A Decision Support System for Selecting Secure Web Services

Author(s):  
Khaled M. Khan

Web service is becoming an important area of business processing and research for enterprise systems. Various Web service providers currently offer diverse computing services ranging from entertainment, finance, and health care to real-time application. With the widespread proliferation of Web Services, not only delivering secure services has become a critical challenge for the service providers, but users face constant challenges in selecting the appropriate Web services for their enterprise application systems. Security has become an important issue for information systems (IS) managers for a secure integration of Web services with their enterprise systems. Security is one of the determining factors in selecting appropriate Web services. The need for run-time composition of enterprise systems with third-party Web services requires a careful selection process of Web services with security assurances consistent with the enterprise business goal. Selection of appropriate Web services with required security assurances is essentially a problem of choice among several alternative services available in the market. The IS managers have little control of the actual security behavior of the third-party Web services, however, they can control the selection of right services which could likely comply their security requirements. Selecting third-party Web services arbitrarily over the Internet is critical as well as risky.

2010 ◽  
pp. 556-564
Author(s):  
Khaled M. Khan

Web service is becoming an important area of business processing and research for enterprise systems. Various Web service providers currently offer diverse computing services ranging from entertainment, finance, and health care to real-time application. With the widespread proliferation of Web Services, not only delivering secure services has become a critical challenge for the service providers, but users face constant challenges in selecting the appropriate Web services for their enterprise application systems. Security has become an important issue for information systems (IS) managers for a secure integration of Web services with their enterprise systems. Security is one of the determining factors in selecting appropriate Web services. The need for run-time composition of enterprise systems with third-party Web services requires a careful selection process of Web services with security assurances consistent with the enterprise business goal. Selection of appropriate Web services with required security assurances is essentially a problem of choice among several alternative services available in the market. The IS managers have little control of the actual security behavior of the third-party Web services, however, they can control the selection of right services which could likely comply their security requirements. Selecting third-party Web services arbitrarily over the Internet is critical as well as risky.


2011 ◽  
pp. 1113-1120
Author(s):  
Khaled M. Khan

Web service is becoming an important area of business processing and research for enterprise systems. Various Web service providers currently offer diverse computing services ranging from entertainment, finance, and health care to real-time application. With the widespread proliferation of Web Services, not only delivering secure services has become a critical challenge for the service providers, but users face constant challenges in selecting the appropriate Web services for their enterprise application systems. Security has become an important issue for information systems (IS) managers for a secure integration of Web services with their enterprise systems. Security is one of the determining factors in selecting appropriate Web services. The need for run-time composition of enterprise systems with third-party Web services requires a careful selection process of Web services with security assurances consistent with the enterprise business goal. Selection of appropriate Web services with required security assurances is essentially a problem of choice among several alternative services available in the market. The IS managers have little control of the actual security behavior of the third-party Web services, however, they can control the selection of right services which could likely comply their security requirements. Selecting third-party Web services arbitrarily over the Internet is critical as well as risky.


2014 ◽  
Vol 11 (2) ◽  
pp. 67-84 ◽  
Author(s):  
Tanveer Ahmed ◽  
Abhishek Srivastava

Service oriented architecture has revolutionized the way a traditional business process is executed. The success of this architecture is Indue to the composition of multiple heterogeneous services at runtime. Web service composition is a mechanism where several web services are combined at runtime to build a complex application for a user. It is one of the most sought after processes in the context of semantic web. But, composition of web services at runtime is a difficult task owing to the availability of multiple service providers offering the same functionality. The process if exasperated by due conflicting preferences of a service consumer. In this paper, the authors address the issue of selecting a service based on Quality of Service (QoS) attributes. They utilize concepts customized from physics to create an environment that facilitates the selection of a best service from the set of similar services. The technique not only facilitates the selection of the service with the best QoS attributes, but distributes the load among expeditiously. Here in this paper, the authors concentrate on minimizing and equitably balancing the waiting time for a user. They conduct in silico experiments on multiple workflows to demonstrate the efficacy of the proposed technique to balance load efficiently among similar service offerings.


Author(s):  
Swapnil Sawant ◽  
Avinash Sarode

The Indian manufacturing industry is growing rapidly, and supply chain management (SCM) plays the most important role in the industry. In SCM, customer satisfaction in terms of quantity, quality and on time delivery is the most important critical factor. To satisfy this requirement, the best third-party logistics (3PL) service provider is required.  Therefore, the selection of the best third-party logistics provider is one of the basic requirements in SCM. Logistics services are the backbone of an economy, providing the efficient, cost effective flow of goods and services on which other commercial sectors depend. The logistics companies work as the outsourced or third-party service providers and support the organization's logistics functions. In this study, we identified some important criteria for 3PL implementation in SCM in Indian manufacturing industries.  With the help of this study, supply chain managers from small to medium sized manufacturing industries can simplify the selection process for 3PL vendors. This study will help in the selection of the best vendor from such a competitive group and provide justification for the selection. 


Author(s):  
Sandeep Kumar ◽  
Kuldeep Kumar

Semantic Web service selection is considered as the one of the most important aspects of semantic web service composition process. The Quality of Service (QoS) and cognitive parameters can be a good basis for this selection process. In this paper, we have presented a hybrid selection model for the selection of Semantic Web services based on their QoS and cognitive parameters. The presented model provides a new approach of measuring the QoS parameters in an accurate way and provides a completely novel and formalized measurement of different cognitive parameters.


2018 ◽  
Vol 232 ◽  
pp. 01049
Author(s):  
Haili Zhang ◽  
Xiuguo Zhang ◽  
Zhiying Cao

The service system is based on the SOA architecture, and its component services are usually deployed by third-party service providers in an open network environment. This openness also brings confusion to service system while extending functions. Unavailability of a single service may result in the unavailability of the entire service system. This paper uses Web service credibility as a standard to measure whether Web service is available. Web service credibility is calculated by 12 factors that affect quality of Web service. According to time series of Web service credibility in the past, credibility at next time period can be predicted. This paper proposes a Gated Recurrent Unit (GRU) algorithm which uses grid search algorithm and adaptive moment estimation (Adam) to solve above problem. In this algorithm, grid search algorithm is used to get the best hyper-parameters of network and Adam is used to correct the gradient in the gradient descent. Finally, based on a large number of real Web services, the GRU prediction algorithm is verified by experiments. Experimental results show that the GRU algorithm has higher prediction accuracy than other methods in Web service credibility prediction.


2020 ◽  
Vol 2 (1) ◽  
pp. 122-133
Author(s):  
SALMAN AHMED ◽  
DR. MUHAMMAD ASIM ◽  
SALMAN MANZOOR

Purpose: Logistics plays an important role in integrating the supply chain of industries. But given the volatility and dynamic nature of supply chain management as a field, the factors that need to be considered when choosing a 3PL can vary based on geographic location, type of industry, nature of the product and so on. Therefore, this study aims to identify which factors impact 3PL Service Provider selection the most in the edible oil industry specifically based in Karachi. Design: The study describes and the theory of core competencies and how these competencies are used in the selection process of 3PL Service Providers. A survey was carried out through questionnaires to determine which competencies are best suited to choosing a 3PL Service Provider in the edible oil industry. Findings: The findings showed the Selection of 3PL Provider was most significantly impacted by two of the five variables Cost of Service and Operational Performance. Financial Performance showed a weak relationship while the last two variables were proven to have little or no relationship with the independent variable. Originality and Value: The study will help the supply chain professionals of the edible oil companies focus on certain factors while outsourcing their work most importantly selecting a 3PL service provider.


Author(s):  
George Yee ◽  
Larry Korba

The growth of the Internet has been accompanied by the growth of Internet services (e.g., e-commerce, e-health). This proliferation of services and the increasing attacks on them by malicious individuals have highlighted the need for service security. The security requirements of an Internet or Web service may be specified in a security policy. The provider of the service is then responsible for implementing the security measures contained in the policy. However, a service customer or consumer may have security preferences that are not reflected in the provider’s security policy. In order for service providers to attract and retain customers, as well as reach a wider market, a way of personalizing a security policy to a particular customer is needed. We derive the content of an Internet or Web service security policy and propose a flexible security personalization approach that will allow an Internet or Web service provider and customer to negotiate to an agreed-upon personalized security policy. In addition, we present two application examples of security policy personalization, and overview the design of our security personalization prototype.


2021 ◽  
Vol 12 (1) ◽  
pp. 135-146
Author(s):  
E.A. Ejem ◽  
C.M. Uka ◽  
D.N. Dike ◽  
C.C. Ikeogu ◽  
C.C. Igboanusi ◽  
...  

Abstract This paper is focused on solving the evaluation and selection of 3PL’s by applying multi-criteria decision-making methods. Nigerian Breweries, Nigerian Bottling Company (NBC), AG Leventis, Kobo logistics, and Flour Mills of Nigeria (FMN) were understudied. The main criteria on which evaluation is based were established: Cost, Service level, Financial Capability, Reputation and Long-term relationship. A combination of two quantitative models was adopted in the study. Relevant data were collected through an oral interview with managers and key decision-makers at the companies. SWARA was first applied to the collated data to determine the relative weights of the criteria. Afterwards, the TOPSIS was applied to the weights developed using SWARA and on the performance of the selected service providers. After the analysis, the best service provider was identified as supplier 2 while the worst was supplier 5.


Sign in / Sign up

Export Citation Format

Share Document