{"title":"Model-Driven Design, Development, Execution and Management of Service-Based Applications","authors":"D. Moreno-Garcia, J. Estublier","doi":"10.1109/SCC.2012.64","DOIUrl":"https://doi.org/10.1109/SCC.2012.64","url":null,"abstract":"Service-based software applications, such as pervasive and ubiquitous ones, are increasingly embedded in our daily lives integrating smart communicating devices. Usually, changes in the execution context of these applications occur unpredictably over time, such as dynamic variations in the availability of the used services and devices, or of the user location and needs. This unpredictable variability in the execution contexts makes impossible to know at design-time the exact conditions under which these applications will be used and the services that will be most suited at a given time. Therefore, the architecture of such applications cannot be fully defined at design-time. These applications must be defined in abstract and flexible ways, allowing incremental composition and dynamic adaptation to their execution context at runtime. In this paper, we present a model-driven approach for designing, developing, executing and managing service-based applications. At design-time, an application is mainly defined by its requirements and goals. The application definition can be extended to add specific functional or non-functional concerns, such as dynamic adaptation, deployment or distribution. At development-time, the application can be automatically and incrementally composed, ensuring its consistency with respect to its definition. At runtime, the application execution is supported and controlled by our runtime environment.","PeriodicalId":178841,"journal":{"name":"2012 IEEE Ninth International Conference on Services Computing","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132489771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards the Application of Reinforcement Learning Techniques for Quality-Based Service Selection in Automated Service Composition","authors":"Alexander Jungmann, B. Kleinjohann","doi":"10.1109/SCC.2012.76","DOIUrl":"https://doi.org/10.1109/SCC.2012.76","url":null,"abstract":"A major goal of the On-The-Fly Computing project is the automated composition of individual services based on services that are available in dynamic markets. Dependent on the granularity of a market, different alternatives that satisfy the requested functional requirements may emerge. In order to select the best solution, services are usually selected with respect to their quality in terms of inherent non-functional properties. In this paper, we describe our idea of how to model this service selection process as a Markov Decision Process, which we in turn intend to solve by means of Reinforcement Learning techniques in order to control the underlying service composition process. In addition, some initial issues with respect to our approach are addressed.","PeriodicalId":178841,"journal":{"name":"2012 IEEE Ninth International Conference on Services Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130957744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Human-Asset-Compromised Allocation Model of Multiple Emergency Projects in Service-Focused Enterprises","authors":"Yan Wang, Liang Zhang, Wei Wang","doi":"10.1109/SCC.2012.89","DOIUrl":"https://doi.org/10.1109/SCC.2012.89","url":null,"abstract":"Chinese enterprises have been conducting low-end processing for foreign brands. In recent years, they want to get rid of this high-pay low-income pattern and develop towards the high-end of the value chain. Most of them are transforming to service-focused enterprises that aim to provide customers with customized service. In service-focused enterprises, the human asset - like industry experts, technology experts, product experts and so on - is very important. Sometimes, the services provided by experts can directly affect the satisfaction of customers. Service-focused enterprises always have to face this challenge: multiple projects occur in emergency situations at the same time and need to dispatch multiple suitable experts from multiple places in order to respond. Under the constraint of human asset requirements on time and cost, this paper establishes an uncompromised resource allocation model for human asset emergency response. According to the characteristics of human asset emergency issues, the mathematical model can be presented to help solve the largescale emergency difficulties among multiple projects, multiple experts' types and multiple experts' locations. Finally, a case study is carried on to prove the algorithm's effectiveness.","PeriodicalId":178841,"journal":{"name":"2012 IEEE Ninth International Conference on Services Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126771112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Service-Oriented Architecture for SPDFLOW: A Healthcare Workflow System for Sterile Processing Departments","authors":"Xiaoyu Ma, Shiyong Lu, Kai Yang","doi":"10.1109/SCC.2012.81","DOIUrl":"https://doi.org/10.1109/SCC.2012.81","url":null,"abstract":"Healthcare workflow has recently become an enabling technology in the healthcare industry to automate processes, improve care quality, and enhances patient safety. Although some work has been done on healthcare workflow for some departments of a hospital, automating processes and improving patient safety in the Sterile Processing Department (SPD) is still an open problem. The main contributions of this paper are: i) we identify the main factors and issues in the current practice of a sterile processing department that compromise patient safety; ii) we propose to address these issues using healthcare workflow and identify the key architectural requirements for a healthcare workflow system for SPDs; iii) based on these requirements, we propose a service-oriented architecture and validate it with our SPD workflow prototyping system, SPDFLOW. To our best knowledge, SPDFLOW is the first effort in exploring healthcare workflow technology in the SPD domain.","PeriodicalId":178841,"journal":{"name":"2012 IEEE Ninth International Conference on Services Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126431883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Regarding Processors and Reconfigurable IP Cores as Services","authors":"Chao Wang, Xi Li, Peng Chen, Junneng Zhang, Xiaojing Feng, Xuehai Zhou","doi":"10.1109/SCC.2012.72","DOIUrl":"https://doi.org/10.1109/SCC.2012.72","url":null,"abstract":"This paper proposes a service-oriented reconfigurable co-processing architecture. The novelty of the architecture is to apply service-oriented concepts to system on chip (SoC) design paradigms and utilizes each processor and IP core as a function unit. Regarded as abstract instructions, tasks can be scheduled to IP core for parallel execution automatically. A uniform IP reconfiguration interface is provided to allow function units replacement at run-time. Neither the applications nor the tool chains need to be redesigned after hardware reconfiguration. To evaluate the SOA concepts, we implemented a prototype on a state-of-art Virtex5 FPGA board with IP cores implemented from EEMBC DENBench. The prototype and experimental results demonstrate it can support a range of hardware accelerators in an efficient manner. Furthermore, results also depict that the architecture takes moderate silicon area affordable power consumption. We believe the SOA approach opens a new direction to combine SOA concepts with reconfigurable computing hardware architectures.","PeriodicalId":178841,"journal":{"name":"2012 IEEE Ninth International Conference on Services Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131524889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Global Service Space Construction and Its Application to Workflow as a Service","authors":"Wuhui Chen, Incheon Paik, R. Komiya","doi":"10.1109/SCC.2012.15","DOIUrl":"https://doi.org/10.1109/SCC.2012.15","url":null,"abstract":"It is considered that Web services have had a tremendous impact on the web as a potential silver bullet for supporting a distributed service-based economy on a global scale. However, despite the outstanding progress, their uptake on a web scale has been significantly less than initially anticipated. Isolated service islands without links to related services have hampered service discovery and composition. In this paper, we propose a methodology to drive innovation from isolated service islands into the global social service network to connect the service islands. First, we propose Linked social service-specific principles based on Linked Data principles for publishing services on the open web as linked social services, and suggest a new platform for constructing a global social service network. Then, an approach is proposed to enable exploitation of a global social service network, providing workflow as a service. Finally, experimental results show that Linked social service can solve the service composition problem by enabling providing workflow as a service based on the global social service network, and has the potential to be the next wave of services.","PeriodicalId":178841,"journal":{"name":"2012 IEEE Ninth International Conference on Services Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133158914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"INSC: An Iterative Negotiation Approach for Service Compositions","authors":"Qiang He, Yun Yang, Jun Yan, Hai Jin","doi":"10.1109/SCC.2012.38","DOIUrl":"https://doi.org/10.1109/SCC.2012.38","url":null,"abstract":"The service-oriented paradigm offers support for engineering service-based systems (SBSs) based on service compositions. The selection of services with the aim to fulfil the quality constraints for SBSs and to achieve the optimisation goals is a critical and challenging issue. In particular, when the quality-of-service (QoS) constraints for a SBS are severe, it is often difficult to find an optimal solution for the SBS. Exploiting the competition among service providers can help SBS developers obtain favourable QoS offers for the component services of SBSs and increase the possibility of finding optimal solutions for the SBSs. In this paper, we present a novel joint optimisation and negotiation approach named Iterative Negotiation for Service Composition (INSC) that supports effective and efficient QoS-aware service selection for SBSs. We evaluate INSC experimentally using example SBSs that are synthetically generated based on a real-world Web service dataset. The experimental results show that INSC can significantly and efficiently increase the possibility of finding optimal solutions in severe service composition scenarios.","PeriodicalId":178841,"journal":{"name":"2012 IEEE Ninth International Conference on Services Computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134405491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Access Control with Hidden Policies and Credentials for Service Computing","authors":"Xinfeng Ye, M. Gao","doi":"10.1109/SCC.2012.13","DOIUrl":"https://doi.org/10.1109/SCC.2012.13","url":null,"abstract":"In a services computing environment, a large amount of sensitive data is hosted by service providers. As the owners of data might have different security requirements for their data, many systems allow each data item to have its own access control policy. For privacy and security reasons, some data owners and clients might want their access control policies and credentials to remain secret to the service providers which handle the access control of the data. That is, the service providers cannot comprehend the contents of the access control policies and the credentials. This paper proposed a role-based access control scheme. It uses cryptographic techniques to obscure data's access control policies and clients' credentials. The scheme is efficient as the policy enforcement process only uses the information available on the service provider that carries out the access control. A prototype of the scheme has been implemented and the execution time of the scheme were measured.","PeriodicalId":178841,"journal":{"name":"2012 IEEE Ninth International Conference on Services Computing","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134540682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Scientific Workflow Provenance Access Control Policies","authors":"Ruiqi Luo, Ping Yang, Shiyong Lu, M. Gofman","doi":"10.1109/SCC.2012.60","DOIUrl":"https://doi.org/10.1109/SCC.2012.60","url":null,"abstract":"Provenance has become an important concept for services computing in general, and for scientific workflows in particular. Provenance often contains confidential data and dependencies whose access needs to be protected. Provenance access control policies control who can access which provenance information. Correct specification of provenance access control policies is critical to ensure system security. However, due to the sheer size of provenance, it is often difficult to comprehend the full effects of an access control policy by manual inspection alone due to complex multi-step dependencies and their interactions. In this paper, we present automated analysis algorithms and complexity results for three provenance analysis problems. We have also developed incremental strategies for these algorithms for evolving provenance and access control policies.","PeriodicalId":178841,"journal":{"name":"2012 IEEE Ninth International Conference on Services Computing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116730706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Semantic Extended Multi-layer Model for BPEL Process Generation","authors":"Budan Wu, Junliang Chen","doi":"10.1109/SCC.2012.102","DOIUrl":"https://doi.org/10.1109/SCC.2012.102","url":null,"abstract":"BPEL is a popular standard language in SOA enterprise for specifying business process. A developer has to use specific programming technologies to construct process structure and specify Web services inputs and outputs in the process. It is time-consuming to specify every business process from low-level Web services. This paper proposes a semantic extended BPEL model for SOA process generation, and implements the model in a practical BPEL IDE. The new BPEL IDE supports efficient visual design of SOA processes, and helps developers focus more on business logic. A real multimedia conference SOA application is given to demonstrate the efficiency of SOA process generation with semantic extended BPEL model on the new BPEL IDE. And a Load Runner evaluation is given to validate the efficient BPEL process generation has no negative effect on execution efficiency of the generated BPEL code.","PeriodicalId":178841,"journal":{"name":"2012 IEEE Ninth International Conference on Services Computing","volume":"694 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123843341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}