5,414 research outputs found
Recommended from our members
Towards an aspect weaving BPEL engine
This position paper proposes the use of dynamic aspects and
the visitor design pattern to obtain a highly configurable and
extensible BPEL engine. Using these two techniques, the
core of this infrastructural software can be customised to
meet new requirements and add features such as debugging,
execution monitoring, or changing to another Web Service
selection policy. Additionally, it can easily be extended to
cope with customer-specific BPEL extensions. We propose
the use of dynamic aspects not only on the engine itself
but also on the workflow in order to tackle the problems of
Web Service hot deployment and hot fixes to long running
processes. In this way, composing aWeb Service "on-the-fly"
means weaving its choreography interface into the workflow
Towards the design of a platform for abuse detection in OSNs using multimedial data analysis
Online social networks (OSNs) are becoming increasingly popular every day. The vast amount of data created by users and their actions yields interesting opportunities, both socially and economically. Unfortunately, these online communities are prone to abuse and inappropriate behaviour such as cyber bullying. For victims, this kind of behaviour can lead to depression and other severe problems. However, due to the huge amount of users and data it is impossible to manually check all content posted on the social network. We propose a pluggable architecture with reusable components, able to quickly detect harmful content. The platform uses text-, image-, audio- and video-based analysis modules to detect inappropriate content or high risk behaviour. Domain services aggregate this data and flag user profiles if necessary. Social network moderators need only check the validity of the flagged profiles. This paper reports upon key requirements of the platform, the architectural components and important challenges
The Architectural Dynamics of Encapsulated Botnet Detection (EDM)
Botnet is one of the numerous attacks ravaging the networking environment.
Its approach is said to be brutal and dangerous to network infrastructures as
well as client systems. Since the introduction of botnet, different design
methods have been employed to solve the divergent approach but the method of
taking over servers and client systems is unabated. To solve this, we first
identify Mpack, ICEpack and Fiesta as enhanced IRC tool. The analysis of its
role in data exchange using OSI model was carried out. This further gave the
needed proposal to the development of a High level architecture representing
the structural mechanism and the defensive mechanism within network server so
as to control the botnet trend. Finally, the architecture was designed to
respond in a proactive state when scanning and synergizing the double data
verification modules in an encapsulation manner within server system
Enabling High-Level Application Development for the Internet of Things
Application development in the Internet of Things (IoT) is challenging
because it involves dealing with a wide range of related issues such as lack of
separation of concerns, and lack of high-level of abstractions to address both
the large scale and heterogeneity. Moreover, stakeholders involved in the
application development have to address issues that can be attributed to
different life-cycles phases. when developing applications. First, the
application logic has to be analyzed and then separated into a set of
distributed tasks for an underlying network. Then, the tasks have to be
implemented for the specific hardware. Apart from handling these issues, they
have to deal with other aspects of life-cycle such as changes in application
requirements and deployed devices. Several approaches have been proposed in the
closely related fields of wireless sensor network, ubiquitous and pervasive
computing, and software engineering in general to address the above challenges.
However, existing approaches only cover limited subsets of the above mentioned
challenges when applied to the IoT. This paper proposes an integrated approach
for addressing the above mentioned challenges. The main contributions of this
paper are: (1) a development methodology that separates IoT application
development into different concerns and provides a conceptual framework to
develop an application, (2) a development framework that implements the
development methodology to support actions of stakeholders. The development
framework provides a set of modeling languages to specify each development
concern and abstracts the scale and heterogeneity related complexity. It
integrates code generation, task-mapping, and linking techniques to provide
automation. Code generation supports the application development phase by
producing a programming framework that allows stakeholders to focus on the
application logic, while our mapping and linking techniques together support
the deployment phase by producing device-specific code to result in a
distributed system collaboratively hosted by individual devices. Our evaluation
based on two realistic scenarios shows that the use of our approach improves
the productivity of stakeholders involved in the application development
Using real options to select stable Middleware-induced software architectures
The requirements that force decisions towards building distributed system architectures are usually of a non-functional nature. Scalability, openness, heterogeneity, and fault-tolerance are examples of such non-functional requirements. The current trend is to build distributed systems with middleware, which provide the application developer with primitives for managing the complexity of distribution, system resources, and for realising many of the non-functional requirements. As non-functional requirements evolve, the `coupling' between the middleware and architecture becomes the focal point for understanding the stability of the distributed software system architecture in the face of change. It is hypothesised that the choice of a stable distributed software architecture depends on the choice of the underlying middleware and its flexibility in responding to future changes in non-functional requirements. Drawing on a case study that adequately represents a medium-size component-based distributed architecture, it is reported how a likely future change in scalability could impact the architectural structure of two versions, each induced with a distinct middleware: one with CORBA and the other with J2EE. An option-based model is derived to value the flexibility of the induced-architectures and to guide the selection. The hypothesis is verified to be true for the given change. The paper concludes with some observations that could stimulate future research in the area of relating requirements to software architectures
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Network
We propose a Trustworthy Service Evaluation (TSE) system to enable users to share service reviews inservice-oriented mobile social networks (S-MSNs). Each service provider independently maintains a TSE for itself, which collects andstores users’ reviews about its services without requiring any third trusted authority. The service reviews can then be made available tointerested users in making wise service selection decisions. It identify three unique service review attacks, i.e., linkability, rejection, and modification attacks, and develop sophisticated security mechanisms for the TSE to deal with these attacks. Specifically, the basicTSE (bTSE) enables users to distributedly and cooperatively submit their reviews in an integrated chain form by using hierarchical and aggregate signature techniques. It restricts the service providers to reject, modify, or delete the reviews. Thus, the integrity and authenticity of reviews are improved. Further, It extend the bTSE to a Sybil-resisted TSE (SrTSE) to enable the detection of two typical sybil attacks. In the SrTSE, if a user generates multiple reviews toward a vendor in a predefined time slot with differentpseudonyms, the real identity of that user will be revealed. Through security analysis and numerical results, It show that the bTSE and the SrTSE effectively resist the service review attacks and the SrTSE additionally detects the Sybil attacks in an efficient manner.Through performance evaluation, It show that the bTSE achieves better performance in terms of submission rate and delay than a service review system that does not adopt user cooperation
A decision support system for QoS-enabled distributed web services architecture
Service selection is crucial for fulfilling the requirements of service requestors. While in the real service-oriented environment, Quality of Services (QoS) is one of the greatest concerns for consumers during service selection. Existing web services "standards do not tackle the QoS issue adequately when service discovery and selection are performed. In this paper, we argue that the process of services selection is a kind of decision making" to decide which service should be selected dependent on their QoS and trustworthiness values as well as their functional capabilities. Hence, we propose a service selection solution which utilizes the Decision Support Systems Module (DSS Module) to select the most appropriate service. In DSS module we introduce Service Trust to carry out the service QoS measurement based on the Context-specific Quality Aspects. The architecture of DSS module is presented in detail and the solution is also integrated into one of the components "domain broker" in our proposed distributed web services architecture. The contributions of this paper are two fold. Firstly, we apply DSS module into web services, thus opening a new, fertile ground for DSS research in web services literature and secondly, we provide a novel and feasible solution for QoS-based service selection
An ontology-based model management architecture for service innovation
Organizations have indicated renewed interest in service innovation, design and management, given the growth of service sector. Decision support systems (DSS) play an important role in supporting this endeavor, through management of organizational resources such as data and models. Given the global nature of service value chains, there have been ever increasing demands on managing, sharing, and reusing these heterogeneous and distributed resources, both within and across organizational boundaries, through DSS consisting of database management systems (DBMS) and model management systems (MMS). Analogous to DBMS, model management systems focus on the management of decision models, dealing with representation, storage, and retrieval of models as well as a variety of applications such as analysis, reuse, sharing, and composition of models. Recent developments in the areas of semantic web and ontologies have provided a rich tool set for computational reasoning about these resources in an intelligent manner. In this chapter, we leverage these advances and apply service-oriented design principles to propose an ontology-based model management architecture supporting service innovation. The architecture is illustrated with case study scenarios and current state of implementation. The role of potential information technologies in supporting the architecture is also discussed. We then provide a roadmap to make advancements in research in this direction
Autonomic Approach based on Semantics and Checkpointing for IoT System Management
Le résumé en français n'a pas été communiqué par l'auteur.Le résumé en anglais n'a pas été communiqué par l'auteur
- …