Computing environments are evolving from mainframe systems to distributed systems. Stand-alone programs that have been developed using object-oriented technology are not suitable for these new environments. However, programs that have been developed using a component-based technology have proven to be more suitable for the new environments due to their granularity and reusability. In this paper, we present a reengineering process for migrating from an object-oriented legacy system to a component-based system. This process consists of two steps: first, to create basic components with the relationship of their constituent classes, second, to refine components using the metrics we propose.
{"title":"A reengineering process for migrating from an object-oriented legacy system to a component-based system","authors":"Eunjoo Lee, Byungjeong Lee, Woochang Shin, Chisu Wu","doi":"10.1109/CMPSAC.2003.1245362","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245362","url":null,"abstract":"Computing environments are evolving from mainframe systems to distributed systems. Stand-alone programs that have been developed using object-oriented technology are not suitable for these new environments. However, programs that have been developed using a component-based technology have proven to be more suitable for the new environments due to their granularity and reusability. In this paper, we present a reengineering process for migrating from an object-oriented legacy system to a component-based system. This process consists of two steps: first, to create basic components with the relationship of their constituent classes, second, to refine components using the metrics we propose.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131875341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-11-03DOI: 10.1109/CMPSAC.2003.1245325
R. Montanari, G. Tonti, C. Stefanelli
The convergence between the Internet and telecommunication systems promotes an integrated scenario characterized by different flavors of mobility. Users can connect to the network from ubiquitous points of attachment and wireless portable devices can roam by maintaining continuous connectivity. Novel middleware technologies based on code mobility has the potential to enhance service provisioning to mobile users/devices. However, code mobility adds complexity to the design of applications and calls for new approaches for the programming of code mobility strategies. Separation between mobility and computational concerns is crucial to reduce the complexity of code mobility control and to favor rapid mobile code-based service prototyping, run-time configuration and maintenance. To achieve the needed degree of separation of concerns the paper advocates the adoption of policies and proposes a policy-based framework for dynamic code mobility management. In addition, the paper explores a reflective-based approach to mobility control and compares policy with reflective-based programming solutions to point out the main differences and lessons learned.
{"title":"Policy-based separation of concerns for dynamic code mobility management","authors":"R. Montanari, G. Tonti, C. Stefanelli","doi":"10.1109/CMPSAC.2003.1245325","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245325","url":null,"abstract":"The convergence between the Internet and telecommunication systems promotes an integrated scenario characterized by different flavors of mobility. Users can connect to the network from ubiquitous points of attachment and wireless portable devices can roam by maintaining continuous connectivity. Novel middleware technologies based on code mobility has the potential to enhance service provisioning to mobile users/devices. However, code mobility adds complexity to the design of applications and calls for new approaches for the programming of code mobility strategies. Separation between mobility and computational concerns is crucial to reduce the complexity of code mobility control and to favor rapid mobile code-based service prototyping, run-time configuration and maintenance. To achieve the needed degree of separation of concerns the paper advocates the adoption of policies and proposes a policy-based framework for dynamic code mobility management. In addition, the paper explores a reflective-based approach to mobility control and compares policy with reflective-based programming solutions to point out the main differences and lessons learned.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116154550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-11-03DOI: 10.1109/CMPSAC.2003.1245393
Dean Kuo, A. Fekete, P. Greenfield, Julian Jang, D. Palmer
One important trend in enterprise-scale IT has been the increasing use of business-business integration (B2Bi) technologies to automate business processes that cross organizational boundaries, such as the interactions between partner companies along a supply chain. It is relatively easy to describe a pattern of interaction, or choreography, in the case where everything proceeds smoothly. However, the abnormal cases, such as where a process fails or a message is lost, are much more complicated, and risk introducing data and process inconsistencies into computer-based systems. Current B2Bi technologies do not supply an infrastructure that can provide reliability without considerable sophistication from the architects and developers. As a first step towards guiding architects to the design of B2Bi systems that maintain consistency despite failures, this paper describes a variety of types of failure that can arise in practice, based on a realistic e-procurement scenario. We describe these failures in terms of the different types of state that naturally occur within the distributed system. Understanding the types of failure that need to be handled, or prevented, is essential to an architect or developer who must design and write handlers for all the exceptions that can occur in their workflows.
{"title":"Just what could possibly go wrong in B2B integration?","authors":"Dean Kuo, A. Fekete, P. Greenfield, Julian Jang, D. Palmer","doi":"10.1109/CMPSAC.2003.1245393","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245393","url":null,"abstract":"One important trend in enterprise-scale IT has been the increasing use of business-business integration (B2Bi) technologies to automate business processes that cross organizational boundaries, such as the interactions between partner companies along a supply chain. It is relatively easy to describe a pattern of interaction, or choreography, in the case where everything proceeds smoothly. However, the abnormal cases, such as where a process fails or a message is lost, are much more complicated, and risk introducing data and process inconsistencies into computer-based systems. Current B2Bi technologies do not supply an infrastructure that can provide reliability without considerable sophistication from the architects and developers. As a first step towards guiding architects to the design of B2Bi systems that maintain consistency despite failures, this paper describes a variety of types of failure that can arise in practice, based on a realistic e-procurement scenario. We describe these failures in terms of the different types of state that naturally occur within the distributed system. Understanding the types of failure that need to be handled, or prevented, is essential to an architect or developer who must design and write handlers for all the exceptions that can occur in their workflows.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"8 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123725411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-11-03DOI: 10.1109/CMPSAC.2003.1245364
G. D. Lucca, A. R. Fasolino, Porfirio Tramontana, U. D. Carlini
The growing market request for Web applications is forcing software industries to produce applications under the pressure of a short time-to-market and a strong competition, with the consequence that low quality and poor documented software is often produced. Maintaining, evolving or comprehending these applications are not straightforward tasks, and reverse engineering processes should be defined and validated to support them. In this paper a reverse engineering approach for reconstructing an object-oriented conceptual model of the application domain of a Web application is presented. The proposed approach defines a process that reconstructs the model in three steps. In each step, heuristic criteria exploiting source code analysis are used for the identification of objects and their relationships. Tools for implementing this method have been produced, and experiments for validating it have been carried out with the support of case studies. Experimental results showed the feasibility and the effectiveness of the proposed approach.
{"title":"Recovering a business object model from a Web applications","authors":"G. D. Lucca, A. R. Fasolino, Porfirio Tramontana, U. D. Carlini","doi":"10.1109/CMPSAC.2003.1245364","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245364","url":null,"abstract":"The growing market request for Web applications is forcing software industries to produce applications under the pressure of a short time-to-market and a strong competition, with the consequence that low quality and poor documented software is often produced. Maintaining, evolving or comprehending these applications are not straightforward tasks, and reverse engineering processes should be defined and validated to support them. In this paper a reverse engineering approach for reconstructing an object-oriented conceptual model of the application domain of a Web application is presented. The proposed approach defines a process that reconstructs the model in three steps. In each step, heuristic criteria exploiting source code analysis are used for the identification of objects and their relationships. Tools for implementing this method have been produced, and experiments for validating it have been carried out with the support of case studies. Experimental results showed the feasibility and the effectiveness of the proposed approach.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124794678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-11-03DOI: 10.1109/CMPSAC.2003.1245368
I. Kotsiopoulos, J. Keane, M. Turner, P. Layzell, F. Zhu
Effective use of heterogeneous, distributed information in a coherent, integrated fashion has long been a "holy grail". The UK Health and Social care domain is an example where a global view is needed to facilitate decision making, whilst having ethical and legal concerns. The IBHIS project aims to provide an integrated broker that enables coherent use of a set of distributed, heterogeneous data sources, whilst ensuring trustworthiness and audit. This paper presents a service-oriented federated architecture for the IBHIS broker.
{"title":"IBHIS: integration broker for heterogeneous information sources","authors":"I. Kotsiopoulos, J. Keane, M. Turner, P. Layzell, F. Zhu","doi":"10.1109/CMPSAC.2003.1245368","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245368","url":null,"abstract":"Effective use of heterogeneous, distributed information in a coherent, integrated fashion has long been a \"holy grail\". The UK Health and Social care domain is an example where a global view is needed to facilitate decision making, whilst having ethical and legal concerns. The IBHIS project aims to provide an integrated broker that enables coherent use of a set of distributed, heterogeneous data sources, whilst ensuring trustworthiness and audit. This paper presents a service-oriented federated architecture for the IBHIS broker.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121152791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-11-03DOI: 10.1109/CMPSAC.2003.1245327
R. Walters
RDT is a graphical formal modeling language in which the modeler works by constructing diagrams of the processes in their model which they join together to form complete systems. Aside from the benefits which accrue as a side effect of building a formal model of a proposed systems, these diagrammatic models can be useful as a means of communication between the development team and the users. However one of the greatest benefits of a formal model is that it can be subjected to rigorous examination to ensure that it satisfies properties required of the system. This paper describes the transformation used by the RDT toolset to generate Promela code (the input language of the SPIN model-checker) automatically from a model.
{"title":"Automating checking of models built using a graphically based formal modeling language","authors":"R. Walters","doi":"10.1109/CMPSAC.2003.1245327","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245327","url":null,"abstract":"RDT is a graphical formal modeling language in which the modeler works by constructing diagrams of the processes in their model which they join together to form complete systems. Aside from the benefits which accrue as a side effect of building a formal model of a proposed systems, these diagrammatic models can be useful as a means of communication between the development team and the users. However one of the greatest benefits of a formal model is that it can be subjected to rigorous examination to ensure that it satisfies properties required of the system. This paper describes the transformation used by the RDT toolset to generate Promela code (the input language of the SPIN model-checker) automatically from a model.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124140628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-11-03DOI: 10.1109/CMPSAC.2003.1245413
Xiangzhu Gao, S. Murugesan, Bruce W. N. Lo
In conventional information retrieval (IR), documents in a collection are indexed before the retrieval process, and the document collection is generally static, organised and homogeneous. But, information on the Web is vast, dynamic, unorganised and heterogeneous. Current search engines and IR systems on the Web are based on the conventional indexing approach and have limitations including the need for frequent update of the index. We propose a non-indexing approach for information retrieval on the Web and show that the IR system based on this approach performs better than popular search engines.
{"title":"A dynamic information retrieval system for the Web","authors":"Xiangzhu Gao, S. Murugesan, Bruce W. N. Lo","doi":"10.1109/CMPSAC.2003.1245413","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245413","url":null,"abstract":"In conventional information retrieval (IR), documents in a collection are indexed before the retrieval process, and the document collection is generally static, organised and homogeneous. But, information on the Web is vast, dynamic, unorganised and heterogeneous. Current search engines and IR systems on the Web are based on the conventional indexing approach and have limitations including the need for frequent update of the index. We propose a non-indexing approach for information retrieval on the Web and show that the IR system based on this approach performs better than popular search engines.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126877195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-11-03DOI: 10.1109/CMPSAC.2003.1245416
C. Boldyreff, J. Brittle, C. Korhonen, Phyo Kyaw, J. Lavery, D. Nutter, S. Rank
There has been a long history of CASE tool development, with an underlying software repository at the heart of most systems. Usually such tools, even the more recently web-based systems, are focused on supporting individual projects within an enterprise or across a number of distributed sites. Little support for maintaining large heterogeneous collections of software artefacts across a number of projects has been developed. Within the GENESIS project, this has been a key consideration in the development of the Open Source Component Artefact Repository (OSCAR). Its most recent extensions are explicitly addressing the provision of cross project global views of large software collections as well as historical views of individual artefacts within a collection. The long-term benefits of such support can only be realised if OSCAR is widely adopted and various steps to facilitate this are described.
{"title":"Web-based support for managing large collections of software artefacts","authors":"C. Boldyreff, J. Brittle, C. Korhonen, Phyo Kyaw, J. Lavery, D. Nutter, S. Rank","doi":"10.1109/CMPSAC.2003.1245416","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245416","url":null,"abstract":"There has been a long history of CASE tool development, with an underlying software repository at the heart of most systems. Usually such tools, even the more recently web-based systems, are focused on supporting individual projects within an enterprise or across a number of distributed sites. Little support for maintaining large heterogeneous collections of software artefacts across a number of projects has been developed. Within the GENESIS project, this has been a key consideration in the development of the Open Source Component Artefact Repository (OSCAR). Its most recent extensions are explicitly addressing the provision of cross project global views of large software collections as well as historical views of individual artefacts within a collection. The long-term benefits of such support can only be realised if OSCAR is widely adopted and various steps to facilitate this are described.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128083126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-11-03DOI: 10.1109/CMPSAC.2003.1245418
Qingkai Ma, Wei Hao, Wei Li, Manghui Tu, I. Yen
Many agent-based systems have been developed over the past decade; however, the security issues are usually not addressed adequately. In order to make the mobile agent paradigm more useful and acceptable for Web and Internet applications, the security considerations should go beyond the protection of basic agent execution environments. In this paper, we present the design of a robust Java-based mobile agent system, PeAgent. The PeAgent system not only incorporates a fine-grain agent privilege control mechanism, but also includes a multi-level protection mechanism that can be used throughout the life-cycle of agents. A two-level domain hierarchy is constructed to organize the large number of Internet nodes in the agent system into manageable units: the global/domain management unit (GMU/DMU). Each unit consists of a certification authority (CA) and a location manager (LM). The certificates issued from GMU and DMU define the access privileges on the PeAgent servers for each agent. A context hierarchy is built up on the PeAgent servers for fine-level resource access control and agent management. Overall, the PeAgent system provides a secure computing environment for widely distributed applications over a network of heterogeneous platforms. It also facilitates the development of secure Web-based applications.
{"title":"PeAgent - a mobile agent system to support secure Internet and Web applications","authors":"Qingkai Ma, Wei Hao, Wei Li, Manghui Tu, I. Yen","doi":"10.1109/CMPSAC.2003.1245418","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245418","url":null,"abstract":"Many agent-based systems have been developed over the past decade; however, the security issues are usually not addressed adequately. In order to make the mobile agent paradigm more useful and acceptable for Web and Internet applications, the security considerations should go beyond the protection of basic agent execution environments. In this paper, we present the design of a robust Java-based mobile agent system, PeAgent. The PeAgent system not only incorporates a fine-grain agent privilege control mechanism, but also includes a multi-level protection mechanism that can be used throughout the life-cycle of agents. A two-level domain hierarchy is constructed to organize the large number of Internet nodes in the agent system into manageable units: the global/domain management unit (GMU/DMU). Each unit consists of a certification authority (CA) and a location manager (LM). The certificates issued from GMU and DMU define the access privileges on the PeAgent servers for each agent. A context hierarchy is built up on the PeAgent servers for fine-level resource access control and agent management. Overall, the PeAgent system provides a secure computing environment for widely distributed applications over a network of heterogeneous platforms. It also facilitates the development of secure Web-based applications.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"9 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133205149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-11-03DOI: 10.1109/CMPSAC.2003.1245315
S. Yau, Xinyu Zhang
Secure group communication in mobile ad hoc networks is often dynamic and impromptu, and thus requires efficient and automated secure group management and seamless and combination of secure groups with distributed applications running upon them. Existing approaches to secure group communication cannot satisfy these requirements. In this paper, an automated secure group management approach is presented. Based on this approach, a middleware service for secure group communication is developed to facilitate development and execution of distributed applications using secure group communication in mobile ad hoc networks. This middleware service is implemented in a context sensitive middleware RSCM.
{"title":"A middleware service for secure group communication in mobile ad hoc networks","authors":"S. Yau, Xinyu Zhang","doi":"10.1109/CMPSAC.2003.1245315","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245315","url":null,"abstract":"Secure group communication in mobile ad hoc networks is often dynamic and impromptu, and thus requires efficient and automated secure group management and seamless and combination of secure groups with distributed applications running upon them. Existing approaches to secure group communication cannot satisfy these requirements. In this paper, an automated secure group management approach is presented. Based on this approach, a middleware service for secure group communication is developed to facilitate development and execution of distributed applications using secure group communication in mobile ad hoc networks. This middleware service is implemented in a context sensitive middleware RSCM.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133880398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}