Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.76
Sean S. E. Thorpe, Tyrone Grandison, Arnett Campbell, Janet Williams, K. Burrell, I. Ray
Cloud computing log digital investigations relate to the investigation of a potential crime using the digital forensic evidence from a virtual machine (VM) host operating system using the hypervisor event logs. In cloud digital log forensics, work on the forensic reconstruction of evidence on VM hosts system is required, but with the heterogeneous complexity involved with an enterprise's private cloud not to mention public cloud distributed environments, a possible Web Services-centric approach may be required for such log supported investigations. A data cloud log forensics service oriented architecture (SOA) audit framework for this type of forensic examination needs to allow for the reconstruction of transactions spanning multiple VM hosts, platforms and applications. This paper explores the requirements of a cloud log forensics SOA framework for performing effective digital investigation examinations in these abstract web services environments. This framework will be necessary in order to develop investigative and forensic auditing tools and techniques for use in cloud based log-centric SOAs.
{"title":"Towards a Forensic-Based Service Oriented Architecture Framework for Auditing of Cloud Logs","authors":"Sean S. E. Thorpe, Tyrone Grandison, Arnett Campbell, Janet Williams, K. Burrell, I. Ray","doi":"10.1109/SERVICES.2013.76","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.76","url":null,"abstract":"Cloud computing log digital investigations relate to the investigation of a potential crime using the digital forensic evidence from a virtual machine (VM) host operating system using the hypervisor event logs. In cloud digital log forensics, work on the forensic reconstruction of evidence on VM hosts system is required, but with the heterogeneous complexity involved with an enterprise's private cloud not to mention public cloud distributed environments, a possible Web Services-centric approach may be required for such log supported investigations. A data cloud log forensics service oriented architecture (SOA) audit framework for this type of forensic examination needs to allow for the reconstruction of transactions spanning multiple VM hosts, platforms and applications. This paper explores the requirements of a cloud log forensics SOA framework for performing effective digital investigation examinations in these abstract web services environments. This framework will be necessary in order to develop investigative and forensic auditing tools and techniques for use in cloud based log-centric SOAs.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117067069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.64
Jia Zhang, P. Votava, Tsengdar J. Lee, Owen Chu, Clyde Li, David Liu, K. Liu, Norman Xin, R. Nemani
NASA Earth Exchange (NEX) is a collaboration platform whose goal is to accelerate Earth science research, by leveraging NASA's vast collections of global satellite data together with access to NASA's High-End Computing (HEC) facilities. NEX also aims to facilitate the sharing of experimental results as well as scientific processes (workflows) with the Earth science community through integration with VisTrails workflow management system. While VisTrails is used internally, it is not easily accessible from remote computers without directly logging into the NASA HEC systems through twofactor authentication and a bastion host. This paper describes the initial design of an extensible architecture that facilitates easier workflow interaction on NEX, by enabling users to develop and execute workflows in a supercomputing environment directly from their local VisTrails installation. This architecture helps domain scientists seamlessly leverage distributed computing and storage resources and it is potentially applicable to other scientific workflow management software. We further describe the architecture of the VisTrails-HEC plugin (as well as the VisTrails-Amazon plugin) and the implementation of a working prototype to demonstrate the feasibility of our solution.
{"title":"Bridging VisTrails Scientific Workflow Management System to High Performance Computing","authors":"Jia Zhang, P. Votava, Tsengdar J. Lee, Owen Chu, Clyde Li, David Liu, K. Liu, Norman Xin, R. Nemani","doi":"10.1109/SERVICES.2013.64","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.64","url":null,"abstract":"NASA Earth Exchange (NEX) is a collaboration platform whose goal is to accelerate Earth science research, by leveraging NASA's vast collections of global satellite data together with access to NASA's High-End Computing (HEC) facilities. NEX also aims to facilitate the sharing of experimental results as well as scientific processes (workflows) with the Earth science community through integration with VisTrails workflow management system. While VisTrails is used internally, it is not easily accessible from remote computers without directly logging into the NASA HEC systems through twofactor authentication and a bastion host. This paper describes the initial design of an extensible architecture that facilitates easier workflow interaction on NEX, by enabling users to develop and execute workflows in a supercomputing environment directly from their local VisTrails installation. This architecture helps domain scientists seamlessly leverage distributed computing and storage resources and it is potentially applicable to other scientific workflow management software. We further describe the architecture of the VisTrails-HEC plugin (as well as the VisTrails-Amazon plugin) and the implementation of a working prototype to demonstrate the feasibility of our solution.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115657547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.67
Jianhua Zheng, Liang-Jie Zhang, Rong Zhu, Ke Ning, Dong Liu
Matrix multiplication is used in a variety of applications. It requires a lot of computation time especially for large-scale matrices. Parallel processing is a good choice for matrix multiplication operation. To overcome the efficiencies of existing algorithms for parallel matrix multiplication, a matrix multiplication processing scheme based on vector linear combination (VLC) was presented. The VLC scheme splits the matrix multiplication procedure into two steps. The first step obtains the weighted vectors by scalar multiplication. The second step gets the final result through a linear combination of the weighted vectors with identical row numbers. We present parallel matrix multiplication implementations using MapReduce (MR) based on VLC scheme and explain in detail the MR job. The map method receives the matrix input and generates intermediate (key, value) pairs according to the VLC scheme requirement. The reduce method conducts the scalar multiplication and vectors summation. In the end, the reduce method outputs the result in the way of row vector. Then performance theoretical analysis and experiment result comparing with other algorithms are proposed. Algorithm presented in this paper needs less computation time than other algorithms. Finally, we conclude the paper and propose future works.
{"title":"Parallel Matrix Multiplication Algorithm Based on Vector Linear Combination Using MapReduce","authors":"Jianhua Zheng, Liang-Jie Zhang, Rong Zhu, Ke Ning, Dong Liu","doi":"10.1109/SERVICES.2013.67","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.67","url":null,"abstract":"Matrix multiplication is used in a variety of applications. It requires a lot of computation time especially for large-scale matrices. Parallel processing is a good choice for matrix multiplication operation. To overcome the efficiencies of existing algorithms for parallel matrix multiplication, a matrix multiplication processing scheme based on vector linear combination (VLC) was presented. The VLC scheme splits the matrix multiplication procedure into two steps. The first step obtains the weighted vectors by scalar multiplication. The second step gets the final result through a linear combination of the weighted vectors with identical row numbers. We present parallel matrix multiplication implementations using MapReduce (MR) based on VLC scheme and explain in detail the MR job. The map method receives the matrix input and generates intermediate (key, value) pairs according to the VLC scheme requirement. The reduce method conducts the scalar multiplication and vectors summation. In the end, the reduce method outputs the result in the way of row vector. Then performance theoretical analysis and experiment result comparing with other algorithms are proposed. Algorithm presented in this paper needs less computation time than other algorithms. Finally, we conclude the paper and propose future works.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115007798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.17
Samuel Paul Kaluvuri, M. Bezzi, Y. Roudier
Solutions based on service-oriented architecture are gaining popularity. However a wider adoption, especially for business critical functions, is hampered by the trust deficit that exists between consumers and providers, as consumers are shielded from the service architectures and the operation of the service itself. Security certification can be used as a means to bridge this trust deficit. Common Criteria for Information Technology Evaluation (CC) is a widely recognized and used security certification scheme. However, the CC scheme was tailored to provide assurance for traditional software provisioning models and hence cannot be applied to SOA solutions as is. In this paper, we present the limitations of the CC scheme when applied in SOA, the challenges that must be overcome for its adoption and possible directions through which some of those challenges can be met. In particular, we point out that CC scheme should be extended to allow for dynamic evaluation of deployed systems (which includes the operational environment) and for handling assurance of composite services.
基于面向服务的体系结构的解决方案越来越受欢迎。然而,由于消费者不受服务体系结构和服务本身的操作的影响,消费者和提供者之间存在信任赤字,从而阻碍了更广泛的采用,特别是对于业务关键功能。安全认证可以作为弥补这种信任缺陷的一种手段。CC (Common Criteria for Information Technology Evaluation)是一种被广泛认可和使用的安全认证方案。然而,CC方案是为传统的软件供应模型提供保证而定制的,因此不能按原样应用于SOA解决方案。在本文中,我们介绍了在SOA中应用CC模式时的局限性、采用CC模式必须克服的挑战,以及应对其中一些挑战的可能方向。特别地,我们指出CC方案应该扩展到允许对部署的系统(包括操作环境)进行动态评估,并处理复合服务的保证。
{"title":"Bringing Common Criteria Certification to Web Services","authors":"Samuel Paul Kaluvuri, M. Bezzi, Y. Roudier","doi":"10.1109/SERVICES.2013.17","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.17","url":null,"abstract":"Solutions based on service-oriented architecture are gaining popularity. However a wider adoption, especially for business critical functions, is hampered by the trust deficit that exists between consumers and providers, as consumers are shielded from the service architectures and the operation of the service itself. Security certification can be used as a means to bridge this trust deficit. Common Criteria for Information Technology Evaluation (CC) is a widely recognized and used security certification scheme. However, the CC scheme was tailored to provide assurance for traditional software provisioning models and hence cannot be applied to SOA solutions as is. In this paper, we present the limitations of the CC scheme when applied in SOA, the challenges that must be overcome for its adoption and possible directions through which some of those challenges can be met. In particular, we point out that CC scheme should be extended to allow for dynamic evaluation of deployed systems (which includes the operational environment) and for handling assurance of composite services.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"19 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129889683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.48
Lijuan Wang, Jun Shen, G. Beydoun
Huge collections of data have been created in recent years. Cloud computing has been widely accepted as the next-generation solution to addressing data-proliferation problems. Because of the explosion in digital data and the distributed nature of the cloud, as well as the increasingly large number of providers in the market, providing efficient cost models for composing data-intensive services will become central to this dynamic market. The location of users, service composers, service providers, and data providers will affect the total cost of service provision. Different providers will need to make decisions about how to price and pay for resources. Each of them wants to maximize its profit as well as retain its position in the marketplace. Based on our earlier work, this paper addresses the effect of data intensity and the communication cost of mass data transfer on service composition, and proposes a service selection algorithm based on an enhanced ant colony system for data-intensive service provision. In this paper, the data-intensive service composition problem is modeled as an AND/OR graph, which is not only able to deal with sequence relations and switch relations, but is also able to deal with parallel relations between services. In addition, the performance of the service selection algorithm is evaluated by simulations.
{"title":"Enhanced Ant Colony Algorithm for Cost-Aware Data-Intensive Service Provision","authors":"Lijuan Wang, Jun Shen, G. Beydoun","doi":"10.1109/SERVICES.2013.48","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.48","url":null,"abstract":"Huge collections of data have been created in recent years. Cloud computing has been widely accepted as the next-generation solution to addressing data-proliferation problems. Because of the explosion in digital data and the distributed nature of the cloud, as well as the increasingly large number of providers in the market, providing efficient cost models for composing data-intensive services will become central to this dynamic market. The location of users, service composers, service providers, and data providers will affect the total cost of service provision. Different providers will need to make decisions about how to price and pay for resources. Each of them wants to maximize its profit as well as retain its position in the marketplace. Based on our earlier work, this paper addresses the effect of data intensity and the communication cost of mass data transfer on service composition, and proposes a service selection algorithm based on an enhanced ant colony system for data-intensive service provision. In this paper, the data-intensive service composition problem is modeled as an AND/OR graph, which is not only able to deal with sequence relations and switch relations, but is also able to deal with parallel relations between services. In addition, the performance of the service selection algorithm is evaluated by simulations.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132093295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.54
Hongbin Lu, Mark Shtern, B. Simmons, Michael Smit, Marin Litoiu
This paper presents a flexible deployment service for cloud computing. The service facilitates the specification and the execution of cloud deployment plans for applications. An application is described through a pattern, an abstract view that captures the logical view of the application and its mapping into cloud resources. The services instantiate the pattern in the cloud and allows for runtime updates of the deployment. The service is accessible through a RESTful interface. We identify the requirements for the service, describe its interfaces and show several case studies that capture the main features of the service.
{"title":"Pattern-Based Deployment Service for Next Generation Clouds","authors":"Hongbin Lu, Mark Shtern, B. Simmons, Michael Smit, Marin Litoiu","doi":"10.1109/SERVICES.2013.54","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.54","url":null,"abstract":"This paper presents a flexible deployment service for cloud computing. The service facilitates the specification and the execution of cloud deployment plans for applications. An application is described through a pattern, an abstract view that captures the logical view of the application and its mapping into cloud resources. The services instantiate the pattern in the cloud and allows for runtime updates of the deployment. The service is accessible through a RESTful interface. We identify the requirements for the service, describe its interfaces and show several case studies that capture the main features of the service.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130049674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.80
Desheng Li, Lianwen Jin, Yin Zhang
In this paper, we present a new Handwriting Recognition Platform as a Service (HRPaaS) using cloud infrastructure as a service(IaaS), middleware, and HTTP application programming interface (API) technologies. Based on the OpenStack cloud IaaS architecture, a handwriting recognition HTTPAPI service is designed to provide a highly reliable, real-time, customized handwriting character recognition service for application developers. Using middleware and cloud computing technologies, the computing resources, HTTPAPI response service pool, and backend handwriting recognition service pool can be loosely coupled and integrated to achieve fast and flexible deployment of the HRPaaS.
{"title":"HRPaaS: A Handwriting Recognition Platform as a Service Based on Middleware and the HTTP API","authors":"Desheng Li, Lianwen Jin, Yin Zhang","doi":"10.1109/SERVICES.2013.80","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.80","url":null,"abstract":"In this paper, we present a new Handwriting Recognition Platform as a Service (HRPaaS) using cloud infrastructure as a service(IaaS), middleware, and HTTP application programming interface (API) technologies. Based on the OpenStack cloud IaaS architecture, a handwriting recognition HTTPAPI service is designed to provide a highly reliable, real-time, customized handwriting character recognition service for application developers. Using middleware and cloud computing technologies, the computing resources, HTTPAPI response service pool, and backend handwriting recognition service pool can be loosely coupled and integrated to achieve fast and flexible deployment of the HRPaaS.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114281985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.28
Y. Badr, S. Banerjee
Service-oriented architectures are increasingly deployed in open, distributed and dynamic environments, which require an end-to-end security awareness security at each phase of the service's lifecycle. Moreover, the security should not only focus on services without considering the risks and threats that might be caused by elements from business activities or underlying hardware and software infrastructure. In this paper, we adopt a holistic approach to define a security conceptual model that covers all elements at the business, service and infrastructure levels and guides each phase in a typical design method for service-oriented architectures. Since the information security is subject to uncertain and unforeseen threats, we propose a fuzzy logic decision system that helps identify security risks based on the security conceptual model and select appropriate security measures based on security objectives.
{"title":"Managing End-to-End Security Risks with Fuzzy Logic in Service-Oriented Architectures","authors":"Y. Badr, S. Banerjee","doi":"10.1109/SERVICES.2013.28","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.28","url":null,"abstract":"Service-oriented architectures are increasingly deployed in open, distributed and dynamic environments, which require an end-to-end security awareness security at each phase of the service's lifecycle. Moreover, the security should not only focus on services without considering the risks and threats that might be caused by elements from business activities or underlying hardware and software infrastructure. In this paper, we adopt a holistic approach to define a security conceptual model that covers all elements at the business, service and infrastructure levels and guides each phase in a typical design method for service-oriented architectures. Since the information security is subject to uncertain and unforeseen threats, we propose a fuzzy logic decision system that helps identify security risks based on the security conceptual model and select appropriate security measures based on security objectives.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114639799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.14
Javier Espinar, A. Maña, Hristo Koshutanski
The concept of Dynamic Coalitions (DCs) provides a scalable approach for service-based business integration suitable to Small and Medium-size Enterprises (SMEs). An outcome of a DC model is a composite service offered to a market place. The notion of security-by-design certified coalition enables coalition designers/owners to request a certification authority to certify whether the coalition workflow design supports certain security properties of interest by stipulating the security properties individual services have to conform to. This paper presents an approach based on a novel Highly Dynamic Coalition (HDC) concept able to provide workflow operation assurance for security-by-design certified service-based coalitions. Certified HDC models can become an enabler for SMEs to participate in coalition formations guaranteeing a certified level of security. Users of HDC-based services will have assurance for the properties preserved during coalition operation, while service providers will have assurance in providing services during HDC formations and partners' selection phases. We will show how workflow operation assurance is realized by means of service security certificates developed in ASSERT4SOA project.
{"title":"Workflow Operational Assurance Platform for Security-by-Design Certified Service-Based Coalitions","authors":"Javier Espinar, A. Maña, Hristo Koshutanski","doi":"10.1109/SERVICES.2013.14","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.14","url":null,"abstract":"The concept of Dynamic Coalitions (DCs) provides a scalable approach for service-based business integration suitable to Small and Medium-size Enterprises (SMEs). An outcome of a DC model is a composite service offered to a market place. The notion of security-by-design certified coalition enables coalition designers/owners to request a certification authority to certify whether the coalition workflow design supports certain security properties of interest by stipulating the security properties individual services have to conform to. This paper presents an approach based on a novel Highly Dynamic Coalition (HDC) concept able to provide workflow operation assurance for security-by-design certified service-based coalitions. Certified HDC models can become an enabler for SMEs to participate in coalition formations guaranteeing a certified level of security. Users of HDC-based services will have assurance for the properties preserved during coalition operation, while service providers will have assurance in providing services during HDC formations and partners' selection phases. We will show how workflow operation assurance is realized by means of service security certificates developed in ASSERT4SOA project.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132540098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-28DOI: 10.1109/SERVICES.2013.18
Khalid Elgazzar, Patrick Martin, H. Hassanein
Mobile devices with their various form factors have become the most convenient and pervasive computing platform, whether to carry out everyday business or to get online. Mobile users tend to adopt the fast food trend even in consuming online mobile services and functionalities. The Web service approach promises great flexibility in offering software functionality over the network, while maintaining interoperability between heterogeneous platforms. However, the diversity that exists in mobile devices and their platforms with variations in capabilities present unique challenges in developing services that can accommodate such diversity. Recent years have witnessed the rise of user-facing service developments that can be consumed on the go with standard interface, such as RESTful Web services. However, the discovery of such services does not match their growing popularity. In addition, existing discovery approaches lack supporting mechanisms that ensure the proper functioning of discovered services within the user context and failing to match personal preferences. This paper introduces personalized Web service discovery for mobile environments. Preliminary results show that incorporating user preferences and context significantly improves the overall precision of service discovery.
{"title":"Personalized Mobile Web Service Discovery","authors":"Khalid Elgazzar, Patrick Martin, H. Hassanein","doi":"10.1109/SERVICES.2013.18","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.18","url":null,"abstract":"Mobile devices with their various form factors have become the most convenient and pervasive computing platform, whether to carry out everyday business or to get online. Mobile users tend to adopt the fast food trend even in consuming online mobile services and functionalities. The Web service approach promises great flexibility in offering software functionality over the network, while maintaining interoperability between heterogeneous platforms. However, the diversity that exists in mobile devices and their platforms with variations in capabilities present unique challenges in developing services that can accommodate such diversity. Recent years have witnessed the rise of user-facing service developments that can be consumed on the go with standard interface, such as RESTful Web services. However, the discovery of such services does not match their growing popularity. In addition, existing discovery approaches lack supporting mechanisms that ensure the proper functioning of discovered services within the user context and failing to match personal preferences. This paper introduces personalized Web service discovery for mobile environments. Preliminary results show that incorporating user preferences and context significantly improves the overall precision of service discovery.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128753153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}