142 research outputs found

    A CPL to Java compiler for dynamic service personalization in JAIN-SIP server

    Get PDF
    Service personalization is a key feature of next generation networks: different standards and technologies have been proposed to meet this requirement in an easier and more flexible way. Among these, using standard APIs to abstract behavior of different network protocols and defining service behavior with scripting language can drive to a more flexible way to realize userpersonalization of call-handling policies. To reach this goal, this paper presents an efficient architecture and implementation of personalization policies, using standards like CPL (Call Processing Language) and JAIN-SIP. The novelty of this approach is the improvement of performances, enhancing a JAIN-SIP compliant proxy server with advanced Java features, like the dynamic remote class loading of profile objects. These are asynchronously generated by a CPL to Java compiler, in order to reduce overhead due to CPL interpretation and remote calls

    Service Composition Quality Evaluation in SPICE Platform

    Get PDF
    The goal of the SPICE project is to develop an extendable overlay architecture and framework to support easy and quick creation, and deployment of Telecommunication and Information Services. The SPICE Service Creation Environment (SCE) is used by developers to create both basic services and complex service compositions, which are then deployed in the SPICE Service Execution Environment (SEE), which hide the complexity of the communication environment. Along with its functional interface, each service exposes its own nonfunctional properties (like Response Time, Cost, Availability, etc...) by means of the SPATEL service description language. These properties are defined in an ontology and this chapter will discuss how the SCE helps developers in evaluating a service composition by calculating the aggregated values of such properties

    UML requirements for Distributed Software Architectures

    Get PDF
    The use in various projects of UML as the modeling notation for representing software systems, revealed the need for additional constructs and architectural views, especially in the field of distributed software architectures. This article identifies a list of requirements toward UML, which we find appropriate especially in its current standardization stage

    A large study on the effect of code obfuscation on the quality of java code

    Get PDF
    Context: Obfuscation is a common technique used to protect software against malicious reverse engineering. Obfuscators manipulate the source code to make it harder to analyze and more difficult to understand for the attacker. Although different obfuscation algorithms and implementations are available, they have never been directly compared in a large scale study. Aim: This paper aims at evaluating and quantifying the effect of several different obfuscation implementations (both open source and commercial), to help developers and project managers to decide which algorithms to use. Method: In this study we applied 44 obfuscations to 18 subject applications covering a total of 4 millions lines of code. The effectiveness of these source code obfuscations has been measured using 10 code metrics, considering modularity, size and complexity of code. Results: Results show that some of the considered obfuscations are effective in making code metrics change substantially from original to obfuscated code, although this change (called potency of the obfuscation) is different on different metrics. In the paper we recommend which obfuscations to select, given the security requirements of the software to be protected

    First International Workshop on Telecom Service Oriented Architectures (TSOA-07)

    Get PDF
    Telecommunication services and network features are often tightly coupled, separate, and vertically integrated. This vertical approach has an extremely weakening effect on service provider’s ability to develop more complex services that could span over heterogeneous telecom networks and IT services

    Automated Reasoning on Aspects Interactions

    Get PDF
    The aspect-oriented paradigm allows weaving aspects in different join points of a program. Aspects can modify object fields and method control flow, thus possibly introducing subtle and undesired interactions (conflicts) among aspects and objects, which are not easily detectable. In this paper we propose a fully automated approach to discover conflicts among classes and aspects directly from Java bytecode. The novelty of this work is the usage of a rule engine for identifying possible conflicts among advices, methods, and fields. The knowledge base is obtained through static analysis of classes and aspects bytecode. The possible conflicts are represented by means of rules that can be easily extended and customized

    Communication Web Services Composition and Integration

    Get PDF
    Nowadays, the development of services that span over both the Internet and telephony networks is driving significant efforts towards the integration of services offered by IT providers with telecom operators ones. Web Services have often been recommended for providing, composing and realizing Telecom services but introducing them means facing up with several challenges. This work sharpens benefits and drawbacks of Web Service applications within a Telecom environment focusing in particular on JAIN SLEE architecture, which defines a standard environment targeted at communication-based applications

    Developing Secure Software and Systems

    Get PDF
    The development and maintenance of network and data security in software systems is done in a late phase of design and coding or during deployment, often in an ad-hoc manner. Network monitoring and recovery, encryption protocols, best practices for combating cyber-crime, or disaster recovery planning are useful methodologies applied to enforce security of a deployed system. Nevertheless these are not enough to protect from attacks directed to software vulnerabilities hidden at design and code level. Introducing security aspects in all the phases of the software development process is an emerging approach to limit costs of adding security features when it's too late and very expensive in terms of time and resources. In this paper we illustrate some proposals to consider security issues in the software process from the early phase of requirements to design and coding

    Rule-based monitoring and error detecting for converged telecommunication processes

    Get PDF
    Convergent process may be defined as a composition of services which integrates functionalities from Web and Telecommunication domains. However, during execution of convergent processes some services may fail; in such cases a reconfiguration process must be triggered to recover normal behaviour of composite process. Previous works have developed mechanisms for reducing reconfiguration time while initial restrictions are maintained; this is achieved by replacing regions of services instead of individual services. The present work presents an approach for monitoring and error detecting in convergent processes using rule production systems based on ITIL model. The approach was tested in the monitoring module of the AUTO framework, whose architecture and performance are discussed to show that this approach can efficiently detect errors and repair convergent processes in telecom environments

    Call Control Component implementing converged Telephony- Internet networks

    Get PDF
    Global telecommunications are in the early stages of a fundamental transformation, in which telecommunication networks and information technologies are yielding converged networks named Next Generation Networks (NGN). In this context this article presents a call control component able to handle calls between a telephone and a PC, accordingly to actions decided by the application layer that sets up and redirects calls between terminals over heterogeneous networks like Internet and PSTN. This goal is achieved through software adapters offering APIs porting standard protocols like Media Gateway Control Protocol and Intelligent Network Application Protocol (INAP), to CORBA-based software components
    • …
    corecore