{"title":"ModelDriven Instrumentation for Monitoring the Quality of Web Service Compositions","authors":"Christof Momm, Thomas Detsch, S. Abeck","doi":"10.1109/EDOCW.2008.44","DOIUrl":"https://doi.org/10.1109/EDOCW.2008.44","url":null,"abstract":"Supporting business services through Web service compositions (WSC) as part of service-oriented architectures involves various runtime monitoring requirements. The implementation of these requirements results in additional development activities. Due to the lack of standards for treating such WSC monitoring concerns, a corresponding development approach has to deal with a variety of specific technologies. This paper therefore introduces a platform-independent approach to the instrumentation of WSC and the generation of an effective monitoring infrastructure based on the principles of model-driven software development (MDSD).","PeriodicalId":205960,"journal":{"name":"2008 12th Enterprise Distributed Object Computing Conference Workshops","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115157206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for interoperability analysis on the semantic web using architecture models","authors":"Johan Ullberg, Robert Lagerström, M. Ekstedt","doi":"10.1109/EDOCW.2008.5","DOIUrl":"https://doi.org/10.1109/EDOCW.2008.5","url":null,"abstract":"IT decision making requires analysis of possible future scenarios. The quality of the decisions can be enhanced by the use of architecture models that increase the understanding of the components of the system scenario. It is desirable that the created models support the needed analysis effectively since creation of architecture models often is a demanding and time consuming task. This paper suggests a framework for assessing interoperability on the systems communicating over the semantic web as well as a metamodel suitable for this assessment. Extended influence diagrams are used in the framework to capture the relations between various interoperability factors and enable aggregation of these into a holistic interoperability measure. The paper is concluded with an example using the framework and metamodel to create models and perform interoperability analysis.","PeriodicalId":205960,"journal":{"name":"2008 12th Enterprise Distributed Object Computing Conference Workshops","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125057450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A BDI-Based Reflective Infrastructure for Dynamic Workflows","authors":"Sebastian Richly, Wolfgang Buecke, U. Assmann","doi":"10.1109/EDOCW.2008.2","DOIUrl":"https://doi.org/10.1109/EDOCW.2008.2","url":null,"abstract":"Business processes (workflows) standardize frequently recurring courses of events and actions in organizations. If these business processes are optimized, the resulting improvements in efficiency and quality are multiplied throughout the respective organization as the experience of individuals is shared among all employees. It is also true that all employees of a given organization have to follow the respective process instructions unless it appears necessary to deviate from the prescribed actions in order to react to unexpected events, failures, or other exceptions the process has not been designed for. In this paper, we present our approach for reflective and dynamic workflows that are based on the BDI (belief desire intention) agent technology. Our primary goal is to introduce a new way of adaptation using sub-workflows instead of atomic changes. The second challenge we meet is the need for workflows to find and apply modifications on their own; this should also be learned at runtime.","PeriodicalId":205960,"journal":{"name":"2008 12th Enterprise Distributed Object Computing Conference Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128658626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Enhanced Presence Filtering","authors":"Andrew Rutherford, R. Botha","doi":"10.1109/EDOCW.2008.61","DOIUrl":"https://doi.org/10.1109/EDOCW.2008.61","url":null,"abstract":"We live in a world of multiple communication channels which, on the face of it, should make persons more easily contactable. However, it can in fact be a time consuming process to establish contact due to these many avenues of communication. It is also true that many communication channels can equate to an increase in unwanted and disruptive communication attempts. The use of presence information is viewed as a possible solution to both the foregoing problems. This is achievable by persons making their presence information available for subscription by others, thus improving the communication experience of all concerned. However, there are many attributes denoting presence which are of a sensitive nature, and the release of such information needs to be tightly controlled to ensure it is released only to authorized persons. Current standards provide for the use of presence authorization rules to filter presence information and in so doing, provide the required access control. However the authors believe that shortcomings exist in this current approach. The intent of this paper is to investigate an alternative method of addressing availability through the use of, but not disclosure of sensitive information. Such a method could improve communication efficacy for both caller and callee, while reducing the release of privacy sensitive information.","PeriodicalId":205960,"journal":{"name":"2008 12th Enterprise Distributed Object Computing Conference Workshops","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129927308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a business-IT aligned maturity model for collaborative networked organizations","authors":"R. S. Tapia, M. Daneva, P. V. Eck, R. Wieringa","doi":"10.1109/EDOCW.2008.59","DOIUrl":"https://doi.org/10.1109/EDOCW.2008.59","url":null,"abstract":"Aligning business and IT in networked organizations is a complex endeavor because in such settings, business-IT alignment is driven by economic processes instead of by centralized decision-making processes. In order to facilitate managing business-IT alignment in networked organizations, we need a maturity model that allows collaborating organizations to assess the current state of alignment and take appropriate action to improve it where needed. In this paper we propose the first version of such a model, which we derive from various alignment models and theories.","PeriodicalId":205960,"journal":{"name":"2008 12th Enterprise Distributed Object Computing Conference Workshops","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130315273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A reference model for cross-organizational coordination architectures","authors":"E. Truyen, W. Joosen","doi":"10.1109/EDOCW.2008.10","DOIUrl":"https://doi.org/10.1109/EDOCW.2008.10","url":null,"abstract":"Dominant trends in distributed systems are increasing network connectivity, business-to-business integration and an evolution from desktop-oriented software to service-oriented software. The size and complexity of networked services has furthermore broadened from intra-organization to cross-organizational service provisioning. In the last decade many coordination architectures have been proposed to coordinate the provisioning of services across organizational boundaries. These approaches involve various types of service contracts and policies, and various coordination activities including negotiation, validation, enactment, monitoring and enforcement of service policies and contracts. In this paper, we propose a reference model for such coordination architectures in order to support the following goals: (i) to facilitate the analysis, comparison and discussion of different coordination architectures and (ii) to allow for constructive proposals about improving the existing coordination architectures.","PeriodicalId":205960,"journal":{"name":"2008 12th Enterprise Distributed Object Computing Conference Workshops","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124128046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated Privacy Audits Based on Pruning of Log Data","authors":"R. Accorsi, T. Stocker","doi":"10.1109/EDOCW.2008.18","DOIUrl":"https://doi.org/10.1109/EDOCW.2008.18","url":null,"abstract":"This paper presents a novel approach to automated audits based on the pruning of log data represented as trees. Events, recorded as a sequential list of entries, are interpreted as nodes of a tree. The audit consists in removing the nodes that are compliant with the policy, so that the remaining tree consists only of the violations of the policy. Besides presenting the method, this paper demonstrates that the resultant method is more efficient than usual audit approaches by analyzing its theoretical complexity and the runtime figures obtained by a proof of concept.","PeriodicalId":205960,"journal":{"name":"2008 12th Enterprise Distributed Object Computing Conference Workshops","volume":"444 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131737676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Well-formed Rules for Viewpoint Correspondences Specification","authors":"J. Romero, Antonio Vallecillo","doi":"10.1109/EDOCW.2008.63","DOIUrl":"https://doi.org/10.1109/EDOCW.2008.63","url":null,"abstract":"Service Enterprise Architecture (SEA) is nowadays gaining a wider audience in companies using large-scale IT systems. It combines service orientation and viewpoint modeling. Hence, service orientation is attractive due to its ability to virtualize component architecture and to enable easier composition and contractualization. However, services may be defined at multiple levels (business, application, technology) and viewpoint modeling permits to adopt a systematic approach. This paper compares several frameworks (Zachman, RM-ODP) and methodologies (TOGAF/ADM, Praxeme, ThinkService). A special focus is made on their ability to handle viewpoint correspondences and evolution management.","PeriodicalId":205960,"journal":{"name":"2008 12th Enterprise Distributed Object Computing Conference Workshops","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129783098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rodolfo A. Santiago, Guijun Wang, Harley Chen, Changzhou Wang
{"title":"Interoperability of End to End Quality of Service (QoS) Management across Heterogeneous Platforms in System of Systems","authors":"Rodolfo A. Santiago, Guijun Wang, Harley Chen, Changzhou Wang","doi":"10.1109/EDOCW.2008.39","DOIUrl":"https://doi.org/10.1109/EDOCW.2008.39","url":null,"abstract":"Interconnectivity, interoperability, evolution and emergent behavior are some of the key characteristics of system of systems (SOS). Providing end to end quality of service (QoS) for an SOS is a major challenge today because of issues with connectivity, the independent evolution of component systems and their heterogeneity. Heterogeneity of systems is common because of the independent evolution paths and development cycles of the systems. In this paper, we describe an interoperable end to end QoS management solution including concepts, architecture, prototype, and experimental results. Our solution not only provides QoS at systems level, but also ensuring end-to-end QoS across heterogeneous systems at the SOS level. To validate our solution, we analyzed and compared architecture alternatives and developed prototype and experiments employing multiple and varied data dissemination technologies.","PeriodicalId":205960,"journal":{"name":"2008 12th Enterprise Distributed Object Computing Conference Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131046837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Jie, Alistair Young, J. Arshad, J. Finch, R. Procter, A. Turner
{"title":"A Guanxi Shibboleth based Security Infrastructure","authors":"W. Jie, Alistair Young, J. Arshad, J. Finch, R. Procter, A. Turner","doi":"10.1109/EDOCW.2008.6","DOIUrl":"https://doi.org/10.1109/EDOCW.2008.6","url":null,"abstract":"An e-Social Science infrastructure generally has security requirements to protect their restricted resources or services. As a widely accepted authentication and authorization technology, Shibboleth supports the sharing of resources on inter-institutional federation. Guanxi is an open source implementation of the Shibboleth protocol and architecture. In this paper, we propose a security infrastructure for e-social science based on the Guanxi Shibboleth. This security infrastructure presents two main features. Firstly, Guanxi Shibboleth is integrated into the user-friendly Sakai collaborative and learning environment which provides an ideal place for users to access a variety of federation resources in line with the Shibboleth authentication model. Secondly, PERMIS technology is used to enhance the authorization mechanisms thus enabling a policy-driven, role-based, fine-grained access control. As a result, the security infrastructure presents the advantages of Guanxi Shibboleth, PERMIS and Sakai, and it has been applied to e-Social Science application. We believe this security infrastructure provides a promising authentication and authorization solution for e-social science applications as well as applications in other domains.","PeriodicalId":205960,"journal":{"name":"2008 12th Enterprise Distributed Object Computing Conference Workshops","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131684448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}