Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.58
Stamatia Rizou, George Angouras
Self-employed professionals need powerful software tools to manage their daily tasks. The increasing need for mobility support in combination with the emergence of Internet-based services make SaaS solutions an attractive option for freelancers to manage their business. In this paper, we present ORBI, a SaaS solution especially designed to meet the needs of self-employed professionals that is currently available in the Greek market. We present the key concepts behind the design and implementation of the ORBI solution and we discuss its main value proposition. Furthermore, as part of the ongoing and future research activities we present the main research directions in an effort to use ORBI as an industrial test bed to test and validate innovative concepts and tools.
{"title":"ORBI: An Internet Service for Self-Employed Professionals","authors":"Stamatia Rizou, George Angouras","doi":"10.1109/SERVICES.2013.58","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.58","url":null,"abstract":"Self-employed professionals need powerful software tools to manage their daily tasks. The increasing need for mobility support in combination with the emergence of Internet-based services make SaaS solutions an attractive option for freelancers to manage their business. In this paper, we present ORBI, a SaaS solution especially designed to meet the needs of self-employed professionals that is currently available in the Greek market. We present the key concepts behind the design and implementation of the ORBI solution and we discuss its main value proposition. Furthermore, as part of the ongoing and future research activities we present the main research directions in an effort to use ORBI as an industrial test bed to test and validate innovative concepts and tools.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123951156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.64
Jia Zhang, P. Votava, Tsengdar J. Lee, Owen Chu, Clyde Li, David Liu, K. Liu, Norman Xin, R. Nemani
NASA Earth Exchange (NEX) is a collaboration platform whose goal is to accelerate Earth science research, by leveraging NASA's vast collections of global satellite data together with access to NASA's High-End Computing (HEC) facilities. NEX also aims to facilitate the sharing of experimental results as well as scientific processes (workflows) with the Earth science community through integration with VisTrails workflow management system. While VisTrails is used internally, it is not easily accessible from remote computers without directly logging into the NASA HEC systems through twofactor authentication and a bastion host. This paper describes the initial design of an extensible architecture that facilitates easier workflow interaction on NEX, by enabling users to develop and execute workflows in a supercomputing environment directly from their local VisTrails installation. This architecture helps domain scientists seamlessly leverage distributed computing and storage resources and it is potentially applicable to other scientific workflow management software. We further describe the architecture of the VisTrails-HEC plugin (as well as the VisTrails-Amazon plugin) and the implementation of a working prototype to demonstrate the feasibility of our solution.
{"title":"Bridging VisTrails Scientific Workflow Management System to High Performance Computing","authors":"Jia Zhang, P. Votava, Tsengdar J. Lee, Owen Chu, Clyde Li, David Liu, K. Liu, Norman Xin, R. Nemani","doi":"10.1109/SERVICES.2013.64","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.64","url":null,"abstract":"NASA Earth Exchange (NEX) is a collaboration platform whose goal is to accelerate Earth science research, by leveraging NASA's vast collections of global satellite data together with access to NASA's High-End Computing (HEC) facilities. NEX also aims to facilitate the sharing of experimental results as well as scientific processes (workflows) with the Earth science community through integration with VisTrails workflow management system. While VisTrails is used internally, it is not easily accessible from remote computers without directly logging into the NASA HEC systems through twofactor authentication and a bastion host. This paper describes the initial design of an extensible architecture that facilitates easier workflow interaction on NEX, by enabling users to develop and execute workflows in a supercomputing environment directly from their local VisTrails installation. This architecture helps domain scientists seamlessly leverage distributed computing and storage resources and it is potentially applicable to other scientific workflow management software. We further describe the architecture of the VisTrails-HEC plugin (as well as the VisTrails-Amazon plugin) and the implementation of a working prototype to demonstrate the feasibility of our solution.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115657547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.34
Richard K. Lomotey, R. Deters
The mobile terrain is rapidly establishing itself as the reliable node for accessing cloud hosted data. Today, commodity cloud providers especially from the Infrastructure-as-a-Service (IaaS) cloud expose their service APIs which facilitates the "app-ification" of enterprise workflows on mobile devices. However, these IaaS providers require the customer (i.e., the data consumer) to submit multiple security credentials which are computation intensive for the purposes of authentication and authorization. As a result, the authentication process introduces undesired delays in a mobile network when consuming enterprise data due to the increasing computational demand and the voluminous HTTP header that is transported across the wireless bandwidth.This paper introduces an application called MiLAMob that is a middleware-layer that handles the authentication process on behalf of the consumer devices in real time and with minimal HTTP traffic. The middleware currently supports mobile consumption of data on IaaS clouds such as Amazon S3, Dropbox, and MEGA. Further, the middleware employs the OAuth 2.0 technique (E.g. Facebook, Google+, and Personal Login) to identify the mobile end-user and uses security tokens to handle the tedious authentication with the IaaS cloud. Also, the deployment of the middleware enforces additional data protection because the security credentials and the IaaS abstractions are shielded from the mobile application domain and the end users.
{"title":"SaaS Authentication Middleware for Mobile Consumers of IaaS Cloud","authors":"Richard K. Lomotey, R. Deters","doi":"10.1109/SERVICES.2013.34","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.34","url":null,"abstract":"The mobile terrain is rapidly establishing itself as the reliable node for accessing cloud hosted data. Today, commodity cloud providers especially from the Infrastructure-as-a-Service (IaaS) cloud expose their service APIs which facilitates the \"app-ification\" of enterprise workflows on mobile devices. However, these IaaS providers require the customer (i.e., the data consumer) to submit multiple security credentials which are computation intensive for the purposes of authentication and authorization. As a result, the authentication process introduces undesired delays in a mobile network when consuming enterprise data due to the increasing computational demand and the voluminous HTTP header that is transported across the wireless bandwidth.This paper introduces an application called MiLAMob that is a middleware-layer that handles the authentication process on behalf of the consumer devices in real time and with minimal HTTP traffic. The middleware currently supports mobile consumption of data on IaaS clouds such as Amazon S3, Dropbox, and MEGA. Further, the middleware employs the OAuth 2.0 technique (E.g. Facebook, Google+, and Personal Login) to identify the mobile end-user and uses security tokens to handle the tedious authentication with the IaaS cloud. Also, the deployment of the middleware enforces additional data protection because the security credentials and the IaaS abstractions are shielded from the mobile application domain and the end users.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123834232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.17
Samuel Paul Kaluvuri, M. Bezzi, Y. Roudier
Solutions based on service-oriented architecture are gaining popularity. However a wider adoption, especially for business critical functions, is hampered by the trust deficit that exists between consumers and providers, as consumers are shielded from the service architectures and the operation of the service itself. Security certification can be used as a means to bridge this trust deficit. Common Criteria for Information Technology Evaluation (CC) is a widely recognized and used security certification scheme. However, the CC scheme was tailored to provide assurance for traditional software provisioning models and hence cannot be applied to SOA solutions as is. In this paper, we present the limitations of the CC scheme when applied in SOA, the challenges that must be overcome for its adoption and possible directions through which some of those challenges can be met. In particular, we point out that CC scheme should be extended to allow for dynamic evaluation of deployed systems (which includes the operational environment) and for handling assurance of composite services.
基于面向服务的体系结构的解决方案越来越受欢迎。然而,由于消费者不受服务体系结构和服务本身的操作的影响,消费者和提供者之间存在信任赤字,从而阻碍了更广泛的采用,特别是对于业务关键功能。安全认证可以作为弥补这种信任缺陷的一种手段。CC (Common Criteria for Information Technology Evaluation)是一种被广泛认可和使用的安全认证方案。然而,CC方案是为传统的软件供应模型提供保证而定制的,因此不能按原样应用于SOA解决方案。在本文中,我们介绍了在SOA中应用CC模式时的局限性、采用CC模式必须克服的挑战,以及应对其中一些挑战的可能方向。特别地,我们指出CC方案应该扩展到允许对部署的系统(包括操作环境)进行动态评估,并处理复合服务的保证。
{"title":"Bringing Common Criteria Certification to Web Services","authors":"Samuel Paul Kaluvuri, M. Bezzi, Y. Roudier","doi":"10.1109/SERVICES.2013.17","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.17","url":null,"abstract":"Solutions based on service-oriented architecture are gaining popularity. However a wider adoption, especially for business critical functions, is hampered by the trust deficit that exists between consumers and providers, as consumers are shielded from the service architectures and the operation of the service itself. Security certification can be used as a means to bridge this trust deficit. Common Criteria for Information Technology Evaluation (CC) is a widely recognized and used security certification scheme. However, the CC scheme was tailored to provide assurance for traditional software provisioning models and hence cannot be applied to SOA solutions as is. In this paper, we present the limitations of the CC scheme when applied in SOA, the challenges that must be overcome for its adoption and possible directions through which some of those challenges can be met. In particular, we point out that CC scheme should be extended to allow for dynamic evaluation of deployed systems (which includes the operational environment) and for handling assurance of composite services.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"19 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129889683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.48
Lijuan Wang, Jun Shen, G. Beydoun
Huge collections of data have been created in recent years. Cloud computing has been widely accepted as the next-generation solution to addressing data-proliferation problems. Because of the explosion in digital data and the distributed nature of the cloud, as well as the increasingly large number of providers in the market, providing efficient cost models for composing data-intensive services will become central to this dynamic market. The location of users, service composers, service providers, and data providers will affect the total cost of service provision. Different providers will need to make decisions about how to price and pay for resources. Each of them wants to maximize its profit as well as retain its position in the marketplace. Based on our earlier work, this paper addresses the effect of data intensity and the communication cost of mass data transfer on service composition, and proposes a service selection algorithm based on an enhanced ant colony system for data-intensive service provision. In this paper, the data-intensive service composition problem is modeled as an AND/OR graph, which is not only able to deal with sequence relations and switch relations, but is also able to deal with parallel relations between services. In addition, the performance of the service selection algorithm is evaluated by simulations.
{"title":"Enhanced Ant Colony Algorithm for Cost-Aware Data-Intensive Service Provision","authors":"Lijuan Wang, Jun Shen, G. Beydoun","doi":"10.1109/SERVICES.2013.48","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.48","url":null,"abstract":"Huge collections of data have been created in recent years. Cloud computing has been widely accepted as the next-generation solution to addressing data-proliferation problems. Because of the explosion in digital data and the distributed nature of the cloud, as well as the increasingly large number of providers in the market, providing efficient cost models for composing data-intensive services will become central to this dynamic market. The location of users, service composers, service providers, and data providers will affect the total cost of service provision. Different providers will need to make decisions about how to price and pay for resources. Each of them wants to maximize its profit as well as retain its position in the marketplace. Based on our earlier work, this paper addresses the effect of data intensity and the communication cost of mass data transfer on service composition, and proposes a service selection algorithm based on an enhanced ant colony system for data-intensive service provision. In this paper, the data-intensive service composition problem is modeled as an AND/OR graph, which is not only able to deal with sequence relations and switch relations, but is also able to deal with parallel relations between services. In addition, the performance of the service selection algorithm is evaluated by simulations.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132093295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.54
Hongbin Lu, Mark Shtern, B. Simmons, Michael Smit, Marin Litoiu
This paper presents a flexible deployment service for cloud computing. The service facilitates the specification and the execution of cloud deployment plans for applications. An application is described through a pattern, an abstract view that captures the logical view of the application and its mapping into cloud resources. The services instantiate the pattern in the cloud and allows for runtime updates of the deployment. The service is accessible through a RESTful interface. We identify the requirements for the service, describe its interfaces and show several case studies that capture the main features of the service.
{"title":"Pattern-Based Deployment Service for Next Generation Clouds","authors":"Hongbin Lu, Mark Shtern, B. Simmons, Michael Smit, Marin Litoiu","doi":"10.1109/SERVICES.2013.54","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.54","url":null,"abstract":"This paper presents a flexible deployment service for cloud computing. The service facilitates the specification and the execution of cloud deployment plans for applications. An application is described through a pattern, an abstract view that captures the logical view of the application and its mapping into cloud resources. The services instantiate the pattern in the cloud and allows for runtime updates of the deployment. The service is accessible through a RESTful interface. We identify the requirements for the service, describe its interfaces and show several case studies that capture the main features of the service.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130049674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.80
Desheng Li, Lianwen Jin, Yin Zhang
In this paper, we present a new Handwriting Recognition Platform as a Service (HRPaaS) using cloud infrastructure as a service(IaaS), middleware, and HTTP application programming interface (API) technologies. Based on the OpenStack cloud IaaS architecture, a handwriting recognition HTTPAPI service is designed to provide a highly reliable, real-time, customized handwriting character recognition service for application developers. Using middleware and cloud computing technologies, the computing resources, HTTPAPI response service pool, and backend handwriting recognition service pool can be loosely coupled and integrated to achieve fast and flexible deployment of the HRPaaS.
{"title":"HRPaaS: A Handwriting Recognition Platform as a Service Based on Middleware and the HTTP API","authors":"Desheng Li, Lianwen Jin, Yin Zhang","doi":"10.1109/SERVICES.2013.80","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.80","url":null,"abstract":"In this paper, we present a new Handwriting Recognition Platform as a Service (HRPaaS) using cloud infrastructure as a service(IaaS), middleware, and HTTP application programming interface (API) technologies. Based on the OpenStack cloud IaaS architecture, a handwriting recognition HTTPAPI service is designed to provide a highly reliable, real-time, customized handwriting character recognition service for application developers. Using middleware and cloud computing technologies, the computing resources, HTTPAPI response service pool, and backend handwriting recognition service pool can be loosely coupled and integrated to achieve fast and flexible deployment of the HRPaaS.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114281985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.28
Y. Badr, S. Banerjee
Service-oriented architectures are increasingly deployed in open, distributed and dynamic environments, which require an end-to-end security awareness security at each phase of the service's lifecycle. Moreover, the security should not only focus on services without considering the risks and threats that might be caused by elements from business activities or underlying hardware and software infrastructure. In this paper, we adopt a holistic approach to define a security conceptual model that covers all elements at the business, service and infrastructure levels and guides each phase in a typical design method for service-oriented architectures. Since the information security is subject to uncertain and unforeseen threats, we propose a fuzzy logic decision system that helps identify security risks based on the security conceptual model and select appropriate security measures based on security objectives.
{"title":"Managing End-to-End Security Risks with Fuzzy Logic in Service-Oriented Architectures","authors":"Y. Badr, S. Banerjee","doi":"10.1109/SERVICES.2013.28","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.28","url":null,"abstract":"Service-oriented architectures are increasingly deployed in open, distributed and dynamic environments, which require an end-to-end security awareness security at each phase of the service's lifecycle. Moreover, the security should not only focus on services without considering the risks and threats that might be caused by elements from business activities or underlying hardware and software infrastructure. In this paper, we adopt a holistic approach to define a security conceptual model that covers all elements at the business, service and infrastructure levels and guides each phase in a typical design method for service-oriented architectures. Since the information security is subject to uncertain and unforeseen threats, we propose a fuzzy logic decision system that helps identify security risks based on the security conceptual model and select appropriate security measures based on security objectives.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114639799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.14
Javier Espinar, A. Maña, Hristo Koshutanski
The concept of Dynamic Coalitions (DCs) provides a scalable approach for service-based business integration suitable to Small and Medium-size Enterprises (SMEs). An outcome of a DC model is a composite service offered to a market place. The notion of security-by-design certified coalition enables coalition designers/owners to request a certification authority to certify whether the coalition workflow design supports certain security properties of interest by stipulating the security properties individual services have to conform to. This paper presents an approach based on a novel Highly Dynamic Coalition (HDC) concept able to provide workflow operation assurance for security-by-design certified service-based coalitions. Certified HDC models can become an enabler for SMEs to participate in coalition formations guaranteeing a certified level of security. Users of HDC-based services will have assurance for the properties preserved during coalition operation, while service providers will have assurance in providing services during HDC formations and partners' selection phases. We will show how workflow operation assurance is realized by means of service security certificates developed in ASSERT4SOA project.
{"title":"Workflow Operational Assurance Platform for Security-by-Design Certified Service-Based Coalitions","authors":"Javier Espinar, A. Maña, Hristo Koshutanski","doi":"10.1109/SERVICES.2013.14","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.14","url":null,"abstract":"The concept of Dynamic Coalitions (DCs) provides a scalable approach for service-based business integration suitable to Small and Medium-size Enterprises (SMEs). An outcome of a DC model is a composite service offered to a market place. The notion of security-by-design certified coalition enables coalition designers/owners to request a certification authority to certify whether the coalition workflow design supports certain security properties of interest by stipulating the security properties individual services have to conform to. This paper presents an approach based on a novel Highly Dynamic Coalition (HDC) concept able to provide workflow operation assurance for security-by-design certified service-based coalitions. Certified HDC models can become an enabler for SMEs to participate in coalition formations guaranteeing a certified level of security. Users of HDC-based services will have assurance for the properties preserved during coalition operation, while service providers will have assurance in providing services during HDC formations and partners' selection phases. We will show how workflow operation assurance is realized by means of service security certificates developed in ASSERT4SOA project.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132540098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.18
Khalid Elgazzar, Patrick Martin, H. Hassanein
Mobile devices with their various form factors have become the most convenient and pervasive computing platform, whether to carry out everyday business or to get online. Mobile users tend to adopt the fast food trend even in consuming online mobile services and functionalities. The Web service approach promises great flexibility in offering software functionality over the network, while maintaining interoperability between heterogeneous platforms. However, the diversity that exists in mobile devices and their platforms with variations in capabilities present unique challenges in developing services that can accommodate such diversity. Recent years have witnessed the rise of user-facing service developments that can be consumed on the go with standard interface, such as RESTful Web services. However, the discovery of such services does not match their growing popularity. In addition, existing discovery approaches lack supporting mechanisms that ensure the proper functioning of discovered services within the user context and failing to match personal preferences. This paper introduces personalized Web service discovery for mobile environments. Preliminary results show that incorporating user preferences and context significantly improves the overall precision of service discovery.
{"title":"Personalized Mobile Web Service Discovery","authors":"Khalid Elgazzar, Patrick Martin, H. Hassanein","doi":"10.1109/SERVICES.2013.18","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.18","url":null,"abstract":"Mobile devices with their various form factors have become the most convenient and pervasive computing platform, whether to carry out everyday business or to get online. Mobile users tend to adopt the fast food trend even in consuming online mobile services and functionalities. The Web service approach promises great flexibility in offering software functionality over the network, while maintaining interoperability between heterogeneous platforms. However, the diversity that exists in mobile devices and their platforms with variations in capabilities present unique challenges in developing services that can accommodate such diversity. Recent years have witnessed the rise of user-facing service developments that can be consumed on the go with standard interface, such as RESTful Web services. However, the discovery of such services does not match their growing popularity. In addition, existing discovery approaches lack supporting mechanisms that ensure the proper functioning of discovered services within the user context and failing to match personal preferences. This paper introduces personalized Web service discovery for mobile environments. Preliminary results show that incorporating user preferences and context significantly improves the overall precision of service discovery.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128753153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}