SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
www.redpel.com +91 7620593389/7507483102
Office Add: WhitePel Software Pvt. Ltd. , 63/A, Ragvilas, Lane No-C, Koregaon Park Pune – 411001
Webs: www.redpel.com, www.whitepel.com , Email : redpelsoftware@gmail.com
Service Computing for java/ dot net
Check following Projects ,also check if any spelling mistakes
before showing to your Guide:
1.A Loosely Coupled Integration Environment for
Collaborative Applications.
In the computer-supported cooperative work domain, researchers have always wondered
about which principles and models to adopt for the development of collaborative
applications capable to really meet users' needs. However, these requirements are often
unpredictable and depend on several task- or environment-related factors. Integrated
collaborative environments are rarely open, extensible, and reconfigurable enough so as to
meet these requirements. This paper presents an environment, called loosely coupled
environment for integrating collaborative applications (LEICA), allowing the integration of
existing collaborative applications. LEICA adopts a loosely coupled integration approach
which is based on Web Services technology, an Event Notification System, and the
definition of Collaboration Policies to control the interactions between integrated
applications. LEICA allows different functionalities of existing applications to be dynamically
combined and controlled, enhancing its flexibility. Through a case study, we show how
LEICA was successfully used to integrate three collaborative applications: a Co-browsing
tool, an instant messaging tool, and a Voice over Internet Protocol Conference Controller.
2.Addressing Dependability throughout the SOA Life Cycle.
Synopsis:
Dependability should be considered throughout the phases of the SOA life cycle. This
article proposes the application of a service level management approach to address
dependability and presents dependability-related activities for every stage (Model,
Assemble, Deploy, and Manage) of the SOA life cycle. Furthermore, we describe the
concepts and the formalisms that are behind these activities. Following these activities
service providers and aggregators can offer optimized levels of dependability from their
existing services and thus better meet user requirements.
3.Automated Certification for Compliant Cloud-based
Business Processes.
Synopsis:
www.redpel.com +91 7620593389/7507483102
Office Add: WhitePel Software Pvt. Ltd. , 63/A, Ragvilas, Lane No-C, Koregaon Park Pune – 411001
Webs: www.redpel.com, www.whitepel.com , Email : redpelsoftware@gmail.com
A key problem in the deployment of large-scale, reliable cloud computing concerns the difficulty to certify
the compliance of business processes operating in the cloud. Standard audit procedures such as SAS-70
and SAS-117 are hard to conduct for cloud-based processes. The paper proposes a novel approach to
certify the compliance of business processes with regulatory requirements. The approach translates
process models into their corresponding Petri net representations and checks them against requirements
also expressed in this formalism. Being based on Petri nets, the approach provides well-founded
evidence on adherence and, in case of noncompliance, indicates the possible vulnerabilities.
4.Expert Discovery and Interactions in Mixed Service-
Oriented Systems.
Synopsis:
Web-based collaborations and processes have become essential in today's business
environments. Such processes typically span interactions between people and services
across globally distributed companies. Web services and SOA are the defacto technology to
implement compositions of humans and services. The increasing complexity of
compositions and the distribution of people and services require adaptive and context-
aware interaction models. To support complex interaction scenarios, we introduce a mixed
service-oriented system composed of both human-provided and Software-Based Services
(SBSs) interacting to perform joint activities or to solve emerging problems. However,
competencies of people evolve over time, thereby requiring approaches for the automated
management of actor skills, reputation, and trust. Discovering the right actor in mixed
service-oriented systems is challenging due to scale and temporary nature of
collaborations. We present a novel approach addressing the need for flexible involvement of
experts and knowledge workers in distributed collaborations. We argue that the automated
inference of trust between members is a key factor for successful collaborations. Instead of
following a security perspective on trust, we focus on dynamic trust in collaborative
networks. We discuss Human-Provided Services (HPSs) and an approach for managing
user preferences and network structures. HPS allows experts to offer their skills and
capabilities as services that can be requested on demand. Our main contributions center
around a context-sensitive trust-based algorithm called ExpertHITS inspired by the concept
of hubs and authorities in web-based environments. ExpertHITS takes trust-relations and
link properties in social networks into account to estimate the reputation of users..
5.Extracting Product Features and Sentiments from Chinese
Customer Reviews
Synopsis:
E-commerce, or business done on the Internet has become more and more popular. Meanwhile, the
number of customer reviews for products on the internet grows rapidly. For a popular product, the
www.redpel.com +91 7620593389/7507483102
Office Add: WhitePel Software Pvt. Ltd. , 63/A, Ragvilas, Lane No-C, Koregaon Park Pune – 411001
Webs: www.redpel.com, www.whitepel.com , Email : redpelsoftware@gmail.com
number of reviews can be in hundreds. As a result, the problem of ¿opinion mining¿ has seen
increasing attention over several years. In this paper, we proposed a statistical method to extract
product features from Chinese customer reviews. The method is based on distribution of a candidate
word in different domains and within the certain domain. It also takes into account the unbalance size of
different product reviews. Experimental results show that it achieves better performance than other
methods.
6.Monitoring Service Systems from a Language-Action
Perspective.
Synopsis:
Business processes are increasingly distributed and open, making them prone to failure.
Monitoring is, therefore, an important concern not only for the processes themselves but
also for the services that comprise these processes. We present a framework for multilevel
monitoring of these service systems. It formalizes interaction protocols, policies, and
commitments that account for standard and extended effects following the language-action
perspective, and allows specification of goals and monitors at varied abstraction levels. We
demonstrate how the framework can be implemented and evaluate it with multiple scenarios
that include specifying and monitoring open-service policy commitments.
7.OWLPath: An OWL Ontology-Guided Query Editor.
Synopsis:
Most Semantic Web technology-based applications need users to have a deep background
on the formal underpinnings of ontology languages and some basic skills in these
technologies. Generally, only experts in the field meet these requirements. In this paper, we
present OWLPath, a natural language-query editor guided by multilanguage OWL-formatted
ontologies. This application allows nonexpert users to easily create SPARQL queries that
can be issued over most existing ontology storage systems. Our approach is a fully fledged
solution backed with a proof-of-concept implementation and the empirical results of two
challenging use cases: one in the domain of e-finance and the other in e-tourism
8.Server-Side Streaming Processing of WS-Security.
Synopsis:
With SOAP-based web services leaving the stadium of being an explorative set of new
technologies and entering the stage of mature and fundamental building blocks for service-
driven business processes-and in some cases even for mission-critical systems-the
demand for nonfunctional requirements including efficiency as well as security and
www.redpel.com +91 7620593389/7507483102
Office Add: WhitePel Software Pvt. Ltd. , 63/A, Ragvilas, Lane No-C, Koregaon Park Pune – 411001
Webs: www.redpel.com, www.whitepel.com , Email : redpelsoftware@gmail.com
dependability commonly increases rapidly. Although web services are capable of coupling
heterogeneous information systems in a flexible and cost-efficient way, the processing
efficiency and robustness against certain attacks do not fulfill industry-strength
requirements. In this paper, a comprehensive stream-based WS-Security processing
system is introduced, which enables a more efficient processing in service computing and
increases the robustness against different types of Denial-of-Service (DoS) attacks. The
introduced engine is capable of processing all standard-conforming applications of WS-
Security in a streaming manner. It can handle, e.g., any order, number, and nesting degree
of signature and encryption operations, closing the gap toward more efficient and
dependable web services.
9.Service-Centric Framework for a Digital Government
Application.
Synopsis:
This paper presents a service-oriented digital government infrastructure focused on
efficiently providing customized services to senior citizens. We designed and developed a
Web Service Management System (WSMS), called WebSenior, which provides a service-
centric framework to deliver government services to senior citizens. The proposed WSMS
manages the entire life cycle of third-party web services. These act as proxies for real
government services. Due to the specific requirements of our digital government
application, we focus on the following key components of WebSenior: service composition,
service optimization, and service privacy preservation. These components form the nucleus
that achieves seamless cooperation among government agencies to provide prompt and
customized services to senior citizens.
10.Service-Oriented Architecture for High-Dimensional
Private Data Mashup.
Synopsis:
Mashup is a web technology that allows different service providers to flexibly integrate their
expertise and to deliver highly customizable services to their customers. Data mashup is a
special type of mashup application that aims at integrating data from multiple data providers
depending on the user's request. However, integrating data from multiple sources brings
about three challenges: 1) Simply joining multiple private data sets together would reveal
the sensitive information to the other data providers. 2) The integrated (mashup) data could
potentially sharpen the identification of individuals and, therefore, reveal their person-
specific sensitive information that was not available before the mashup. 3) The mashup
data from multiple sources often contain many data attributes. When enforcing a traditional
www.redpel.com +91 7620593389/7507483102
Office Add: WhitePel Software Pvt. Ltd. , 63/A, Ragvilas, Lane No-C, Koregaon Park Pune – 411001
Webs: www.redpel.com, www.whitepel.com , Email : redpelsoftware@gmail.com
privacy model, such as K-anonymity, the high-dimensional data would suffer from the
problem known as the curse of high dimensionality, resulting in useless data for further data
analysis. In this paper, we study and resolve a privacy problem in a real-life mashup
application for the online advertising industry in social networks, and propose a service-
oriented architecture along with a privacy-preserving data mashup algorithm to address the
aforementioned challenges. Experiments on real-life data suggest that our proposed
architecture and algorithm is effective for simultaneously preserving both privacy and
information utility on the mashup data. To the best of our knowledge, this is the first work
that integrates high-dimensional data for mashup service.
11.Vulnerability Analysis in SOA-Based Business Processes.
Synopsis:
Business processes and services can more flexibly be combined when based upon
standards. However, such flexible compositions practically always contain vulnerabilities,
which imperil the security and dependability of processes. Vulnerability management tools
require patterns to find or monitor vulnerabilities. Such patterns have to be derived from
vulnerability types. Existing analysis methods such as attack trees and FMEA result in such
types, yet require much experience and provide little guidance during the analysis. Our
main contribution is ATLIST, a new vulnerability analysis method with improved
transferability. Especially in service-oriented architectures, which employ a mix of
established web technologies and SOA-specific standards, previously observed
vulnerability types and variations thereof can be found. Therefore, we focus on the detection
of known vulnerability types by leveraging previous vulnerability research. A further
contribution in this respect is the, to the best of our knowledge, most comprehensive
compilation of vulnerability information sources to date. We present the method to search
for vulnerability types in SOA-based business processes and services. Also, we show how
patterns can be derived from these types, so that tools can be employed. An additional
contribution is a case study, in which we apply the new method to an SOA-based business
process scenario.

Weitere ähnliche Inhalte

Was ist angesagt?

Abul_Resume_QE&A
Abul_Resume_QE&AAbul_Resume_QE&A
Abul_Resume_QE&AAbul Azad
 
Ws Soa V6 Theory And Practice
Ws Soa V6 Theory And PracticeWs Soa V6 Theory And Practice
Ws Soa V6 Theory And PracticePini Cohen
 
Softengi - Inspired Software Engineering
Softengi - Inspired Software EngineeringSoftengi - Inspired Software Engineering
Softengi - Inspired Software EngineeringSoftengi
 
Krishna chaitanya chivukula 4.7 yrs
Krishna chaitanya chivukula 4.7 yrsKrishna chaitanya chivukula 4.7 yrs
Krishna chaitanya chivukula 4.7 yrschaitu6939
 
High Scalability Network Performance Management for Enterprises
High Scalability Network Performance Management for EnterprisesHigh Scalability Network Performance Management for Enterprises
High Scalability Network Performance Management for EnterprisesCA Technologies
 
Test Manager CV 2015
Test Manager CV 2015Test Manager CV 2015
Test Manager CV 2015Mark Hall
 
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...CA Technologies
 

Was ist angesagt? (18)

Harish
HarishHarish
Harish
 
Abul_Resume_QE&A
Abul_Resume_QE&AAbul_Resume_QE&A
Abul_Resume_QE&A
 
My Resume-2
My Resume-2My Resume-2
My Resume-2
 
7.3 Years of Experience
7.3 Years of Experience7.3 Years of Experience
7.3 Years of Experience
 
Rajkumar K_Resume
Rajkumar K_ResumeRajkumar K_Resume
Rajkumar K_Resume
 
7 Years of Experience
7 Years of Experience7 Years of Experience
7 Years of Experience
 
Ws Soa V6 Theory And Practice
Ws Soa V6 Theory And PracticeWs Soa V6 Theory And Practice
Ws Soa V6 Theory And Practice
 
BA Resume
BA  ResumeBA  Resume
BA Resume
 
Udit
UditUdit
Udit
 
Softengi - Inspired Software Engineering
Softengi - Inspired Software EngineeringSoftengi - Inspired Software Engineering
Softengi - Inspired Software Engineering
 
Krishna chaitanya chivukula 4.7 yrs
Krishna chaitanya chivukula 4.7 yrsKrishna chaitanya chivukula 4.7 yrs
Krishna chaitanya chivukula 4.7 yrs
 
High Scalability Network Performance Management for Enterprises
High Scalability Network Performance Management for EnterprisesHigh Scalability Network Performance Management for Enterprises
High Scalability Network Performance Management for Enterprises
 
Test Manager CV 2015
Test Manager CV 2015Test Manager CV 2015
Test Manager CV 2015
 
RaviKuraba_4
RaviKuraba_4RaviKuraba_4
RaviKuraba_4
 
3.9 Resume Years
3.9 Resume Years3.9 Resume Years
3.9 Resume Years
 
Ramasundararajan MV_Resume
Ramasundararajan MV_ResumeRamasundararajan MV_Resume
Ramasundararajan MV_Resume
 
Test manager resume
Test manager resumeTest manager resume
Test manager resume
 
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
 

Ähnlich wie Service computing project list for java and dotnet

Top 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringTop 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringConvetit
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com msudan92
 
Evaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web ServicesEvaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web ServicesIRJET Journal
 
The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)F5 Networks
 
Cloud computing for java and dotnet
Cloud computing for java and dotnetCloud computing for java and dotnet
Cloud computing for java and dotnetredpel dot com
 
Adaptive Information Technology for Service Lifecycle Management
Adaptive Information Technology for Service Lifecycle ManagementAdaptive Information Technology for Service Lifecycle Management
Adaptive Information Technology for Service Lifecycle Managementwhite paper
 
Application Modernization With Cloud Native Approach_ An in-depth Guide.pdf
Application Modernization With Cloud Native Approach_ An in-depth Guide.pdfApplication Modernization With Cloud Native Approach_ An in-depth Guide.pdf
Application Modernization With Cloud Native Approach_ An in-depth Guide.pdfbasilmph
 
STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...
STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...
STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...IRJET Journal
 
Finite State Machine Based Evaluation Model For Web Service Reliability Analysis
Finite State Machine Based Evaluation Model For Web Service Reliability AnalysisFinite State Machine Based Evaluation Model For Web Service Reliability Analysis
Finite State Machine Based Evaluation Model For Web Service Reliability Analysisdannyijwest
 
Web Services-Enhanced Agile Modeling and Integrating Business Processes
Web Services-Enhanced Agile Modeling and Integrating Business ProcessesWeb Services-Enhanced Agile Modeling and Integrating Business Processes
Web Services-Enhanced Agile Modeling and Integrating Business ProcessesMustafa Salam
 
AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06Jay van Zyl
 
Apq Qms Project Plan
Apq Qms Project PlanApq Qms Project Plan
Apq Qms Project PlanEng-Mohammad
 
Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...
Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...
Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...Shaunak Gujjewar
 
M.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.comM.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.comArun Somu Panneerselvam
 
Root Cause Detection in a Service-Oriented Architecture
Root Cause Detection in a Service-Oriented ArchitectureRoot Cause Detection in a Service-Oriented Architecture
Root Cause Detection in a Service-Oriented ArchitectureSam Shah
 
The Need for Unified Performance Management
The Need for Unified Performance ManagementThe Need for Unified Performance Management
The Need for Unified Performance ManagementRiverbed Technology
 
IRJET - Application Development Approach to Transform Traditional Web Applica...
IRJET - Application Development Approach to Transform Traditional Web Applica...IRJET - Application Development Approach to Transform Traditional Web Applica...
IRJET - Application Development Approach to Transform Traditional Web Applica...IRJET Journal
 
Agile testing and_the_banking_domain_2009
Agile testing and_the_banking_domain_2009Agile testing and_the_banking_domain_2009
Agile testing and_the_banking_domain_2009Anil Kumar
 

Ähnlich wie Service computing project list for java and dotnet (20)

Top 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringTop 8 Trends in Performance Engineering
Top 8 Trends in Performance Engineering
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com
 
Evaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web ServicesEvaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web Services
 
The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)
 
Cloud computing for java and dotnet
Cloud computing for java and dotnetCloud computing for java and dotnet
Cloud computing for java and dotnet
 
Adaptive Information Technology for Service Lifecycle Management
Adaptive Information Technology for Service Lifecycle ManagementAdaptive Information Technology for Service Lifecycle Management
Adaptive Information Technology for Service Lifecycle Management
 
M017258892
M017258892M017258892
M017258892
 
Application Modernization With Cloud Native Approach_ An in-depth Guide.pdf
Application Modernization With Cloud Native Approach_ An in-depth Guide.pdfApplication Modernization With Cloud Native Approach_ An in-depth Guide.pdf
Application Modernization With Cloud Native Approach_ An in-depth Guide.pdf
 
STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...
STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...
STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...
 
Finite State Machine Based Evaluation Model For Web Service Reliability Analysis
Finite State Machine Based Evaluation Model For Web Service Reliability AnalysisFinite State Machine Based Evaluation Model For Web Service Reliability Analysis
Finite State Machine Based Evaluation Model For Web Service Reliability Analysis
 
Web Services-Enhanced Agile Modeling and Integrating Business Processes
Web Services-Enhanced Agile Modeling and Integrating Business ProcessesWeb Services-Enhanced Agile Modeling and Integrating Business Processes
Web Services-Enhanced Agile Modeling and Integrating Business Processes
 
AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06
 
Soa 2013
Soa 2013Soa 2013
Soa 2013
 
Apq Qms Project Plan
Apq Qms Project PlanApq Qms Project Plan
Apq Qms Project Plan
 
Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...
Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...
Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...
 
M.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.comM.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.com
 
Root Cause Detection in a Service-Oriented Architecture
Root Cause Detection in a Service-Oriented ArchitectureRoot Cause Detection in a Service-Oriented Architecture
Root Cause Detection in a Service-Oriented Architecture
 
The Need for Unified Performance Management
The Need for Unified Performance ManagementThe Need for Unified Performance Management
The Need for Unified Performance Management
 
IRJET - Application Development Approach to Transform Traditional Web Applica...
IRJET - Application Development Approach to Transform Traditional Web Applica...IRJET - Application Development Approach to Transform Traditional Web Applica...
IRJET - Application Development Approach to Transform Traditional Web Applica...
 
Agile testing and_the_banking_domain_2009
Agile testing and_the_banking_domain_2009Agile testing and_the_banking_domain_2009
Agile testing and_the_banking_domain_2009
 

Mehr von redpel dot com

An efficient tree based self-organizing protocol for internet of things
An efficient tree based self-organizing protocol for internet of thingsAn efficient tree based self-organizing protocol for internet of things
An efficient tree based self-organizing protocol for internet of thingsredpel dot com
 
Validation of pervasive cloud task migration with colored petri net
Validation of pervasive cloud task migration with colored petri netValidation of pervasive cloud task migration with colored petri net
Validation of pervasive cloud task migration with colored petri netredpel dot com
 
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...redpel dot com
 
Towards a virtual domain based authentication on mapreduce
Towards a virtual domain based authentication on mapreduceTowards a virtual domain based authentication on mapreduce
Towards a virtual domain based authentication on mapreduceredpel dot com
 
Toward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureredpel dot com
 
Protection of big data privacy
Protection of big data privacyProtection of big data privacy
Protection of big data privacyredpel dot com
 
Privacy preserving and delegated access control for cloud applications
Privacy preserving and delegated access control for cloud applicationsPrivacy preserving and delegated access control for cloud applications
Privacy preserving and delegated access control for cloud applicationsredpel dot com
 
Performance evaluation and estimation model using regression method for hadoo...
Performance evaluation and estimation model using regression method for hadoo...Performance evaluation and estimation model using regression method for hadoo...
Performance evaluation and estimation model using regression method for hadoo...redpel dot com
 
Frequency and similarity aware partitioning for cloud storage based on space ...
Frequency and similarity aware partitioning for cloud storage based on space ...Frequency and similarity aware partitioning for cloud storage based on space ...
Frequency and similarity aware partitioning for cloud storage based on space ...redpel dot com
 
Multiagent multiobjective interaction game system for service provisoning veh...
Multiagent multiobjective interaction game system for service provisoning veh...Multiagent multiobjective interaction game system for service provisoning veh...
Multiagent multiobjective interaction game system for service provisoning veh...redpel dot com
 
Efficient multicast delivery for data redundancy minimization over wireless d...
Efficient multicast delivery for data redundancy minimization over wireless d...Efficient multicast delivery for data redundancy minimization over wireless d...
Efficient multicast delivery for data redundancy minimization over wireless d...redpel dot com
 
Cloud assisted io t-based scada systems security- a review of the state of th...
Cloud assisted io t-based scada systems security- a review of the state of th...Cloud assisted io t-based scada systems security- a review of the state of th...
Cloud assisted io t-based scada systems security- a review of the state of th...redpel dot com
 
I-Sieve: An inline High Performance Deduplication System Used in cloud storage
I-Sieve: An inline High Performance Deduplication System Used in cloud storageI-Sieve: An inline High Performance Deduplication System Used in cloud storage
I-Sieve: An inline High Performance Deduplication System Used in cloud storageredpel dot com
 
Bayes based arp attack detection algorithm for cloud centers
Bayes based arp attack detection algorithm for cloud centersBayes based arp attack detection algorithm for cloud centers
Bayes based arp attack detection algorithm for cloud centersredpel dot com
 
Architecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog networkArchitecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog networkredpel dot com
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingredpel dot com
 
An anomalous behavior detection model in cloud computing
An anomalous behavior detection model in cloud computingAn anomalous behavior detection model in cloud computing
An anomalous behavior detection model in cloud computingredpel dot com
 
A tutorial on secure outsourcing of large scalecomputation for big data
A tutorial on secure outsourcing of large scalecomputation for big dataA tutorial on secure outsourcing of large scalecomputation for big data
A tutorial on secure outsourcing of large scalecomputation for big dataredpel dot com
 
A parallel patient treatment time prediction algorithm and its applications i...
A parallel patient treatment time prediction algorithm and its applications i...A parallel patient treatment time prediction algorithm and its applications i...
A parallel patient treatment time prediction algorithm and its applications i...redpel dot com
 
A mobile offloading game against smart attacks
A mobile offloading game against smart attacksA mobile offloading game against smart attacks
A mobile offloading game against smart attacksredpel dot com
 

Mehr von redpel dot com (20)

An efficient tree based self-organizing protocol for internet of things
An efficient tree based self-organizing protocol for internet of thingsAn efficient tree based self-organizing protocol for internet of things
An efficient tree based self-organizing protocol for internet of things
 
Validation of pervasive cloud task migration with colored petri net
Validation of pervasive cloud task migration with colored petri netValidation of pervasive cloud task migration with colored petri net
Validation of pervasive cloud task migration with colored petri net
 
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...
 
Towards a virtual domain based authentication on mapreduce
Towards a virtual domain based authentication on mapreduceTowards a virtual domain based authentication on mapreduce
Towards a virtual domain based authentication on mapreduce
 
Toward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architecture
 
Protection of big data privacy
Protection of big data privacyProtection of big data privacy
Protection of big data privacy
 
Privacy preserving and delegated access control for cloud applications
Privacy preserving and delegated access control for cloud applicationsPrivacy preserving and delegated access control for cloud applications
Privacy preserving and delegated access control for cloud applications
 
Performance evaluation and estimation model using regression method for hadoo...
Performance evaluation and estimation model using regression method for hadoo...Performance evaluation and estimation model using regression method for hadoo...
Performance evaluation and estimation model using regression method for hadoo...
 
Frequency and similarity aware partitioning for cloud storage based on space ...
Frequency and similarity aware partitioning for cloud storage based on space ...Frequency and similarity aware partitioning for cloud storage based on space ...
Frequency and similarity aware partitioning for cloud storage based on space ...
 
Multiagent multiobjective interaction game system for service provisoning veh...
Multiagent multiobjective interaction game system for service provisoning veh...Multiagent multiobjective interaction game system for service provisoning veh...
Multiagent multiobjective interaction game system for service provisoning veh...
 
Efficient multicast delivery for data redundancy minimization over wireless d...
Efficient multicast delivery for data redundancy minimization over wireless d...Efficient multicast delivery for data redundancy minimization over wireless d...
Efficient multicast delivery for data redundancy minimization over wireless d...
 
Cloud assisted io t-based scada systems security- a review of the state of th...
Cloud assisted io t-based scada systems security- a review of the state of th...Cloud assisted io t-based scada systems security- a review of the state of th...
Cloud assisted io t-based scada systems security- a review of the state of th...
 
I-Sieve: An inline High Performance Deduplication System Used in cloud storage
I-Sieve: An inline High Performance Deduplication System Used in cloud storageI-Sieve: An inline High Performance Deduplication System Used in cloud storage
I-Sieve: An inline High Performance Deduplication System Used in cloud storage
 
Bayes based arp attack detection algorithm for cloud centers
Bayes based arp attack detection algorithm for cloud centersBayes based arp attack detection algorithm for cloud centers
Bayes based arp attack detection algorithm for cloud centers
 
Architecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog networkArchitecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog network
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computing
 
An anomalous behavior detection model in cloud computing
An anomalous behavior detection model in cloud computingAn anomalous behavior detection model in cloud computing
An anomalous behavior detection model in cloud computing
 
A tutorial on secure outsourcing of large scalecomputation for big data
A tutorial on secure outsourcing of large scalecomputation for big dataA tutorial on secure outsourcing of large scalecomputation for big data
A tutorial on secure outsourcing of large scalecomputation for big data
 
A parallel patient treatment time prediction algorithm and its applications i...
A parallel patient treatment time prediction algorithm and its applications i...A parallel patient treatment time prediction algorithm and its applications i...
A parallel patient treatment time prediction algorithm and its applications i...
 
A mobile offloading game against smart attacks
A mobile offloading game against smart attacksA mobile offloading game against smart attacks
A mobile offloading game against smart attacks
 

Kürzlich hochgeladen

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 

Kürzlich hochgeladen (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 

Service computing project list for java and dotnet

  • 1. www.redpel.com +91 7620593389/7507483102 Office Add: WhitePel Software Pvt. Ltd. , 63/A, Ragvilas, Lane No-C, Koregaon Park Pune – 411001 Webs: www.redpel.com, www.whitepel.com , Email : redpelsoftware@gmail.com Service Computing for java/ dot net Check following Projects ,also check if any spelling mistakes before showing to your Guide: 1.A Loosely Coupled Integration Environment for Collaborative Applications. In the computer-supported cooperative work domain, researchers have always wondered about which principles and models to adopt for the development of collaborative applications capable to really meet users' needs. However, these requirements are often unpredictable and depend on several task- or environment-related factors. Integrated collaborative environments are rarely open, extensible, and reconfigurable enough so as to meet these requirements. This paper presents an environment, called loosely coupled environment for integrating collaborative applications (LEICA), allowing the integration of existing collaborative applications. LEICA adopts a loosely coupled integration approach which is based on Web Services technology, an Event Notification System, and the definition of Collaboration Policies to control the interactions between integrated applications. LEICA allows different functionalities of existing applications to be dynamically combined and controlled, enhancing its flexibility. Through a case study, we show how LEICA was successfully used to integrate three collaborative applications: a Co-browsing tool, an instant messaging tool, and a Voice over Internet Protocol Conference Controller. 2.Addressing Dependability throughout the SOA Life Cycle. Synopsis: Dependability should be considered throughout the phases of the SOA life cycle. This article proposes the application of a service level management approach to address dependability and presents dependability-related activities for every stage (Model, Assemble, Deploy, and Manage) of the SOA life cycle. Furthermore, we describe the concepts and the formalisms that are behind these activities. Following these activities service providers and aggregators can offer optimized levels of dependability from their existing services and thus better meet user requirements. 3.Automated Certification for Compliant Cloud-based Business Processes. Synopsis:
  • 2. www.redpel.com +91 7620593389/7507483102 Office Add: WhitePel Software Pvt. Ltd. , 63/A, Ragvilas, Lane No-C, Koregaon Park Pune – 411001 Webs: www.redpel.com, www.whitepel.com , Email : redpelsoftware@gmail.com A key problem in the deployment of large-scale, reliable cloud computing concerns the difficulty to certify the compliance of business processes operating in the cloud. Standard audit procedures such as SAS-70 and SAS-117 are hard to conduct for cloud-based processes. The paper proposes a novel approach to certify the compliance of business processes with regulatory requirements. The approach translates process models into their corresponding Petri net representations and checks them against requirements also expressed in this formalism. Being based on Petri nets, the approach provides well-founded evidence on adherence and, in case of noncompliance, indicates the possible vulnerabilities. 4.Expert Discovery and Interactions in Mixed Service- Oriented Systems. Synopsis: Web-based collaborations and processes have become essential in today's business environments. Such processes typically span interactions between people and services across globally distributed companies. Web services and SOA are the defacto technology to implement compositions of humans and services. The increasing complexity of compositions and the distribution of people and services require adaptive and context- aware interaction models. To support complex interaction scenarios, we introduce a mixed service-oriented system composed of both human-provided and Software-Based Services (SBSs) interacting to perform joint activities or to solve emerging problems. However, competencies of people evolve over time, thereby requiring approaches for the automated management of actor skills, reputation, and trust. Discovering the right actor in mixed service-oriented systems is challenging due to scale and temporary nature of collaborations. We present a novel approach addressing the need for flexible involvement of experts and knowledge workers in distributed collaborations. We argue that the automated inference of trust between members is a key factor for successful collaborations. Instead of following a security perspective on trust, we focus on dynamic trust in collaborative networks. We discuss Human-Provided Services (HPSs) and an approach for managing user preferences and network structures. HPS allows experts to offer their skills and capabilities as services that can be requested on demand. Our main contributions center around a context-sensitive trust-based algorithm called ExpertHITS inspired by the concept of hubs and authorities in web-based environments. ExpertHITS takes trust-relations and link properties in social networks into account to estimate the reputation of users.. 5.Extracting Product Features and Sentiments from Chinese Customer Reviews Synopsis: E-commerce, or business done on the Internet has become more and more popular. Meanwhile, the number of customer reviews for products on the internet grows rapidly. For a popular product, the
  • 3. www.redpel.com +91 7620593389/7507483102 Office Add: WhitePel Software Pvt. Ltd. , 63/A, Ragvilas, Lane No-C, Koregaon Park Pune – 411001 Webs: www.redpel.com, www.whitepel.com , Email : redpelsoftware@gmail.com number of reviews can be in hundreds. As a result, the problem of ¿opinion mining¿ has seen increasing attention over several years. In this paper, we proposed a statistical method to extract product features from Chinese customer reviews. The method is based on distribution of a candidate word in different domains and within the certain domain. It also takes into account the unbalance size of different product reviews. Experimental results show that it achieves better performance than other methods. 6.Monitoring Service Systems from a Language-Action Perspective. Synopsis: Business processes are increasingly distributed and open, making them prone to failure. Monitoring is, therefore, an important concern not only for the processes themselves but also for the services that comprise these processes. We present a framework for multilevel monitoring of these service systems. It formalizes interaction protocols, policies, and commitments that account for standard and extended effects following the language-action perspective, and allows specification of goals and monitors at varied abstraction levels. We demonstrate how the framework can be implemented and evaluate it with multiple scenarios that include specifying and monitoring open-service policy commitments. 7.OWLPath: An OWL Ontology-Guided Query Editor. Synopsis: Most Semantic Web technology-based applications need users to have a deep background on the formal underpinnings of ontology languages and some basic skills in these technologies. Generally, only experts in the field meet these requirements. In this paper, we present OWLPath, a natural language-query editor guided by multilanguage OWL-formatted ontologies. This application allows nonexpert users to easily create SPARQL queries that can be issued over most existing ontology storage systems. Our approach is a fully fledged solution backed with a proof-of-concept implementation and the empirical results of two challenging use cases: one in the domain of e-finance and the other in e-tourism 8.Server-Side Streaming Processing of WS-Security. Synopsis: With SOAP-based web services leaving the stadium of being an explorative set of new technologies and entering the stage of mature and fundamental building blocks for service- driven business processes-and in some cases even for mission-critical systems-the demand for nonfunctional requirements including efficiency as well as security and
  • 4. www.redpel.com +91 7620593389/7507483102 Office Add: WhitePel Software Pvt. Ltd. , 63/A, Ragvilas, Lane No-C, Koregaon Park Pune – 411001 Webs: www.redpel.com, www.whitepel.com , Email : redpelsoftware@gmail.com dependability commonly increases rapidly. Although web services are capable of coupling heterogeneous information systems in a flexible and cost-efficient way, the processing efficiency and robustness against certain attacks do not fulfill industry-strength requirements. In this paper, a comprehensive stream-based WS-Security processing system is introduced, which enables a more efficient processing in service computing and increases the robustness against different types of Denial-of-Service (DoS) attacks. The introduced engine is capable of processing all standard-conforming applications of WS- Security in a streaming manner. It can handle, e.g., any order, number, and nesting degree of signature and encryption operations, closing the gap toward more efficient and dependable web services. 9.Service-Centric Framework for a Digital Government Application. Synopsis: This paper presents a service-oriented digital government infrastructure focused on efficiently providing customized services to senior citizens. We designed and developed a Web Service Management System (WSMS), called WebSenior, which provides a service- centric framework to deliver government services to senior citizens. The proposed WSMS manages the entire life cycle of third-party web services. These act as proxies for real government services. Due to the specific requirements of our digital government application, we focus on the following key components of WebSenior: service composition, service optimization, and service privacy preservation. These components form the nucleus that achieves seamless cooperation among government agencies to provide prompt and customized services to senior citizens. 10.Service-Oriented Architecture for High-Dimensional Private Data Mashup. Synopsis: Mashup is a web technology that allows different service providers to flexibly integrate their expertise and to deliver highly customizable services to their customers. Data mashup is a special type of mashup application that aims at integrating data from multiple data providers depending on the user's request. However, integrating data from multiple sources brings about three challenges: 1) Simply joining multiple private data sets together would reveal the sensitive information to the other data providers. 2) The integrated (mashup) data could potentially sharpen the identification of individuals and, therefore, reveal their person- specific sensitive information that was not available before the mashup. 3) The mashup data from multiple sources often contain many data attributes. When enforcing a traditional
  • 5. www.redpel.com +91 7620593389/7507483102 Office Add: WhitePel Software Pvt. Ltd. , 63/A, Ragvilas, Lane No-C, Koregaon Park Pune – 411001 Webs: www.redpel.com, www.whitepel.com , Email : redpelsoftware@gmail.com privacy model, such as K-anonymity, the high-dimensional data would suffer from the problem known as the curse of high dimensionality, resulting in useless data for further data analysis. In this paper, we study and resolve a privacy problem in a real-life mashup application for the online advertising industry in social networks, and propose a service- oriented architecture along with a privacy-preserving data mashup algorithm to address the aforementioned challenges. Experiments on real-life data suggest that our proposed architecture and algorithm is effective for simultaneously preserving both privacy and information utility on the mashup data. To the best of our knowledge, this is the first work that integrates high-dimensional data for mashup service. 11.Vulnerability Analysis in SOA-Based Business Processes. Synopsis: Business processes and services can more flexibly be combined when based upon standards. However, such flexible compositions practically always contain vulnerabilities, which imperil the security and dependability of processes. Vulnerability management tools require patterns to find or monitor vulnerabilities. Such patterns have to be derived from vulnerability types. Existing analysis methods such as attack trees and FMEA result in such types, yet require much experience and provide little guidance during the analysis. Our main contribution is ATLIST, a new vulnerability analysis method with improved transferability. Especially in service-oriented architectures, which employ a mix of established web technologies and SOA-specific standards, previously observed vulnerability types and variations thereof can be found. Therefore, we focus on the detection of known vulnerability types by leveraging previous vulnerability research. A further contribution in this respect is the, to the best of our knowledge, most comprehensive compilation of vulnerability information sources to date. We present the method to search for vulnerability types in SOA-based business processes and services. Also, we show how patterns can be derived from these types, so that tools can be employed. An additional contribution is a case study, in which we apply the new method to an SOA-based business process scenario.