2013 IEEE Ninth World Congress on Services最新文献

筛选
英文 中文
Adoption of Cloud Computing Services by Public Sector Organisations 公营机构采用云计算服务
2013 IEEE Ninth World Congress on Services Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.50
M. Bellamy
{"title":"Adoption of Cloud Computing Services by Public Sector Organisations","authors":"M. Bellamy","doi":"10.1109/SERVICES.2013.50","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.50","url":null,"abstract":"Despite attractive benefits a range of barriers is inhibiting take-up of Cloud Computing services which in most public sector organisations remains at less than 5% of the ICT footprint. The generic factor inhibiting wider deployment is that use of Cloud Computing services exposes organisations to heightened risks. While the inherent risks can be managed, in the near term significant investment in skills, processes, tools and technology is a prerequisite for doing so efficiently. For many organisations that use ICT services, the level of investment needed will often be prohibitive. This has created the opportunity for the emergence of trusted cloud brokerage services that can invest strategically to assist organisations with the use of Cloud Computing services and management of the associated risks, developing service portfolios that reduce upfront costs, so that use of Cloud Computing services becomes the best choice on a project by project basis. This paper considers the benefits of Cloud Computing, identifies the barriers to take up and how these can be overcome, and considers how cloud services brokerages can potentially develop new capabilities to accelerate take-up and benefits realisation.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129578795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
A User Requirements Oriented Semantic Web Services Composition Framework 面向用户需求的语义Web服务组合框架
2013 IEEE Ninth World Congress on Services Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.45
Sana Baccar, M. Rouached, Mohamed Abid
{"title":"A User Requirements Oriented Semantic Web Services Composition Framework","authors":"Sana Baccar, M. Rouached, Mohamed Abid","doi":"10.1109/SERVICES.2013.45","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.45","url":null,"abstract":"Web services provide an instantiation of the loosely coupled Service Oriented Architecture (SOA) and facilitate the process of enterprise application integration. However, with the explosive growth of the number of Web services published over the Internet, identifying a high quality of composite services by taking into account both functional and non-functional requirements of end users has become a real challenge that needs to be addressed. We propose in this paper an approach that adresses this challenge by considering a two-phase composition process. The composition first proceeds to generate an abstract plan based on Web service types using Dynamic Description Logics (DDL). This abstract plan is then concretized into an executable plan by selecting the appropriate Web service instances based on non-functional requirements.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128913542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Auditing Requirements for Implementing the Chinese Wall Model in the Service Cloud 服务云中中国墙模型实施的审计要求
2013 IEEE Ninth World Congress on Services Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.44
Sarra M. Alqahtani, R. Gamble, I. Ray
{"title":"Auditing Requirements for Implementing the Chinese Wall Model in the Service Cloud","authors":"Sarra M. Alqahtani, R. Gamble, I. Ray","doi":"10.1109/SERVICES.2013.44","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.44","url":null,"abstract":"The service cloud model allows for the composition of services into an application that can respond to tenant requests. The composition of services, which may originate with different vendors, results in a service chain that supports end-to-end round trip messaging. Thus, the service cloud model must support provisioning services for the request without incurring a conflict of interest (COI) in their message exchange among vendors. Service vendors must disclose their COI classes for storage and analysis by the cloud because as services are provisioned to an application, additional conflict classes may be added, preventing the service from future compositions to avoid COI. In this paper, we present a strategy to centrally store and monitor COI classes for services in a service chain using principles of the Chinese Wall Model. We introduce a Security Monitoring Database (SMDB) that audits and monitors the COI classes as they exist or are assigned to hosted services, including the tenant services making requests. We describe an algorithm to prevent COI before provisioning services and dynamically detect it during run time due to concurrent service invocations using the SMDB information.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114233066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Viral Marketing and Its Application in Enterprise Drive Operation 病毒式营销及其在企业驱动运营中的应用
2013 IEEE Ninth World Congress on Services Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.56
Li Wang, Liang-Jie Zhang, Ning Li, Dong Liu, Yifu Guo, Jianhua Zheng, Bo Hu, Ning Ke
{"title":"Viral Marketing and Its Application in Enterprise Drive Operation","authors":"Li Wang, Liang-Jie Zhang, Ning Li, Dong Liu, Yifu Guo, Jianhua Zheng, Bo Hu, Ning Ke","doi":"10.1109/SERVICES.2013.56","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.56","url":null,"abstract":"This paper mainly develops the operation strategy of an enterprise drive based on viral marketing. Firstly, it introduces the concept, the features and successful cases of viral marketing. Next, it introduces what is Kingdee cloud drive and shows the comparative results among Kingdee cloud drive and other drives. With respect to the market positioning, this paper designs the operation strategy. Based on viral marketing, the detailed progress and reward mechanism are put forward in order to attract more users. Finally, the lottery model is developed based on the analytic network process in the reward mechanism.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122388652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Families of Personalized Mobile Applications 面向个性化移动应用的家庭
2013 IEEE Ninth World Congress on Services Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.21
Eleni Stroulia, D. Gibbs, Blerina Bazelli
{"title":"Towards Families of Personalized Mobile Applications","authors":"Eleni Stroulia, D. Gibbs, Blerina Bazelli","doi":"10.1109/SERVICES.2013.21","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.21","url":null,"abstract":"In this position paper, we present our early work towards a software architecture for developing product lines of personalized mobile applications.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133030008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Formal Modeling and Verification of Cloud Architectures: A Case Study on Hadoop 面向云架构的形式化建模与验证:以Hadoop为例
2013 IEEE Ninth World Congress on Services Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.47
G. S. Reddy, Yuzhang Feng, Yang Liu, J. Dong, Jun Sun, K. Rajaraman
{"title":"Towards Formal Modeling and Verification of Cloud Architectures: A Case Study on Hadoop","authors":"G. S. Reddy, Yuzhang Feng, Yang Liu, J. Dong, Jun Sun, K. Rajaraman","doi":"10.1109/SERVICES.2013.47","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.47","url":null,"abstract":"Hadoop is a popular open source implementation of MapReduce, that has a number of prominent users including Yahoo!, Facebook, and Twitter. Though several works have focused on deploying algorithms on Hadoop MapReduce, research efforts into applying formal methods to prove the correctness of hadoop systems are limited. In this paper we propose a holistic approach to verify the correctness of hadoop systems using model checking techniques. We model Hadoop's parallel architecture to constraint it to valid start up ordering and identify and prove the benefits of data locality, deadlock-freeness and non-termination among others.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130310496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Bridging the GAP between Software Certification and Trusted Computing for Securing Cloud Computing 弥合软件认证和可信计算之间的差距,确保云计算的安全
2013 IEEE Ninth World Congress on Services Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.15
A. Muñoz, A. Maña
{"title":"Bridging the GAP between Software Certification and Trusted Computing for Securing Cloud Computing","authors":"A. Muñoz, A. Maña","doi":"10.1109/SERVICES.2013.15","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.15","url":null,"abstract":"Despite the fact that software security certification has important advantages; among these we highlighted that it allows to increase users' trust by means of attesting security properties. However, in most of cases the system that is subject of certification is considered to be monolithic. This fact implies that existing certification schemes do not provide support for dynamic changes of components as required in Cloud Computing scenarios. In existing certification schemes certificates refer to a particular version of the product or system, changes in the system structure require a process of recertification. We propose a solution based on the combination of software certification techniques and hardware-based certification, as those provided by the Trusted Computing technology. Likewise, the main target of our approach is bringing the gap existing between the software certification and the means for hardware certification, in order to provide a solution for the whole system certification using Trusted Computing technology.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114515006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Simultaneously Supporting Privacy and Auditing in Cloud Computing Systems 同时支持云计算系统中的隐私和审计
2013 IEEE Ninth World Congress on Services Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.38
Tyrone Grandison, Sean S. E. Thorpe, Leon Stenneth
{"title":"Simultaneously Supporting Privacy and Auditing in Cloud Computing Systems","authors":"Tyrone Grandison, Sean S. E. Thorpe, Leon Stenneth","doi":"10.1109/SERVICES.2013.38","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.38","url":null,"abstract":"Over the last few years, cloud services have been steadily gaining traction in their use by commercial and noncommercial entities. As more and more sensitive or valuable processes, business functions and data move into the cloud, the need to improve threat identification and response, via auditing cloud transactions, increases. At the same time, the need for cloud users to protect the security and privacy of their resources has also intensified. In this paper, the problem of simultaneously supporting privacy and auditing in cloud systems is studied. Specifically, the paper discusses the guiding principles, fundamental concepts, and threat models for current cloud computing systems. Finally, we propose infrastructure that exploits a novel thin layer between the client and the cloud service provider to ensure that data storage, operation, and auditing does not reveal sensitive client information.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114444432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Real-Time Analytics in the Cloud 走向云端的实时分析
2013 IEEE Ninth World Congress on Services Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.36
Amr Osman, M. El-Refaey, A. Elnaggar
{"title":"Towards Real-Time Analytics in the Cloud","authors":"Amr Osman, M. El-Refaey, A. Elnaggar","doi":"10.1109/SERVICES.2013.36","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.36","url":null,"abstract":"The data explosion and the tremendous growth in the volume of data generated from various IT services places an enormous demand on harnessing and smartly analyzing the generated data and enterprise contents. According to recent studies, it is predicted that the volume of such data will become 26 fold in the next five years. While there might be some existing technologies to support this, industry is frantically exploring new models that lead to more efficient and higher performance solutions. With the aid of cloud computing and high performance analytics such as scalable-parallel machine learning, big data could be the fuel to a smarter cloud-powered IT world. Through our work, we provide a state-of-the-art review of high-performance advanced cloud analytics in the literature in attempt to find the ideal real-time platform for distributed analytic computations.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115834282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Social Ontology and Semantic Actions: Enabling Social Networking Services for Distributed Web Tasking 社会本体和语义行为:为分布式Web任务提供社会网络服务
2013 IEEE Ninth World Congress on Services Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.23
J. Ng, Diana H. Lau
{"title":"Social Ontology and Semantic Actions: Enabling Social Networking Services for Distributed Web Tasking","authors":"J. Ng, Diana H. Lau","doi":"10.1109/SERVICES.2013.23","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.23","url":null,"abstract":"End-users are confined by the social networking platforms that they invest effort in to set up their social contacts and relationships. The centralized, monopolized, and silo approach of today's social networking providers discourage interoperability across platforms. Enterprises struggle to find a common social networking approach to deal with the diversity of social networking platforms of choice of their users. Though each social networking platform provides their own APIs for externalizing users' social data, they are not designed to interoperate with other platforms. In this paper, we propose Social Ontology and Semantic Actions (SOSA) as a de-centralized, inter-operable social networking model and runtime services that enterprises can use as social networking middleware components for interoperability of social networking platforms of their users. SOSA provides platform agnostic construct for contacts; relationship axiom association with contacts, with inherent inferences to compute memberships given a relationship axiom. SOSA also enables binding with enterprise services as semantic actions of a given relationship axiom. Social relationship can also be used incontext with enterprise services and distributed web tasking.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125066241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信