11,804 research outputs found
Service-oriented modeling for e-business applications components
The emerging trends for e-business engineering revolve
around specialisation and cooperation. Successful
companies focus on their core competences, and rely on a
network of business partners for the support services
required to compose a comprehensive offer for their
customers. Modulariy is crucial for a flexible e-business
infrastructure, but related requirements seldom reflect on
the design and operational models of business
information systems.
Software components are widely used for the
implementation of e-business applications, with proved
benefits in terms of system development and maintenance.
We propose a service-oriented componentisation of ebusiness
systems as a way to close the gap with the
business models they support. Blurring the distinction
between external services and internal capabilities, we
propose a homogeneous model for the definition of ebusiness
applications components. After a brief
discussion on the foundational aspects of the approach,
we present the process-based technique we adopted for
component modelling. We then present an infrastructure
compliant with the model proposed that we built on top of
an EJB (Enterprise Java Beans) platform
Mapping service components to EJB business objects
The emerging trends for e-business engineering revolve around specialisation and cooperation. Successful companies focus on their core competencies and rely on a network of business partners for the support services required to compose a comprehensive offer for their customers. Modularity is crucial for a flexible e-business infrastructure, but related requirements seldom reflect on the design and operational models of business information systems. Software components are widely used for the implementation of e-business applications, with proven benefits in terms of system development and maintenance. We propose a service-oriented componentisation of e-business systems as a way to close the gap with the business models they support. Blurring the distinction between external services and internal capabilities, we propose a homogeneous model for the definition of e-business applications components and present a process-based technique for component modelling. We finally present an Enterprise Java Beans extension that implements the model
Citizen Electronic Identities using TPM 2.0
Electronic Identification (eID) is becoming commonplace in several European
countries. eID is typically used to authenticate to government e-services, but
is also used for other services, such as public transit, e-banking, and
physical security access control. Typical eID tokens take the form of physical
smart cards, but successes in merging eID into phone operator SIM cards show
that eID tokens integrated into a personal device can offer better usability
compared to standalone tokens. At the same time, trusted hardware that enables
secure storage and isolated processing of sensitive data have become
commonplace both on PC platforms as well as mobile devices.
Some time ago, the Trusted Computing Group (TCG) released the version 2.0 of
the Trusted Platform Module (TPM) specification. We propose an eID architecture
based on the new, rich authorization model introduced in the TCGs TPM 2.0. The
goal of the design is to improve the overall security and usability compared to
traditional smart card-based solutions. We also provide, to the best our
knowledge, the first accessible description of the TPM 2.0 authorization model.Comment: This work is based on an earlier work: Citizen Electronic Identities
using TPM 2.0, to appear in the Proceedings of the 4th international workshop
on Trustworthy embedded devices, TrustED'14, November 3, 2014, Scottsdale,
Arizona, USA, http://dx.doi.org/10.1145/2666141.266614
Academic Freedom of the Faculty Member as Citizen
A hi-tech company often focuses on being innovative by providing product offerings as product leader, fast follower or with operational excellence. In the international calling sector the technological solutions are numerous. The providers are, for instance, normal telecom providers, Voice over Internet Protocol (VoIP) and Mobile virtual network operators (MVNO). This means that a company faces not only the competitors that offer the same solution but also from outside the companyâs business sector. The company thus needs to tackle many challenges, such as fast-paced product development, market expansion, competitor volatility, at the same time as the company cultivates its brand assets. This study focuses on the branding strategy within the VoIP telecom sector. It aims to set a guideline for how companies, in particular in the VoIP telecom sectors, cultivate and enhance their brand identity in order to differentiate themselves from competitors as well as achieve a successful and sustainable level of brand equity. The thesis also studies the brand strategies that have already manifested themselves within the providers of international calling services, in particular VoIP providers and a couple of MVNO providers. By conducting the brand identity and brand equity analysis, customer analysis and competitorsâ analysis, a company can make a decision on brand strategy that will further associate, differentiate, energize and support its brands. The research framework consists of both the corporate and consumer perspectives. It consists of brand theory, market research, competitor analysis and the companyâs brand identity, as well as brand awareness analysis. The thesis presents the Swedish VoIP consumersâ behavior and trends, the guideline and case study on how a company bridges the gap between brand identity and brand equity as well as the guideline and case study of brand portfolio strategies that have been explored within the VoIP telecom sectors, i.e. VoIP branding
An integration bridge for heterogeneous e-service environments
Dissertação para obtenção do Grau de Mestre em
Engenharia Electrotécnica e de ComputadoresHome automation has evolved from a single integration of services (provided by devices, equipment, etc.) in the environment to a more broad integration of these core services with others(external to the environment) to create some added-value services for home users. This presents a
key challenge of how to integrate disparate and heterogeneous e-service networks.
To this, there exist already some good approaches but with some deficiencies. First, they fail to put in place some expeditious integration approach for having services registered across service
domains. And then, do not provide a good method for having target services be transparently invoked from within the source environment. Thus, an enhanced integration concept is needed for tackling these challenges.
As a solution, this work proposes an integration bridge concept, composed of two key elements: one, an interoperability bridge to go from service descriptions in the target environment format to service announcement in the source environment; and two, a service bridge, to have an image of
the target service exist in the source environment as a service in itself. The concept has been tested and validated in JXTA-P2P source and W3C-WebServices target environments that much relate to Home Automation scenarios
Academic Freedom of the Faculty Member as Citizen
The faculty member in an institution of higher learning functions in two capacities.He is, first of all, a scholar
Constitutional Law - First Amendment - Free Exercise Clause - Establishment Clause - Schools and School Districts
The Supreme Court of Pennsylvania has held that inclusion of an invocation and benediction at a public high school commencement, at which attendance was voluntary, violated neither the free exercise clause nor the establishment clause of the first amendment of the United States Constitution nor that section of the Pennsylvania Constitution governing free exercise and establishment of religion.
Wiest v. Mt. Lebanon School District, 457 Pa. 166, 320 A.2d 362, cert. denied, 419 U.S. 967 (1974)
Implementing privacy with Erlang active objects
Functional active objects are a new paradigm for the implementation of services. They offer safe distributed eval- uation with futures and immutable objects guaranteeing efficient implementation of privacy while offering verified quality assurance based on the functional paradigm and a development in an interactive theorem prover. In this paper, we present a novel and highly performant implementation of functional active objects in Erlang. Besides outlining the guiding principles of the interpreter, we show by concrete examples how secure services can be realized
WISM 2005 : web information systems modeling
Modern Web Information Systems (WIS) need to satisfy a large number of requirements coming from different WIS stakeholders. Modeling WIS by focusing at one design aspect at-a-time helps the implementation of these requirements. During the last years several model-driven methodologies have been proposed to support the WIS design. Strategic modeling is usually the first step in WIS design. It is a very general characterization of WIS which answers questions like: what is the purpose of the WIS?, which are the WIS users?, what functionality is provided by the WIS?, what is the content of the WIS?, what is the layout and atmosphere of the presentations provided by the WIS?, etc. It is only after answering the above questions at a high abstract level that the designer can proceed with the detailed specifications of the WIS. Data integration is one of the most important characteristics of WIS. Some examples of domains in which data integration is present are: public services and bioinformatics. WIS need to support user interfaces that make a lot of data coming from different sources available to the user in a transparent way. The Semantic Web technologies seem to facilitate the data integration problem on the Web by providing the necessary languages to describe the data semantics. Very often the Web user browses pages that he will like to view again at a later time. The present browsing history mechanisms included in Web browsers proved to be insufficient for an adequate retrieval of already seen information. A semantical organization of the previously visited pages can improve the process of retrieving previously seen data. There is an increasing demand to make WIS personalizable so that these systems better deal with the user interests. WIS design methodologies do propose adaptation techniques in order to realize WIS personalization. Despite the fact that some of these adaptation techniques are very similar (or even the same) in different methodologies, the notations to specify WIS personalization aspects are quite different. By defining a reference model for specifying WIS personalization one could improve the reuse of the personalization specifications and also enable a seamless translation between different specific personalization specifications. The above issues are some of the topics that are tackled in the workshop papers. We hope that we did raise the readersâ interest so that they will have a close look at the papers and possibly contribute to the fascinating and challenging area of WIS modeling
- âŠ