Multiagent Systems and Web Services in Enterprise Environments

Author(s):  
Eduardo H. Ramírez ◽  
Ramón F. Brena

In this chapter we discuss the general aspects related to the utilization of MultiAgent systems in Enterprise environments with special emphasis on the integration architectures enabled by Web Service technologies. Also, we present a decoupled architectural approach that allows Software Agents to interoperate with enterprise systems using Web Services. The proposed solution leverages existing technologies and standards in order to reduce the time-to-market and increase the adoption of agent-based applications. Finally, we show some case studies of knowledge-oriented Web services that have been designed following the discussed approach and outline some current research and business concerns for the field.

Author(s):  
Eduardo H. Ramírez ◽  
Ramón F. Brena

In this paper we present a decoupled architectural approach that allows software agents to interoperate with enterprise systems using Web services. The solution leverages existing technologies and standards in order to reduce the time-to-market and increase the adoption of agent-based applications. We present case studies of applications that have been enhanced by our proposal.


2010 ◽  
pp. 556-564
Author(s):  
Khaled M. Khan

Web service is becoming an important area of business processing and research for enterprise systems. Various Web service providers currently offer diverse computing services ranging from entertainment, finance, and health care to real-time application. With the widespread proliferation of Web Services, not only delivering secure services has become a critical challenge for the service providers, but users face constant challenges in selecting the appropriate Web services for their enterprise application systems. Security has become an important issue for information systems (IS) managers for a secure integration of Web services with their enterprise systems. Security is one of the determining factors in selecting appropriate Web services. The need for run-time composition of enterprise systems with third-party Web services requires a careful selection process of Web services with security assurances consistent with the enterprise business goal. Selection of appropriate Web services with required security assurances is essentially a problem of choice among several alternative services available in the market. The IS managers have little control of the actual security behavior of the third-party Web services, however, they can control the selection of right services which could likely comply their security requirements. Selecting third-party Web services arbitrarily over the Internet is critical as well as risky.


2011 ◽  
pp. 641-658
Author(s):  
Vladimir Tosic ◽  
Wei Ma ◽  
Babak Pagurek ◽  
Bernard Pagurek ◽  
Hanan Lutfiyya

The Web Service Offerings Infrastructure (WSOI) is a monitoring and management infrastructure for the Web Service Offerings Language (WSOL). It extends Apache Axis, an open-source tool for hosting Web services. We present technical details of several WSOI solutions for monitoring Web Services. To pass management information among management parties, we built WSOI serializer and WSOI deserializer modules converting data between formats of Axis’ MessageContext properties and SOAP headers. To perform different monitoring activities for different WSOL service offerings, we implemented Web Service Offering Descriptor (WSOD) as a complement to Axis’ Web Service Deployment Descriptor (WSDD) component. To represent run-time values of WSOL-related management information, we developed WSOI management information model. All these solutions were verified with a prototype implementation of WSOI 2.0 and validated on case studies.


Author(s):  
Vladimir Tosic ◽  
Wei Ma ◽  
Babak Esfandiari ◽  
Bernard Pagurek ◽  
Hanan Lutfiyya

The Web Service Offerings Infrastructure (WSOI) is a monitoring and management infrastructure for the Web Service Offerings Language (WSOL). It extends Apache Axis, an open-source tool for hosting Web services. We present technical details of several WSOI solutions for monitoring Web Services. To pass management information among management parties, we built WSOI serializer and WSOI deserializer modules converting data between formats of Axis’ MessageContext properties and SOAP headers. To perform different monitoring activities for different WSOL service offerings, we implemented Web Service Offering Descriptor (WSOD) as a complement to Axis’ Web Service Deployment Descriptor (WSDD) component. To represent run-time values of WSOL-related management information, we developed WSOI management information model. All these solutions were verified with a prototype implementation of WSOI 2.0 and validated on case studies.


Author(s):  
Khaled M. Khan

Web service is becoming an important area of business processing and research for enterprise systems. Various Web service providers currently offer diverse computing services ranging from entertainment, finance, and health care to real-time application. With the widespread proliferation of Web Services, not only delivering secure services has become a critical challenge for the service providers, but users face constant challenges in selecting the appropriate Web services for their enterprise application systems. Security has become an important issue for information systems (IS) managers for a secure integration of Web services with their enterprise systems. Security is one of the determining factors in selecting appropriate Web services. The need for run-time composition of enterprise systems with third-party Web services requires a careful selection process of Web services with security assurances consistent with the enterprise business goal. Selection of appropriate Web services with required security assurances is essentially a problem of choice among several alternative services available in the market. The IS managers have little control of the actual security behavior of the third-party Web services, however, they can control the selection of right services which could likely comply their security requirements. Selecting third-party Web services arbitrarily over the Internet is critical as well as risky.


2011 ◽  
pp. 388-407
Author(s):  
Zakaria Maamar

This chapter presents two research projects applying context in Web services. A Web service is an accessible application that other applications and humans can discover and invoke to satisfy multiple needs. While much of the work on Web services has up to now focused on low-level standards for publishing, discovering, and triggering Web services, several arguments back the importance of making Web services aware of their context. In the ConCWS project, the focus is on using context during Web-services composition, and in the ConPWS project, the focus is on using context during Web-services personalization. In both projects, various concepts are used such as software agents, conversations, and policies. For instance, software agents engage in conversations with their peers to agree on the Web services that participate in a composition. Agents’ engagements are regulated using policies.


2004 ◽  
Vol 19 (2) ◽  
pp. 175-180 ◽  
Author(s):  
M. BRIAN BLAKE ◽  
SIMON PARSONS ◽  
TERRY R. PAYNE

Advancements in software agents and Semantic Web service technologies are generally enhancing the landscape of electronic commerce. Semantic Web service technologies promise the standardisation and discoverability of software capabilities for network-enabled organisations. Moreover, with the addition of the intelligence and autonomy of software agents, transactions may be equally automated for consumer-to-consumer, business-to-consumer, and business-to-business collaborations. The 2003 Workshop on Electronic Commerce, Agents, and Semantic Web Services was held in conjunction with the International Conference on Electronic Commerce (ICEC2003). The purpose of this workshop was to bring together researchers and practitioners in the areas of electronic commerce, agents, and Semantic Web services to discuss the state-of-art in each individual area in addition to the synergies among the areas. This paper contains a summary of the workshop presentations and a discussion of next steps for Semantic Web services created in the working sessions concluding the workshop.


2014 ◽  
Vol 11 (2) ◽  
pp. 697-721 ◽  
Author(s):  
Costin Bădică ◽  
Nick Bassiliades ◽  
Sorin Ilie ◽  
Kalliopi Kravari

In this paper we present an approach for reusing agent-based reasoning capabilities by making them available for invocation as Web services. In this way, we provide the missing link between the highly interoperable Web services and the autonomicity and intelligence of agent-based systems, so that the latter can be seamlessly integrated into the knowledge-rich SemanticWeb environment without being compromised by isolated communication platforms and languages or restricted to only one or just few reasoning formalisms. We have achieved this by extending the EMERALD framework for agent based reasoning with a Web service interface. Our approach is exemplified by the development of an online system for intelligent brokering of apartment rentals. The broker intelligence is captured as a defeasible knowledge base, while its problem solving process involves the invocation of third party defeasible reasoning Web services included into the EMERALD framework.


2011 ◽  
pp. 1113-1120
Author(s):  
Khaled M. Khan

Web service is becoming an important area of business processing and research for enterprise systems. Various Web service providers currently offer diverse computing services ranging from entertainment, finance, and health care to real-time application. With the widespread proliferation of Web Services, not only delivering secure services has become a critical challenge for the service providers, but users face constant challenges in selecting the appropriate Web services for their enterprise application systems. Security has become an important issue for information systems (IS) managers for a secure integration of Web services with their enterprise systems. Security is one of the determining factors in selecting appropriate Web services. The need for run-time composition of enterprise systems with third-party Web services requires a careful selection process of Web services with security assurances consistent with the enterprise business goal. Selection of appropriate Web services with required security assurances is essentially a problem of choice among several alternative services available in the market. The IS managers have little control of the actual security behavior of the third-party Web services, however, they can control the selection of right services which could likely comply their security requirements. Selecting third-party Web services arbitrarily over the Internet is critical as well as risky.


Author(s):  
Nuno Antunes ◽  
Marco Vieira

Although web services are becoming business-critical components, they are often deployed with software bugs that can be maliciously exploited. Numerous developers are not specialized on security and the common time-to-market constraints limit an in-depth testing for vulnerabilities. In this context, vulnerability detection tools have a very important role helping the developers to produce less vulnerable code. However, developers usually select a tool to use and rely on its results without knowing its real effectiveness. This chapter presents two case studies on the effectiveness of several well-known vulnerability detection tools and discusses their strengths and limitations. Based on lessons learned, the chapter also proposes a benchmarking technique that can be used to select the tool that best fits a specific scenario. The main goal is to provide web service developers with information on how much they can rely on widely used vulnerability detection tools and on how to select the most adequate tool.


Sign in / Sign up

Export Citation Format

Share Document