2.0, in particular for design-time specification and runtime execution of composite services with dynamic behavior. Enriching BPMN with threat information enables a process-centric threat modeling approach that complements risk assessment and attack scenarios. We have included examples showing the use of error events, escalation events and text annotations for process, collaboration, choreography and conversation diagrams.


Sign in / Sign up

Export Citation Format

Share Document