Behavioral Attestation for Web Services Based Business Processes

2010 ◽  
Vol 7 (3) ◽  
pp. 52-72 ◽  
Author(s):  
Masoom Alam ◽  
Mohammad Nauman ◽  
Xinwen Zhang ◽  
Tamleek Ali ◽  
Patrick C. K. Hung ◽  
...  

Service Oriented Architecture (SOA) is an architectural paradigm that enables dynamic composition of heterogeneous, independent, multi-vendor business services. A prerequisite for such inter-organizational workflows is the establishment of trustworthiness, which is mostly achieved through non-technical measures, such as legislation, and/or social consent that businesses or organizations pledge themselves to adhere. A business process can only be trustworthy if the behavior of all services in it is trustworthy. Trusted Computing Group (TCG) has defined an open set of specifications for the establishment of trustworthiness through a hardware root-of-trust. This paper has three objectives: firstly, the behavior of individual services in a business process is formally specified. Secondly, to overcome the inherent weaknesses of trust management through software alone, a hardware root of-trust devised by the TCG, is used for the measurement of the behavior of individual services in a business process. Finally, a verification mechanism is detailed through which the trustworthiness of a business process can be verified.

Author(s):  
Masoom Alam ◽  
Mohammad Nauman ◽  
Xinwen Zhang ◽  
Tamleek Ali ◽  
Patrick Hung ◽  
...  

Service Oriented Architecture (SOA) is an architectural paradigm that enables dynamic composition of heterogeneous, independent, multi-vendor business services. A prerequisite for such inter-organizational workflows is the establishment of trustworthiness, which is mostly achieved through non-technical measures, such as legislation, and/or social consent that businesses or organizations pledge themselves to adhere. A business process can only be trustworthy if the behavior of all services in it is trustworthy. Trusted Computing Group (TCG) has defined an open set of specifications for the establishment of trustworthiness through a hardware root-of-trust. This paper has three objectives: firstly, the behavior of individual services in a business process is formally specified. Secondly, to overcome the inherent weaknesses of trust management through software alone, a hardware root of-trust devised by the TCG, is used for the measurement of the behavior of individual services in a business process. Finally, a verification mechanism is detailed through which the trustworthiness of a business process can be verified.


Author(s):  
Youcef Baghdadi ◽  
Naoufel Kraiem

Reverse engineering techniques have become very important within the maintenance process providing several benefits. They retrieve abstract representations that not only facilitate the comprehension of legacy systems but also refactor these representations. Business process archaeology has emerged as a set of techniques and tools to recover business processes from source code and to preserve the existing business functions and rules buried in legacy source code. This chapter presents a reverse engineering process and a tool to retrieve services from running databases. These services are further reused in composing business processes with respect to Service-Oriented Architecture, a new architectural style that promotes agility.


2006 ◽  
Vol 15 (01) ◽  
pp. 57-85 ◽  
Author(s):  
IVO JOSÉ GARCIA DOS SANTOS ◽  
EDMUNDO ROBERTO MAURO MADEIRA

The Service-Oriented Architecture promises to be an affordable solution for the integration of heterogeneous systems through the Internet. In the e-Business field, this promise represents a great chance for companies to increase competitiveness and to enable the enactment of new collaborative e-Business processes. In this paper, we present a Virtual Marketplace infrastructure, the VM-Flow, which uses Dynamic Composition of Web Services (Orchestration and Choreography) as a fundamental technique to enable interorganizational business interactions in the context of Dynamic Virtual Enterprises. The VM-Flow platform is workflow-based and also introduces a series of interaction policies to deal with aspects like autonomy and privacy. A platform model is presented together with details on the infrastructure prototype and on an application built over it.


2019 ◽  
Vol 0 (9/2019) ◽  
pp. 33-44
Author(s):  
Tadeusz Nowicki ◽  
Adrian Woźniak

Service Oriented Architecture is popular in many organizations. In particular, it has already deeply rooted in large corporations that need to automate entire business processes and implement them in many systems. It has a unique feature that allows unambiguously indicate service that is to realise business process step. That indication is possible to show directly in BPMN diagram. Thus, it is possible to trace which server has used resources to implement the service and how much of those resources were needed. Therefore, it is possible to build an optimization task that, with limited and unreliable resources, will determine such allocation of components to servers and such an algorithm for assigning tasks to them, so that the processes will work as well as possible. The article presents a model of such an optimization task. This model consists of four layers. The Organization Layer describes the system environment – the types and frequency of initiating business process instances. The Integration Layer describes the business processes and indicates the services that should be performed at every step. The Component Layer describes component characteristics and what services they provide. In Server Layer both: server characteristics and runtime environments necessary for the component to run are described. Finally, the optimization task and evaluation criteria are formulated.


Author(s):  
Xiaoxian Yang ◽  
Tao Yu ◽  
Huahu Xu

In open and changeful Internet, the enterprise business process needs to be organized or restructured dynamically in order to adapt to environment changes and business logic updates. The solution of Web service and service-oriented architecture (SOA) provides a promising approach. The business processes working as a temporary workflow can be composed by distributed services. However, the cross-organizational service feature of business process requires considering not only the functional requirements but also the timed constraints. The timed property plays an important role in service interactions between business processes, such as timed activity, timeout and timed deadlock. Thus, if time requirements cannot be guaranteed, the new created business process will not be acceptable. In this paper, it proposes a framework of using Petri Net to model timed service business process. First, it defines the behavior model of service business process and gives process composition patterns for different structural forms. Second, service model is extended with time specifications, describing timed constraints among business activity interactions. Third, to support further verifications, it introduces a method for the automatic timed properties generation in the form of temporal logic formulae. Our framework gives a reference in practice to formalize service business process into timed service model.


Author(s):  
Mohamed El Amine Chergui ◽  
Sidi Mohamed Benslimane

Several approaches for services development in SOA (Service Oriented Architecture) suggest business processes as a starting point. However, there is a lack of systematic methods for services identification during business analysis. It is recognized that in service engineering, service identification plays a critical role as it lays the foundation for the later phases. Existing Service identification approaches are often prescriptive and mostly ignore automation principles, most are based on the architect's knowledge thus could result in non-optimal designs which results in complicated dependencies between services. In this paper the authors propose a top down approach to identify automatically services from business process by using several design metrics. This approach produces services from business processes as input and using an improved combinatorial particle swarm optimization algorithm with crossover of genetic algorithm. The experimentation denotes that the authors' approach achieves better results in terms of performance and convergence speed.


The cutting-edge technology, namely Cloud of Things (CoT) has shaped the existing business process into a new orientation in terms of performance, usability, and reliability. Among different business processes, online education is one of the prime areas where CoT can be used to make it more agile in the context of performance and usability. In this endeavor, a novel methodology has been proposed for an online higher education framework based on CoT. The proposed framework is made agile using Service Oriented Architecture (SOA). Furthermore, in order to make the proposed framework more reliable, a Zero Knowledge Proof (ZKPF) system has been introduced here. The proposed ZKPF algorithm is based on the Hadamard matrix. Experimental results have shown to lay bare the effectiveness of the proposed algorithms.


Author(s):  
Veronica Gacitua-Decar ◽  
Claus Pahl

Increasingly, enterprises are using service-oriented architecture (SOA) as an approach to enterprise application integration (EAI). SOA has the potential to bridge the gap between business and technology and to improve the reuse of existing applications and the interoperability with new ones. In addition to service architecture descriptions, architecture abstractions like patterns and styles capture design knowledge and allow the reuse of successfully applied designs, thus improving the quality of software. Knowledge gained from integration projects can be captured to build a repository of semantically enriched, experience-based solutions. Business patterns identify the interaction and structure between users, business processes, and data. Specific integration and composition patterns at a more technical level address enterprise application integration and capture reliable architecture solutions. We use an ontology-based approach to capture architecture and process patterns. Ontology techniques for pattern definition, extension, and composition are developed and their applicability in business process-driven application integration is demonstrated.


Author(s):  
Rajani Shankar Sadasivam

The integration of large systems remains problematic in spite of advances in composite services approaches, such as Web services and business process technologies. The next challenge in integration is composite process-personalization (CPP), which involves addressing the needs of the interaction worker. An interaction worker participates and drives business processes. As these workers increasingly perform their work from mobile devices, CPP becomes an important area of mobile research. In this chapter, an agent-based approach to composite services development is introduced, addressing the lack of CPP in integration. A case study is used to demonstrate the steps in the agent-based approach.


Author(s):  
Alistair Barros

In the commercial world, the value of ubiquitous computing applications is proportional to the range of business services that can be accessed in device-consumptive ways. Services originate in legacy applications of organizations, and are developed and operated typically in heterogeneous environments. Service-oriented architecture (SOA), supported by a complex stack of Web services standards, addresses ways in which software components of diverse applications can be homogeneously interacted with and composed. Thus, SOA provides a crucial mechanism for making services accessible to ubiquitous computing applications. In this chapter, we shed light on what SOA entails, based on Web services interfaces and messaging, and service composition through single-party process orchestration and multiparty choreography languages. For the latter, concrete patterns are used to describe the capabilities of prospective standards. Ways in which SOA needs be extended to allow wider and more flexible service trading, typified in current developments through service marketplaces, are then discussed. Such extensions, we argue, converge with directions in ubiquitous computing through so-called ubiquitous service networks and service ecosystems.


Sign in / Sign up

Export Citation Format

Share Document