47 research outputs found

    A comparative study of process mediator components that support behavioral incompatibility

    Full text link
    Most businesses these days use the web services technology as a medium to allow interaction between a service provider and a service requestor. However, both the service provider and the requestor would be unable to achieve their business goals when there are miscommunications between their processes. This research focuses on the process incompatibility between the web services and the way to automatically resolve them by using a process mediator. This paper presents an overview of the behavioral incompatibility between web services and the overview of process mediation in order to resolve the complications faced due to the incompatibility. Several state-of the-art approaches have been selected and analyzed to understand the existing process mediation components. This paper aims to provide a valuable gap analysis that identifies the important research areas in process mediation that have yet to be fully explored.Comment: 20 Pages, 9 figures and 8 Tables; International Journal on Web Service Computing (IJWSC), September 2011, Volume 2, Number

    Assessing the Capability and Priority of Enterprise Architecture Implementation in Malaysian Public Sector

    Get PDF
    Enterprise Architecture (EA) is an integrated approach of information systems, processes, organisation and people in aligning business and information technology together. However, there is a discrepancy in public sector EA implementation whereby the developing countries are still grappling with issues in the implementation while those developed countries are already harvesting the EA benefits and value. Hence, this study aims to investigate the capability and priority of public sector of the developing countries in implementing the EA by proposing an assessment model. The assessment model is based on Balanced Scorecard (BSC) and Analytic Hierarchy Process (AHP) approach. There are 27 EAI capability and priority criteria identified and grouped into six categories according to BSC perspectives namely Internal Process, Learning and Growth, Authority Support, Cost, Technology and Talent Management. Followed by AHP pairwise comparison in calculating the rank of each criterion which is presented via three case studies from Malaysian Public Sector agencies

    Analysis of Existing Privacy-aware Access Control for E-Commerce Application

    Get PDF
    Due to the growing use of the internet, more and more critical processes are running over the web such as e-commerce. Internet allows commerce and business between parties who are physically distant and do not know each other doing the transaction. For the effective operation of the web application and e-commerce applications, security is a key issue. Various aspects of security are relevant to e-commerce such as database security. The availability of e-commerce, user transactions are no longer bound to traditional office-centered environment, but it can be started virtually anywhere at any time. It was moving from closed environment to open environment. In this paper, we clearly define the privacy-aware access control requirements. We also investigated few existing access control in the context of this requirements. We build an assessment criteria in our comparison based on the requirements defined which we finally used it later as a guidelines to design an access control for e-commerce application

    Research Article Novel Security Conscious Evaluation Criteria for Web Service Composition

    Get PDF
    Abstract: This study aims to present a new mathematical based evaluation method for service composition with respects to security aspects. Web service composition as complex problem solver in service computing has become one of the recent challenging issues in today's web environment. It makes a new added value service through combination of available basic services to address the problem requirements. Despite the importance of service composition in service computing, security issues have not been addressed in this area. Considering the dazzling growth of number of service based transactions, making a secure composite service from candidate services with different security concerns is a demanding task. To deal with this challenge, different techniques have been employed which have direct impacts on secure service composition efficiency. Nonetheless, little work has been dedicated to deeply investigate those impacts on service composition outperformance. Therefore, the focus of this study is to evaluate the existing approaches based on their applied techniques and QoS aspects. A mathematicalbased security-aware evaluation framework is proposed wherein Analytic Hierarchy Process (AHP), a multiple criteria decision making technique, is adopted. The proposed framework is tested on state-of-the-art approaches and the statistical analysis of the results presents the efficiency and correctness of the proposed work

    Non-numeric key processing for file indexing using hashing approach

    Get PDF
    This paper describes the processing tehcnique of non-numeric record key for the purpose of storage and retrieval. Hashing approach is employed in the design and experiments to facilitate the addressing machanism. Link-list approach is adopted to handle synonyms. Basic file organisations are discussed very briefly in order to establish a common basis of terminology and concepts

    A universal relation approach for natural query in logic database system

    Get PDF
    Recent advances in Artificial Intelligence and Relational Database systems have contributed to the development of Logic Database systems. A lot of research in logic database have been encompassed on the query evaluation and optimization techniques. Very litde effort has been put to the development of the user's query system to facilitate the naive users interacting with the database. Currently, the form of query is based on the primitive logic form. Therefore, this project aims at developing a prototype natural query system to the logic database as a compromise between the primitive logic query and the natural language query systems. This paper describes a conceptual framework of the natural query system. The concept of predicate universal relation is introduced as an interface to bridge the natural query and the corresponding primitive logic query. The concept of data types is employed as a tool towards the construction of the predicate universal relation. We believe this is the first attempt towards a natural query system for logic database via a universal relation approach

    Integrated financial management and accounting system : a conceptual model using relational DBMS approach

    Get PDF
    This paper describes the conceptual model of an integrated financial management and accounting system (FIMAS) in terms of its objectives, system architecture, process, input and output. The design is based on a case study carried out at Penang Regional Development Authority (PERDA) and Development Authority of Pahang Tenggara (DARA). Both commercial and cash accounting systems are integrated in the model to meet the operational needs of the organisations. The integrated system includes expenditure sub-system, payroll sub-system, allocation sub-system, investment sub-system and billing sub-system. The relational database approach was adopted in the model design to enhance the flexibility in financial data processing

    The integration of spatial and non-spatial data model

    Get PDF
    This paper will discuss about the integration of spatial and non-spatial data in a single data model for a Geographical Information System(GIS) database. In recent research findings for GIS data model, geographical data depends on time constraint. We propose the integration that include the time constraint using a double cube data model based on a feature-based model. A unique key is used to access the integrated database

    Pengkalan data teragih dalam persekitaran IBM PC LAN 1.3 : eksperimen

    Get PDF
    This paper explains the experiment that uses the IBM PC LAN 1.3 package that offer services to Local Area Network under the token ring environment. The purpose is to check the capabilities of the package to provide a distributed database system for the general practice clinics. For the implementation, DBASE III PLUS is used to develop the information system. The experiment is carried out using the facilities at the Institute of Computer Science. The prototype system developed from the experiment is discussed in details. Proposal to improve the system is also discussed
    corecore