Internet technology has given rise to virtual markets on which customers and service providers can deal business transactions being located at places that could be geographically located far apart. In such markets, customers and service providers may not be aware of each other but are required to transact business based on trust which is definitely difficult to assess because in virtual markets, direct application of traditional methods for trust assessments do not work. Trust assessment for Web services has become a hot research topic and all the reported work in literature propose methods that are customer centric. We propose an integrated approach that uses three trust metrics viz. feedback, recommendation and association. It is shown that not only customers but also business analysts and associated business partners can also play their roles in building trust on Web services.
{"title":"Trust Assessment in Web Services: an Extension to jUDDI","authors":"H. Mohanty, K. Prasad, R. Shyamasundar","doi":"10.1109/ICEBE.2007.99","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.99","url":null,"abstract":"Internet technology has given rise to virtual markets on which customers and service providers can deal business transactions being located at places that could be geographically located far apart. In such markets, customers and service providers may not be aware of each other but are required to transact business based on trust which is definitely difficult to assess because in virtual markets, direct application of traditional methods for trust assessments do not work. Trust assessment for Web services has become a hot research topic and all the reported work in literature propose methods that are customer centric. We propose an integrated approach that uses three trust metrics viz. feedback, recommendation and association. It is shown that not only customers but also business analysts and associated business partners can also play their roles in building trust on Web services.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121035528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper uncovers concealed relationships between trust and competitiveness. This study analyzes the effect of these factors on human online decision process and how they influence the business-to-consumer (B2C) outcome when they are used collectively. This research provides a toolset for users to gauge the level of trust and competitiveness of a Web site prior to their engagement in online decision-making process.
{"title":"The Contribution of Intelligent System in Forming Trust and Competitiveness during Online Transactions","authors":"Fahim Akhter","doi":"10.1109/ICEBE.2007.26","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.26","url":null,"abstract":"This paper uncovers concealed relationships between trust and competitiveness. This study analyzes the effect of these factors on human online decision process and how they influence the business-to-consumer (B2C) outcome when they are used collectively. This research provides a toolset for users to gauge the level of trust and competitiveness of a Web site prior to their engagement in online decision-making process.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121311773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Data mining and/or knowledge discovery is a very important part of today's e-business. The World Wide Web has become in reality, the largest online information available practically to anyone with access to Internet. An e-business framework is proposed in the paper, as well as the knowledge discovery technique to personalize e-business, increase cross selling, and improve the customer relationship management. Due to the enormous size of the Web and low precision of user queries, results returned from present Web search engines can reach hundreds or even thousands data. Therefore, finding the right information can be difficult if not impossible. One approach that tries to solve this problem is by using clustering techniques for grouping similar data together in order to facilitate presentation of results in more compact form and enable browsing of the results set. In this paper, a data clustering techniques is presented with emphasis on application to Web search results. An algorithm for clustering Web data based on Rough Set is presented and its practical implementation is discussed.
{"title":"A Rough Set Approach for Clustering the Data Using Knowledge Discovery in World Wide Web for E-Business","authors":"H. K. Tripathy, B. Tripathy","doi":"10.1109/ICEBE.2007.62","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.62","url":null,"abstract":"Data mining and/or knowledge discovery is a very important part of today's e-business. The World Wide Web has become in reality, the largest online information available practically to anyone with access to Internet. An e-business framework is proposed in the paper, as well as the knowledge discovery technique to personalize e-business, increase cross selling, and improve the customer relationship management. Due to the enormous size of the Web and low precision of user queries, results returned from present Web search engines can reach hundreds or even thousands data. Therefore, finding the right information can be difficult if not impossible. One approach that tries to solve this problem is by using clustering techniques for grouping similar data together in order to facilitate presentation of results in more compact form and enable browsing of the results set. In this paper, a data clustering techniques is presented with emphasis on application to Web search results. An algorithm for clustering Web data based on Rough Set is presented and its practical implementation is discussed.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130957721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Web Service has emerged as a dominant paradigm for distributed computing in industry as well as academia. Current Web service discovery methods are based on centralized approaches where Web services are identified based on service functionality. However, as the number of Web Services grows and becomes more dynamic, such a centralized approach quickly becomes impractical, which suffers from problems such as high operational and maintenance cost, single point of failure, and scalability. This paper proposes a semantic web based peer-to-peer architecture for building dynamic, scalable, decentralized service discovery and binding mechanism used for intelligent business process platform of Virtual Travel Agency. In addition, it integrates a scalable mechanism to rank Web services based on domain ontology and group ontology used for service publication, discovery and process generation. Finally, the performance analysis and evaluation of the method has been discussed and the prospects for the future research are presented.
{"title":"A Semantic Web Based Peer to Peer Service Discovery Mechanism for Intelligent Business Process","authors":"Desheng Li, Ru-zhi Xu, Haiyang Wang","doi":"10.1109/ICEBE.2007.83","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.83","url":null,"abstract":"Web Service has emerged as a dominant paradigm for distributed computing in industry as well as academia. Current Web service discovery methods are based on centralized approaches where Web services are identified based on service functionality. However, as the number of Web Services grows and becomes more dynamic, such a centralized approach quickly becomes impractical, which suffers from problems such as high operational and maintenance cost, single point of failure, and scalability. This paper proposes a semantic web based peer-to-peer architecture for building dynamic, scalable, decentralized service discovery and binding mechanism used for intelligent business process platform of Virtual Travel Agency. In addition, it integrates a scalable mechanism to rank Web services based on domain ontology and group ontology used for service publication, discovery and process generation. Finally, the performance analysis and evaluation of the method has been discussed and the prospects for the future research are presented.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115286309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Liangzhao Zeng, H. Lei, M. Dikun, Henry Chang, G. Xie
The service mediation that decouples service interactions is the foundation to support the service composition. The early service mediations are keyword and value-based, which require both service providers and consumers to adhere to the same data formats when defining service interfaces and requests. As such, these service mediations are inadequate for supporting interactions among services in heterogeneous and dynamic environments. In order to overcome this limitation, semantics are introduced into service mediations, for more flexible service matchings. In this paper, we present the design and implementation of a novel semantic service mediation system. Different from existing semantic service mediations, by understanding semantics of service requests and service interfaces, our system supports not only one-to-one service matchings, but also multiple-to-one service correlations. We argue that, by performing service correlation systematically as part of the service mediation, the system can free programmers from understanding extraordinary details of service interfaces when enabling service composition.
{"title":"The Design and Implementation of a Semantic Service Mediation System","authors":"Liangzhao Zeng, H. Lei, M. Dikun, Henry Chang, G. Xie","doi":"10.1109/ICEBE.2007.81","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.81","url":null,"abstract":"The service mediation that decouples service interactions is the foundation to support the service composition. The early service mediations are keyword and value-based, which require both service providers and consumers to adhere to the same data formats when defining service interfaces and requests. As such, these service mediations are inadequate for supporting interactions among services in heterogeneous and dynamic environments. In order to overcome this limitation, semantics are introduced into service mediations, for more flexible service matchings. In this paper, we present the design and implementation of a novel semantic service mediation system. Different from existing semantic service mediations, by understanding semantics of service requests and service interfaces, our system supports not only one-to-one service matchings, but also multiple-to-one service correlations. We argue that, by performing service correlation systematically as part of the service mediation, the system can free programmers from understanding extraordinary details of service interfaces when enabling service composition.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124863595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Due to the dramatic increase in intrusive activities architecture security analysis and design has emerged as an important aspect of the development of software services. It is a well-accepted fact in software engineering that security concerns like any other quality concerns should be dealt with in the early stages of software development. However, current software security risk analysis approaches still heavily rely on ad hoc techniques. These involve significant amount of subjective efforts creating greater potential for inaccuracies. In this paper, we propose a user system interaction effect (USIE) model that can be used systematically to derive and analyze security concerns from service-oriented software architectures. Many aspects of the model derivation and analysis can be automated, which limit the amount of user involvement, and thereby reduce the subjectivity underlying typical security risk analysis process. The model can be used as a foundation for systematic analysis of software services from different security perspectives.
{"title":"Systematic Security Analysis for Service-Oriented Software Architectures","authors":"Yanguo Liu, I. Traoré","doi":"10.1109/ICEBE.2007.84","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.84","url":null,"abstract":"Due to the dramatic increase in intrusive activities architecture security analysis and design has emerged as an important aspect of the development of software services. It is a well-accepted fact in software engineering that security concerns like any other quality concerns should be dealt with in the early stages of software development. However, current software security risk analysis approaches still heavily rely on ad hoc techniques. These involve significant amount of subjective efforts creating greater potential for inaccuracies. In this paper, we propose a user system interaction effect (USIE) model that can be used systematically to derive and analyze security concerns from service-oriented software architectures. Many aspects of the model derivation and analysis can be automated, which limit the amount of user involvement, and thereby reduce the subjectivity underlying typical security risk analysis process. The model can be used as a foundation for systematic analysis of software services from different security perspectives.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125258577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recently, there has been an increasing interest in RFlD (radio frequency identification) system and RFID systems have been applied to various applications. Load balancing is a fundamental technique for providing scalability of systems by moving workload from overloaded nodes to underloaded nodes. This paper presents a new load balancing approach by considering the unique features of RFID middlewares. In contrast to most of the existing approaches where independencies are assumed among jobs, applications in RFID middlewares have inter-dependencies due to RFID readers. Our approach incorporates such unique characteristics of RFID middlewares.
{"title":"A Dynamic Load Balancing Approach Based on the Standard RFID Middleware Architecture","authors":"Jaegeol Park, H. Chae, E. S. So","doi":"10.1109/ICEBE.2007.17","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.17","url":null,"abstract":"Recently, there has been an increasing interest in RFlD (radio frequency identification) system and RFID systems have been applied to various applications. Load balancing is a fundamental technique for providing scalability of systems by moving workload from overloaded nodes to underloaded nodes. This paper presents a new load balancing approach by considering the unique features of RFID middlewares. In contrast to most of the existing approaches where independencies are assumed among jobs, applications in RFID middlewares have inter-dependencies due to RFID readers. Our approach incorporates such unique characteristics of RFID middlewares.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128540477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile RFID systems are increasingly being deployed in industry and m-commerce. Due to the inherent limitations of mobile devices (PDAs, mobile phones, etc.) such as CPU speed, memory and storage capacity, special supports must be provided to utilize RFID in mobile devices. However, currently, most of organizations put their focuses on RFID middleware running on desktops or servers, while few attentions have been paid to mobile RFID middleware which allows for rapid prototyping and development of mobile RFID solutions. In this paper, we put forward a component-based, service-oriented architecture that provides developers with the possibility of constructing customized mobile RFID middleware to support different combinations of requirements. And we developed Mobile RFID service extension (MRSE), a RFID extension for OSGi platform.
{"title":"Design an OSGi Extension Service for Mobile RFID Applications","authors":"Jie Wu, Dong Wang, H. Sheng","doi":"10.1109/ICEBE.2007.41","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.41","url":null,"abstract":"Mobile RFID systems are increasingly being deployed in industry and m-commerce. Due to the inherent limitations of mobile devices (PDAs, mobile phones, etc.) such as CPU speed, memory and storage capacity, special supports must be provided to utilize RFID in mobile devices. However, currently, most of organizations put their focuses on RFID middleware running on desktops or servers, while few attentions have been paid to mobile RFID middleware which allows for rapid prototyping and development of mobile RFID solutions. In this paper, we put forward a component-based, service-oriented architecture that provides developers with the possibility of constructing customized mobile RFID middleware to support different combinations of requirements. And we developed Mobile RFID service extension (MRSE), a RFID extension for OSGi platform.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116686505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The network delays, failures and randomization make the composite web service system nondeterministic and difficult to be analyzed. However a probabilistic model can capture and abstract these sources of non-determinism more precisely and enable statistical analysis and simulations. We propose probabilistic rewrite theories as a general semantic framework supporting high level specification of probabilistic systems that can be massively concurrent. With the following two additional assertions, assumption and commitment, probabilistic rewrite theories facilitate reasoning about the composition and verification of services integration. The PMaude, a rewriting methodology based tool in which probabilistic formal modeling and analysis can be used from the earliest phases of nondeterministic system design to uncover many errors and inconsistencies, and to reach high assurance for critical composite web service system.
{"title":"A Rewriting Based Model for Nondeterministic Composite Web Service System","authors":"Junfeng Wu, Huai-kou Miao","doi":"10.1109/ICEBE.2007.30","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.30","url":null,"abstract":"The network delays, failures and randomization make the composite web service system nondeterministic and difficult to be analyzed. However a probabilistic model can capture and abstract these sources of non-determinism more precisely and enable statistical analysis and simulations. We propose probabilistic rewrite theories as a general semantic framework supporting high level specification of probabilistic systems that can be massively concurrent. With the following two additional assertions, assumption and commitment, probabilistic rewrite theories facilitate reasoning about the composition and verification of services integration. The PMaude, a rewriting methodology based tool in which probabilistic formal modeling and analysis can be used from the earliest phases of nondeterministic system design to uncover many errors and inconsistencies, and to reach high assurance for critical composite web service system.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116523945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Service-Oriented Computing (SOC) is becoming the dominating paradigm for software development in many areas, including e-business, robotics, gaming, and scientific computation. One of the key issues lagging behind is the education. In spite of significant progress in SOC applications, SOC education has not been taught in introductory classes. Existing SOC courses are graduate or senior-level courses in universities that require full programming background. While various issues regarding SOC are being explored and discussed, the issues for SOC education, especially at high school level, still remain uncultivated, which does not match up with the importance of SOC paradigm. Sponsored by U.S. Department of Education, the Computer Science & Engineering Department and the College of Education at Arizona State University, in cooperation with Scottsdale Unified School District and Coronado High School, we pioneered the first SOC course for high school students in Spring 2007. The same course was taught to high school teachers in summer 2007, and the service-oriented robotics development part was taught to high school students in a summer camp in 2007. This paper discusses the design of the course and reports the experience and lessons in teaching these classes.
{"title":"Designing a Service-Oriented Computing Course for High Schools","authors":"W. Tsai, Yinong Chen, Xin Sun","doi":"10.1109/ICEBE.2007.115","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.115","url":null,"abstract":"Service-Oriented Computing (SOC) is becoming the dominating paradigm for software development in many areas, including e-business, robotics, gaming, and scientific computation. One of the key issues lagging behind is the education. In spite of significant progress in SOC applications, SOC education has not been taught in introductory classes. Existing SOC courses are graduate or senior-level courses in universities that require full programming background. While various issues regarding SOC are being explored and discussed, the issues for SOC education, especially at high school level, still remain uncultivated, which does not match up with the importance of SOC paradigm. Sponsored by U.S. Department of Education, the Computer Science & Engineering Department and the College of Education at Arizona State University, in cooperation with Scottsdale Unified School District and Coronado High School, we pioneered the first SOC course for high school students in Spring 2007. The same course was taught to high school teachers in summer 2007, and the service-oriented robotics development part was taught to high school students in a summer camp in 2007. This paper discusses the design of the course and reports the experience and lessons in teaching these classes.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115790941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}