Yingchao Zhang, Zhiping Jiang, Xiaohao Yu, Xiaoqiang Song
{"title":"Mapping Services to Activities in Service Oriented Architecture (SOA) Design: A Simulation-Driven Optimizing Method Based on DODAF2.0","authors":"Yingchao Zhang, Zhiping Jiang, Xiaohao Yu, Xiaoqiang Song","doi":"10.1109/SOSE.2014.70","DOIUrl":"https://doi.org/10.1109/SOSE.2014.70","url":null,"abstract":"In order to optimize the mapping between service composition and operational activities within the process of service oriented architecture design, a method based on the DODAF 2.0 is proposed to match operational activities with services. Firstly, related architectural description methods, including Object-oriented method and the formal method, are studied based on the DODAF2.0. Secondly, considering the probability and potential resource conflicts, basic process of Petri Net simulation model was created based on related architectural models, and the rationality of mapping from services to operational activities is verified by the execution of simulation models.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123211850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Data Deduplication in Cloud Storage","authors":"Waraporn Leesakul, P. Townend, Jie Xu","doi":"10.1109/SOSE.2014.46","DOIUrl":"https://doi.org/10.1109/SOSE.2014.46","url":null,"abstract":"Cloud computing plays a major role in the business domain today as computing resources are delivered as a utility on demand to customers over the Internet. Cloud storage is one of the services provided in cloud computing which has been increasing in popularity. The main advantage of using cloud storage from the customers' point of view is that customers can reduce their expenditure in purchasing and maintaining storage infrastructure while only paying for the amount of storage requested, which can be scaled-up and down upon demand. With the growing data size of cloud computing, a reduction in data volumes could help providers reducing the costs of running large storage system and saving energy consumption. So data deduplication techniques have been brought to improve storage efficiency in cloud storages. With the dynamic nature of data in cloud storage, data usage in cloud changes overtime, some data chunks may be read frequently in period of time, but may not be used in another time period. Some datasets may be frequently accessed or updated by multiple users at the same time, while others may need the high level of redundancy for reliability requirement. Therefore, it is crucial to support this dynamic feature in cloud storage. However current approaches are mostly focused on static scheme, which limits their full applicability in dynamic characteristic of data in cloud storage. In this paper, we propose a dynamic deduplication scheme for cloud storage, which aiming to improve storage efficiency and maintaining redundancy for fault tolerance.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116689503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalysis of a Remote User Authentication Protocol Using Smart Cards","authors":"R. Madhusudhan, S. RohithKumar","doi":"10.1109/SOSE.2014.84","DOIUrl":"https://doi.org/10.1109/SOSE.2014.84","url":null,"abstract":"Remote user authentication using smart cards is a method of verifying the legitimacy of remote users accessing the server through insecure channel, by using smart cards to increase the efficiency of the system. During last couple of years many protocols to authenticate remote users using smart cards have been proposed. But unfortunately, most of them are proved to be unsecure against various attacks. Recently this year, Yung-Cheng Lee improved Shin et al.'s protocol and claimed that their protocol is more secure. In this article, we have shown that Yung-Cheng-Lee's protocol too has defects. It does not provide user anonymity; it is vulnerable to Denial-of-Service attack, Session key reveal, user impersonation attack, Server impersonation attack and insider attacks. Further it is not efficient in password change phase since it requires communication with server and uses verification table.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123002774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WS&i*-RGPS: An Approach to Service-Oriented Requirements Engineering Based on RGPS Metamodels","authors":"Keith de Souza, M. Fantinato","doi":"10.1109/SOSE.2014.15","DOIUrl":"https://doi.org/10.1109/SOSE.2014.15","url":null,"abstract":"Owing to the dynamics of the business environment in which organizations must adapt to changes quickly, the information systems have recently had to adapt to new situations so that they can keep adding value efficiently and effectively. In the light of this scenario, a new discipline called Service-oriented Systems Engineering (SOSE) has emerged in the academic scene and this has highlighted the disciplined, systematic and quantified development of Service-oriented Computing systems. This discipline is divided into other sub-disciplines, one of these sub-disciplines is Service-oriented Requirements Engineering (SORE) and is concerned with defining processes and methodologies to address the question of services requirements from two different perspectives: service consumers and service providers. In the context of SORE, this paper proposes a WS&i*-RGPS approach that explores some alternatives to the descriptions proposed by the Role, Goal, Process and Service (RGPS) metamodels - an approach in SORE. This involves a new definition that seeks to incorporate the advantages of other models -- established in the literature - with RGPS. Accordingly, this new approach outlines the use of the i* framework to describe the Role and Goal layers and shows the use of WS-BPEL/WSDL to describe the process and service layers. The use of the i* framework sets out the goals for managing different aspects of the systems specification. Among its advantages are stability, support in the detection of conflicts, analysis and negotiation. WS-BPEL/WSDL is chosen because of its maturity and widespread use in the state of practice, which increases the chance of this new approach being adopted by industry.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132607144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Provenance of Feedback in Cloud Services","authors":"K. Hamadache, Paraskevi Zerva","doi":"10.1109/SOSE.2014.10","DOIUrl":"https://doi.org/10.1109/SOSE.2014.10","url":null,"abstract":"With the fast adoption of Services Computing, even more driven by the emergence of the Cloud, the need to ensure accountability for quality of service (QoS) for service-based systems/services has reached a critical level. This need has triggered numerous researches in the fields of trust, reputation and provenance. Most of the researches on trust and reputation have focused on their evaluation or computation. In case of provenance they have tried to track down how the service has processed and produced data during its execution. If some of them have investigated credibility models and mechanisms, only few have looked into the way reputation information is produced. In this paper we propose an innovative design for the evaluation of feedback authenticity and credibility by considering the feedback's provenance. This innovative consideration brings up a new level of security and trust in Services Computing, by fighting against malicious feedback and reducing the impact of irrelevant one.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133115552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christian Inzinger, Stefan Nastic, Sanjin Sehic, Michael Vögler, Fei Li, S. Dustdar
{"title":"MADCAT: A Methodology for Architecture and Deployment of Cloud Application Topologies","authors":"Christian Inzinger, Stefan Nastic, Sanjin Sehic, Michael Vögler, Fei Li, S. Dustdar","doi":"10.1109/SOSE.2014.9","DOIUrl":"https://doi.org/10.1109/SOSE.2014.9","url":null,"abstract":"The cloud computing paradigm introduces new possibilities and challenges for application design and deployment. On-demand resource provisioning, as well as resource and cost elasticity, need to be considered when realizing large-scale distributed applications for cloud environments. Current approaches do not sufficiently address the challenges of efficiently architecting and deploying cloud applications in a holistic manner and do not deal with the specific challenges encountered in cloud infrastructures. In this paper we introduce a methodology tackling the practical problems encountered when designing and deploying cloud applications. It enables the structured creation of cloud-native applications, addressing the complete application development lifecycle, from architectural design to concrete deployment topologies provisioned and executed on cloud infrastructure. By using iterative refinement and seamless provenance documentation of decisions made in the process, the methodology eases communication with relevant stakeholders and enables efficient design and deployment of distributed cloud applications.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126260754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Creative Computing Processes: Musical Composition","authors":"A. Hugill","doi":"10.1109/SOSE.2014.80","DOIUrl":"https://doi.org/10.1109/SOSE.2014.80","url":null,"abstract":"This paper addresses the problem of understanding the creative process in creative computing. It describes the levels of abstraction that operate in the process of musical composition. It examines the operation of these levels in the composition of Secret Garden, an installation piece by Martin Rieser and Andrew Hugill. It presents a graph-theoretic model of the creative process of that work, building on the research of Zedan, Cau, Westendorf, Buss, Hugill and Thomas. It suggests how this might be applied in creative computing.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125802157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Customized Infrastructures for Monitoring Business Processes","authors":"M. Comuzzi, R. Martinez","doi":"10.1109/SOSE.2014.19","DOIUrl":"https://doi.org/10.1109/SOSE.2014.19","url":null,"abstract":"Process enactment technology provides native tools and add-ons for monitoring, such as APIs and monitoring consoles, which are usually highly entangled with the underlying process enactment logic and not customizable by process users. In such a case, all users access the same set of monitoring data and functions and process management resources may be allocated for monitoring concerns not of interest for users. In this context, we present a model and a tool for customized process monitoring infrastructures executing on top of existing process enactment technology. The model classifies the options about monitoring over which the preferences of process users may diverge. The tool implements the proposed model, generating customized process monitoring infrastructures embedding the business logic of the monitoring options chosen by process users.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127747038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cloud Trust Authority Framework for Mobile Enterprise Information System","authors":"Hongjun Dai, Qian Li, Meikang Qiu, Zhilou Yu, Zhiping Jia","doi":"10.1109/SOSE.2014.68","DOIUrl":"https://doi.org/10.1109/SOSE.2014.68","url":null,"abstract":"With the trend of mobile enterprise information systems, security has become the primary issue as it relates to business secret, decision, and process control. Hence, we carry out a fully customized framework to emphasize on security from trust authority of the cloud certificate authority server, and to guarantee security with the process of the software developments. The core object model, named as secure mobile beans (SMB), can be deployed into the cloud server. Our framework consists of SMB models, object-relation mapping module, SMB translator, and development tools. The use cases show that it can free developers from the complex implementation of security policies during the development stages, shorten the time of mobile application's development effectively.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126902120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Brugali, Andrea Fernandes da Fonseca, Andrea Luzzana, Yamuna Maccarana
{"title":"Developing Service Oriented Robot Control System","authors":"D. Brugali, Andrea Fernandes da Fonseca, Andrea Luzzana, Yamuna Maccarana","doi":"10.1109/SOSE.2014.28","DOIUrl":"https://doi.org/10.1109/SOSE.2014.28","url":null,"abstract":"The work presented in this paper is motivated by the aim of simplifying the integration of robotic and information systems technology. This would allow for example to extend the capabilities of autonomous robots with the possibility to access Web resources and services. For this purpose, this paper presents the Task Component Architecture, a framework for the implementation of Service ComponentArchitecture (SCA) components that execute autonomouslytheir service and that can be seamlessly integrated with robotic software control systems.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127788062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}