142 research outputs found
A CPL to Java compiler for dynamic service personalization in JAIN-SIP server
Service personalization is a key feature of next generation networks: different standards and
technologies have been proposed to meet this requirement in an easier and more flexible way.
Among these, using standard APIs to abstract behavior of different network protocols and defining
service behavior with scripting language can drive to a more flexible way to realize userpersonalization
of call-handling policies. To reach this goal, this paper presents an efficient
architecture and implementation of personalization policies, using standards like CPL (Call
Processing Language) and JAIN-SIP. The novelty of this approach is the improvement of
performances, enhancing a JAIN-SIP compliant proxy server with advanced Java features, like the
dynamic remote class loading of profile objects. These are asynchronously generated by a CPL to
Java compiler, in order to reduce overhead due to CPL interpretation and remote calls
Service Composition Quality Evaluation in SPICE Platform
The goal of the SPICE project is to develop an extendable overlay architecture and framework to support easy and quick creation, and deployment of Telecommunication and Information Services. The SPICE Service Creation Environment (SCE) is used by developers to create both basic services and complex service compositions, which are then deployed in the SPICE Service Execution Environment (SEE), which hide the complexity of the communication environment. Along with its functional interface, each service exposes its own nonfunctional properties (like Response Time, Cost, Availability, etc...) by means of the SPATEL service description language. These properties are defined in an ontology and this chapter will discuss how the SCE helps developers in evaluating a service composition by calculating the aggregated values of such properties
UML requirements for Distributed Software Architectures
The use in various projects of UML as the modeling
notation for representing software systems, revealed the
need for additional constructs and architectural views,
especially in the field of distributed software architectures.
This article identifies a list of requirements toward UML,
which we find appropriate especially in its current
standardization stage
A large study on the effect of code obfuscation on the quality of java code
Context: Obfuscation is a common technique used to protect software against malicious reverse engineering. Obfuscators manipulate the source code to make it harder to analyze and more difficult to understand for the attacker. Although different obfuscation algorithms and implementations are available, they have never been directly compared in a large scale study.
Aim: This paper aims at evaluating and quantifying the effect of several different obfuscation implementations (both open source and commercial), to help developers and project managers to decide which algorithms to use.
Method: In this study we applied 44 obfuscations to 18 subject applications covering a total of 4 millions lines of code. The effectiveness of these source code obfuscations has been measured using 10 code metrics, considering modularity, size and complexity of code.
Results: Results show that some of the considered obfuscations are effective in making code metrics change substantially from original to obfuscated code, although this change (called potency of the obfuscation) is different on different metrics. In the paper we recommend which obfuscations to select, given the security requirements of the software to be protected
First International Workshop on Telecom Service Oriented Architectures (TSOA-07)
Telecommunication services and network features are often tightly coupled, separate,
and vertically integrated. This vertical approach has an extremely weakening effect on
service provider’s ability to develop more complex services that could span over
heterogeneous telecom networks and IT services
Automated Reasoning on Aspects Interactions
The aspect-oriented paradigm allows weaving
aspects in different join points of a program. Aspects can modify object fields and method control flow, thus possibly introducing subtle and undesired interactions
(conflicts) among aspects and objects, which are not easily detectable.
In this paper we propose a fully automated
approach to discover conflicts among classes and aspects directly from Java bytecode. The novelty of this work is the usage of a rule engine for identifying possible conflicts among advices, methods, and fields.
The knowledge base is obtained through static
analysis of classes and aspects bytecode. The possible conflicts are represented by means of rules that can be easily extended and customized
Developing Secure Software and Systems
The development and maintenance of network and data security in software systems is done in
a late phase of design and coding or during deployment, often in an ad-hoc manner. Network
monitoring and recovery, encryption protocols, best practices for combating cyber-crime, or
disaster recovery planning are useful methodologies applied to enforce security of a deployed
system. Nevertheless these are not enough to protect from attacks directed to software
vulnerabilities hidden at design and code level.
Introducing security aspects in all the phases of the software development process is an
emerging approach to limit costs of adding security features when it's too late and very expensive
in terms of time and resources. In this paper we illustrate some proposals to consider security
issues in the software process from the early phase of requirements to design and coding
Rule-based monitoring and error detecting for converged telecommunication processes
Convergent process may be defined as a composition of services which integrates functionalities from Web and Telecommunication domains. However, during execution of convergent processes some services may fail; in such cases a reconfiguration process must be triggered to recover normal behaviour of composite process. Previous works have developed mechanisms for reducing reconfiguration time while initial restrictions are maintained; this is achieved by replacing regions of services instead of individual services. The present work presents an approach for monitoring and error detecting in convergent processes using rule production systems based on ITIL model. The approach was tested in the monitoring module of the AUTO framework, whose architecture and performance are discussed to show that this approach can efficiently detect errors and repair convergent processes in telecom environments
Communication Web Services Composition and Integration
Nowadays, the development of services that span
over both the Internet and telephony networks is
driving significant efforts towards the integration of
services offered by IT providers with telecom operators
ones. Web Services have often been recommended for
providing, composing and realizing Telecom services
but introducing them means facing up with several
challenges.
This work sharpens benefits and drawbacks of Web
Service applications within a Telecom environment
focusing in particular on JAIN SLEE architecture,
which defines a standard environment targeted at
communication-based applications
Realizing an MDA and SOA Marriage for the Development of Mobile Services
The paper presents an approach for developing composite telecommunication
services running on mobile phones which takes advantage of
the use of model driven techniques as well as the loose coupling paradigm in
SOA. A domain-specific UML dialect named SPATEL has been developed
which serves as the basis for generating applications that can be deployed in
distinct terminals and servers technologies. The composite services typically
combines telecommunication enablers - like SMS sending and GSM localisation
- with traditional IT components accessible over the internet, such as a
Yellow Page facility. This work has been conducted in the context of the IST
SPICE European collaborative project
- …