Pub Date : 2004-03-28DOI: 10.1109/RIDE.2004.1281706
Sisi Liu, Rania Y. Khalaf, F. Curbera
BPEL4WS is a process modeling language for composing Web services. On the other hand, DAML-S is an ontology for defining semantic Web services that includes a process model. We present a one-way mapping from the DAML-S process model to BPEL4WS, focusing on their common aspect: providing a specification of a service's interaction protocol. The mapping clarifies their relation to each other, and enables DAML-S described services to be used by Web services requestors that are not semantically-enabled. A prototype translator was created, and examples are provided.
{"title":"From DAML-S processes to BPEL4WS","authors":"Sisi Liu, Rania Y. Khalaf, F. Curbera","doi":"10.1109/RIDE.2004.1281706","DOIUrl":"https://doi.org/10.1109/RIDE.2004.1281706","url":null,"abstract":"BPEL4WS is a process modeling language for composing Web services. On the other hand, DAML-S is an ontology for defining semantic Web services that includes a process model. We present a one-way mapping from the DAML-S process model to BPEL4WS, focusing on their common aspect: providing a specification of a service's interaction protocol. The mapping clarifies their relation to each other, and enables DAML-S described services to be used by Web services requestors that are not semantically-enabled. A prototype translator was created, and examples are provided.","PeriodicalId":143695,"journal":{"name":"14th International Workshop Research Issues on Data Engineering: Web Services for e-Commerce and e-Government Applications, 2004. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127349274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-03-28DOI: 10.1109/RIDE.2004.1281700
E. Bertino, M. Damiani, Davide Momini
In this paper, we present an access control model for spatial data on Web. Such a model is based on the following assumptions: first, spatial data consist of objects with sharp boundaries located in a geographical space; second, data are manipulated through the operations provided by a Web map management service. The goal of the system is to control the way data are accessed by users having different profiles. We propose an extension of classical models based on authorization rules by assigning authorizations a geographical scope. In such a way, the operations users may execute on spatial data may vary, depending on user identity and object position.
{"title":"An access control system for a Web map management service","authors":"E. Bertino, M. Damiani, Davide Momini","doi":"10.1109/RIDE.2004.1281700","DOIUrl":"https://doi.org/10.1109/RIDE.2004.1281700","url":null,"abstract":"In this paper, we present an access control model for spatial data on Web. Such a model is based on the following assumptions: first, spatial data consist of objects with sharp boundaries located in a geographical space; second, data are manipulated through the operations provided by a Web map management service. The goal of the system is to control the way data are accessed by users having different profiles. We propose an extension of classical models based on authorization rules by assigning authorizations a geographical scope. In such a way, the operations users may execute on spatial data may vary, depending on user identity and object position.","PeriodicalId":143695,"journal":{"name":"14th International Workshop Research Issues on Data Engineering: Web Services for e-Commerce and e-Government Applications, 2004. Proceedings.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123005140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-03-28DOI: 10.1109/RIDE.2004.1281698
Thomi Pilioura, G. Kapos, A. Tsalgatidou
Web services enhance current Web functionality by altering its nature from document to service-oriented. As the number of Web services increases, it becomes increasingly important to provide a scalable infrastructure of registries that allows both developers and end-users to perform discovery of semantic Web enabled services. The discovery of services needs to be based on QoS characteristics in order to enable result ranking and service selection. Current Web service publication and discovery mechanisms, such as UDDI, either address these issues partially or not at all. In this paper, we build on the enabling technologies of Web services, peer-to-peer and semantic Web in an attempt to address all these important dimensions of service publication and discovery. More specifically, we use a hybrid peer-to-peer topology to organize registries based on domains. In such a model, each registry retains its autonomy, meaning that it can use the publication and discovery mechanisms as well as the ontology of its choice.
{"title":"PYRAMID-S: a scalable infrastructure for semantic Web service publication and discovery","authors":"Thomi Pilioura, G. Kapos, A. Tsalgatidou","doi":"10.1109/RIDE.2004.1281698","DOIUrl":"https://doi.org/10.1109/RIDE.2004.1281698","url":null,"abstract":"Web services enhance current Web functionality by altering its nature from document to service-oriented. As the number of Web services increases, it becomes increasingly important to provide a scalable infrastructure of registries that allows both developers and end-users to perform discovery of semantic Web enabled services. The discovery of services needs to be based on QoS characteristics in order to enable result ranking and service selection. Current Web service publication and discovery mechanisms, such as UDDI, either address these issues partially or not at all. In this paper, we build on the enabling technologies of Web services, peer-to-peer and semantic Web in an attempt to address all these important dimensions of service publication and discovery. More specifically, we use a hybrid peer-to-peer topology to organize registries based on domains. In such a model, each registry retains its autonomy, meaning that it can use the publication and discovery mechanisms as well as the ontology of its choice.","PeriodicalId":143695,"journal":{"name":"14th International Workshop Research Issues on Data Engineering: Web Services for e-Commerce and e-Government Applications, 2004. Proceedings.","volume":"339 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116052726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-03-28DOI: 10.1109/RIDE.2004.1281710
Esam Alwagait, Shahram Ghandeharizadeh
Web services (WSs) correspond to conceptual entities with well defined interfaces published by different organizations. For example, with businesses, a WS might correspond to a business process to be invoked by other WSs and Internet applications. To increase availability of a WS, an organization might replicate it across different nodes. This study focuses on data intensive applications that: (a) expose a conceptual entity as a Web service (WS); and (b) disperse copies of their WSs across the nodes of a distributed environment to enhance both performance and availability. We describe the design and implementation of a dependable Web services (DeW) framework to realize physical-location-independence. Physical-location-independence means a plan will execute as long as a copy of its referenced WSs is available. This concept enables the client proxy objects to continue operation in the presence of both failures and WS migrations that balance system load.
{"title":"DeW: a dependable Web services framework","authors":"Esam Alwagait, Shahram Ghandeharizadeh","doi":"10.1109/RIDE.2004.1281710","DOIUrl":"https://doi.org/10.1109/RIDE.2004.1281710","url":null,"abstract":"Web services (WSs) correspond to conceptual entities with well defined interfaces published by different organizations. For example, with businesses, a WS might correspond to a business process to be invoked by other WSs and Internet applications. To increase availability of a WS, an organization might replicate it across different nodes. This study focuses on data intensive applications that: (a) expose a conceptual entity as a Web service (WS); and (b) disperse copies of their WSs across the nodes of a distributed environment to enhance both performance and availability. We describe the design and implementation of a dependable Web services (DeW) framework to realize physical-location-independence. Physical-location-independence means a plan will execute as long as a copy of its referenced WSs is available. This concept enables the client proxy objects to continue operation in the presence of both failures and WS migrations that balance system load.","PeriodicalId":143695,"journal":{"name":"14th International Workshop Research Issues on Data Engineering: Web Services for e-Commerce and e-Government Applications, 2004. Proceedings.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133483258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-03-28DOI: 10.1109/RIDE.2004.1281702
Z. Sakr, N. Georganas
With the emerging technology of the MPEG-4 XMT standard, highly and efficiently compressed MPEG-4 scenes, which can include images, video, audio, and 3D objects, can be easily built using the text-based XMT format. XMT allows content authors to exchange their content with other authors, tools, or service providers and facilitates interoperability with MPEG-4, X3D and SMIL. In order for authors and designers to protect their work, some form of security needs to be applied to the MPEG-4 XMT structure. Unlike images or videos, watermarking an XMT structure is not an easy task, since the structure contains no noise components to embed the watermark, and if the watermark was embedded, it can be easily detected and removed. This paper is the first one proposing a robust algorithm for authentication and protection of MPEG-4 XMT structured scenes.
{"title":"An MPEG-4 XMT scene structure algorithm for authentication and copyright protection","authors":"Z. Sakr, N. Georganas","doi":"10.1109/RIDE.2004.1281702","DOIUrl":"https://doi.org/10.1109/RIDE.2004.1281702","url":null,"abstract":"With the emerging technology of the MPEG-4 XMT standard, highly and efficiently compressed MPEG-4 scenes, which can include images, video, audio, and 3D objects, can be easily built using the text-based XMT format. XMT allows content authors to exchange their content with other authors, tools, or service providers and facilitates interoperability with MPEG-4, X3D and SMIL. In order for authors and designers to protect their work, some form of security needs to be applied to the MPEG-4 XMT structure. Unlike images or videos, watermarking an XMT structure is not an easy task, since the structure contains no noise components to embed the watermark, and if the watermark was embedded, it can be easily detected and removed. This paper is the first one proposing a robust algorithm for authentication and protection of MPEG-4 XMT structured scenes.","PeriodicalId":143695,"journal":{"name":"14th International Workshop Research Issues on Data Engineering: Web Services for e-Commerce and e-Government Applications, 2004. Proceedings.","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127911741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}