SlideShare ist ein Scribd-Unternehmen logo
1 von 40
Downloaden Sie, um offline zu lesen
March 2021: Top 10
Downloaded Articles
in Web Service
Computing
International Journal on Web Service
Computing (IJWSC)
http://airccse.org/journal/jwsc/ijwsc.html
ISSN 0974 - 9322 (Online) ; 0975 - 2293 (Print)
SURVEY OF CLOUD COMPUTING
Amira. A. Elsonbaty
High Institute of Engineering & Technology in New Damietta
ABSTRACT
With expanding volumes of knowledgeable production and the variability of themes and roots,
shapes and languages, most detectable issues related to the delivery of storage space for the
information and the variety of treatment strategies in addition to the problems related to the flow
of information and methods go down and take an interest in the advantage of them face the
researchers. In any case, such a great significance comes with a support of a great infrastructure
that includes large data centers comprising thousands of server units and other supporting
equipment. The cloud is not a small, undeveloped branch of it, it is a type of computing that is
based on the internet, an image from the internet. Cloud Computing is a developed technology,
cloud computing, possibly offers an overall economic benefit, in that end users shares a large,
centrally achieved pool of storing and computing resources, rather than owning and managing
their own systems. But, it needs to be environment friendly also. This review paper gives a
general overview of cloud computing, also it describes cloud computing, architecture of cloud
computing, characteristics of cloud computing, and different services and deployment model of
cloud computing. This paper is for anyone who will have recently detected regarding cloud
computing and desires to grasp a lot of regarding cloud computing
KEYWORDS
cloud computing; architecture of cloud computing; characteristics of cloud computing
For More Details : https://aircconline.com/ijwsc/V9N4/9418ijwsc02.pdf
Volume Link : http://airccse.org/journal/jwsc/current2018.html
REFERENCES
[1] Bharti Wadhwa, “Energy Saving Approaches for Green Cloud Computing: A Review”,
Proceedings of 2014 RAECS UIET Panjab University Chandigarh, 06 - 08 March, 2014
978-1-4799-2291- 8/14/$31.00 ©2014 IEEE
[2] Jasleen Kaur, Ms. Anupma Sehrawat, Ms. Neha Bishnoi, " Survey Paper on Basics of
Cloud Computing and Data Security," International Journal of Computer Science Trends
and Technology (IJCST) – Volume 2 Issue 3, May-Jun 2014.
[3] https://en.wikipedia.org/wiki/Cloud_computing,12-9-4:30pm.
[4] Yashpalsinh Jadeja, Kirit Modi, “Cloud Computing - Concepts, Architecture and
Challenges” in Proceeding of International Conference on Computing, Electronics and
Electrical Technologies [ICCEET], 2012.
[5] Qi Zhang, Lu Cheng and Raouf Boutaba, “Cloud computing: state-of-the-art and research
challenges”. Journal of Internet Services and Applications, Volume 1, Issue 1, pp 7–18,
May 2010
[6] Ivanka Menken," Cloud Computing - The Complete Cornerstone Guide to Cloud
Computing Best Practices Concepts, Terms, and Techniques for Successfully Planning,
Implementing ... Enterprise IT Cloud ComputingTechnology", London, UK, UK ©2008 ,
ISBN:1921573007 9781921573002,2008.
[7] Ms. Disha H. Parekh, Dr. R. Sridaran, “An Analysis of Security Challenges in Cloud
Computing,” (IJACSA) International Journal of Advanced Computer Science and
Applications, Vol. 4, No.1, 2013.
[8] Jasleen Kaur, Ms.Anupma Sehrawat, Ms.Neha Bishnoi ,"Survey Paper on Basics of Cloud
Computing and Data Security", International Journal of Computer Science Trends and
Technology (IJCST) – Volume 2 Issue 3, May-Jun 2014.
[9] M. Armbrust, O. Fox, R. Griffith, A. D. Joseph, Y. Katz, A. Konwinski, et al., "M.: Above
the clouds: A Berkeley view of cloud computing," 2009.
[10] S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of
cloud computing," Journal of Network and Computer Applications, vol. 34, pp. 1-11, 2011.
International Journal on Web Service Computing (IJWSC), Vol.9, No.3/4, December 2018
27
[11] Aniruddha S. Rumale, D.N.Chaudhari, ” Cloud Computing: Infrastructure as a Service,”
International Journal of Inventive Engineering and Sciences (IJIES) ISSN: 2319–9598,
Volume-1, Issue-3, February 2013.
[12] Imran Ashrafa, "An Overview of Service Models of Cloud Computing," International
Journal of Multidisciplinary and Current Research 27 Aug 2014, Vol.2 [8] Yashpalsinh
Jadeja; Kirit Modi, “Cloud Computing - Concepts, Architecture and Challenges” in
Proceeding of International Conference on Computing, Electronics and Electrical
Technologies [ICCEET], 2012.
[13] Xu Wang, Beizhan Wang, Jing Huang, “Cloud computing and its key techniques” in
Proceeding of IEEE Conference, 2011.
[14] Michael Boniface, Bassem Nasser, Juri Papay, Stephen C. Phillips, Arturo Servin, Xiaoyu
Yang, Zlatko Zlatev, Spyridon V. Gogouvitis, Gregory Katsaros, Kleopatra Konstanteli,
George Kousiouris, Andreas Menychtas, Dimosthenis Kyriazis, “Platform-as-a-Service
Architecture for Real-time Quality of Service Management in Clouds,” Fifth International
Conference on Internet and Web Applications and Services, 2010.
A COMPARATIVE STUDY OF PROCESS MEDIATOR CCOMPONENTS THAT SUPPORT
BEHAVIORAL INCOMPATIBILITY
Kanmani Munusamy 1
, Harihodin Selamat2
, Suhaimi Ibrahim3
and Mohd Sapiyan Baba4
1, 2, 3
Advanced Informatics School (AIS), Universiti Teknologi Malaysia (UTM), Malaysia.
1
kanmani3@live.utm.my, 2
harihodin@utm.my, 3
suhaimiibrahim@utm.my
4
Faculty of Computer Science & Information Technology, University Malaya (UM), Malaysia.
4
pian@um.edu.my
ABSTRACT
Most businesses these days use the web services technology as a medium to allow interaction
between a service provider and a service requestor. However, both the service provider and the
requestor would be unable to achieve their business goals when there are miscommunications
between their processes. This research focuses on the process incompatibility between the web
services and the way to automatically resolve them by using a process mediator. This paper
presents an overview of the behavioral incompatibility between web services and the overview
of process mediation in order to resolve the complications faced due to the incompatibility.
Several state-of the-art approaches have been selected and analyzed to understand the existing
process mediation components. This paper aims to provide a valuable gap analysis that identifies
the important research areas in process mediation that have yet to be fully explored.
KEYWORDS
Web services, semantic web services, web service mediation, web service adaptation and
behavioral incompatibility
For More Details : http://airccse.org/journal/jwsc/papers/0911wsc02.pdf
Volume Link : http://airccse.org/journal/jwsc/current2011.html
REFERENCES
[1] S.G.H. Tabatabaei, A.V. Dastjerdi, W.M.N.W. Kadir, S. Ibrahim, and E. Sarafian,
“Security conscious AI-planning-based composition of semantic web services,”
International Journal of Web Information Systems, vol. 6, no. 3, 2010, pp. 203-229. 0 1 2 3
4 5 6 7 8 Support for both control and data flow Support semantic and reasoning
Automatic in generation of… Automation in mismatches… Automation in identification
of… Automation in generating the… Scalable to support generic scenario Support complex
case study Implemented with evaluation
[2] M. Kanmani, I. Suhaimi, K. Mojtaba, M. Keyvan, and T. Sayed Gholam Hassan (2010),
"An evaluation of process mediation approaches in web services", Proceedings of the 12th
International Conference on Information Integration and Web-based Applications &
Services, Paris, France, ACM pp. 48-55.
[3] M. Keyvan, I. Suhaimi, K. Mojtaba, M. Kanmani, and T. Sayed Gholam Hassan (2010),
"A comparative evaluation of semantic web service discovery approaches", Proceedings of
the 12th International Conference on Information Integration and Web-based Applications
& Services, Paris, France, ACM
[4] Thirumaran.M, Dhavachelvan.P, and Thanigaivel.K, “Business Rule Management
Framework for Enterprise Web Services,” International Journal on Web Service
Computing ( IJWSC ), vol. 1, no. 2, 2010, pp. 15-29.
[5] S. Arroyo, M.A. Sicilia, and J.M. Dodero, “Choreography frameworks for business
integration: Addressing heterogeneous semantics,” Computers in Industry, vol. 58, no. 6,
2007, pp. 487-503.
[6] D. Fensel, and C. Bussler, “The web service modeling framework WSMF,” Electronic
Commerce Research and Applications, vol. 1, no. 2, 2002, pp. 113-137.
[7] D.M. Yellin, and R.E. Strom, “Protocol specifications and component adaptors,” ACM
Transactions on Programming Languages and Systems, vol. 19, no. 2, 1997, pp. 292-333.
[8] M. Stollberg, E. Cimpian, and D. fensel (2005), "Mediating Capabilities with
DeltaRelations", in M. Hepp, A. polleres, F. Harmelen, and M. Genesereth (eds), First
International Workshop on Mediation in Semantic Web Services (MEDIATE 2005)
conjuction with 3rd International Conference on Service-Oriented Computing (ICSOC
2005), Amsterdam, Netherlands pp. 51-66.
[9] D. Martin, M. Burstein, J. Hobbs, O. Lassila, D. McDermott, S. McIlraith, S. Narayanan,
M. Paolucci, B. Parsia, T. Payne, E. Sirin, N. Srinivasan, and K. Sycara (2004), "OWL-S:
Semantic Markup for Web Services ", W3C Member Submission, Retrieved from:
http://www.w3.org/Submission/OWL-S/, Last Access: 28 June 2011
[10] J.d. Bruijn, C. Bussler, J. Domingue, D. Fensel, M. Hepp, U. Keller, M. Kifer, J. Kopecky,
H. Lausen, E. Oren, A. Polleres, D. Roman, J. Scicluna, and M. Stollberg (2005), "Web
Service Modeling Ontology (WSMO)", W3C Member Submission, Retrieved from:
http://www.w3.org/Submission/WSMO/, Last Access: 28 June 2011
[11] H.R. Motahari Nezhad, B. Benatallah, A. Martens, F. Curbera, and F. Casati (2007),
"Semiautomated adaptation of service interactions", in 16th International World Wide Web
Conference, WWW2007, Banff, AB, pp. 993-1002.
[12] S. Wei, M. Xiaoxing, D. Wanchun, and J. Lü (2008), "Toward a model-based approach
to dynamic adaptation of composite services", in Proceedings of the IEEE International
Conference on Web Services, ICWS 2008, Beijing, pp. 561-568.
[13] T. Wei, R. Fangyan, F. Yushun, and Z. Jun (2007), "Compatibility analysis and
mediationaided composition for BPEL services", Lecture Notes in Computer Science
(including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in
Bioinformatics), Bangkok, pp. 1062-1065.
[14] R. Mateescu, P. Poizat, and G. Salaün, “Adaptation of Service Protocols Using Process
Algebra and On-the-Fly Reduction Techniques,” Service-Oriented Computing – ICSOC
2008, 2008, pp. 84-99.
[15] S. Dustdar, J. Fiadeiro, A. Sheth, M. Dumas, M. Spork, and K. Wang, “Adapt or Perish:
Algebra and Visual Notation for Service Interface Adaptation,” Business Process
Management, Lecture Notes in Computer Science 4102, Springer Berlin / Heidelberg,
2006, pp. 65-80.
[16] E. Cimpian, and A. Mocan (2005), "Process Mediation In WSMX", in E. Cimpian (Ed.),
Vienna, p. 29. International Journal on Web Service Computing (IJWSC), Vol.2, No.3,
September 2011 29
[17] R. Mizoguchi, Z. Shi, F. Giunchiglia, E. Cimpian, A. Mocan, and M. Stollberg, “Mediation
Enabled Semantic Web Services Usage,” The Semantic Web – ASWC 2006, Lecture
Notes in Computer Science 4185, Springer Berlin / Heidelberg, 2006, pp. 459-473.
[18] X. Li, Y. Fan, S. Madnick, and Q.Z. Sheng, “A pattern-based approach to protocol
mediation for web services composition,” Information and Software Technology, vol. 52,
no. 3, 2009, pp. 304-323.
[19] J. Camara, G. Salaun, and C. Canal, “Composition and run-time adaptation of mismatching
behavioural interfaces,” Journal of Universal Computer Science, vol. 14, no. 13, 2008, pp.
2182-2211.
[20] L. Bordeaux, G. Salaun, D. Berardi, and M. Mecella (2005), "When are two web services
compatible?", in M.C. Shan, U. Dayal, and M. Hsu (eds), Lecture Notes in Computer
Science, Toronto, Ont., Vol. 3324, pp. 15-28.
[21] A. Brogi, and R. Popescu, “Service adaptation through trace inspection,” International
Journal of Business Process Integration and Management, vol. 2, 2007, pp. 9-16.
[22] W. Kongdenfha, H.R. Motahari-Nezhad, B. Benatallah, F. Casati, and R. Saint-Paul,
“Mismatch patterns and adaptation aspects: A foundation for rapid development of web
service adapters,” IEEE Transactions on Services Computing, vol. 2, no. 2, 2009, pp. 94-
107.
[23] L. Kuang, S. Deng, J. Wu, and Y. Li (2009), "Towards adaptation of service interface
semantics", in 2009 IEEE International Conference on Web Services, ICWS 2009, Los
Angeles, CA, pp. 279-286.
[24] R. Seguel, R. Eshuis, and P. Grefen (2010), "Generating Minimal Protocol Adaptors for
Loosely Coupled Services", in Web Services (ICWS), 2010 IEEE International Conference
on, pp. 417-424.
[25] G. Wiederhold, “Mediators in the architecture of future information systems,” Computer,
vol. 25, no. 3, 1992, pp. 38-49.
[26] G. Grahne, and V. Kiricenko (2005), "Process Mediation in Extended Roman Model", in
M. Hepp, A. polleres, F. Harmelen, and M. Genesereth (Eds.) First International Workshop
on Mediation in Semantic Web Services (MEDIATE 2005) conjuction with 3rd
International Conference on Service-Oriented Computing (ICSOC 2005), Amsterdam,
Netherlands pp. 17- 33.
[27] W. Tan, Y. Fan, and M. Zhou, “A petri net-based method for compatibility analysis and
composition of web services in business process execution language,” IEEE Transactions
on Automation Science and Engineering, vol. 6, no. 1, 2009, pp. 94-106.
[28] R. Vaculin, R. Neruda, and K. Sycara, “The process mediation framework for semantic
Web services,” International Journal of Agent-Oriented Software Engineering, vol. 3, no.
1, 2009, pp. 27-58.
[29] L. Ardissono, R. Furnari, G. Petrone, and M. Segnan, “Interaction protocol mediation in
web service composition,” International Journal of Web Engineering and Technology, vol.
6, no. 1, 2010, pp. 4-32.
[30] Z. Zhou, S. Bhiri, L. Shu, and M. Hauswirth (2009), "Formal verification of mediated web
service interactions considering client's expected behaviours", in 2009 5th International
Conference on Collaborative Computing: Networking, Applications and Worksharing,
CollaborateCom 2009, Washington, DC.
[31] B. Benatallah, F. Casati, D. Grigori, H.R. Motahari Nezhad, and F. Toumani (2005),
"Developing adapters for web services integration", in O. Pastor, and J.F. Cunha (eds),
Lecture Notes in Computer Science, Porto, Vol. 3520, pp. 415-429.
[32] E. Cimpian, and A. Mocan (2005), "WSMX process mediation based on choreographies",
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial
Intelligence and Lecture Notes in Bioinformatics), Nancy, pp. 130-143. International
Journal on Web Service Computing (IJWSC), Vol.2, No.3, September 2011 30
[33] K. Wang, M. Dumas, C. Ouyang, and J. Vayssière (2008), "The service adaptation
machine", in Proceedings of the 6th IEEE European Conference on Web Services,
ECOWS'08, Dublin, pp. 145-154.
[34] X. Li, Y. Fan, J. Wang, L. Wang, and F. Jiang (2008), "A pattern-based approach to
development of service mediators for protocol mediation", in 7th IEEE/IFIP Working
Conference on Software Architecture, WICSA 2008, Vancouver, BC, pp. 137-146.
[35] R. Mateescu, P. Poizat, and G. Salaun (2007), "Behavioral adaptation of component
compositions based on process algebra encodings", in ASE'07 - 2007 ACM/IEEE
International Conference on Automated Software Engineering, Atlanta, GA, pp. 385-388.
BUSINESS RULE MANAGEMENT FRAMEWORK FOR ENTERPRISE
WEB SERVICES
Thirumaran. M1
and Ilavarasan. E2
and Thanigaivel. K3
and Abarna. S4
1
Department of Computer science and Engineering, Pondicherry Engg College, India.
thirumaran@pec.edu
2
Department of Computer science and Engineering, Pondicherry Engg College, India.
eilavarasan@pec.edu
3
Department of Computer science and Engineering, Pondicherry Engg College, India.
thanigaivel20@pec.edu
4
Department of Computer science and Engineering, Pondicherry Engg College, India.
abarna.pec@gmail.com
ABSTRACT
Making a business rule extraction more dynamic is an open issue, and we think it is feasible if
we decompose the business process structure in a set of rules, each of them representing a
transition of the business process. As a consequence the business process engine can be realized
by reusing and integrating an existing Rule Engine. We are proposing a way for extracting the
business rules and then to modify it at the runtime. Business rules specifies the constraints that
affect the behaviors and also specifies the derivation of conditions that affect the execution flow.
The rules can be extracted from use cases, specifications or system code. But since not many
enterprises capture their business rules in a structured, explicit form like documents or implicit
software codes, they need to be identified first, before being captured and managed. These rules
change more often than the processes themselves, but changing and managing business rules is a
complex task beyond the abilities of most business analysts. The capturing process focuses on
the identification of the potential business rules sources. As business logic requirements change,
business analysts can update the business logic without enlisting the aid of the IT staff. The new
logic is immediately available to all client applications. In current trend the rules are modified or
changed in the static time phase. But this paper provides to change the rules at the run time. Here
the rules are extracted from the services and can be a changed dynamically. The existing rules
are modified and attached to source code without hindering service to the end user which can be
achieved with source control systems. When the rules are revised, it provides a path in budding
new business logic. This new business logic can be adopted for the efficient software
development.
KEYWORDS
Dynamic Rule Execution, Business process, Business rules, Business Rules Approaches.
For More Details : http://airccse.org/journal/jwsc/papers/1210ijwsc02.pdf
Volume Link : http://airccse.org/journal/jwsc/currentissue.html
REFERENCES
[1] Chun Ouyang , “From Business Process Models to Process-Oriented Software Systems”
[2] Michael zur Muehlen, “Business Process and Business Rule Modeling Languages for
Compliance Management: A Representational Analysis”, Twenty-Sixth International
Conference on Conceptual Modeling - ER 2007 - Tutorials, Posters, Panels and Industrial
Contributions, Auckland, New Zealand. Figure 2. Dynamic rule Extraction
[3] Josef Schiefer, “Event-Driven Rules for Sensing and Responding to Business Situations”.
[4] Claire Costello, “ Orchestrating Supply chain Interactions using Emerging Process
Description Languages and Business Rules”.
[5] Anca Andreescu, “ A General Software Development Process Suitable for Explicit
Manipulation of Business Rules”
[6] Milan Milanović1, “ Modeling Service Orchestrations with a Rule-enhanced Business
Process Language”
[7] Olegas Vasilecas,” Ensuring Consistency of Information Systems Rules Models”.
[8] Anis Charfi, “ Hybrid Web Service Composition: Business Processes Meet Business
Rules”.
[9] Bruno de Moura Araujo, “ A method for Validating the Compliance of Business Processes
to Business Rules”.
[10] Nicholas Zsifkov, “ Business Rules Domains and Business Rules Modeling”.
[11] Antonio Oliveira, “ Filho Change Impact Analysis from Business Rules”.
[12] Jose F. Mejia Bernal, “ Dynamic Context-Aware Business Process: A Rule-Based
Approach Supported by Pattern Identification”.
[13] Timon C. Du and Hsing-Ling Chen ,“Building a Multiple-Criteria Negotiation Support
System”, IEEE transactions on knowledge and data engineering, vol. 19, no. 6, June 2007.
[14] Sam Weber, Hoi Chan, Lou Degenaro, Judah Diament, Achille Fokoue-Nkoutche, and
Isabelle Rouvellou, “Fusion: A System For Business Users To Manage Program
Variability”, IEEE Transaction on software engineering , Nov 2008.
[15] H. M. Sneed, “Extracting Business Logic from Existing COBOL Programs as a Basis for
Redevelopment”, 9th International Workshop on Program Comprehension, Toronto,
Canada, 2001, pp. 167-175.
[16] Sangseung Kang, “Design of Rule Object Model for Business Rule Systems”, 1996,pp.
818-822.
[17] Olga Levina, “Extracting Business Logic from Business Process Models”, 2010 IEEE.
[18] Mohammed Alawairdhi, “A Business-Logic Based Framework for Evolving Software
Systems”, 2009 33rd Annual IEEE International Computer Software and Applications
Conference.
[19] Olegas Vasilecas, “Ensuring Consistency of Information Systems Rules Models”, the
International Multiconference on Computer Science and Information Technology, 2008.
[20] Anis Charfi, “ Hybrid Web Service Composition: Business Processes Meet Business
Rules”, ICSOC'04, November 15–19, 2004, New York, New York, USA.
[21] Jose F. Mejia Bernal, “ Dynamic Context-Aware Business Process: A Rule-Based
Approach Supported by Pattern Identification”, SAC’10, March 22-26, 2010, Sierre,
Switzerland.
[22] Gulnoza Ziyaeva, Eunmi Choi, and Dugki Min, “Content-Based Intelligent Routing and
Message Processing in Enterprise Service Bus”, International Conference on Convergence
and Hybrid Information Technology, 2008
[23] en.wikipedia.org/wiki/Business_rule
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY
AND CHALLENGES
Selwa ELFIRDOUSSI
EMINES, School of Industrial Management, University Mohamed 6 Polytechnic, 43150,
Benguerir, Morocco,
ABSTRACT
Efficient supply chain management calls for robust analytical and optimal models to automate its
process. Therefore, information technology is an essential ingredient that integrates these tools in
supply chain. With the emergence of wireless, the high technologies and the reliability of mobile
devices, mobile web services draw a promising horizon facing economic challenges. They offer
new personalized services to each actor in the supply chain on their mobile devices at anytime
and anywhere. This paper presents a literature review of mobile web service implemented on the
industry context based on the supply chain management approach. First, a large definition of
mobile web service and some proposal architecture are exposed. Then the paper discuss some
generic related work on mobile web service focusing on supply chain management. Finally some
challenges on m-service oriented supply chain management are proposed.
KEYWORDS
Mobile web service; smart industry; Supply chain management; Service Oriented Architecture.
For More Details : https://aircconline.com/ijwsc/V9N2/9218ijwsc01.pdf
Volume Link : http://airccse.org/journal/jwsc/current2018.html
REFERENCES
[1] J. T. Mentzer, W. DeWitt, J. S. Keebler, S. Min, N. W. Nix, C. D. Smith et Z. G. Zacharia,
«Defining Supply Chain Mangement,» Journal of Business logistics, vol. 22, n° %12, pp.
1-25, 2001.
[2] S. c. Graham, «Integrating the supply chain,» International Journal of Physical Distribution
& Materials Management, vol. 19, n° %18, pp. 3-8, 1989.
[3] K. Elgazzar, P. Martin et H. Hassanein, «Mobile Web Services: State of the Art and
Challenges,» International Journal of Advanced Computer Science and Applications, vol.
5, n° %13, pp. 173-188, 2014.
[4] E. Elabd, P. M. El-Kafrawy et E. M. Abou-Nassar, «Semantic-based Web Services
Selection for Mobile,» chez The 9th International Conference on INFOrmatics and
Systems, 2014.
[5] S. Berger, S. Mcfaddin, C. Narayanaswami et M. Raghunath, «Web services on mobile
devicesimplementation and experience,» Mobile Computing Systems and Applications, pp.
100-109, 2003.
[6] F. AlShahwan et K. Moessner, «Providing SOAP Web services and RESTful Web services
from mobile hosts,» chez Internet and Web Applications and Services, 2010.
[7] S. Hamida, Une approche basée agent mobile pour le m-service web sémantique, BISKRA:
Université Mohamed Khider, 2014.
[8] T. M. Voigt, T. Naumowicz, H. Ritter et J. Schiller, «Performance considerations for
mobile web services,» Computer Communications, p. 1097–1105, 2007.
[9] M. Treiber, C. Scherling et S. Dustdar, «Applying SOA Principles on Mobile Platforms,»
chez International Conference on Software Engineering, Honolulu, 2010.
[10] F. Hirsch, J. Kemp et J. Ilkka, Mobile web services: architecture and implementation, John
Wiley & Sons, 2007.
[11] S. Oh et G. C. Fox, «HHFR: A new architecture for Mobile Web Services Principles and
Implementations,» Technical paper, 2005.
[12] A. COBÂRZAN, «Consuming Web Services on Mobile Platforms,» Informatica
Economică, vol. 14, n° %13, pp. 98-105, 2010.
[13] M. Chen, D. Zhang et L. Zhou, «Providing web services to mobile users: the architecture
design of an m-service portal,» Int. J. Mobile Communications, vol. 3, n° %11, pp. 1-18,
2005.
[14] S. Abhishek et V. Rohit, «A novel web service directory framework for mobile
environments,» chez International conferance on Web Services (ICWS), Anchorage, 2014.
[15] V. D. a. W. L. Sonja Zaplata, «Realizing Mobile Web Services for Dynamic
Applications,» AIS Transactions on Enterprise Systems, vol. 2, n° %11, pp. 3-12, 2009.
[16] H. Artail, K. Fawaz et A. Ghandour, «A Proxy-Based architecture for dynamic discovery
and invocation of Web Services from mobile devices,» IEEE Transactions on Services
Computing, vol. 5, n° %11, pp. 99-115, 2012.
[17] S. Elfrirdoussi, Z. Jarir et M. Quafafou, «Popularity based Web Service Search,» chez 19th
International Conference on web service, Hawai, 2012.
[18] S. N. Srirama, M. Jarke et W. Prinz, «Mobile web services mediation framework,» chez
ACM/IFIP/USENIX International Middleware Conference, New York, 2007. International
Journal on Web Service Computing (IJWSC), Vol.9, No.2, June 2018 11
[19] K. Elgazzar, H. Hassanein et P. Martin, «Cloud-based mobile Web service discovery,»
Pervasive and Mobile Computing, vol. 13, p. 67–84, 2014.
[20] M. Adacal et A. Bener, «Mobile Web services: a new agent-based framework,» IEEE
Internet Computing, vol. 10, n° %13, pp. 58-65, 2006.
[21] S. N. Srirama, M. Jarke et W. Prinz, «MWSMF: A Mediation Framework Realizing
Scalable Mobile Web Service Provisioning,» chez International conference on MOBILe
Wireless MiddleWARE, Operating Systems, and Applications, 2008
[22] S. N. Srirama, M. Jarke, H. Zhu et H. Prinz, «Scalable mobile web service discovery in
peer to peer networks,» chez Internet and Web Applications and Services, 2008.
[23] K. Elgazzar, P. Martin et H. Hassanein, «Personalized Mobile Web Service Discovery,»
chez World Congress on Services, Santa Clara Marriott, CA, USA, 2013.
[24] R. Kumar et V. K. Kiran, «Dynamic Discovery and Invocation of Web services Through
Android Mobile,» International Journal of Engineering Trends and Technology, vol. 4, n°
%17, pp. 3182- 3185, 2013.
[25] F. AlShahwan et M. Faisal, «Mobile cloud computing for providing complex mobile web
services,» chez Mobile Cloud Computing, Services, and Engineering, San Francisco, 2014.
[26] C. Chang et S. Ling, «Towards an Infrastructure-less SOA for Mobile Web Service
Composition,» chez arXiv preprint arXiv:, 1304.5045.
[27] H. YANG, H. LUO et F. YE, «Security in mobile ad hoc networks: challenges and
solutions,» IEEE wireless communications, pp. 38-47, 2004.
[28] S. N. Rirama, M. Jarke et Prinz, «A performance evaluation of mobile web services
security,» chez 3rd International Conference on Web Information Systems and
Technologies, 2007.
[29] A. Gunasekaran et E. W. Ngai, «Information systems in supply chain integration and
management,» European Journal of Operational Research, vol. 159, n° %12, pp. 269-295,
2004.
[30] K. Croxton , S. Garcia-Dastugue et D. M. Lambert, «The Supply Chain Management
Processes,» The International Journal of Logistics Management, vol. 12, n° %12, pp. 13-
36, 2001.
[31] T. L. Rakestraw, R. V. Eunni et R. R. Kasuganti, «The mobile apps industry: A case
study,» Journal of Business Cases and Applications, vol. 9, n° %11, pp. 1-26, 2013.
[32] A. Light, S. Punnett et K. Webb, Mobile Innovation: Ontario’s Growing Mobile Content,
Services, and Applications, Toronto: Mobile Experience Innovation Centre, 2012.
[33] O. Irena et R. Knut, «Mobile Business in Logistics,» In GI Jahrestagung, pp. 530-536,
2006.
[34] Ö. Åke, S. Linus, L. Per et D. Jerker, «Mobile Medical Applications Made Feasible
Through Use of EIS Platforms,» chez Instrumentation and Measurement Technology
Conference, USA, 2003.
[35] R. Michaelides, Z. Michaelides et D. Nicolaou, «Optimisation of logistics operations using
GPS technology solutions: a case study,» chez POMS conference, Vancouver, 2010.
[36] K. S. Chinchu et G. Selvakumar, «Web Service based e-logistics application,»
International Journal of Modern Engineering Research, pp. 084-088, 2012.
[37] R. Angeles, «supply-chain applications and implementation issues,» Information systems
management, vol. 22, n° %11, pp. 51-65, 2005
[38] T. Kelepouris, K. Pramatari et G. Doukidis, «RFID-enabled traceability in the food supply
chain,» Industrial Management & Data Systems, vol. 107, n° %12, pp. 183-200, 2007.
[39] Q. Shi et X. Ding, «Mobile Internet based construction supply chain management: A
critical review,» Automation in Construction., 2016.
[40] S. Taylor, «The New Mobile World Order : Perspectives on the Future of the Mobile
Industry,» Cisco, 2012.
[41] S. Elfrirdoussi, Z. Jarir et M. Quafafou, «Discovery and Visual Interactive WS Engine
based on popularity: Architecture and Implementation,» International Journal of Software
Engineering and Its Applications, pp. 213-228, 2014.
[42] S. Elfrirdoussi, Z. Jarir et M. Quafafou, «Web Service Composition Based on Popularity,»
chez CS & IT CSCP, 2014.
PXPATHV: PREVENTING XPATH INJECTION VULNERABILITIES IN WEB
APPLICATIONS
V.Shanmughaneethi
Computer Centre, National Institute of Technical Teachers Training and Research (NITTTR),
Govt. of India Taramani, Chennai, India
shanneethi@gmail.com
R.Ravichandran
Resource Centre, National Institute of Technical Teachers Training and Research (NITTTR),
Govt. of India Taramani, Chennai, India
keelairavi@hotmail.com
S.Swamynathan
Dept. IST, CEG, Anna University Chennai, India
swamyns@annauniv.edu
ABSTRACT
Generally, most Web applications use relational databases to store and retrieve information. But,
the growing acceptance of XML technologies for documents it is logical that security should be
integrated with XML solutions. In a web application, an improper user inputs is a main cause for
a wide variety of attacks. XML Path or XPath language is used for querying information from
the nodes of an XML document. XPath Injection is an attack technique, much like SQL
injection, exists when a malicious user can insert arbitrary XPath code into form fields and URL
query parameters in order to inject this code directly into the XPath query evaluation engine.
Through the crafted input a malicious user would bypass authentication or to access restricted
data from the XML data source.Hence, we proposed an approach to detect XPath injection attack
in XML databases at runtime. Our approach intercept XPath expression and parse the XQuery
expression to find the inputs to be placed in the expression. The identified inputs are used to
design an XML file and it would be validated through a schema.
KEYWORDS
XPath Injection, SQL Injection, XQuery, Web Application Security, XSLT, XML Schema,
XML Security, Command Injection
For More Details : http://airccse.org/journal/jwsc/papers/0911wsc05.pdf
Volume Link : http://airccse.org/journal/jwsc/current2011.html
REFERENCES
[1] Zhendong Su, Gary Wassermann, “The Essence of Command Injection Attacks in Web
Applications”, Proceedings of the thirty third ACM symposium on Principles of
Programming Languages,South Carolina,2006,pp. 372-382.
[2] Amit Kelvin, “Blind XPath Injection”, a whitepaper from Watchfire, Director of Security
and Research, Sanctum, 2005.
[3] Jaime Blasco, “Introduction to XPath Injection Techniques”, Hakin9, Conference on IT
Underground, Czech Republic, 2007, pp.no 23-31.
[4] Dimitris Mitropoulos, Vassilios Karakoidas, and Diomidis Spinellis, “Fortifying
Applications against XPath Injection Attacks”, MCIS 2009: 4th Mediterranean Conference
on Information Systems, 2009, Athens, pp.no 1169–1179.
[5] Nuno Antunes, Nuno Laranjeiro, Marco Vieira, Henrique Madeira, “ Effective Detection 1
2 3 4 5 6 7 8 9 10 0 50 100 150 200 250 Response Time Without PXpathV module (ms)
Response Time With PXpathV module (ms) International Journal on Web Service
Computing (IJWSC), Vol.2, No.3, September 2011 64 of SQL/XPath Injection
Vulnerabilities in Web Services”, IEEE International Conference on Services
Computing,Portugal, 2009, pp. 260-267
[6] Gabriel Hermosillo, Roberto Gomez, Lionel Seinturier, Laurence Duchien , “Using Aspect
Programming to Secure Web Applications”, Journal of Software,Vol. 6, No.
2,Vienna,2008,pp. 53-63.
[7] Jinghua Groppe,Sven Groppe, “ Filtering unsatisfiable XPath queries”, Journal Data &
Knowledge Engineering , Vol.64 No. 1,Amsterdam, 2008,pp.no 134-169.
[8] XML Path Language (XPath) version 2.0, http://www.w3.org/TR/XPath
[9] OWASP Guide, http://www.owasp.org/index.php/Blind_XPath_Injection
[10] Vieira, M., Antunes, N., Madeira, H., “Using Web Security Scanners to Detect
Vulnerabilities in Web Services”, Intl.Conf. on Dependable Systems and Networks,
Lisbon, 2009.
[11] Laranjeiro, N., Vieira, M., Madeira, H., “Protecting Database Centric Web Services against
SQL/XPath Injection Attacks”, DEXA 2009, Linz, Austria, September 2009
[12] Wu, R., Hisada, H. and Ranaweera, R., ‘‘Static analysis of web security in generic syntax
format’’, The 2009 International Conference on Internet Computing (ICOMP 2009), Las
Vegas, NV, pp. 58-63
[13] Velu Shanmughaneethi, Ra. Yagna Pravin and S. Swamynathan “XIVD: Runtime
Detection of XPath Injection Vulnerabilities in XML Databases through Aspect Oriented
Programming” Communications in Computer and Information Science, 1, Volume 198,
Advances in Computing and Information Technology (ACITY 2011), Part 1, Pages 192-
201
DYNAMIC WEB SERVICE COMPOSITION BASED ON NETWORK MODELING WITH
STATISTICAL ANALYSIS AND BACKTRACKING
M.SureshKumar 1
and P.Varalakshmi 2
1
Research Scholar, Anna University, Chennai, suresh.priya.kumar@gmail.com
2
Department of Information Technology, MIT Campus, Anna University, Chennai,
varanip@gmail.com
ABSTRACT
A Web service is a software system designed to support interoperable machine-to-machine
interaction over a network. Web services provide a standard means of interoperating between
different software applications, running on a variety of platforms and/or frameworks. One of the
main advantages of the usage of web services is its ability to integrate with the other services
through web service composition and realize the required functionality. This paper presents a
new paradigm of dynamic web services composition using network analysis paired with
backtracking. An algorithm called “Zeittafel” for the selection and scheduling of services that are
to be composed is also presented. With the proposed system better percentage of job success rate
is obtained compared to the existing methodology.
KEYWORDS
Dynamic composition, PERT, backtracking, tour planner
For More Details : http://airccse.org/journal/jwsc/papers/3212ijwsc02.pdf
Volume Link : http://airccse.org/journal/jwsc/current2012.html
REFERENCES
[1] Web Services Architecture http://www.w3.org/TR/ws-arch/
[2] Thomas Erl, SOA Principles http://www.soaprinciples.com/
[3] P.Sandhya and Dr. M. Lakshmi, “A Novel Approach for Realizing Business Agility
through Temporally Planned Automatic Web Service Composition using Network
Analysis” , International Conference On Semantic Web & Web Services SWWS 2011.
[4] Gexin Li, Aixin Zu, Chengwen Wu, Zhengzhong Wang, “Web service composition based
on backtracking”, Second International Conference on Artificial Intelligence, Management
Science and Electronic Commerce AIMSEC 2011.
[5] Program Evaluation and Review Technique (PERT)
http://en.wikipedia.org/wiki/Program_Evaluation_and_Review_Technique
[6] Backtracking http://en.wikipedia.org/wiki/Backtracking
[7] Incheon Paik, Daisuke Maruyama “Automatic Web Services Composition Using
Combining HTand CSP” Seventh International Conference on Computer And Information
Technology, IEEE 2007
[8] Sayed Gholam Hassan Tabatabaei, “Web Service Composition Approaches to Support
Dynamic E- Business Systems”, Communications of the IBIMA, 2008
[9] Farhan Hassan Khan, M.Younus Javed, Saba Bashir , “QoS Based Dynamic Web Services
Composition & Execution”, International Journal of Computer Science and Information
Security, Vol. 7, No. 2, February 2010
[10] Yilan Gu and Mikhail Soutchanski. “ A Logic For Decidable Reasoning About Services”
Proceedings of AAAI-06 workshop on AIDriven Technologies for Services-Oriented
Computing 2006.
[11] A. Marconi, M. Pistore, and P. Traverso. "Implicit vs. Explicit Data-Flow Requirements in
Web Service Composition Goals". In Proceeding of the 4th International Conference on
ServiceOriented Computing (ICSOC06), volume 4294 of Lecture Notes in Computer
Science (LNCS), Chicago, Illinois, USA, 2006. Springer.
[12] Michael Hu, Howard Foster “Using a Rigorous Approach for Engineering Web Services
Compositions: A Case Study”. IEEE International Conference on Services Computing, Vol
2, July 2005
[13] Daniela Barreirs claro, Patrick Albers , Jin-kao Hao “Selecting Web Services for Optimal
Composition” 2nd International Workshop On Semantic And Dynamic Web Processes
(SDWP 2005).
SPEEDING UP THE WEB CRAWLING PROCESS ON A MULTI-CORE
PROCESSOR USING VIRTUALIZATION
Hussein Al-Bahadili1
, Hamzah Qtishat2
, Reyadh S. Naoum2
1
Faculty of Information Technology, Petra University, Amman, Jordan hbahadili@uop.edu.jo
2
Faculty of Information Technology, Middle East University, Amman, Jordan
hamzah.qtishat@yahoo.com,rnaoum@meu.edu.jo
ABSTRACT
A Web crawler is an important component of the Web search engine. It demands large amount of
hardware resources (CPU and memory) to crawl data from the rapidly growing and changing
Web. So that the crawling process should be a continuous process performed from time-to-time
to maintain up-to-date crawled data. This paper develops and investigates the performance of a
new approach to speed up the crawling process on a multi-core processor through virtualization.
In this approach, the multi-core processor is divided into a number of virtual-machines (VMs)
that can run in parallel (concurrently) performing different crawling tasks on different data. It
presents a description, implementation, and evaluation of a VM-based distributed Web crawler.
In order to estimate the speedup factor achieved by the VM-based crawler over a non-
virtualization crawler, extensive crawling experiments were carried-out to estimate the crawling
times for various numbers of documents. Furthermore, the average crawling rate in documents
per unit time is computed, and the effect of the number of VMs on the speedup factor is
investigated. For example, on an Intel® Core™ i5-2300 CPU @2.80 GHz and 8 GB memory, a
speedup factor of ~1.48 is achieved when crawling 70000 documents on 3 and 4 VMs.
KEYWORDS
Web search engine; Web crawler; virtualization; virtual machines; distributed crawling; multi-
core processor; distribution methodologies; processor-farm methodology.
For More Details : http://airccse.org/journal/jwsc/papers/4113ijwsc02.pdf
Volume Link : http://airccse.org/journal/jwsc/current2013.html
REFERENCES
[1] B. Croft, D. Metzler, &T. Strohman (2009). Search Engines: Information Retrieval in
Practice. Addison Wesley.
[2] M. Levene (2005). An Introduction to Search Engine and Web Navigation. Addison
Wesley.
[3] WorldWideWebSize (2012). The size of the World Wide Web.
http://www.worldwidewebsize.com.
[4] T. Calishain. (2004). Web Search Garage. Prentice Hall.
[5] C. Olston&M. Najork (2010). Web Crawling. Now Publishers Inc.
[6] Q. Tan (2009). Designing New Crawling and Indexing Techniques for Web Search
Engines. VDM Verlag.
[7] W. Gao, H. C. Lee, &Y. Miao (2006). Geographically Focused Collaborative Crawling.
Proceedings of the 15th International Conference on World Wide Web (WWW’06), pp.
287-296.
[8] D. Mukhopadhyay, S. Mukherjee, S.Ghosh, S. Kar, &Y. C. Kim(2006). Architecture of a
Scalable Dynamic Parallel WebCrawler with High Speed Downloadable Capability for a
Web Search Engine. Proceedings of the 6th International Workshop on Multimedia Signal
Processing & Transmission (MSPT’06). pp. 103-108. Jeonju, Korea.
[9] S. Tongchim, P.Srichaivattana, C.Kruengkrai, V.Sornlertlamvanich, &H.
Isahara(2006).Collaborative Web Crawler over High-speed Research Network.
Proceedings of the 1st International Conference on Knowledge, Information and Creativity
Support Systems, pp. 302-308. August 1-4. Ayutthaya, Thailand.
[10] Boldi, P., Codenotti, B., Santini, M., & Vigna, S. (2004). UbiCrawler: A Scalable Fully
Distributed Web Crawler. Software: Practice and Experience, Vol. 34, Issue 8, pp. 711 –
726.
[11] J. Cho,&H. Garcia-Molina (2002). Parallel Crawlers. Proceedings of the 11th International
Conference on World Wide Web (WWW’02). May 7-11. Honolulu, Hawaii, USA.
[12] V. Shkapenyuk&T. Suel (2002).Design and Implementation of a High-Performance
Distributed Web Crawler.Proceedings of the 18th International Conference on Data
Engineering, pp.357-368. February 26- March 1. San Jose, CA, USA.
[13] I. Hernandez, C. R.Rivero, D. Ruiz, &R. Corchuelo (2012) An Architecture for Efficient
Web Crawling. Lecture Notes in Business Information Processing, Vol. 112, pp. 228-234
[14] S. Ghoshal (2011). Computer Architecture and Organization. Pearson Education.
[15] J. Laudon L.Spracklen (2007). The ComingWave of Multithreaded Chip Microprocessors.
International Journal of Parallel Programming, Vol. 35, No. 3, pp. 299-330.
[16] T. L. Floyd (2009). Digital Fundamentals. 10th Edition. Prentice Hall.
[17] H. Al-Bahadili&S. Al-Saab (2011).Development of a Novel Compressed Index-Query
Web Search Engine Model. International Journal of Information Technology and Web
Engineering (IJITWE), Vol. 6, No. 3, pp. 39-56.
[18] J. Smith &R. Nair (2005). Virtual Machines: Versatile Platforms for Systems and
Processes. The Morgan Kaufmann Series in Computer Architecture and Design.
[19] N. Smyth (2010). Xen Virtualization Essentials. Payload Media.
[20] C. Takemura &L. Crawford (2009). The Book of Xen: A Practical Guide for the System
Administrator. 1st Edition. No Starch Press.
[21] J. Cho, H. Garcia-Molina &L. Page (1998). Efficient Crawling Through URL
Ordering.Proceedings of the 7th International World-Wide Web Conference (WWW
1998), April 14-18, Brisbane, Australia.
[22] S. Chakrabarti, M. van den Berg, &B. Dom (1999). Focused Crawling: A New Approach
to Topic-Specific Web Resource Discovery. Computer Networks, Vol 31, Issue 11-16, pp.
1623–1640
[23] C. Chung &C. L. A. Clarke (2002). Topic-Oriented Collaborative Crawling. Proceedings
of the ACM Conference on Information and Knowledge Management (CIKM’02),
November 4–9. McLean, Virginia, USA. International Journal on Web Service Computing
(IJWSC), Vol.4, No.1, March 2013 37
[24] H. Yan, J. Wang, X. Li, & L. Guo (2002). Architectural Design and Evaluation of an
Efficient Webcrawling System. Journal of System and software, Vol. 60, Issue 3, pp.185-
193.
[25] T. Takahashi, H. Soonsang, K. Taura, & A. Yonezawa (2002). World Wide Web Crawler.
Proceedings of the 11th International Conference on World Wide Web (WWW 2002), May
7-11, Honolulu, Hawaii, USA.
[26] B. T. Loo, O. Cooper, & S. Krishnamurthy(2004). Distributed Web Crawling over DHTs.
University of California, Berkeley. EECS Technical Report Identifier: CSD-04-1305.
Retrieved on 12 August 2012 fromhttp://techreports.lib.berkeley.edu/accessPages/CSD-04-
1305.
[27] Y. Hafri&C. Djeraba(2004). High Performance Crawling System. Proceedings of the 6th
ACM SIGMM International Workshop on Multimedia Information Retrieval (MIR’04),
pp. 299-306, October 10-16, New York, USA.
[28] J. Exposto, J. Macedo, A. Pina, A. Alves, &J. Rufino (2005). Geographical Partition for
Distributed Web Crawling. Proceedings of the 2nd International ACM Workshop on
Geographic Information Retrieval (GIR 2005), ACM Press, pp. 55-60, Bremen, Germany.
[29] D. H. P. Chau, S. Pandit, S. Wang, &C. Faloutsos (2007). Parallel Crawling for Online
Social Networks. Proceedings of the International Conference on World Wide Web
(WWW 2007). May 8-12. PP. 201-210. Banff, Alberta, Canada.
[30] S. Ibrahim, H. Jin, L. Lu, L. Qi, S. Wu, &X. Shi (2009). Evaluating MapReduce on Virtual
Machines: The Hadoop Case. Lecture Notes in Computer Science, Vol. 5931, pp. 519-528.
[31] J. M. Hsieh, S. D. Gribble, &H. M. Levy (2010). The Architecture and Implementation of
an Extensible Web Crawler. Proceedings of the 7th USENIX Symposium on Networked
Systems Design and Implementation (NSDI '10). April 28-30. San Jose, California, USA.
[32] S. Anbukodi&K. M. Manickam (2011). Reducing Web Crawler Overhead Using Mobile
Crawler. International Conference on Emerging Trends in Electrical and Computer
Technology (ICETECT 2011). pp. 926-932. March 23-24. Nagercoil, India.
[33] Xen (2012). http://www.xen.org.
[34] F. Hartl (2012). Nutch How It Works. http://www.florianhartl.com/nutch-how-it-
works.html.
[35] T. White (2012). Hadoop: The Definitive guide. 3rd Edition. O'Reilly Media.
[36] H. M. Qtishat (2012). Developing a Virtual-Machine-Based Distributed Web Crawling
Model. MSc Thesis. Faculty of Information Technology, Middle East University, Amman,
Jordan.
[37] M. Fleury&A. Downton (2004). Pipelined Processor Farms: Structured Design for
Embedded Parallel Systems. John Wiley & Sons.
[38] S. Roosta (2000). Parallel Processing and Parallel Algorithms: Theory and computation.
Springer Verlag. New York, USA.
WEB SERVICE COMPOSITION PROCESSES: A COMPARATIVE STUDY
Aram AlSedrani and Ameur Touir Department of Computer Science, King Saud University,
Riyadh, KSA
ABSTRACT
Service composition is the process of constructing new services by combining several existing
ones. It considered as one of the complex challenges in distributed and dynamic environment.
The composition process includes, in general, the searching for existing services in a specific
domain, and selecting the appropriate service, then coordinating composition flow and invoking
services. Over the past years, the problem of web service composition has been studied
intensively by researchers. Therefore, a significant amount of solutions and new methods to
tackle this problem are presented. In this paper, our objective is to investigate algorithms and
methodologies to provide a classification of existing methods in each composition phase.
Moreover, we aim at conducting a comparative study to discover the main features and limitation
in each phase in order to assist future research in this area.
KEYWORDS
Service composition, Composition planning, Discovery method, Selection method, Execution
method.
For More Details : https://aircconline.com/ijwsc/V7N1/7116ijwsc01.pdf
Volume Link : http://airccse.org/journal/jwsc/current2016.html
REFERENCES
[1] M. H. Valipour, B. Amirzafari, K. N. Maleki, and N. Daneshpour, “A Brief Survey of
Software Architecture Concepts and Service Oriented Architecture,” in IEEE International
Conference on Computer Science and Information Technology, 2009, pp. 34–38.
[2] R. Yin, “Study of Composing Web Service Based on SOA,” in Proceedings of the 2nd
International Conference on Green Communications and Networks, 2013, vol. 2, no. Gcn
2012, pp. 209–214.
[3] J. Rao and X. Su, “A Survey of Automated Web Service Composition Methods,” in
Proceedings of the First international conference on Semantic Web Services and Web
Process Composition, 2004, vol. 3387, pp. 43–54.
[4] V. Portchelvi, V. P. Venkatesan, and G. Shanmugasundaram, “Achieving Web Services
Composition – a Survey,” Softw. Eng., vol. 2, no. 5, pp. 195–202, 2012.
[5] F. Zeshan and R. Mohamad, “Semantic Web Service Composition Approaches : Overview
and Limitations,” Int. J. New Comput. Archit. Their Appl., vol. 1, no. 3, pp. 640–651,
2011.
[6] P. Bertoli, A. Cimatti, M. Pistore, and P. Traverso, “A Framework for Planning with
Extended Goals under Partial Observability,” in ICAPS-03 Proceedings, 2003, pp. 215–
224.
[7] S. Kumar, “Agent-Based Semantic Web Service Composition,” New York, NY: Springer,
2012, pp. 15–25.
[8] P. Kungas and M. Matskin, “Semantic Web Service Composition Through a P2P-Based
Multi-agent Environment,” in Proceedings of the Fourth International Workshop on Agents
and Peer-to- Peer Computing, 2005, pp. 106–119.
[9] L. Wei, L. Junzhou, L. Bo, Z. Xiao, and C. Jiuxin, “Multi-agent based QoS-aware Service
Composition,” in IEEE International Conference on Systems, Man and Cybernetics, 2010,
pp. 3125– 3132.
[10] M. Klusch, “Semantic Web Service Description,” in Intelligent Service Coordination in the
Semantic Web, Birkhauser Basel publishing, 2008, pp. 41–68.
[11] A. KIM, M. KANG, C. MEADOWS, E. IOUP, and J. SAMPLE, “A Framework for
Automatic Web Service Composition,” Washington, USA, 2009.
[12] G. Baryannis, O. Danylevych, D. Karastoyanova, K. Kritikos, P. Leitner, F. Rosenberg,
and B. Wetzstein, “Service Composition,” in The S-Cube Book, Springer, 2010, pp. 57–87.
[13] J. Korhonen, L. Pajunen, and J. Puustjärvi, “Automatic Composition of Web Service
Workflows Using a Semantic Agent,” in Proceedings of the IEEE/WIC International
Conference on Web Intelligence, 2003, pp. 566–569
[14] W. Van Der-Aalst, K. Van Hee, and G. Houben, “Modelling and Analysing Workflow
using a Petrinet Based Approach,” in Proceedings of the second Workshop on Computer-
Supported Cooperative Work, Petri nets and related for- malisms, 1994, pp. 31–50
[15] BPMN, “Business Process Modeling Notation,” Object Management Group, 2011.
[Online]. Available: http://www.bpmn.org/.
[16] M. Carman, L. Serafini, and P. Traverso, “Web Service Composition as Planning,” in
Workshop on Planning for Web Services in ICAPS’03, 2003.
[17] J. Peer, “Web Service Composition as AI Planning – a Survey,” Switzerland, 2005.
[18] B. Bonet and H. Geffner, “Planning as Heuristic Search: New Results,” ECP, pp. 360–372,
1999.
[19] V. levizou and D. Plexousaki, “Enhanced Specifications for Web Service Composition,” in
proceedings of the European Conference on Web Services, 2006, pp. 223–232.
[20] K. Nariai, I. Paik, and M. Shinozawa, “Planning and Composition of Web services with
Dynamic Constraints Using Situation Calculus,” in Proceedings of The Fifth International
Conference on Computer and Information Technology (CIT’05), 2005, pp. 1009–1013.
[21] S. J. Samuel, R. G. Road, and T. Nadu, “an Approach for Graph Based Planning and
Quality Driven Composition of Web Services,” Indian J. Comput. Sci. Eng., vol. 2, no. 5,
pp. 672–679, 2011.
[22] F. Lecue, E. Silva, and L. F. Pires, “A Framework for Dynamic Web Services
Composition,” in Proceedings of the 2nd ECOWS Workshop on Emerging Web Services
Technology, 2007, pp. 59–75. International Journal on Web Service Computing (IJWSC),
Vol.7, No.1, March 2016 20
[23] S. Narayanan and S. A. McIlraith, “Simulation, Verifcation and Automated Composition
of Web Services,” in WWW ’02: Proceedings of the eleventh international conference on
World Wide Web, 2002, pp. 77–88.
[24] M. Ghallab, D. Nau, and P. Traverso, “Hierarchical Task Network Planning,” in
Automated Planning Theory and Practice, First., San Francisco: Elsevier Inc., 2004, pp.
229–262.
[25] B. B. Anderson, J. V. Hansen, and P. B. Lowry, “Creating automated Plans for Semantic
Web Applications Through Planning as Model Checking,” Expert Syst. Appl., vol. 36, no.
7, pp. 10595– 10603, 2009.
[26] A. Farooq and R. Arshad, “An Efficient Technique for Web Services Identification,” Int. J.
Multidiscip. Sci. Eng., vol. 2, no. 1, pp. 26–30, 2011.
[27] S. Pakari, E. Kheirkhah, and M. Jalali, “Web Service Discovery Methods And Techniques :
A Review.,” vol. 4, no. 1, pp. 1–14, 2014.
[28] H. Xiao, Y. Zou, J. Ng, and L. Nigul, “An Approach for Context-Aware Service Discovery
and Recommendation,” in IEEE International Conference on Web Services, 2010, pp. 163–
170.
[29] N. H. Rostami, E. Kheirkhah, and M. Jalali, “Web Services Composition Methods and
Techniques: A Review,” Int. J. Comput. Sci. Eng. Inf. Technol., vol. 3, no. 6, pp. 15–29,
2013.
[30] D. Fensel, F. M. Facca, E. Simperl, and I. Toma, “Web Service Modeling Ontology,” in
Semantic Web Services, Springer Berlin Heidelberg, 2011, pp. 107–129.
[31] J. Sangers, F. Frasincar, F. Hogenboom, and V. Chepegin, “Semantic Web Service
Discovery Using Natural Language Processing Techniques,” Expert Syst. Appl., vol. 31,
pp. 1–27, 2013.
[32] T. Amudha, N. Saritha, and P. Usha, “A Multi-agent Based Framework for Dynamic
Service Discovery and Access Using Matchmaking Approach,” in International
Conference on Intelligent Agent & Multi-Agent Systems, 2009, pp. 1–4.
[33] M. Klusch, B. Fries, and K. Sycara, “OWLS-MX : A Hybrid Semantic Web Service
Matchmaker for OWL-S Services,” Web Semant. Sci. Serv. Agents World Wide Web, vol.
7, no. 2, pp. 121–133, 2009.
[34] . Zhou, N. A. Abdullah, and Z. Shi, “A Hybrid P2P Approach to Service Discovery in the
Cloud,” I.J. Inf. Technol. Comput. Sci., vol. 1, pp. 1–9, 2011.
[35] M. Moghaddam and J. G. Davis, “Service Selection in Web Service Composition: A
Comparative Review of Existing Approaches,” in Web Services Foundations, First., A.
Bouguettaya, Q. Z. Sheng, and F. Daniel, Eds. New York: Springer, 2014, pp. 321–346.
[36] L. Zeng, B. Benatallah, A. H. H. Ngu, M. Dumas, J. Kalagnanam, and H. Chang, “QoS-
Aware Middleware for Web Services Composition,” IEEE Trans. Softw. Eng., vol. 30, no.
5, pp. 311–327, May 2004.
[37] L. Ai, “QoS-Aware Web Service Composition using Genetic Algorithms,” Queensland
University of Technology, 2011.
[38] A. Hilton and T. Culver, “Constraint Handling for Genetic Algorithms in Optimal
Remediation Design,” J. Water Resour. Plan. Manag., vol. 126, no. 3, pp. 128–137, 2000.
[39] F. Rosenberg, P. Celikovic, A. Michlmayr, P. Leitner, and S. Dustdar, “An End-to-End
Approach for QoS-Aware Service Composition,” in IEEE International Enterprise
Distributed Object Computing Conference, 2009, pp. 151–160.
[40] F. Rosenberg, P. Celikovic, A. Michlmayr, P. Leitner, and S. Dustdar, “A Stochastic
Programming Approach for QoS-Aware Service Composition,” in Eighth IEEE
International Symposium on Cluster Computing and the Grid (CCGRID), 2008, pp. 226–
233.
[41] X. Xie and K. Chen, “An AHP-Based Evaluation Model for Service Composition,” in
Computational Science and Its Applications - ICCSA, 2006, pp. 756–766.
[42] J. Figueira, V. Mousseau, and B. Roy, “ELECTRE Methods,” in Multiple Criteria Decision
Analysis, Springer, 2005, pp. 133–162.
[43] S. Dasgupta, “A Semantic Framework for Event-Driven Service Composition" A
Dissertation in Computer Science and Telecommunications and Computer Networking
Presented to the Faculty of the University of Missouri Kansas City in partial fulfillment of
the requirements for t,” University of Missouri Kansas City, 2011
[44] A. Karande, M. Karande, and B B Meshram, “Choreography and Orchestration using
Business Process Execution Language for SOA with Web Services,” Int. J. Comput. Sci.
Issues IJCSI´11, vol. 8, no. 2, pp. 224–232, 2011.
[45] J. P. Sousa, V. Poladian, D. Garlan, and B. Schmerl, “Task-based Adaptation for
Ubiquitous Computing,” IEEE Trans. Syst. Man. Cybern., vol. 36, no. 3, pp. 328–340,
2006.
[46] F. Casati, S. Ilnicki, L. Jin, V. Krishnamoorthy, and M.-C. Shan, “Adaptive and Dynamic
Service Composition in eFlow,” in proceeding of 12th International Conference Advanced
Information Systems Engineering (CAiSE), 2000, pp. 13–31.
[47] K. Kritikos, S. Kubicki, and E. Dubois, “Goal-based Business Service Composition,” Serv.
Oriented Comput. Appl., vol. 7, no. 4, pp. 231–257, 2013.
[48] J. Rao, P. Küngas, and M. Matskin, “Composition of Semantic Web Services Using Linear
Logic Theorem Proving,” Inf. Syst., vol. 31, no. 4–5, pp. 340–360, 2006.
[49] L. Chen, M. Li, and J. Cao, “A Rule-Based Workflow Approach for Service Composition,”
Parallel Distrib. Process. Appl., vol. 3758, no. 03, pp. 1036–1046, 2005.
[50] Z. Ying, C. Junliang, C. Bo, and Z. Yang, “Using ECA Rules to Manage Web Service
Composition for Multimedia Conference System,” in 2nd IEEE International Conference
on Broadband Network & Multimedia Technology, 2009, pp. 545–549.
A LITERATURE REVIEW ON TRUST MANAGEMENT IN WEBSERVICES ACCESS
CONTROL
R.Joseph Manoj1
and Dr.A.Chandrasekar2
1
Research Scholar, Manonmaniam Sundaranar University, Tirunelveli, Tamilnadu, India &
Associate Professor, Department of MCA, St.Joseph’s College of Engineering, Chennai, India,
2
Professor, Department of CSE, St.Joseph’s College of Engineering, Chennai, India
ABSTRACT
Web Service is a reusable component which has set of related functionalities that service
requesters can programmatically access from the service provider and manipulate through the
Web. One of the main security issue is to secure web services from the malicious requesters.
Since trust plays an important role in many kinds of human communication, it allows people to
work under insecurity and with the risk of negative cost, many researchers have proposed
different trust based web services access control model to prevent malicious requesters. In this
literature review, various existing trust based web services access control model have been
studied also investigated how the concept of a trust level is used in the access control policy of a
service provider to allow service requester to access the web services.
KEYWORDS
Web Services, Access model, security, trust, trust model.
For More Details : http://airccse.org/journal/jwsc/papers/4313ijwsc01.pdf
Volume Link : http://airccse.org/journal/jwsc/current2013.html
REFERENCES
[1] S. Haibo and H.Fan, "A context-aware role-based access control model for web services,"
in IEEE International Conference on e- Business Engineering, 2005. ICEBE 2005
[2] E. Yuan, J. Tong, B. A. H. Inc, “Attributed based access control for web services," in 2005
IEEE International Conference on Web Services, 2005. ICWS 2005. Proceedings, 2005
[3] R.Joseph manoj, A.Chandrasekar, M.D.Anto Praveena, Gandhi Desai “AFTAC: Attribute,
Feedback and Time Decay based Access Control for web services”,(ICCCIT 2012)
[4] Hien Trang Nguyen, Weiliang Zhao, Jian Yang, “A Trust and Reputation Model Based on
Bayesian Network for Web Services”, 2010 IEEE International Conference on Web
Services
[5] V.Mareeswari, Dr. E. Sathiyamoorthy, “A Survey on Trust in Semantic Web Services”
International Journal of Scientific & Engineering Research, Volume 3, Issue 2, February-
2012
[6] Srividya K Bansal, Ajay Bansal, M. Brian Blake, Trust-based Dynamic Web Service
Composition using Social Network Analysis, IEEE Workshop on Business Applications of
Social Network, 13th December 2010.
[7] Damjan Kovac, Denis Trcek, Qualitative trust modeling in SOA, Journal of Systems
Architecture 55 (2009) 255–263
[8] Donovan Artz, Yolanda Gil,” A survey of trust in computer science and the Semantic
Web”.
[9] Stefania Galizia, Alessio Gugliotta and John Domingue, A Trust Based Methodology for
Web Service Selection, International Conferences on Semantic Computing, 2007.
[10] Surya Nepal, Wanita Sherchan and Athman Bouguettaya, A Behaviour-Based Trust Model
for Service Web, IEEE international Conference on Service Oriented Computing and
Applications, 2010.
[11] Xing Su, Minjie Zhang, Yi Mu, Kwang Mong Sim, PBTrust: A Priority-Based Trust
Model for Service Selection in General Service-Oriented Environments, 2010 IEEE/IFIP
International Conference on Embedded and Ubiquitous Computing.
[12] Yijiao Zhu a, Junhao Wen a, Mingwen Qin a, Guoli Zhou, Web Service Selection
Mechanism with QoS and Trust Management, Journal of Information & Computational
Science 8: 12 (2011) 2327– 2334.
[13] Manling Zhu, Lin Liu, Zhi Jin, A Social Trust Model for Services, AWRE 2006 Adelaide,
Australia
[14] R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. 2003. Propagation of Trust and
Distrust. Proceedings of the 13th Annual International World Wide Web Conference,
NewYork, International Journal on Web Service Computing (IJWSC), Vol.4, No.3,
September 2013 18
[15] L Ding, L Zhou, T Finin, Trust Based Knowledge Outsourcing for Semantic Web Agents,
WIC International Conference on Web Intelligence (WI 2003), 2003
[16] S.D. Kamvar, M.T. Schlosser, H. Garcia-Molina. “The Eigen-Trust algorithm for
reputation management in P2P networks”, In Proc. 12th Int. World Wide Web Conf., 2003.
[17] Y Gil, D Artz, Towards content trust of web resources, Proceedings of the 15th
international conference on World Wide Web, 2006
[18] Yarden Katz and Jennifer Golbeck, Social network-based trust in prioritized default logic
in Proceedings of the twenty-first national conference on artificial intelligence (aaai-06),
2006.
[19] Y. Gil, V. Ratnakar. Trusting Information Sources One Citizen at a Time. Proc. 1st Int.
Semantic Web conf.(ISWC), Sardinia, Italy, 2002
[20] Sapna Singh*, Archana Puri*, Shiksha Smreti Singh*, Anurika Vaish*, S.Venkatesan* A
Trust Based pproach For Secure Access Control In Information Centric Network
[21] Cesar Ali “CATRAC: Context Aware Trust and Role based Access Control for composite
web services” 10th IEEE international Conference on computer and information
technology (CIT 2010)
[22] Shanshan Song, Kai Hwang, and Mikin Macwan, “Fuzzy Trust Integration for Security
Enforcement in Grid Computing” NPC 2004, LNCS 3222, pp. 9-21.
[23] Wang Meng; Hongxia Xia; Huazhu Song, “A Dynamic Trust Model Based on
Recommendation Credibility in Grid Domain”, International Conference CiSE, 2009.
[24] Gao Ying; Zhan Jiang, “A layered trust model based on behavior in service grid“, 2nd
International Conference ICACC, 2010.
[25] Kai Wei; Shaohua Tang, “A Multi-level Trust Evaluation Model based on D-S Theory for
Grid”, International Conference CIS '09. 2009.
[26] Vivekananth.P “A Behavior Based Trust Model for Grid Security”, International Journal of
Computer Applications, Volume 5– No.6, 2010.
[27] Shangzhu Jin ; Jun peng Access control for web services based on feedback and time
decay” Proc 9th IEEE Int.Conf on cognitive Informatics 2010.
[28] Tie-Yan Li, Huafei Zhu, Kwok-Yan Lam: “A Novel Two-Level Trust Model for Grid”.
ICICS 2003.
[29] Wu Xiaonian; Zhang Runlian; Zhou Shengyuan; Ma Chunbo, “Behavior Trust
Computation Model Based on Risk Evaluation in the Grid Environment”, WRI World
Congress WCSE '09, 2009.
[30] Bhanwar, S.; Bawa, S, “Establishing and Evaluating Trust in a Grid Environment”, 10th
International symposium ISPAN’09, 2009
[31] Renagaramanujam Srinivasan and Srivaramangai P. “A Comprehensive Trust Model for
Improved Reliability in Grid.”, International Journal of Computer Applications Volume5-
No.7,August 2010
[32] Takabi H, Amini M, and Jalili R, “Trust-Based User-Role Assignment in Role-Based
Access Control,” ACS/IEEE International Conference on Computer Systems and
Applications2007, The University of Arizona, Amman, Jordan: AICCSA 2007
[33] X. Wang, J. Luo, A. Song and T. Ma, “Semantic Access Control in Grid Computing”.
Proc. 11th International Conference on Parallel and Distributed Systems, 2005.
[34] Scott D. Stoller,” Trust Management for Web Services”, 2005
[35] Meriam Jemel, Nadia Ben Azzouna, Khaled Ghedira” Towards a Dynamic Access Control
Model for E-government Web Services”, IEEE Asia-Pacific Services Computing
Conference,2010
[36] Mui, L., Mohtashemi, M., Halberstadt, A.: “A computational model of trust and
reputation”. In: 35th Annual Hawai International Conference on System Sciences
(HICSS’02). Volume 7.IEEE Computer Society
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
Mathur Mohit
Asst. Professor, Department of IT &CS Jagan Institute of Management Studies (Affiliated to
GGSIP University, New Delhi), Rohini, Delhi, India.
mohitmathur19@yahoo.co.in
ABSTRACT
Cloud computing is generally believed to the most gifted technological revolution in computing
and it will soon become an industry standard. It is believed that cloud will replace the traditional
office setup. However a big question mark exists over the network performance when the cloud
traffic explodes. We call it “explosion” as in future we know that various cloud services
replacing desktop computing will be accessed via cloud and the traffic increases exponentially.
This journal aims at addressing some of these doubts better called “dangers” about the network
performance, when cloud becomes a standard globally and providing a comprehensive solution
to those problems. Our study concentrates on, that despite of offering better round-trip times and
throughputs, cloud appears to consistently lose large amounts of the data that it is required to
send to the clients. In this journal, we give a concise survey on the research efforts in this area.
Our survey findings show that the networking research community has converged to the
common understanding that a measurement infrastructure is insufficient for the optimal
operation and future growth of the cloud. Despite many proposals on building an network
measurement infrastructure from the research community, we believe that it will not be in the
near future for such an infrastructure to be fully deployed and operational, due to both the scale
and the complexity of the network. We also suggest a set of technologies to identify and manage
cloud traffic using IP header DS field, QoS protocols, MPLS/IP Header Compression, Use of
high speed edge routers and cloud traffic flow measurement. In the solution DS Field of IP
header will be used to recognize the cloud traffic separately, QOS protocols provide the cloud
traffic, the type of QOS it requires by allocating resources and marking cloud traffic
identification. Further the MPLS/IP Header Compression is performed so that the traffic can pass
through the existing network efficiently and speedily. The solution also suggests deployment of
high speed edge routers to improve network conditions and finally it suggest to measure the
traffic flow using meters for better cloud network management. Our solutions assume that cloud
is being assessed via basic public network.
KEYWORDS
Cloud computing, traffic, Round trip time, Throughput, IP, DS field, MPLS, RSVP, Sampling,
and Compression.
For More Details : http://airccse.org/journal/jwsc/papers/1210ijwsc01.pdf
Volume Link : http://airccse.org/journal/jwsc/currentissue.html
REFERENCES
[1] Beard, H., 2008. Cloud Computing Best Practices for Managing and Measuring Processes
for OnDemand Computing, Applications and Data Centers in the Cloud with S LA’s.
Amazon.com: Emereo.
[2] LaMonica, M., 2008. Amazon storage 'cloud' service goes dark, ruffles Web 2.0 feathers |
Webware - CNET.
[3] Weiss, A., 2007. Computing in the clouds, netWorker, 11(4)
[4] Rajkumar Buyya, Chee Shin Yeo, and Srikumar Venu- gopal, Market Oriented Cloud
Computing: Vision, Hype and Reality for delivering IT Services as Computing Utilities 10
Elucidation of upcoming traffic problems in Cloud Computing
[5] BRODKIN, J. Loss of customer data spurs closure of online storage service ’The Linkup’.
Network World (August 2008).
[6] BECHTOLSHEIM, A. Cloud Computing and Cloud Networking talk at UC Berkeley,
December 2008.
[7] MCCALPIN, J. Memory bandwidth and machine balance in current high performance
computers. IEEE Technical Committee on Computer Architecture Newsletter (1995), 19–
25.
[8] RANGAN, K. The Cloud Wars: $100+ billion at stake. Tech. rep., Merrill Lynch, May
2008.
[9] Network-based Measurements on Cloud Computing Services-Vinod Venkataraman Ankit
Shah Department of Computer SciencesThe University of Texas at Austin, Austin, TX
78712-0233 Yin Zhang
[10] Davie, B. and Rekhter, Y., "MPLS Technology and Applications," Morgan Kaufmann,
2000
[11] Black, U., "MPLS and Label Switching Networks," Prentice Hall, 2001
[12] Armitage, G., "Quality of Service in IP Networks, Morgan Kaufmann, 2000
[13] E. Rosen, A. Viswanathan, and R. Callon: Multiprotocol Label Switching Architecture.
Internet Drafts, August 1999.
[14] R. Braden, Ed., L. Zhang, S. Berson, S. Herzog, and S. Jamin: Resource ReSerVation
Protocol (RSVP) – Version 1 Functional Spec- ification. RFC2205, September 1997.
[15] T. Li and Y. Rekhter: A Provider Architecture for Differentiated Services and Traffic Engi-
neering (PASTE). RFC2430, October 1998.
[16] K. Nichols, S. Blake, F. Baker, and D. Black: Definition of the Differentiated Services
Field (DS Field) in the IPv4 and IPv6 Headers. RFC2474, December 1998. N. McKeown,
M. Izzard, A. Mekkittikul, B.
[17] White Paper : Internet QoS: A Big Picture Xipeng Xiao and Lionel M. Ni Department of
Computer Science 3115 Engineering Building Michigan State University East Lansing, MI
48824-1226
[18] White Paper : MPLS DiffServ: A Combined Approach by Asha Rahul Sawant, Jihad
Qaddour Applied Computer Science,Illinois State University
[19] Uyless Black, MPLS and label Switching Networks, Prentice Hall, Upper Saddle River,
2002
[20] S. Blake, An Architecture for Differentiated Services, RFC 2475, December 1998
[21] Cisco Systems, Diffserv –The Scalable End-to-End QoS Model,
http://www.cisco.com/warp/public/cc/pd/iosw/ioft /iofwft/prodlit/difse_wp.htm
[22] White Paper Quality of Service and MPLS Methodologies by ipinfusion Inc.
[23] CESNET technical report number 14/2004 Notes to Flow-Based Traffic Analysis System
Design Tom Kosnar7.12. 2004
[24] White paper : Managing Incoming Traffic by Ashok Singh Sairam Supervisor: Prof.
Gautam Barua Dept. of CSE, IIT Guwahati,,India.
[25] “Can we Afford a Cloud?” by Mohit Mathur, Nitin Saraswat published in ICACCT’08,
APIIT Panipat, India
[26] “Assessment of Strong User Authentication Techniques in cloud based Computing” by
Mohit Mathur, Nitin Saraswat published in IACC’09, Thapar University, Patiala,India.
[27] Internet Traffic Explosion by 2015 - Next Phase is Rich Media for Infrastructure 2.0
February 2, International Journal on Web Service Computing (IJWSC), Vol.1, No.2,
December 2010 13 2009 Posted by John Furrier in Technology
[28] Sampled Based Estimation of Network Traffic Flow Characteristics by Lili Yang George
Michailidis Department of Statistics Department of Statistics University of Michigan
University of Michigan Ann Arbor, MI 48109 Ann Arbor, MI 48109
[29] Yang, L and Michailidis, G. (2006), Estimating Network Traffic Characteristics based on
Sampled Data, Technical Report, Department of Statistics, The University of Michigan.
[30] Mori, T., Uchida, M. and Kawahara, R. (2004), Identifying elephant flows through
periodically sampled packets, Proceedings ACM SIGCOMM, 115-120.
[31] White Paper : Monitoring network traffic using sflow technology on ex series ethernet
switches by Juniper Networks, 2010.
[32] Bandwidth Estimation for Best-Effort Internet Traffic by Jin Cao, William S. Cleveland
and Don X. Sun.
[33] Cloud Computing Initiative using Modified Ant Colony Framework by Soumya Banerjee,
Indrajit Mukherjee, and P.K. Mahanti., World Academy of Science, Engineering and
Technology 56 2009.
[34] Duffield, N. (2004), Sampling for passive Internet measurement: A Review, Statistical
Science, 19, 472-498

Weitere ähnliche Inhalte

Was ist angesagt?

Presentation 2019 08-30
Presentation 2019 08-30Presentation 2019 08-30
Presentation 2019 08-30Mahdi_Fahmideh
 
Trends in heterogeneous computing in 2020
Trends in heterogeneous computing in 2020Trends in heterogeneous computing in 2020
Trends in heterogeneous computing in 2020ijdpsjournal
 
Using of Cloud Technologies in the Process of Preparing Future Specialists fo...
Using of Cloud Technologies in the Process of Preparing Future Specialists fo...Using of Cloud Technologies in the Process of Preparing Future Specialists fo...
Using of Cloud Technologies in the Process of Preparing Future Specialists fo...ijtsrd
 
University of South Florida Case Study
University of South Florida Case StudyUniversity of South Florida Case Study
University of South Florida Case StudyCitrix
 
TUWien - ASE Summer 2015: Engineering human-based services in elastic systems
TUWien - ASE Summer 2015: Engineering human-based services in elastic systemsTUWien - ASE Summer 2015: Engineering human-based services in elastic systems
TUWien - ASE Summer 2015: Engineering human-based services in elastic systemsHong-Linh Truong
 
Resource Consideration in Internet of Things A Perspective View
Resource Consideration in Internet of Things A Perspective ViewResource Consideration in Internet of Things A Perspective View
Resource Consideration in Internet of Things A Perspective Viewijtsrd
 
The 27th Australasian Conference on Information Systems
The 27th Australasian Conference  on Information SystemsThe 27th Australasian Conference  on Information Systems
The 27th Australasian Conference on Information SystemsMahdi_Fahmideh
 
Insights on critical energy efficiency approaches in internet-ofthings applic...
Insights on critical energy efficiency approaches in internet-ofthings applic...Insights on critical energy efficiency approaches in internet-ofthings applic...
Insights on critical energy efficiency approaches in internet-ofthings applic...IJECEIAES
 
Security and Challenges using Clouds Computing in Healthcare Management System
Security and Challenges using Clouds Computing in Healthcare Management SystemSecurity and Challenges using Clouds Computing in Healthcare Management System
Security and Challenges using Clouds Computing in Healthcare Management Systemijtsrd
 
IRJET- Cost Effective Workflow Scheduling in Bigdata
IRJET-  	  Cost Effective Workflow Scheduling in BigdataIRJET-  	  Cost Effective Workflow Scheduling in Bigdata
IRJET- Cost Effective Workflow Scheduling in BigdataIRJET Journal
 
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
 
dagrep_v006_i004_p057_s16152
dagrep_v006_i004_p057_s16152dagrep_v006_i004_p057_s16152
dagrep_v006_i004_p057_s16152Lenore Mullin
 
Adarsh - Grid Computing
Adarsh - Grid ComputingAdarsh - Grid Computing
Adarsh - Grid ComputingAdarsh Patil
 
Cloud Computing And Android Apps For The Indian
Cloud Computing And Android Apps For The IndianCloud Computing And Android Apps For The Indian
Cloud Computing And Android Apps For The IndianSanjay Chitnis
 
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...IJECEIAES
 
CLOUD COMPUTING IN THE PUBLIC SECTOR: MAPPING THE KNOWLEDGE DOMAIN
CLOUD COMPUTING IN THE PUBLIC SECTOR: MAPPING THE KNOWLEDGE DOMAINCLOUD COMPUTING IN THE PUBLIC SECTOR: MAPPING THE KNOWLEDGE DOMAIN
CLOUD COMPUTING IN THE PUBLIC SECTOR: MAPPING THE KNOWLEDGE DOMAINijmpict
 

Was ist angesagt? (19)

Presentation 2019 08-30
Presentation 2019 08-30Presentation 2019 08-30
Presentation 2019 08-30
 
Trends in heterogeneous computing in 2020
Trends in heterogeneous computing in 2020Trends in heterogeneous computing in 2020
Trends in heterogeneous computing in 2020
 
Using of Cloud Technologies in the Process of Preparing Future Specialists fo...
Using of Cloud Technologies in the Process of Preparing Future Specialists fo...Using of Cloud Technologies in the Process of Preparing Future Specialists fo...
Using of Cloud Technologies in the Process of Preparing Future Specialists fo...
 
University of South Florida Case Study
University of South Florida Case StudyUniversity of South Florida Case Study
University of South Florida Case Study
 
TUWien - ASE Summer 2015: Engineering human-based services in elastic systems
TUWien - ASE Summer 2015: Engineering human-based services in elastic systemsTUWien - ASE Summer 2015: Engineering human-based services in elastic systems
TUWien - ASE Summer 2015: Engineering human-based services in elastic systems
 
Resource Consideration in Internet of Things A Perspective View
Resource Consideration in Internet of Things A Perspective ViewResource Consideration in Internet of Things A Perspective View
Resource Consideration in Internet of Things A Perspective View
 
The 27th Australasian Conference on Information Systems
The 27th Australasian Conference  on Information SystemsThe 27th Australasian Conference  on Information Systems
The 27th Australasian Conference on Information Systems
 
Insights on critical energy efficiency approaches in internet-ofthings applic...
Insights on critical energy efficiency approaches in internet-ofthings applic...Insights on critical energy efficiency approaches in internet-ofthings applic...
Insights on critical energy efficiency approaches in internet-ofthings applic...
 
Security and Challenges using Clouds Computing in Healthcare Management System
Security and Challenges using Clouds Computing in Healthcare Management SystemSecurity and Challenges using Clouds Computing in Healthcare Management System
Security and Challenges using Clouds Computing in Healthcare Management System
 
IRJET- Cost Effective Workflow Scheduling in Bigdata
IRJET-  	  Cost Effective Workflow Scheduling in BigdataIRJET-  	  Cost Effective Workflow Scheduling in Bigdata
IRJET- Cost Effective Workflow Scheduling in Bigdata
 
TOWARDS A MACHINE LEARNING BASED ARTIFICIALLY INTELLIGENT SYSTEM FOR ENERGY E...
TOWARDS A MACHINE LEARNING BASED ARTIFICIALLY INTELLIGENT SYSTEM FOR ENERGY E...TOWARDS A MACHINE LEARNING BASED ARTIFICIALLY INTELLIGENT SYSTEM FOR ENERGY E...
TOWARDS A MACHINE LEARNING BASED ARTIFICIALLY INTELLIGENT SYSTEM FOR ENERGY E...
 
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCH
 
dagrep_v006_i004_p057_s16152
dagrep_v006_i004_p057_s16152dagrep_v006_i004_p057_s16152
dagrep_v006_i004_p057_s16152
 
Iot dan cc
Iot dan ccIot dan cc
Iot dan cc
 
Adarsh - Grid Computing
Adarsh - Grid ComputingAdarsh - Grid Computing
Adarsh - Grid Computing
 
Cloud Computing And Android Apps For The Indian
Cloud Computing And Android Apps For The IndianCloud Computing And Android Apps For The Indian
Cloud Computing And Android Apps For The Indian
 
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...
 
Security research trends in 2020
Security research trends in 2020Security research trends in 2020
Security research trends in 2020
 
CLOUD COMPUTING IN THE PUBLIC SECTOR: MAPPING THE KNOWLEDGE DOMAIN
CLOUD COMPUTING IN THE PUBLIC SECTOR: MAPPING THE KNOWLEDGE DOMAINCLOUD COMPUTING IN THE PUBLIC SECTOR: MAPPING THE KNOWLEDGE DOMAIN
CLOUD COMPUTING IN THE PUBLIC SECTOR: MAPPING THE KNOWLEDGE DOMAIN
 

Ähnlich wie Top 10 Downloaded Articles in Web Service Computing Journal

May 2022: Most Download Articles in Web & Semantic Technology
May 2022: Most Download Articles in Web & Semantic TechnologyMay 2022: Most Download Articles in Web & Semantic Technology
May 2022: Most Download Articles in Web & Semantic Technologydannyijwest
 
Top 5 most viewed articles from academia in 2020
Top 5 most viewed articles from academia in 2020Top 5 most viewed articles from academia in 2020
Top 5 most viewed articles from academia in 2020IJCSEA Journal
 
New research articles 2020 august issue- international journal of computer ...
New research articles   2020 august issue- international journal of computer ...New research articles   2020 august issue- international journal of computer ...
New research articles 2020 august issue- international journal of computer ...AIRCC Publishing Corporation
 
Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018ITIIIndustries
 
A_Middleware_based_on_Service_Oriented_Architectur.pdf
A_Middleware_based_on_Service_Oriented_Architectur.pdfA_Middleware_based_on_Service_Oriented_Architectur.pdf
A_Middleware_based_on_Service_Oriented_Architectur.pdf12rno
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
December 2022: Top 10 Read Articles in Network Security and Its Applications
December 2022: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2022: Top 10 Read Articles in Network Security and Its Applications
December 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...AIRCC Publishing Corporation
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
April 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsApril 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsMay 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
May 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyMay 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyAIRCC Publishing Corporation
 

Ähnlich wie Top 10 Downloaded Articles in Web Service Computing Journal (20)

May 2022: Most Download Articles in Web & Semantic Technology
May 2022: Most Download Articles in Web & Semantic TechnologyMay 2022: Most Download Articles in Web & Semantic Technology
May 2022: Most Download Articles in Web & Semantic Technology
 
Top 5 most viewed articles from academia in 2020
Top 5 most viewed articles from academia in 2020Top 5 most viewed articles from academia in 2020
Top 5 most viewed articles from academia in 2020
 
New research articles 2020 august issue- international journal of computer ...
New research articles   2020 august issue- international journal of computer ...New research articles   2020 august issue- international journal of computer ...
New research articles 2020 august issue- international journal of computer ...
 
Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018
 
A_Middleware_based_on_Service_Oriented_Architectur.pdf
A_Middleware_based_on_Service_Oriented_Architectur.pdfA_Middleware_based_on_Service_Oriented_Architectur.pdf
A_Middleware_based_on_Service_Oriented_Architectur.pdf
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its Applications
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 
December 2022: Top 10 Read Articles in Network Security and Its Applications
December 2022: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2022: Top 10 Read Articles in Network Security and Its Applications
December 2022: Top 10 Read Articles in Network Security and Its Applications
 
Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its Applications
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its Applications
 
April 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsApril 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its Applications
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its Applications
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsMay 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its Applications
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its Applications
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
 
May 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyMay 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information Technology
 

Kürzlich hochgeladen

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 

Kürzlich hochgeladen (20)

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 

Top 10 Downloaded Articles in Web Service Computing Journal

  • 1. March 2021: Top 10 Downloaded Articles in Web Service Computing International Journal on Web Service Computing (IJWSC) http://airccse.org/journal/jwsc/ijwsc.html ISSN 0974 - 9322 (Online) ; 0975 - 2293 (Print)
  • 2. SURVEY OF CLOUD COMPUTING Amira. A. Elsonbaty High Institute of Engineering & Technology in New Damietta ABSTRACT With expanding volumes of knowledgeable production and the variability of themes and roots, shapes and languages, most detectable issues related to the delivery of storage space for the information and the variety of treatment strategies in addition to the problems related to the flow of information and methods go down and take an interest in the advantage of them face the researchers. In any case, such a great significance comes with a support of a great infrastructure that includes large data centers comprising thousands of server units and other supporting equipment. The cloud is not a small, undeveloped branch of it, it is a type of computing that is based on the internet, an image from the internet. Cloud Computing is a developed technology, cloud computing, possibly offers an overall economic benefit, in that end users shares a large, centrally achieved pool of storing and computing resources, rather than owning and managing their own systems. But, it needs to be environment friendly also. This review paper gives a general overview of cloud computing, also it describes cloud computing, architecture of cloud computing, characteristics of cloud computing, and different services and deployment model of cloud computing. This paper is for anyone who will have recently detected regarding cloud computing and desires to grasp a lot of regarding cloud computing KEYWORDS cloud computing; architecture of cloud computing; characteristics of cloud computing For More Details : https://aircconline.com/ijwsc/V9N4/9418ijwsc02.pdf Volume Link : http://airccse.org/journal/jwsc/current2018.html
  • 3. REFERENCES [1] Bharti Wadhwa, “Energy Saving Approaches for Green Cloud Computing: A Review”, Proceedings of 2014 RAECS UIET Panjab University Chandigarh, 06 - 08 March, 2014 978-1-4799-2291- 8/14/$31.00 ©2014 IEEE [2] Jasleen Kaur, Ms. Anupma Sehrawat, Ms. Neha Bishnoi, " Survey Paper on Basics of Cloud Computing and Data Security," International Journal of Computer Science Trends and Technology (IJCST) – Volume 2 Issue 3, May-Jun 2014. [3] https://en.wikipedia.org/wiki/Cloud_computing,12-9-4:30pm. [4] Yashpalsinh Jadeja, Kirit Modi, “Cloud Computing - Concepts, Architecture and Challenges” in Proceeding of International Conference on Computing, Electronics and Electrical Technologies [ICCEET], 2012. [5] Qi Zhang, Lu Cheng and Raouf Boutaba, “Cloud computing: state-of-the-art and research challenges”. Journal of Internet Services and Applications, Volume 1, Issue 1, pp 7–18, May 2010 [6] Ivanka Menken," Cloud Computing - The Complete Cornerstone Guide to Cloud Computing Best Practices Concepts, Terms, and Techniques for Successfully Planning, Implementing ... Enterprise IT Cloud ComputingTechnology", London, UK, UK ©2008 , ISBN:1921573007 9781921573002,2008. [7] Ms. Disha H. Parekh, Dr. R. Sridaran, “An Analysis of Security Challenges in Cloud Computing,” (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 4, No.1, 2013. [8] Jasleen Kaur, Ms.Anupma Sehrawat, Ms.Neha Bishnoi ,"Survey Paper on Basics of Cloud Computing and Data Security", International Journal of Computer Science Trends and Technology (IJCST) – Volume 2 Issue 3, May-Jun 2014. [9] M. Armbrust, O. Fox, R. Griffith, A. D. Joseph, Y. Katz, A. Konwinski, et al., "M.: Above the clouds: A Berkeley view of cloud computing," 2009. [10] S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, vol. 34, pp. 1-11, 2011. International Journal on Web Service Computing (IJWSC), Vol.9, No.3/4, December 2018 27 [11] Aniruddha S. Rumale, D.N.Chaudhari, ” Cloud Computing: Infrastructure as a Service,” International Journal of Inventive Engineering and Sciences (IJIES) ISSN: 2319–9598, Volume-1, Issue-3, February 2013.
  • 4. [12] Imran Ashrafa, "An Overview of Service Models of Cloud Computing," International Journal of Multidisciplinary and Current Research 27 Aug 2014, Vol.2 [8] Yashpalsinh Jadeja; Kirit Modi, “Cloud Computing - Concepts, Architecture and Challenges” in Proceeding of International Conference on Computing, Electronics and Electrical Technologies [ICCEET], 2012. [13] Xu Wang, Beizhan Wang, Jing Huang, “Cloud computing and its key techniques” in Proceeding of IEEE Conference, 2011. [14] Michael Boniface, Bassem Nasser, Juri Papay, Stephen C. Phillips, Arturo Servin, Xiaoyu Yang, Zlatko Zlatev, Spyridon V. Gogouvitis, Gregory Katsaros, Kleopatra Konstanteli, George Kousiouris, Andreas Menychtas, Dimosthenis Kyriazis, “Platform-as-a-Service Architecture for Real-time Quality of Service Management in Clouds,” Fifth International Conference on Internet and Web Applications and Services, 2010.
  • 5. A COMPARATIVE STUDY OF PROCESS MEDIATOR CCOMPONENTS THAT SUPPORT BEHAVIORAL INCOMPATIBILITY Kanmani Munusamy 1 , Harihodin Selamat2 , Suhaimi Ibrahim3 and Mohd Sapiyan Baba4 1, 2, 3 Advanced Informatics School (AIS), Universiti Teknologi Malaysia (UTM), Malaysia. 1 kanmani3@live.utm.my, 2 harihodin@utm.my, 3 suhaimiibrahim@utm.my 4 Faculty of Computer Science & Information Technology, University Malaya (UM), Malaysia. 4 pian@um.edu.my ABSTRACT Most businesses these days use the web services technology as a medium to allow interaction between a service provider and a service requestor. However, both the service provider and the requestor would be unable to achieve their business goals when there are miscommunications between their processes. This research focuses on the process incompatibility between the web services and the way to automatically resolve them by using a process mediator. This paper presents an overview of the behavioral incompatibility between web services and the overview of process mediation in order to resolve the complications faced due to the incompatibility. Several state-of the-art approaches have been selected and analyzed to understand the existing process mediation components. This paper aims to provide a valuable gap analysis that identifies the important research areas in process mediation that have yet to be fully explored. KEYWORDS Web services, semantic web services, web service mediation, web service adaptation and behavioral incompatibility For More Details : http://airccse.org/journal/jwsc/papers/0911wsc02.pdf Volume Link : http://airccse.org/journal/jwsc/current2011.html
  • 6. REFERENCES [1] S.G.H. Tabatabaei, A.V. Dastjerdi, W.M.N.W. Kadir, S. Ibrahim, and E. Sarafian, “Security conscious AI-planning-based composition of semantic web services,” International Journal of Web Information Systems, vol. 6, no. 3, 2010, pp. 203-229. 0 1 2 3 4 5 6 7 8 Support for both control and data flow Support semantic and reasoning Automatic in generation of… Automation in mismatches… Automation in identification of… Automation in generating the… Scalable to support generic scenario Support complex case study Implemented with evaluation [2] M. Kanmani, I. Suhaimi, K. Mojtaba, M. Keyvan, and T. Sayed Gholam Hassan (2010), "An evaluation of process mediation approaches in web services", Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services, Paris, France, ACM pp. 48-55. [3] M. Keyvan, I. Suhaimi, K. Mojtaba, M. Kanmani, and T. Sayed Gholam Hassan (2010), "A comparative evaluation of semantic web service discovery approaches", Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services, Paris, France, ACM [4] Thirumaran.M, Dhavachelvan.P, and Thanigaivel.K, “Business Rule Management Framework for Enterprise Web Services,” International Journal on Web Service Computing ( IJWSC ), vol. 1, no. 2, 2010, pp. 15-29. [5] S. Arroyo, M.A. Sicilia, and J.M. Dodero, “Choreography frameworks for business integration: Addressing heterogeneous semantics,” Computers in Industry, vol. 58, no. 6, 2007, pp. 487-503. [6] D. Fensel, and C. Bussler, “The web service modeling framework WSMF,” Electronic Commerce Research and Applications, vol. 1, no. 2, 2002, pp. 113-137. [7] D.M. Yellin, and R.E. Strom, “Protocol specifications and component adaptors,” ACM Transactions on Programming Languages and Systems, vol. 19, no. 2, 1997, pp. 292-333. [8] M. Stollberg, E. Cimpian, and D. fensel (2005), "Mediating Capabilities with DeltaRelations", in M. Hepp, A. polleres, F. Harmelen, and M. Genesereth (eds), First International Workshop on Mediation in Semantic Web Services (MEDIATE 2005) conjuction with 3rd International Conference on Service-Oriented Computing (ICSOC 2005), Amsterdam, Netherlands pp. 51-66. [9] D. Martin, M. Burstein, J. Hobbs, O. Lassila, D. McDermott, S. McIlraith, S. Narayanan, M. Paolucci, B. Parsia, T. Payne, E. Sirin, N. Srinivasan, and K. Sycara (2004), "OWL-S: Semantic Markup for Web Services ", W3C Member Submission, Retrieved from: http://www.w3.org/Submission/OWL-S/, Last Access: 28 June 2011 [10] J.d. Bruijn, C. Bussler, J. Domingue, D. Fensel, M. Hepp, U. Keller, M. Kifer, J. Kopecky, H. Lausen, E. Oren, A. Polleres, D. Roman, J. Scicluna, and M. Stollberg (2005), "Web
  • 7. Service Modeling Ontology (WSMO)", W3C Member Submission, Retrieved from: http://www.w3.org/Submission/WSMO/, Last Access: 28 June 2011 [11] H.R. Motahari Nezhad, B. Benatallah, A. Martens, F. Curbera, and F. Casati (2007), "Semiautomated adaptation of service interactions", in 16th International World Wide Web Conference, WWW2007, Banff, AB, pp. 993-1002. [12] S. Wei, M. Xiaoxing, D. Wanchun, and J. Lü (2008), "Toward a model-based approach to dynamic adaptation of composite services", in Proceedings of the IEEE International Conference on Web Services, ICWS 2008, Beijing, pp. 561-568. [13] T. Wei, R. Fangyan, F. Yushun, and Z. Jun (2007), "Compatibility analysis and mediationaided composition for BPEL services", Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Bangkok, pp. 1062-1065. [14] R. Mateescu, P. Poizat, and G. Salaün, “Adaptation of Service Protocols Using Process Algebra and On-the-Fly Reduction Techniques,” Service-Oriented Computing – ICSOC 2008, 2008, pp. 84-99. [15] S. Dustdar, J. Fiadeiro, A. Sheth, M. Dumas, M. Spork, and K. Wang, “Adapt or Perish: Algebra and Visual Notation for Service Interface Adaptation,” Business Process Management, Lecture Notes in Computer Science 4102, Springer Berlin / Heidelberg, 2006, pp. 65-80. [16] E. Cimpian, and A. Mocan (2005), "Process Mediation In WSMX", in E. Cimpian (Ed.), Vienna, p. 29. International Journal on Web Service Computing (IJWSC), Vol.2, No.3, September 2011 29 [17] R. Mizoguchi, Z. Shi, F. Giunchiglia, E. Cimpian, A. Mocan, and M. Stollberg, “Mediation Enabled Semantic Web Services Usage,” The Semantic Web – ASWC 2006, Lecture Notes in Computer Science 4185, Springer Berlin / Heidelberg, 2006, pp. 459-473. [18] X. Li, Y. Fan, S. Madnick, and Q.Z. Sheng, “A pattern-based approach to protocol mediation for web services composition,” Information and Software Technology, vol. 52, no. 3, 2009, pp. 304-323. [19] J. Camara, G. Salaun, and C. Canal, “Composition and run-time adaptation of mismatching behavioural interfaces,” Journal of Universal Computer Science, vol. 14, no. 13, 2008, pp. 2182-2211. [20] L. Bordeaux, G. Salaun, D. Berardi, and M. Mecella (2005), "When are two web services compatible?", in M.C. Shan, U. Dayal, and M. Hsu (eds), Lecture Notes in Computer Science, Toronto, Ont., Vol. 3324, pp. 15-28.
  • 8. [21] A. Brogi, and R. Popescu, “Service adaptation through trace inspection,” International Journal of Business Process Integration and Management, vol. 2, 2007, pp. 9-16. [22] W. Kongdenfha, H.R. Motahari-Nezhad, B. Benatallah, F. Casati, and R. Saint-Paul, “Mismatch patterns and adaptation aspects: A foundation for rapid development of web service adapters,” IEEE Transactions on Services Computing, vol. 2, no. 2, 2009, pp. 94- 107. [23] L. Kuang, S. Deng, J. Wu, and Y. Li (2009), "Towards adaptation of service interface semantics", in 2009 IEEE International Conference on Web Services, ICWS 2009, Los Angeles, CA, pp. 279-286. [24] R. Seguel, R. Eshuis, and P. Grefen (2010), "Generating Minimal Protocol Adaptors for Loosely Coupled Services", in Web Services (ICWS), 2010 IEEE International Conference on, pp. 417-424. [25] G. Wiederhold, “Mediators in the architecture of future information systems,” Computer, vol. 25, no. 3, 1992, pp. 38-49. [26] G. Grahne, and V. Kiricenko (2005), "Process Mediation in Extended Roman Model", in M. Hepp, A. polleres, F. Harmelen, and M. Genesereth (Eds.) First International Workshop on Mediation in Semantic Web Services (MEDIATE 2005) conjuction with 3rd International Conference on Service-Oriented Computing (ICSOC 2005), Amsterdam, Netherlands pp. 17- 33. [27] W. Tan, Y. Fan, and M. Zhou, “A petri net-based method for compatibility analysis and composition of web services in business process execution language,” IEEE Transactions on Automation Science and Engineering, vol. 6, no. 1, 2009, pp. 94-106. [28] R. Vaculin, R. Neruda, and K. Sycara, “The process mediation framework for semantic Web services,” International Journal of Agent-Oriented Software Engineering, vol. 3, no. 1, 2009, pp. 27-58. [29] L. Ardissono, R. Furnari, G. Petrone, and M. Segnan, “Interaction protocol mediation in web service composition,” International Journal of Web Engineering and Technology, vol. 6, no. 1, 2010, pp. 4-32. [30] Z. Zhou, S. Bhiri, L. Shu, and M. Hauswirth (2009), "Formal verification of mediated web service interactions considering client's expected behaviours", in 2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2009, Washington, DC. [31] B. Benatallah, F. Casati, D. Grigori, H.R. Motahari Nezhad, and F. Toumani (2005), "Developing adapters for web services integration", in O. Pastor, and J.F. Cunha (eds), Lecture Notes in Computer Science, Porto, Vol. 3520, pp. 415-429.
  • 9. [32] E. Cimpian, and A. Mocan (2005), "WSMX process mediation based on choreographies", Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Nancy, pp. 130-143. International Journal on Web Service Computing (IJWSC), Vol.2, No.3, September 2011 30 [33] K. Wang, M. Dumas, C. Ouyang, and J. Vayssière (2008), "The service adaptation machine", in Proceedings of the 6th IEEE European Conference on Web Services, ECOWS'08, Dublin, pp. 145-154. [34] X. Li, Y. Fan, J. Wang, L. Wang, and F. Jiang (2008), "A pattern-based approach to development of service mediators for protocol mediation", in 7th IEEE/IFIP Working Conference on Software Architecture, WICSA 2008, Vancouver, BC, pp. 137-146. [35] R. Mateescu, P. Poizat, and G. Salaun (2007), "Behavioral adaptation of component compositions based on process algebra encodings", in ASE'07 - 2007 ACM/IEEE International Conference on Automated Software Engineering, Atlanta, GA, pp. 385-388.
  • 10. BUSINESS RULE MANAGEMENT FRAMEWORK FOR ENTERPRISE WEB SERVICES Thirumaran. M1 and Ilavarasan. E2 and Thanigaivel. K3 and Abarna. S4 1 Department of Computer science and Engineering, Pondicherry Engg College, India. thirumaran@pec.edu 2 Department of Computer science and Engineering, Pondicherry Engg College, India. eilavarasan@pec.edu 3 Department of Computer science and Engineering, Pondicherry Engg College, India. thanigaivel20@pec.edu 4 Department of Computer science and Engineering, Pondicherry Engg College, India. abarna.pec@gmail.com ABSTRACT Making a business rule extraction more dynamic is an open issue, and we think it is feasible if we decompose the business process structure in a set of rules, each of them representing a transition of the business process. As a consequence the business process engine can be realized by reusing and integrating an existing Rule Engine. We are proposing a way for extracting the business rules and then to modify it at the runtime. Business rules specifies the constraints that affect the behaviors and also specifies the derivation of conditions that affect the execution flow. The rules can be extracted from use cases, specifications or system code. But since not many enterprises capture their business rules in a structured, explicit form like documents or implicit software codes, they need to be identified first, before being captured and managed. These rules change more often than the processes themselves, but changing and managing business rules is a complex task beyond the abilities of most business analysts. The capturing process focuses on the identification of the potential business rules sources. As business logic requirements change, business analysts can update the business logic without enlisting the aid of the IT staff. The new logic is immediately available to all client applications. In current trend the rules are modified or changed in the static time phase. But this paper provides to change the rules at the run time. Here the rules are extracted from the services and can be a changed dynamically. The existing rules are modified and attached to source code without hindering service to the end user which can be achieved with source control systems. When the rules are revised, it provides a path in budding new business logic. This new business logic can be adopted for the efficient software development. KEYWORDS Dynamic Rule Execution, Business process, Business rules, Business Rules Approaches. For More Details : http://airccse.org/journal/jwsc/papers/1210ijwsc02.pdf Volume Link : http://airccse.org/journal/jwsc/currentissue.html
  • 11. REFERENCES [1] Chun Ouyang , “From Business Process Models to Process-Oriented Software Systems” [2] Michael zur Muehlen, “Business Process and Business Rule Modeling Languages for Compliance Management: A Representational Analysis”, Twenty-Sixth International Conference on Conceptual Modeling - ER 2007 - Tutorials, Posters, Panels and Industrial Contributions, Auckland, New Zealand. Figure 2. Dynamic rule Extraction [3] Josef Schiefer, “Event-Driven Rules for Sensing and Responding to Business Situations”. [4] Claire Costello, “ Orchestrating Supply chain Interactions using Emerging Process Description Languages and Business Rules”. [5] Anca Andreescu, “ A General Software Development Process Suitable for Explicit Manipulation of Business Rules” [6] Milan Milanović1, “ Modeling Service Orchestrations with a Rule-enhanced Business Process Language” [7] Olegas Vasilecas,” Ensuring Consistency of Information Systems Rules Models”. [8] Anis Charfi, “ Hybrid Web Service Composition: Business Processes Meet Business Rules”. [9] Bruno de Moura Araujo, “ A method for Validating the Compliance of Business Processes to Business Rules”. [10] Nicholas Zsifkov, “ Business Rules Domains and Business Rules Modeling”. [11] Antonio Oliveira, “ Filho Change Impact Analysis from Business Rules”. [12] Jose F. Mejia Bernal, “ Dynamic Context-Aware Business Process: A Rule-Based Approach Supported by Pattern Identification”. [13] Timon C. Du and Hsing-Ling Chen ,“Building a Multiple-Criteria Negotiation Support System”, IEEE transactions on knowledge and data engineering, vol. 19, no. 6, June 2007. [14] Sam Weber, Hoi Chan, Lou Degenaro, Judah Diament, Achille Fokoue-Nkoutche, and Isabelle Rouvellou, “Fusion: A System For Business Users To Manage Program Variability”, IEEE Transaction on software engineering , Nov 2008. [15] H. M. Sneed, “Extracting Business Logic from Existing COBOL Programs as a Basis for Redevelopment”, 9th International Workshop on Program Comprehension, Toronto, Canada, 2001, pp. 167-175.
  • 12. [16] Sangseung Kang, “Design of Rule Object Model for Business Rule Systems”, 1996,pp. 818-822. [17] Olga Levina, “Extracting Business Logic from Business Process Models”, 2010 IEEE. [18] Mohammed Alawairdhi, “A Business-Logic Based Framework for Evolving Software Systems”, 2009 33rd Annual IEEE International Computer Software and Applications Conference. [19] Olegas Vasilecas, “Ensuring Consistency of Information Systems Rules Models”, the International Multiconference on Computer Science and Information Technology, 2008. [20] Anis Charfi, “ Hybrid Web Service Composition: Business Processes Meet Business Rules”, ICSOC'04, November 15–19, 2004, New York, New York, USA. [21] Jose F. Mejia Bernal, “ Dynamic Context-Aware Business Process: A Rule-Based Approach Supported by Pattern Identification”, SAC’10, March 22-26, 2010, Sierre, Switzerland. [22] Gulnoza Ziyaeva, Eunmi Choi, and Dugki Min, “Content-Based Intelligent Routing and Message Processing in Enterprise Service Bus”, International Conference on Convergence and Hybrid Information Technology, 2008 [23] en.wikipedia.org/wiki/Business_rule
  • 13. USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES Selwa ELFIRDOUSSI EMINES, School of Industrial Management, University Mohamed 6 Polytechnic, 43150, Benguerir, Morocco, ABSTRACT Efficient supply chain management calls for robust analytical and optimal models to automate its process. Therefore, information technology is an essential ingredient that integrates these tools in supply chain. With the emergence of wireless, the high technologies and the reliability of mobile devices, mobile web services draw a promising horizon facing economic challenges. They offer new personalized services to each actor in the supply chain on their mobile devices at anytime and anywhere. This paper presents a literature review of mobile web service implemented on the industry context based on the supply chain management approach. First, a large definition of mobile web service and some proposal architecture are exposed. Then the paper discuss some generic related work on mobile web service focusing on supply chain management. Finally some challenges on m-service oriented supply chain management are proposed. KEYWORDS Mobile web service; smart industry; Supply chain management; Service Oriented Architecture. For More Details : https://aircconline.com/ijwsc/V9N2/9218ijwsc01.pdf Volume Link : http://airccse.org/journal/jwsc/current2018.html
  • 14. REFERENCES [1] J. T. Mentzer, W. DeWitt, J. S. Keebler, S. Min, N. W. Nix, C. D. Smith et Z. G. Zacharia, «Defining Supply Chain Mangement,» Journal of Business logistics, vol. 22, n° %12, pp. 1-25, 2001. [2] S. c. Graham, «Integrating the supply chain,» International Journal of Physical Distribution & Materials Management, vol. 19, n° %18, pp. 3-8, 1989. [3] K. Elgazzar, P. Martin et H. Hassanein, «Mobile Web Services: State of the Art and Challenges,» International Journal of Advanced Computer Science and Applications, vol. 5, n° %13, pp. 173-188, 2014. [4] E. Elabd, P. M. El-Kafrawy et E. M. Abou-Nassar, «Semantic-based Web Services Selection for Mobile,» chez The 9th International Conference on INFOrmatics and Systems, 2014. [5] S. Berger, S. Mcfaddin, C. Narayanaswami et M. Raghunath, «Web services on mobile devicesimplementation and experience,» Mobile Computing Systems and Applications, pp. 100-109, 2003. [6] F. AlShahwan et K. Moessner, «Providing SOAP Web services and RESTful Web services from mobile hosts,» chez Internet and Web Applications and Services, 2010. [7] S. Hamida, Une approche basée agent mobile pour le m-service web sémantique, BISKRA: Université Mohamed Khider, 2014. [8] T. M. Voigt, T. Naumowicz, H. Ritter et J. Schiller, «Performance considerations for mobile web services,» Computer Communications, p. 1097–1105, 2007. [9] M. Treiber, C. Scherling et S. Dustdar, «Applying SOA Principles on Mobile Platforms,» chez International Conference on Software Engineering, Honolulu, 2010. [10] F. Hirsch, J. Kemp et J. Ilkka, Mobile web services: architecture and implementation, John Wiley & Sons, 2007. [11] S. Oh et G. C. Fox, «HHFR: A new architecture for Mobile Web Services Principles and Implementations,» Technical paper, 2005. [12] A. COBÂRZAN, «Consuming Web Services on Mobile Platforms,» Informatica Economică, vol. 14, n° %13, pp. 98-105, 2010. [13] M. Chen, D. Zhang et L. Zhou, «Providing web services to mobile users: the architecture design of an m-service portal,» Int. J. Mobile Communications, vol. 3, n° %11, pp. 1-18, 2005.
  • 15. [14] S. Abhishek et V. Rohit, «A novel web service directory framework for mobile environments,» chez International conferance on Web Services (ICWS), Anchorage, 2014. [15] V. D. a. W. L. Sonja Zaplata, «Realizing Mobile Web Services for Dynamic Applications,» AIS Transactions on Enterprise Systems, vol. 2, n° %11, pp. 3-12, 2009. [16] H. Artail, K. Fawaz et A. Ghandour, «A Proxy-Based architecture for dynamic discovery and invocation of Web Services from mobile devices,» IEEE Transactions on Services Computing, vol. 5, n° %11, pp. 99-115, 2012. [17] S. Elfrirdoussi, Z. Jarir et M. Quafafou, «Popularity based Web Service Search,» chez 19th International Conference on web service, Hawai, 2012. [18] S. N. Srirama, M. Jarke et W. Prinz, «Mobile web services mediation framework,» chez ACM/IFIP/USENIX International Middleware Conference, New York, 2007. International Journal on Web Service Computing (IJWSC), Vol.9, No.2, June 2018 11 [19] K. Elgazzar, H. Hassanein et P. Martin, «Cloud-based mobile Web service discovery,» Pervasive and Mobile Computing, vol. 13, p. 67–84, 2014. [20] M. Adacal et A. Bener, «Mobile Web services: a new agent-based framework,» IEEE Internet Computing, vol. 10, n° %13, pp. 58-65, 2006. [21] S. N. Srirama, M. Jarke et W. Prinz, «MWSMF: A Mediation Framework Realizing Scalable Mobile Web Service Provisioning,» chez International conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications, 2008 [22] S. N. Srirama, M. Jarke, H. Zhu et H. Prinz, «Scalable mobile web service discovery in peer to peer networks,» chez Internet and Web Applications and Services, 2008. [23] K. Elgazzar, P. Martin et H. Hassanein, «Personalized Mobile Web Service Discovery,» chez World Congress on Services, Santa Clara Marriott, CA, USA, 2013. [24] R. Kumar et V. K. Kiran, «Dynamic Discovery and Invocation of Web services Through Android Mobile,» International Journal of Engineering Trends and Technology, vol. 4, n° %17, pp. 3182- 3185, 2013. [25] F. AlShahwan et M. Faisal, «Mobile cloud computing for providing complex mobile web services,» chez Mobile Cloud Computing, Services, and Engineering, San Francisco, 2014. [26] C. Chang et S. Ling, «Towards an Infrastructure-less SOA for Mobile Web Service Composition,» chez arXiv preprint arXiv:, 1304.5045.
  • 16. [27] H. YANG, H. LUO et F. YE, «Security in mobile ad hoc networks: challenges and solutions,» IEEE wireless communications, pp. 38-47, 2004. [28] S. N. Rirama, M. Jarke et Prinz, «A performance evaluation of mobile web services security,» chez 3rd International Conference on Web Information Systems and Technologies, 2007. [29] A. Gunasekaran et E. W. Ngai, «Information systems in supply chain integration and management,» European Journal of Operational Research, vol. 159, n° %12, pp. 269-295, 2004. [30] K. Croxton , S. Garcia-Dastugue et D. M. Lambert, «The Supply Chain Management Processes,» The International Journal of Logistics Management, vol. 12, n° %12, pp. 13- 36, 2001. [31] T. L. Rakestraw, R. V. Eunni et R. R. Kasuganti, «The mobile apps industry: A case study,» Journal of Business Cases and Applications, vol. 9, n° %11, pp. 1-26, 2013. [32] A. Light, S. Punnett et K. Webb, Mobile Innovation: Ontario’s Growing Mobile Content, Services, and Applications, Toronto: Mobile Experience Innovation Centre, 2012. [33] O. Irena et R. Knut, «Mobile Business in Logistics,» In GI Jahrestagung, pp. 530-536, 2006. [34] Ö. Åke, S. Linus, L. Per et D. Jerker, «Mobile Medical Applications Made Feasible Through Use of EIS Platforms,» chez Instrumentation and Measurement Technology Conference, USA, 2003. [35] R. Michaelides, Z. Michaelides et D. Nicolaou, «Optimisation of logistics operations using GPS technology solutions: a case study,» chez POMS conference, Vancouver, 2010. [36] K. S. Chinchu et G. Selvakumar, «Web Service based e-logistics application,» International Journal of Modern Engineering Research, pp. 084-088, 2012. [37] R. Angeles, «supply-chain applications and implementation issues,» Information systems management, vol. 22, n° %11, pp. 51-65, 2005 [38] T. Kelepouris, K. Pramatari et G. Doukidis, «RFID-enabled traceability in the food supply chain,» Industrial Management & Data Systems, vol. 107, n° %12, pp. 183-200, 2007. [39] Q. Shi et X. Ding, «Mobile Internet based construction supply chain management: A critical review,» Automation in Construction., 2016. [40] S. Taylor, «The New Mobile World Order : Perspectives on the Future of the Mobile Industry,» Cisco, 2012.
  • 17. [41] S. Elfrirdoussi, Z. Jarir et M. Quafafou, «Discovery and Visual Interactive WS Engine based on popularity: Architecture and Implementation,» International Journal of Software Engineering and Its Applications, pp. 213-228, 2014. [42] S. Elfrirdoussi, Z. Jarir et M. Quafafou, «Web Service Composition Based on Popularity,» chez CS & IT CSCP, 2014.
  • 18. PXPATHV: PREVENTING XPATH INJECTION VULNERABILITIES IN WEB APPLICATIONS V.Shanmughaneethi Computer Centre, National Institute of Technical Teachers Training and Research (NITTTR), Govt. of India Taramani, Chennai, India shanneethi@gmail.com R.Ravichandran Resource Centre, National Institute of Technical Teachers Training and Research (NITTTR), Govt. of India Taramani, Chennai, India keelairavi@hotmail.com S.Swamynathan Dept. IST, CEG, Anna University Chennai, India swamyns@annauniv.edu ABSTRACT Generally, most Web applications use relational databases to store and retrieve information. But, the growing acceptance of XML technologies for documents it is logical that security should be integrated with XML solutions. In a web application, an improper user inputs is a main cause for a wide variety of attacks. XML Path or XPath language is used for querying information from the nodes of an XML document. XPath Injection is an attack technique, much like SQL injection, exists when a malicious user can insert arbitrary XPath code into form fields and URL query parameters in order to inject this code directly into the XPath query evaluation engine. Through the crafted input a malicious user would bypass authentication or to access restricted data from the XML data source.Hence, we proposed an approach to detect XPath injection attack in XML databases at runtime. Our approach intercept XPath expression and parse the XQuery expression to find the inputs to be placed in the expression. The identified inputs are used to design an XML file and it would be validated through a schema. KEYWORDS XPath Injection, SQL Injection, XQuery, Web Application Security, XSLT, XML Schema, XML Security, Command Injection For More Details : http://airccse.org/journal/jwsc/papers/0911wsc05.pdf Volume Link : http://airccse.org/journal/jwsc/current2011.html
  • 19. REFERENCES [1] Zhendong Su, Gary Wassermann, “The Essence of Command Injection Attacks in Web Applications”, Proceedings of the thirty third ACM symposium on Principles of Programming Languages,South Carolina,2006,pp. 372-382. [2] Amit Kelvin, “Blind XPath Injection”, a whitepaper from Watchfire, Director of Security and Research, Sanctum, 2005. [3] Jaime Blasco, “Introduction to XPath Injection Techniques”, Hakin9, Conference on IT Underground, Czech Republic, 2007, pp.no 23-31. [4] Dimitris Mitropoulos, Vassilios Karakoidas, and Diomidis Spinellis, “Fortifying Applications against XPath Injection Attacks”, MCIS 2009: 4th Mediterranean Conference on Information Systems, 2009, Athens, pp.no 1169–1179. [5] Nuno Antunes, Nuno Laranjeiro, Marco Vieira, Henrique Madeira, “ Effective Detection 1 2 3 4 5 6 7 8 9 10 0 50 100 150 200 250 Response Time Without PXpathV module (ms) Response Time With PXpathV module (ms) International Journal on Web Service Computing (IJWSC), Vol.2, No.3, September 2011 64 of SQL/XPath Injection Vulnerabilities in Web Services”, IEEE International Conference on Services Computing,Portugal, 2009, pp. 260-267 [6] Gabriel Hermosillo, Roberto Gomez, Lionel Seinturier, Laurence Duchien , “Using Aspect Programming to Secure Web Applications”, Journal of Software,Vol. 6, No. 2,Vienna,2008,pp. 53-63. [7] Jinghua Groppe,Sven Groppe, “ Filtering unsatisfiable XPath queries”, Journal Data & Knowledge Engineering , Vol.64 No. 1,Amsterdam, 2008,pp.no 134-169. [8] XML Path Language (XPath) version 2.0, http://www.w3.org/TR/XPath [9] OWASP Guide, http://www.owasp.org/index.php/Blind_XPath_Injection [10] Vieira, M., Antunes, N., Madeira, H., “Using Web Security Scanners to Detect Vulnerabilities in Web Services”, Intl.Conf. on Dependable Systems and Networks, Lisbon, 2009. [11] Laranjeiro, N., Vieira, M., Madeira, H., “Protecting Database Centric Web Services against SQL/XPath Injection Attacks”, DEXA 2009, Linz, Austria, September 2009 [12] Wu, R., Hisada, H. and Ranaweera, R., ‘‘Static analysis of web security in generic syntax format’’, The 2009 International Conference on Internet Computing (ICOMP 2009), Las Vegas, NV, pp. 58-63
  • 20. [13] Velu Shanmughaneethi, Ra. Yagna Pravin and S. Swamynathan “XIVD: Runtime Detection of XPath Injection Vulnerabilities in XML Databases through Aspect Oriented Programming” Communications in Computer and Information Science, 1, Volume 198, Advances in Computing and Information Technology (ACITY 2011), Part 1, Pages 192- 201
  • 21. DYNAMIC WEB SERVICE COMPOSITION BASED ON NETWORK MODELING WITH STATISTICAL ANALYSIS AND BACKTRACKING M.SureshKumar 1 and P.Varalakshmi 2 1 Research Scholar, Anna University, Chennai, suresh.priya.kumar@gmail.com 2 Department of Information Technology, MIT Campus, Anna University, Chennai, varanip@gmail.com ABSTRACT A Web service is a software system designed to support interoperable machine-to-machine interaction over a network. Web services provide a standard means of interoperating between different software applications, running on a variety of platforms and/or frameworks. One of the main advantages of the usage of web services is its ability to integrate with the other services through web service composition and realize the required functionality. This paper presents a new paradigm of dynamic web services composition using network analysis paired with backtracking. An algorithm called “Zeittafel” for the selection and scheduling of services that are to be composed is also presented. With the proposed system better percentage of job success rate is obtained compared to the existing methodology. KEYWORDS Dynamic composition, PERT, backtracking, tour planner For More Details : http://airccse.org/journal/jwsc/papers/3212ijwsc02.pdf Volume Link : http://airccse.org/journal/jwsc/current2012.html
  • 22. REFERENCES [1] Web Services Architecture http://www.w3.org/TR/ws-arch/ [2] Thomas Erl, SOA Principles http://www.soaprinciples.com/ [3] P.Sandhya and Dr. M. Lakshmi, “A Novel Approach for Realizing Business Agility through Temporally Planned Automatic Web Service Composition using Network Analysis” , International Conference On Semantic Web & Web Services SWWS 2011. [4] Gexin Li, Aixin Zu, Chengwen Wu, Zhengzhong Wang, “Web service composition based on backtracking”, Second International Conference on Artificial Intelligence, Management Science and Electronic Commerce AIMSEC 2011. [5] Program Evaluation and Review Technique (PERT) http://en.wikipedia.org/wiki/Program_Evaluation_and_Review_Technique [6] Backtracking http://en.wikipedia.org/wiki/Backtracking [7] Incheon Paik, Daisuke Maruyama “Automatic Web Services Composition Using Combining HTand CSP” Seventh International Conference on Computer And Information Technology, IEEE 2007 [8] Sayed Gholam Hassan Tabatabaei, “Web Service Composition Approaches to Support Dynamic E- Business Systems”, Communications of the IBIMA, 2008 [9] Farhan Hassan Khan, M.Younus Javed, Saba Bashir , “QoS Based Dynamic Web Services Composition & Execution”, International Journal of Computer Science and Information Security, Vol. 7, No. 2, February 2010 [10] Yilan Gu and Mikhail Soutchanski. “ A Logic For Decidable Reasoning About Services” Proceedings of AAAI-06 workshop on AIDriven Technologies for Services-Oriented Computing 2006. [11] A. Marconi, M. Pistore, and P. Traverso. "Implicit vs. Explicit Data-Flow Requirements in Web Service Composition Goals". In Proceeding of the 4th International Conference on ServiceOriented Computing (ICSOC06), volume 4294 of Lecture Notes in Computer Science (LNCS), Chicago, Illinois, USA, 2006. Springer. [12] Michael Hu, Howard Foster “Using a Rigorous Approach for Engineering Web Services Compositions: A Case Study”. IEEE International Conference on Services Computing, Vol 2, July 2005
  • 23. [13] Daniela Barreirs claro, Patrick Albers , Jin-kao Hao “Selecting Web Services for Optimal Composition” 2nd International Workshop On Semantic And Dynamic Web Processes (SDWP 2005).
  • 24. SPEEDING UP THE WEB CRAWLING PROCESS ON A MULTI-CORE PROCESSOR USING VIRTUALIZATION Hussein Al-Bahadili1 , Hamzah Qtishat2 , Reyadh S. Naoum2 1 Faculty of Information Technology, Petra University, Amman, Jordan hbahadili@uop.edu.jo 2 Faculty of Information Technology, Middle East University, Amman, Jordan hamzah.qtishat@yahoo.com,rnaoum@meu.edu.jo ABSTRACT A Web crawler is an important component of the Web search engine. It demands large amount of hardware resources (CPU and memory) to crawl data from the rapidly growing and changing Web. So that the crawling process should be a continuous process performed from time-to-time to maintain up-to-date crawled data. This paper develops and investigates the performance of a new approach to speed up the crawling process on a multi-core processor through virtualization. In this approach, the multi-core processor is divided into a number of virtual-machines (VMs) that can run in parallel (concurrently) performing different crawling tasks on different data. It presents a description, implementation, and evaluation of a VM-based distributed Web crawler. In order to estimate the speedup factor achieved by the VM-based crawler over a non- virtualization crawler, extensive crawling experiments were carried-out to estimate the crawling times for various numbers of documents. Furthermore, the average crawling rate in documents per unit time is computed, and the effect of the number of VMs on the speedup factor is investigated. For example, on an Intel® Core™ i5-2300 CPU @2.80 GHz and 8 GB memory, a speedup factor of ~1.48 is achieved when crawling 70000 documents on 3 and 4 VMs. KEYWORDS Web search engine; Web crawler; virtualization; virtual machines; distributed crawling; multi- core processor; distribution methodologies; processor-farm methodology. For More Details : http://airccse.org/journal/jwsc/papers/4113ijwsc02.pdf Volume Link : http://airccse.org/journal/jwsc/current2013.html
  • 25. REFERENCES [1] B. Croft, D. Metzler, &T. Strohman (2009). Search Engines: Information Retrieval in Practice. Addison Wesley. [2] M. Levene (2005). An Introduction to Search Engine and Web Navigation. Addison Wesley. [3] WorldWideWebSize (2012). The size of the World Wide Web. http://www.worldwidewebsize.com. [4] T. Calishain. (2004). Web Search Garage. Prentice Hall. [5] C. Olston&M. Najork (2010). Web Crawling. Now Publishers Inc. [6] Q. Tan (2009). Designing New Crawling and Indexing Techniques for Web Search Engines. VDM Verlag. [7] W. Gao, H. C. Lee, &Y. Miao (2006). Geographically Focused Collaborative Crawling. Proceedings of the 15th International Conference on World Wide Web (WWW’06), pp. 287-296. [8] D. Mukhopadhyay, S. Mukherjee, S.Ghosh, S. Kar, &Y. C. Kim(2006). Architecture of a Scalable Dynamic Parallel WebCrawler with High Speed Downloadable Capability for a Web Search Engine. Proceedings of the 6th International Workshop on Multimedia Signal Processing & Transmission (MSPT’06). pp. 103-108. Jeonju, Korea. [9] S. Tongchim, P.Srichaivattana, C.Kruengkrai, V.Sornlertlamvanich, &H. Isahara(2006).Collaborative Web Crawler over High-speed Research Network. Proceedings of the 1st International Conference on Knowledge, Information and Creativity Support Systems, pp. 302-308. August 1-4. Ayutthaya, Thailand. [10] Boldi, P., Codenotti, B., Santini, M., & Vigna, S. (2004). UbiCrawler: A Scalable Fully Distributed Web Crawler. Software: Practice and Experience, Vol. 34, Issue 8, pp. 711 – 726. [11] J. Cho,&H. Garcia-Molina (2002). Parallel Crawlers. Proceedings of the 11th International Conference on World Wide Web (WWW’02). May 7-11. Honolulu, Hawaii, USA. [12] V. Shkapenyuk&T. Suel (2002).Design and Implementation of a High-Performance Distributed Web Crawler.Proceedings of the 18th International Conference on Data Engineering, pp.357-368. February 26- March 1. San Jose, CA, USA. [13] I. Hernandez, C. R.Rivero, D. Ruiz, &R. Corchuelo (2012) An Architecture for Efficient Web Crawling. Lecture Notes in Business Information Processing, Vol. 112, pp. 228-234
  • 26. [14] S. Ghoshal (2011). Computer Architecture and Organization. Pearson Education. [15] J. Laudon L.Spracklen (2007). The ComingWave of Multithreaded Chip Microprocessors. International Journal of Parallel Programming, Vol. 35, No. 3, pp. 299-330. [16] T. L. Floyd (2009). Digital Fundamentals. 10th Edition. Prentice Hall. [17] H. Al-Bahadili&S. Al-Saab (2011).Development of a Novel Compressed Index-Query Web Search Engine Model. International Journal of Information Technology and Web Engineering (IJITWE), Vol. 6, No. 3, pp. 39-56. [18] J. Smith &R. Nair (2005). Virtual Machines: Versatile Platforms for Systems and Processes. The Morgan Kaufmann Series in Computer Architecture and Design. [19] N. Smyth (2010). Xen Virtualization Essentials. Payload Media. [20] C. Takemura &L. Crawford (2009). The Book of Xen: A Practical Guide for the System Administrator. 1st Edition. No Starch Press. [21] J. Cho, H. Garcia-Molina &L. Page (1998). Efficient Crawling Through URL Ordering.Proceedings of the 7th International World-Wide Web Conference (WWW 1998), April 14-18, Brisbane, Australia. [22] S. Chakrabarti, M. van den Berg, &B. Dom (1999). Focused Crawling: A New Approach to Topic-Specific Web Resource Discovery. Computer Networks, Vol 31, Issue 11-16, pp. 1623–1640 [23] C. Chung &C. L. A. Clarke (2002). Topic-Oriented Collaborative Crawling. Proceedings of the ACM Conference on Information and Knowledge Management (CIKM’02), November 4–9. McLean, Virginia, USA. International Journal on Web Service Computing (IJWSC), Vol.4, No.1, March 2013 37 [24] H. Yan, J. Wang, X. Li, & L. Guo (2002). Architectural Design and Evaluation of an Efficient Webcrawling System. Journal of System and software, Vol. 60, Issue 3, pp.185- 193. [25] T. Takahashi, H. Soonsang, K. Taura, & A. Yonezawa (2002). World Wide Web Crawler. Proceedings of the 11th International Conference on World Wide Web (WWW 2002), May 7-11, Honolulu, Hawaii, USA. [26] B. T. Loo, O. Cooper, & S. Krishnamurthy(2004). Distributed Web Crawling over DHTs. University of California, Berkeley. EECS Technical Report Identifier: CSD-04-1305. Retrieved on 12 August 2012 fromhttp://techreports.lib.berkeley.edu/accessPages/CSD-04- 1305.
  • 27. [27] Y. Hafri&C. Djeraba(2004). High Performance Crawling System. Proceedings of the 6th ACM SIGMM International Workshop on Multimedia Information Retrieval (MIR’04), pp. 299-306, October 10-16, New York, USA. [28] J. Exposto, J. Macedo, A. Pina, A. Alves, &J. Rufino (2005). Geographical Partition for Distributed Web Crawling. Proceedings of the 2nd International ACM Workshop on Geographic Information Retrieval (GIR 2005), ACM Press, pp. 55-60, Bremen, Germany. [29] D. H. P. Chau, S. Pandit, S. Wang, &C. Faloutsos (2007). Parallel Crawling for Online Social Networks. Proceedings of the International Conference on World Wide Web (WWW 2007). May 8-12. PP. 201-210. Banff, Alberta, Canada. [30] S. Ibrahim, H. Jin, L. Lu, L. Qi, S. Wu, &X. Shi (2009). Evaluating MapReduce on Virtual Machines: The Hadoop Case. Lecture Notes in Computer Science, Vol. 5931, pp. 519-528. [31] J. M. Hsieh, S. D. Gribble, &H. M. Levy (2010). The Architecture and Implementation of an Extensible Web Crawler. Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI '10). April 28-30. San Jose, California, USA. [32] S. Anbukodi&K. M. Manickam (2011). Reducing Web Crawler Overhead Using Mobile Crawler. International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT 2011). pp. 926-932. March 23-24. Nagercoil, India. [33] Xen (2012). http://www.xen.org. [34] F. Hartl (2012). Nutch How It Works. http://www.florianhartl.com/nutch-how-it- works.html. [35] T. White (2012). Hadoop: The Definitive guide. 3rd Edition. O'Reilly Media. [36] H. M. Qtishat (2012). Developing a Virtual-Machine-Based Distributed Web Crawling Model. MSc Thesis. Faculty of Information Technology, Middle East University, Amman, Jordan. [37] M. Fleury&A. Downton (2004). Pipelined Processor Farms: Structured Design for Embedded Parallel Systems. John Wiley & Sons. [38] S. Roosta (2000). Parallel Processing and Parallel Algorithms: Theory and computation. Springer Verlag. New York, USA.
  • 28. WEB SERVICE COMPOSITION PROCESSES: A COMPARATIVE STUDY Aram AlSedrani and Ameur Touir Department of Computer Science, King Saud University, Riyadh, KSA ABSTRACT Service composition is the process of constructing new services by combining several existing ones. It considered as one of the complex challenges in distributed and dynamic environment. The composition process includes, in general, the searching for existing services in a specific domain, and selecting the appropriate service, then coordinating composition flow and invoking services. Over the past years, the problem of web service composition has been studied intensively by researchers. Therefore, a significant amount of solutions and new methods to tackle this problem are presented. In this paper, our objective is to investigate algorithms and methodologies to provide a classification of existing methods in each composition phase. Moreover, we aim at conducting a comparative study to discover the main features and limitation in each phase in order to assist future research in this area. KEYWORDS Service composition, Composition planning, Discovery method, Selection method, Execution method. For More Details : https://aircconline.com/ijwsc/V7N1/7116ijwsc01.pdf Volume Link : http://airccse.org/journal/jwsc/current2016.html
  • 29. REFERENCES [1] M. H. Valipour, B. Amirzafari, K. N. Maleki, and N. Daneshpour, “A Brief Survey of Software Architecture Concepts and Service Oriented Architecture,” in IEEE International Conference on Computer Science and Information Technology, 2009, pp. 34–38. [2] R. Yin, “Study of Composing Web Service Based on SOA,” in Proceedings of the 2nd International Conference on Green Communications and Networks, 2013, vol. 2, no. Gcn 2012, pp. 209–214. [3] J. Rao and X. Su, “A Survey of Automated Web Service Composition Methods,” in Proceedings of the First international conference on Semantic Web Services and Web Process Composition, 2004, vol. 3387, pp. 43–54. [4] V. Portchelvi, V. P. Venkatesan, and G. Shanmugasundaram, “Achieving Web Services Composition – a Survey,” Softw. Eng., vol. 2, no. 5, pp. 195–202, 2012. [5] F. Zeshan and R. Mohamad, “Semantic Web Service Composition Approaches : Overview and Limitations,” Int. J. New Comput. Archit. Their Appl., vol. 1, no. 3, pp. 640–651, 2011. [6] P. Bertoli, A. Cimatti, M. Pistore, and P. Traverso, “A Framework for Planning with Extended Goals under Partial Observability,” in ICAPS-03 Proceedings, 2003, pp. 215– 224. [7] S. Kumar, “Agent-Based Semantic Web Service Composition,” New York, NY: Springer, 2012, pp. 15–25. [8] P. Kungas and M. Matskin, “Semantic Web Service Composition Through a P2P-Based Multi-agent Environment,” in Proceedings of the Fourth International Workshop on Agents and Peer-to- Peer Computing, 2005, pp. 106–119. [9] L. Wei, L. Junzhou, L. Bo, Z. Xiao, and C. Jiuxin, “Multi-agent based QoS-aware Service Composition,” in IEEE International Conference on Systems, Man and Cybernetics, 2010, pp. 3125– 3132. [10] M. Klusch, “Semantic Web Service Description,” in Intelligent Service Coordination in the Semantic Web, Birkhauser Basel publishing, 2008, pp. 41–68. [11] A. KIM, M. KANG, C. MEADOWS, E. IOUP, and J. SAMPLE, “A Framework for Automatic Web Service Composition,” Washington, USA, 2009. [12] G. Baryannis, O. Danylevych, D. Karastoyanova, K. Kritikos, P. Leitner, F. Rosenberg, and B. Wetzstein, “Service Composition,” in The S-Cube Book, Springer, 2010, pp. 57–87.
  • 30. [13] J. Korhonen, L. Pajunen, and J. Puustjärvi, “Automatic Composition of Web Service Workflows Using a Semantic Agent,” in Proceedings of the IEEE/WIC International Conference on Web Intelligence, 2003, pp. 566–569 [14] W. Van Der-Aalst, K. Van Hee, and G. Houben, “Modelling and Analysing Workflow using a Petrinet Based Approach,” in Proceedings of the second Workshop on Computer- Supported Cooperative Work, Petri nets and related for- malisms, 1994, pp. 31–50 [15] BPMN, “Business Process Modeling Notation,” Object Management Group, 2011. [Online]. Available: http://www.bpmn.org/. [16] M. Carman, L. Serafini, and P. Traverso, “Web Service Composition as Planning,” in Workshop on Planning for Web Services in ICAPS’03, 2003. [17] J. Peer, “Web Service Composition as AI Planning – a Survey,” Switzerland, 2005. [18] B. Bonet and H. Geffner, “Planning as Heuristic Search: New Results,” ECP, pp. 360–372, 1999. [19] V. levizou and D. Plexousaki, “Enhanced Specifications for Web Service Composition,” in proceedings of the European Conference on Web Services, 2006, pp. 223–232. [20] K. Nariai, I. Paik, and M. Shinozawa, “Planning and Composition of Web services with Dynamic Constraints Using Situation Calculus,” in Proceedings of The Fifth International Conference on Computer and Information Technology (CIT’05), 2005, pp. 1009–1013. [21] S. J. Samuel, R. G. Road, and T. Nadu, “an Approach for Graph Based Planning and Quality Driven Composition of Web Services,” Indian J. Comput. Sci. Eng., vol. 2, no. 5, pp. 672–679, 2011. [22] F. Lecue, E. Silva, and L. F. Pires, “A Framework for Dynamic Web Services Composition,” in Proceedings of the 2nd ECOWS Workshop on Emerging Web Services Technology, 2007, pp. 59–75. International Journal on Web Service Computing (IJWSC), Vol.7, No.1, March 2016 20 [23] S. Narayanan and S. A. McIlraith, “Simulation, Verifcation and Automated Composition of Web Services,” in WWW ’02: Proceedings of the eleventh international conference on World Wide Web, 2002, pp. 77–88. [24] M. Ghallab, D. Nau, and P. Traverso, “Hierarchical Task Network Planning,” in Automated Planning Theory and Practice, First., San Francisco: Elsevier Inc., 2004, pp. 229–262. [25] B. B. Anderson, J. V. Hansen, and P. B. Lowry, “Creating automated Plans for Semantic Web Applications Through Planning as Model Checking,” Expert Syst. Appl., vol. 36, no. 7, pp. 10595– 10603, 2009.
  • 31. [26] A. Farooq and R. Arshad, “An Efficient Technique for Web Services Identification,” Int. J. Multidiscip. Sci. Eng., vol. 2, no. 1, pp. 26–30, 2011. [27] S. Pakari, E. Kheirkhah, and M. Jalali, “Web Service Discovery Methods And Techniques : A Review.,” vol. 4, no. 1, pp. 1–14, 2014. [28] H. Xiao, Y. Zou, J. Ng, and L. Nigul, “An Approach for Context-Aware Service Discovery and Recommendation,” in IEEE International Conference on Web Services, 2010, pp. 163– 170. [29] N. H. Rostami, E. Kheirkhah, and M. Jalali, “Web Services Composition Methods and Techniques: A Review,” Int. J. Comput. Sci. Eng. Inf. Technol., vol. 3, no. 6, pp. 15–29, 2013. [30] D. Fensel, F. M. Facca, E. Simperl, and I. Toma, “Web Service Modeling Ontology,” in Semantic Web Services, Springer Berlin Heidelberg, 2011, pp. 107–129. [31] J. Sangers, F. Frasincar, F. Hogenboom, and V. Chepegin, “Semantic Web Service Discovery Using Natural Language Processing Techniques,” Expert Syst. Appl., vol. 31, pp. 1–27, 2013. [32] T. Amudha, N. Saritha, and P. Usha, “A Multi-agent Based Framework for Dynamic Service Discovery and Access Using Matchmaking Approach,” in International Conference on Intelligent Agent & Multi-Agent Systems, 2009, pp. 1–4. [33] M. Klusch, B. Fries, and K. Sycara, “OWLS-MX : A Hybrid Semantic Web Service Matchmaker for OWL-S Services,” Web Semant. Sci. Serv. Agents World Wide Web, vol. 7, no. 2, pp. 121–133, 2009. [34] . Zhou, N. A. Abdullah, and Z. Shi, “A Hybrid P2P Approach to Service Discovery in the Cloud,” I.J. Inf. Technol. Comput. Sci., vol. 1, pp. 1–9, 2011. [35] M. Moghaddam and J. G. Davis, “Service Selection in Web Service Composition: A Comparative Review of Existing Approaches,” in Web Services Foundations, First., A. Bouguettaya, Q. Z. Sheng, and F. Daniel, Eds. New York: Springer, 2014, pp. 321–346. [36] L. Zeng, B. Benatallah, A. H. H. Ngu, M. Dumas, J. Kalagnanam, and H. Chang, “QoS- Aware Middleware for Web Services Composition,” IEEE Trans. Softw. Eng., vol. 30, no. 5, pp. 311–327, May 2004. [37] L. Ai, “QoS-Aware Web Service Composition using Genetic Algorithms,” Queensland University of Technology, 2011. [38] A. Hilton and T. Culver, “Constraint Handling for Genetic Algorithms in Optimal Remediation Design,” J. Water Resour. Plan. Manag., vol. 126, no. 3, pp. 128–137, 2000.
  • 32. [39] F. Rosenberg, P. Celikovic, A. Michlmayr, P. Leitner, and S. Dustdar, “An End-to-End Approach for QoS-Aware Service Composition,” in IEEE International Enterprise Distributed Object Computing Conference, 2009, pp. 151–160. [40] F. Rosenberg, P. Celikovic, A. Michlmayr, P. Leitner, and S. Dustdar, “A Stochastic Programming Approach for QoS-Aware Service Composition,” in Eighth IEEE International Symposium on Cluster Computing and the Grid (CCGRID), 2008, pp. 226– 233. [41] X. Xie and K. Chen, “An AHP-Based Evaluation Model for Service Composition,” in Computational Science and Its Applications - ICCSA, 2006, pp. 756–766. [42] J. Figueira, V. Mousseau, and B. Roy, “ELECTRE Methods,” in Multiple Criteria Decision Analysis, Springer, 2005, pp. 133–162. [43] S. Dasgupta, “A Semantic Framework for Event-Driven Service Composition" A Dissertation in Computer Science and Telecommunications and Computer Networking Presented to the Faculty of the University of Missouri Kansas City in partial fulfillment of the requirements for t,” University of Missouri Kansas City, 2011 [44] A. Karande, M. Karande, and B B Meshram, “Choreography and Orchestration using Business Process Execution Language for SOA with Web Services,” Int. J. Comput. Sci. Issues IJCSI´11, vol. 8, no. 2, pp. 224–232, 2011. [45] J. P. Sousa, V. Poladian, D. Garlan, and B. Schmerl, “Task-based Adaptation for Ubiquitous Computing,” IEEE Trans. Syst. Man. Cybern., vol. 36, no. 3, pp. 328–340, 2006. [46] F. Casati, S. Ilnicki, L. Jin, V. Krishnamoorthy, and M.-C. Shan, “Adaptive and Dynamic Service Composition in eFlow,” in proceeding of 12th International Conference Advanced Information Systems Engineering (CAiSE), 2000, pp. 13–31. [47] K. Kritikos, S. Kubicki, and E. Dubois, “Goal-based Business Service Composition,” Serv. Oriented Comput. Appl., vol. 7, no. 4, pp. 231–257, 2013. [48] J. Rao, P. Küngas, and M. Matskin, “Composition of Semantic Web Services Using Linear Logic Theorem Proving,” Inf. Syst., vol. 31, no. 4–5, pp. 340–360, 2006. [49] L. Chen, M. Li, and J. Cao, “A Rule-Based Workflow Approach for Service Composition,” Parallel Distrib. Process. Appl., vol. 3758, no. 03, pp. 1036–1046, 2005. [50] Z. Ying, C. Junliang, C. Bo, and Z. Yang, “Using ECA Rules to Manage Web Service Composition for Multimedia Conference System,” in 2nd IEEE International Conference on Broadband Network & Multimedia Technology, 2009, pp. 545–549.
  • 33. A LITERATURE REVIEW ON TRUST MANAGEMENT IN WEBSERVICES ACCESS CONTROL R.Joseph Manoj1 and Dr.A.Chandrasekar2 1 Research Scholar, Manonmaniam Sundaranar University, Tirunelveli, Tamilnadu, India & Associate Professor, Department of MCA, St.Joseph’s College of Engineering, Chennai, India, 2 Professor, Department of CSE, St.Joseph’s College of Engineering, Chennai, India ABSTRACT Web Service is a reusable component which has set of related functionalities that service requesters can programmatically access from the service provider and manipulate through the Web. One of the main security issue is to secure web services from the malicious requesters. Since trust plays an important role in many kinds of human communication, it allows people to work under insecurity and with the risk of negative cost, many researchers have proposed different trust based web services access control model to prevent malicious requesters. In this literature review, various existing trust based web services access control model have been studied also investigated how the concept of a trust level is used in the access control policy of a service provider to allow service requester to access the web services. KEYWORDS Web Services, Access model, security, trust, trust model. For More Details : http://airccse.org/journal/jwsc/papers/4313ijwsc01.pdf Volume Link : http://airccse.org/journal/jwsc/current2013.html
  • 34. REFERENCES [1] S. Haibo and H.Fan, "A context-aware role-based access control model for web services," in IEEE International Conference on e- Business Engineering, 2005. ICEBE 2005 [2] E. Yuan, J. Tong, B. A. H. Inc, “Attributed based access control for web services," in 2005 IEEE International Conference on Web Services, 2005. ICWS 2005. Proceedings, 2005 [3] R.Joseph manoj, A.Chandrasekar, M.D.Anto Praveena, Gandhi Desai “AFTAC: Attribute, Feedback and Time Decay based Access Control for web services”,(ICCCIT 2012) [4] Hien Trang Nguyen, Weiliang Zhao, Jian Yang, “A Trust and Reputation Model Based on Bayesian Network for Web Services”, 2010 IEEE International Conference on Web Services [5] V.Mareeswari, Dr. E. Sathiyamoorthy, “A Survey on Trust in Semantic Web Services” International Journal of Scientific & Engineering Research, Volume 3, Issue 2, February- 2012 [6] Srividya K Bansal, Ajay Bansal, M. Brian Blake, Trust-based Dynamic Web Service Composition using Social Network Analysis, IEEE Workshop on Business Applications of Social Network, 13th December 2010. [7] Damjan Kovac, Denis Trcek, Qualitative trust modeling in SOA, Journal of Systems Architecture 55 (2009) 255–263 [8] Donovan Artz, Yolanda Gil,” A survey of trust in computer science and the Semantic Web”. [9] Stefania Galizia, Alessio Gugliotta and John Domingue, A Trust Based Methodology for Web Service Selection, International Conferences on Semantic Computing, 2007. [10] Surya Nepal, Wanita Sherchan and Athman Bouguettaya, A Behaviour-Based Trust Model for Service Web, IEEE international Conference on Service Oriented Computing and Applications, 2010. [11] Xing Su, Minjie Zhang, Yi Mu, Kwang Mong Sim, PBTrust: A Priority-Based Trust Model for Service Selection in General Service-Oriented Environments, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing. [12] Yijiao Zhu a, Junhao Wen a, Mingwen Qin a, Guoli Zhou, Web Service Selection Mechanism with QoS and Trust Management, Journal of Information & Computational Science 8: 12 (2011) 2327– 2334. [13] Manling Zhu, Lin Liu, Zhi Jin, A Social Trust Model for Services, AWRE 2006 Adelaide, Australia
  • 35. [14] R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. 2003. Propagation of Trust and Distrust. Proceedings of the 13th Annual International World Wide Web Conference, NewYork, International Journal on Web Service Computing (IJWSC), Vol.4, No.3, September 2013 18 [15] L Ding, L Zhou, T Finin, Trust Based Knowledge Outsourcing for Semantic Web Agents, WIC International Conference on Web Intelligence (WI 2003), 2003 [16] S.D. Kamvar, M.T. Schlosser, H. Garcia-Molina. “The Eigen-Trust algorithm for reputation management in P2P networks”, In Proc. 12th Int. World Wide Web Conf., 2003. [17] Y Gil, D Artz, Towards content trust of web resources, Proceedings of the 15th international conference on World Wide Web, 2006 [18] Yarden Katz and Jennifer Golbeck, Social network-based trust in prioritized default logic in Proceedings of the twenty-first national conference on artificial intelligence (aaai-06), 2006. [19] Y. Gil, V. Ratnakar. Trusting Information Sources One Citizen at a Time. Proc. 1st Int. Semantic Web conf.(ISWC), Sardinia, Italy, 2002 [20] Sapna Singh*, Archana Puri*, Shiksha Smreti Singh*, Anurika Vaish*, S.Venkatesan* A Trust Based pproach For Secure Access Control In Information Centric Network [21] Cesar Ali “CATRAC: Context Aware Trust and Role based Access Control for composite web services” 10th IEEE international Conference on computer and information technology (CIT 2010) [22] Shanshan Song, Kai Hwang, and Mikin Macwan, “Fuzzy Trust Integration for Security Enforcement in Grid Computing” NPC 2004, LNCS 3222, pp. 9-21. [23] Wang Meng; Hongxia Xia; Huazhu Song, “A Dynamic Trust Model Based on Recommendation Credibility in Grid Domain”, International Conference CiSE, 2009. [24] Gao Ying; Zhan Jiang, “A layered trust model based on behavior in service grid“, 2nd International Conference ICACC, 2010. [25] Kai Wei; Shaohua Tang, “A Multi-level Trust Evaluation Model based on D-S Theory for Grid”, International Conference CIS '09. 2009. [26] Vivekananth.P “A Behavior Based Trust Model for Grid Security”, International Journal of Computer Applications, Volume 5– No.6, 2010.
  • 36. [27] Shangzhu Jin ; Jun peng Access control for web services based on feedback and time decay” Proc 9th IEEE Int.Conf on cognitive Informatics 2010. [28] Tie-Yan Li, Huafei Zhu, Kwok-Yan Lam: “A Novel Two-Level Trust Model for Grid”. ICICS 2003. [29] Wu Xiaonian; Zhang Runlian; Zhou Shengyuan; Ma Chunbo, “Behavior Trust Computation Model Based on Risk Evaluation in the Grid Environment”, WRI World Congress WCSE '09, 2009. [30] Bhanwar, S.; Bawa, S, “Establishing and Evaluating Trust in a Grid Environment”, 10th International symposium ISPAN’09, 2009 [31] Renagaramanujam Srinivasan and Srivaramangai P. “A Comprehensive Trust Model for Improved Reliability in Grid.”, International Journal of Computer Applications Volume5- No.7,August 2010 [32] Takabi H, Amini M, and Jalili R, “Trust-Based User-Role Assignment in Role-Based Access Control,” ACS/IEEE International Conference on Computer Systems and Applications2007, The University of Arizona, Amman, Jordan: AICCSA 2007 [33] X. Wang, J. Luo, A. Song and T. Ma, “Semantic Access Control in Grid Computing”. Proc. 11th International Conference on Parallel and Distributed Systems, 2005. [34] Scott D. Stoller,” Trust Management for Web Services”, 2005 [35] Meriam Jemel, Nadia Ben Azzouna, Khaled Ghedira” Towards a Dynamic Access Control Model for E-government Web Services”, IEEE Asia-Pacific Services Computing Conference,2010 [36] Mui, L., Mohtashemi, M., Halberstadt, A.: “A computational model of trust and reputation”. In: 35th Annual Hawai International Conference on System Sciences (HICSS’02). Volume 7.IEEE Computer Society
  • 37. A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS Mathur Mohit Asst. Professor, Department of IT &CS Jagan Institute of Management Studies (Affiliated to GGSIP University, New Delhi), Rohini, Delhi, India. mohitmathur19@yahoo.co.in ABSTRACT Cloud computing is generally believed to the most gifted technological revolution in computing and it will soon become an industry standard. It is believed that cloud will replace the traditional office setup. However a big question mark exists over the network performance when the cloud traffic explodes. We call it “explosion” as in future we know that various cloud services replacing desktop computing will be accessed via cloud and the traffic increases exponentially. This journal aims at addressing some of these doubts better called “dangers” about the network performance, when cloud becomes a standard globally and providing a comprehensive solution to those problems. Our study concentrates on, that despite of offering better round-trip times and throughputs, cloud appears to consistently lose large amounts of the data that it is required to send to the clients. In this journal, we give a concise survey on the research efforts in this area. Our survey findings show that the networking research community has converged to the common understanding that a measurement infrastructure is insufficient for the optimal operation and future growth of the cloud. Despite many proposals on building an network measurement infrastructure from the research community, we believe that it will not be in the near future for such an infrastructure to be fully deployed and operational, due to both the scale and the complexity of the network. We also suggest a set of technologies to identify and manage cloud traffic using IP header DS field, QoS protocols, MPLS/IP Header Compression, Use of high speed edge routers and cloud traffic flow measurement. In the solution DS Field of IP header will be used to recognize the cloud traffic separately, QOS protocols provide the cloud traffic, the type of QOS it requires by allocating resources and marking cloud traffic identification. Further the MPLS/IP Header Compression is performed so that the traffic can pass through the existing network efficiently and speedily. The solution also suggests deployment of high speed edge routers to improve network conditions and finally it suggest to measure the traffic flow using meters for better cloud network management. Our solutions assume that cloud is being assessed via basic public network. KEYWORDS Cloud computing, traffic, Round trip time, Throughput, IP, DS field, MPLS, RSVP, Sampling, and Compression. For More Details : http://airccse.org/journal/jwsc/papers/1210ijwsc01.pdf Volume Link : http://airccse.org/journal/jwsc/currentissue.html
  • 38. REFERENCES [1] Beard, H., 2008. Cloud Computing Best Practices for Managing and Measuring Processes for OnDemand Computing, Applications and Data Centers in the Cloud with S LA’s. Amazon.com: Emereo. [2] LaMonica, M., 2008. Amazon storage 'cloud' service goes dark, ruffles Web 2.0 feathers | Webware - CNET. [3] Weiss, A., 2007. Computing in the clouds, netWorker, 11(4) [4] Rajkumar Buyya, Chee Shin Yeo, and Srikumar Venu- gopal, Market Oriented Cloud Computing: Vision, Hype and Reality for delivering IT Services as Computing Utilities 10 Elucidation of upcoming traffic problems in Cloud Computing [5] BRODKIN, J. Loss of customer data spurs closure of online storage service ’The Linkup’. Network World (August 2008). [6] BECHTOLSHEIM, A. Cloud Computing and Cloud Networking talk at UC Berkeley, December 2008. [7] MCCALPIN, J. Memory bandwidth and machine balance in current high performance computers. IEEE Technical Committee on Computer Architecture Newsletter (1995), 19– 25. [8] RANGAN, K. The Cloud Wars: $100+ billion at stake. Tech. rep., Merrill Lynch, May 2008. [9] Network-based Measurements on Cloud Computing Services-Vinod Venkataraman Ankit Shah Department of Computer SciencesThe University of Texas at Austin, Austin, TX 78712-0233 Yin Zhang [10] Davie, B. and Rekhter, Y., "MPLS Technology and Applications," Morgan Kaufmann, 2000
  • 39. [11] Black, U., "MPLS and Label Switching Networks," Prentice Hall, 2001 [12] Armitage, G., "Quality of Service in IP Networks, Morgan Kaufmann, 2000 [13] E. Rosen, A. Viswanathan, and R. Callon: Multiprotocol Label Switching Architecture. Internet Drafts, August 1999. [14] R. Braden, Ed., L. Zhang, S. Berson, S. Herzog, and S. Jamin: Resource ReSerVation Protocol (RSVP) – Version 1 Functional Spec- ification. RFC2205, September 1997. [15] T. Li and Y. Rekhter: A Provider Architecture for Differentiated Services and Traffic Engi- neering (PASTE). RFC2430, October 1998. [16] K. Nichols, S. Blake, F. Baker, and D. Black: Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers. RFC2474, December 1998. N. McKeown, M. Izzard, A. Mekkittikul, B. [17] White Paper : Internet QoS: A Big Picture Xipeng Xiao and Lionel M. Ni Department of Computer Science 3115 Engineering Building Michigan State University East Lansing, MI 48824-1226 [18] White Paper : MPLS DiffServ: A Combined Approach by Asha Rahul Sawant, Jihad Qaddour Applied Computer Science,Illinois State University [19] Uyless Black, MPLS and label Switching Networks, Prentice Hall, Upper Saddle River, 2002 [20] S. Blake, An Architecture for Differentiated Services, RFC 2475, December 1998 [21] Cisco Systems, Diffserv –The Scalable End-to-End QoS Model, http://www.cisco.com/warp/public/cc/pd/iosw/ioft /iofwft/prodlit/difse_wp.htm [22] White Paper Quality of Service and MPLS Methodologies by ipinfusion Inc. [23] CESNET technical report number 14/2004 Notes to Flow-Based Traffic Analysis System Design Tom Kosnar7.12. 2004 [24] White paper : Managing Incoming Traffic by Ashok Singh Sairam Supervisor: Prof. Gautam Barua Dept. of CSE, IIT Guwahati,,India. [25] “Can we Afford a Cloud?” by Mohit Mathur, Nitin Saraswat published in ICACCT’08, APIIT Panipat, India [26] “Assessment of Strong User Authentication Techniques in cloud based Computing” by Mohit Mathur, Nitin Saraswat published in IACC’09, Thapar University, Patiala,India.
  • 40. [27] Internet Traffic Explosion by 2015 - Next Phase is Rich Media for Infrastructure 2.0 February 2, International Journal on Web Service Computing (IJWSC), Vol.1, No.2, December 2010 13 2009 Posted by John Furrier in Technology [28] Sampled Based Estimation of Network Traffic Flow Characteristics by Lili Yang George Michailidis Department of Statistics Department of Statistics University of Michigan University of Michigan Ann Arbor, MI 48109 Ann Arbor, MI 48109 [29] Yang, L and Michailidis, G. (2006), Estimating Network Traffic Characteristics based on Sampled Data, Technical Report, Department of Statistics, The University of Michigan. [30] Mori, T., Uchida, M. and Kawahara, R. (2004), Identifying elephant flows through periodically sampled packets, Proceedings ACM SIGCOMM, 115-120. [31] White Paper : Monitoring network traffic using sflow technology on ex series ethernet switches by Juniper Networks, 2010. [32] Bandwidth Estimation for Best-Effort Internet Traffic by Jin Cao, William S. Cleveland and Don X. Sun. [33] Cloud Computing Initiative using Modified Ant Colony Framework by Soumya Banerjee, Indrajit Mukherjee, and P.K. Mahanti., World Academy of Science, Engineering and Technology 56 2009. [34] Duffield, N. (2004), Sampling for passive Internet measurement: A Review, Statistical Science, 19, 472-498