{"title":"ORBI: An Internet Service for Self-Employed Professionals","authors":"Stamatia Rizou, George Angouras","doi":"10.1109/SERVICES.2013.58","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.58","url":null,"abstract":"Self-employed professionals need powerful software tools to manage their daily tasks. The increasing need for mobility support in combination with the emergence of Internet-based services make SaaS solutions an attractive option for freelancers to manage their business. In this paper, we present ORBI, a SaaS solution especially designed to meet the needs of self-employed professionals that is currently available in the Greek market. We present the key concepts behind the design and implementation of the ORBI solution and we discuss its main value proposition. Furthermore, as part of the ongoing and future research activities we present the main research directions in an effort to use ORBI as an industrial test bed to test and validate innovative concepts and tools.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123951156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jia Zhang, P. Votava, Tsengdar J. Lee, Owen Chu, Clyde Li, David Liu, K. Liu, Norman Xin, R. Nemani
{"title":"Bridging VisTrails Scientific Workflow Management System to High Performance Computing","authors":"Jia Zhang, P. Votava, Tsengdar J. Lee, Owen Chu, Clyde Li, David Liu, K. Liu, Norman Xin, R. Nemani","doi":"10.1109/SERVICES.2013.64","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.64","url":null,"abstract":"NASA Earth Exchange (NEX) is a collaboration platform whose goal is to accelerate Earth science research, by leveraging NASA's vast collections of global satellite data together with access to NASA's High-End Computing (HEC) facilities. NEX also aims to facilitate the sharing of experimental results as well as scientific processes (workflows) with the Earth science community through integration with VisTrails workflow management system. While VisTrails is used internally, it is not easily accessible from remote computers without directly logging into the NASA HEC systems through twofactor authentication and a bastion host. This paper describes the initial design of an extensible architecture that facilitates easier workflow interaction on NEX, by enabling users to develop and execute workflows in a supercomputing environment directly from their local VisTrails installation. This architecture helps domain scientists seamlessly leverage distributed computing and storage resources and it is potentially applicable to other scientific workflow management software. We further describe the architecture of the VisTrails-HEC plugin (as well as the VisTrails-Amazon plugin) and the implementation of a working prototype to demonstrate the feasibility of our solution.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115657547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SaaS Authentication Middleware for Mobile Consumers of IaaS Cloud","authors":"Richard K. Lomotey, R. Deters","doi":"10.1109/SERVICES.2013.34","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.34","url":null,"abstract":"The mobile terrain is rapidly establishing itself as the reliable node for accessing cloud hosted data. Today, commodity cloud providers especially from the Infrastructure-as-a-Service (IaaS) cloud expose their service APIs which facilitates the \"app-ification\" of enterprise workflows on mobile devices. However, these IaaS providers require the customer (i.e., the data consumer) to submit multiple security credentials which are computation intensive for the purposes of authentication and authorization. As a result, the authentication process introduces undesired delays in a mobile network when consuming enterprise data due to the increasing computational demand and the voluminous HTTP header that is transported across the wireless bandwidth.This paper introduces an application called MiLAMob that is a middleware-layer that handles the authentication process on behalf of the consumer devices in real time and with minimal HTTP traffic. The middleware currently supports mobile consumption of data on IaaS clouds such as Amazon S3, Dropbox, and MEGA. Further, the middleware employs the OAuth 2.0 technique (E.g. Facebook, Google+, and Personal Login) to identify the mobile end-user and uses security tokens to handle the tedious authentication with the IaaS cloud. Also, the deployment of the middleware enforces additional data protection because the security credentials and the IaaS abstractions are shielded from the mobile application domain and the end users.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123834232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bringing Common Criteria Certification to Web Services","authors":"Samuel Paul Kaluvuri, M. Bezzi, Y. Roudier","doi":"10.1109/SERVICES.2013.17","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.17","url":null,"abstract":"Solutions based on service-oriented architecture are gaining popularity. However a wider adoption, especially for business critical functions, is hampered by the trust deficit that exists between consumers and providers, as consumers are shielded from the service architectures and the operation of the service itself. Security certification can be used as a means to bridge this trust deficit. Common Criteria for Information Technology Evaluation (CC) is a widely recognized and used security certification scheme. However, the CC scheme was tailored to provide assurance for traditional software provisioning models and hence cannot be applied to SOA solutions as is. In this paper, we present the limitations of the CC scheme when applied in SOA, the challenges that must be overcome for its adoption and possible directions through which some of those challenges can be met. In particular, we point out that CC scheme should be extended to allow for dynamic evaluation of deployed systems (which includes the operational environment) and for handling assurance of composite services.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"19 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129889683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Ant Colony Algorithm for Cost-Aware Data-Intensive Service Provision","authors":"Lijuan Wang, Jun Shen, G. Beydoun","doi":"10.1109/SERVICES.2013.48","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.48","url":null,"abstract":"Huge collections of data have been created in recent years. Cloud computing has been widely accepted as the next-generation solution to addressing data-proliferation problems. Because of the explosion in digital data and the distributed nature of the cloud, as well as the increasingly large number of providers in the market, providing efficient cost models for composing data-intensive services will become central to this dynamic market. The location of users, service composers, service providers, and data providers will affect the total cost of service provision. Different providers will need to make decisions about how to price and pay for resources. Each of them wants to maximize its profit as well as retain its position in the marketplace. Based on our earlier work, this paper addresses the effect of data intensity and the communication cost of mass data transfer on service composition, and proposes a service selection algorithm based on an enhanced ant colony system for data-intensive service provision. In this paper, the data-intensive service composition problem is modeled as an AND/OR graph, which is not only able to deal with sequence relations and switch relations, but is also able to deal with parallel relations between services. In addition, the performance of the service selection algorithm is evaluated by simulations.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132093295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongbin Lu, Mark Shtern, B. Simmons, Michael Smit, Marin Litoiu
{"title":"Pattern-Based Deployment Service for Next Generation Clouds","authors":"Hongbin Lu, Mark Shtern, B. Simmons, Michael Smit, Marin Litoiu","doi":"10.1109/SERVICES.2013.54","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.54","url":null,"abstract":"This paper presents a flexible deployment service for cloud computing. The service facilitates the specification and the execution of cloud deployment plans for applications. An application is described through a pattern, an abstract view that captures the logical view of the application and its mapping into cloud resources. The services instantiate the pattern in the cloud and allows for runtime updates of the deployment. The service is accessible through a RESTful interface. We identify the requirements for the service, describe its interfaces and show several case studies that capture the main features of the service.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130049674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HRPaaS: A Handwriting Recognition Platform as a Service Based on Middleware and the HTTP API","authors":"Desheng Li, Lianwen Jin, Yin Zhang","doi":"10.1109/SERVICES.2013.80","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.80","url":null,"abstract":"In this paper, we present a new Handwriting Recognition Platform as a Service (HRPaaS) using cloud infrastructure as a service(IaaS), middleware, and HTTP application programming interface (API) technologies. Based on the OpenStack cloud IaaS architecture, a handwriting recognition HTTPAPI service is designed to provide a highly reliable, real-time, customized handwriting character recognition service for application developers. Using middleware and cloud computing technologies, the computing resources, HTTPAPI response service pool, and backend handwriting recognition service pool can be loosely coupled and integrated to achieve fast and flexible deployment of the HRPaaS.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114281985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Managing End-to-End Security Risks with Fuzzy Logic in Service-Oriented Architectures","authors":"Y. Badr, S. Banerjee","doi":"10.1109/SERVICES.2013.28","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.28","url":null,"abstract":"Service-oriented architectures are increasingly deployed in open, distributed and dynamic environments, which require an end-to-end security awareness security at each phase of the service's lifecycle. Moreover, the security should not only focus on services without considering the risks and threats that might be caused by elements from business activities or underlying hardware and software infrastructure. In this paper, we adopt a holistic approach to define a security conceptual model that covers all elements at the business, service and infrastructure levels and guides each phase in a typical design method for service-oriented architectures. Since the information security is subject to uncertain and unforeseen threats, we propose a fuzzy logic decision system that helps identify security risks based on the security conceptual model and select appropriate security measures based on security objectives.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114639799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Workflow Operational Assurance Platform for Security-by-Design Certified Service-Based Coalitions","authors":"Javier Espinar, A. Maña, Hristo Koshutanski","doi":"10.1109/SERVICES.2013.14","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.14","url":null,"abstract":"The concept of Dynamic Coalitions (DCs) provides a scalable approach for service-based business integration suitable to Small and Medium-size Enterprises (SMEs). An outcome of a DC model is a composite service offered to a market place. The notion of security-by-design certified coalition enables coalition designers/owners to request a certification authority to certify whether the coalition workflow design supports certain security properties of interest by stipulating the security properties individual services have to conform to. This paper presents an approach based on a novel Highly Dynamic Coalition (HDC) concept able to provide workflow operation assurance for security-by-design certified service-based coalitions. Certified HDC models can become an enabler for SMEs to participate in coalition formations guaranteeing a certified level of security. Users of HDC-based services will have assurance for the properties preserved during coalition operation, while service providers will have assurance in providing services during HDC formations and partners' selection phases. We will show how workflow operation assurance is realized by means of service security certificates developed in ASSERT4SOA project.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132540098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Personalized Mobile Web Service Discovery","authors":"Khalid Elgazzar, Patrick Martin, H. Hassanein","doi":"10.1109/SERVICES.2013.18","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.18","url":null,"abstract":"Mobile devices with their various form factors have become the most convenient and pervasive computing platform, whether to carry out everyday business or to get online. Mobile users tend to adopt the fast food trend even in consuming online mobile services and functionalities. The Web service approach promises great flexibility in offering software functionality over the network, while maintaining interoperability between heterogeneous platforms. However, the diversity that exists in mobile devices and their platforms with variations in capabilities present unique challenges in developing services that can accommodate such diversity. Recent years have witnessed the rise of user-facing service developments that can be consumed on the go with standard interface, such as RESTful Web services. However, the discovery of such services does not match their growing popularity. In addition, existing discovery approaches lack supporting mechanisms that ensure the proper functioning of discovered services within the user context and failing to match personal preferences. This paper introduces personalized Web service discovery for mobile environments. Preliminary results show that incorporating user preferences and context significantly improves the overall precision of service discovery.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128753153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}