By Topic

Services Computing, 2008. SCC '08. IEEE International Conference on

Date 7-11 July 2008

Go

Filter Results

Displaying Results 1 - 25 of 107
  • [Front cover - Vol 2]

    Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (1119 KB)  
    Freely Available from IEEE
  • [Title page i - Volume 2]

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (15 KB)  
    Freely Available from IEEE
  • [Title page iii - Volume 2]

    Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (35 KB)  
    Freely Available from IEEE
  • [Copyright notice - Volume 2]

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (49 KB)  
    Freely Available from IEEE
  • Table of contents - Volume 2

    Page(s): v - xii
    Save to Project icon | Request Permissions | PDF file iconPDF (137 KB)  
    Freely Available from IEEE
  • Message from the Industry Chairs -Volume 2

    Page(s): xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (66 KB)  
    Freely Available from IEEE
  • A Structured Service-Centric Approach for the Integration of Command and Control Components

    Page(s): 5 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (294 KB) |  | HTML iconHTML  

    Service-oriented architecture (SOA) ideally provides reliable access to a scalable, agile, and affordable computing environment. In the tactical military context its ultimate goals are greater situational awareness and enhanced operational capability through the efficient sharing of information. Component systems, such as networks and data sources, can provide many of the necessary services to achieve these goals. A structured approach, however, is needed to realize this within command and control systems. This paper describes a hierarchical approach to information integration, called integration layers, and the conceptual foundations for such a structure, using chemical and biological warfare information-system services as examples. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Customer-Centric Privacy Protection Framework for Mobile Service-Oriented Architectures

    Page(s): 13 - 20
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (439 KB) |  | HTML iconHTML  

    Mobile companions such as smart phones and PDAs carry a lot of sensitive data about their owners. With new services aimed at providing more targeted information retrieval through increased interactions with these devices, privacy concerns of individuals must be addressed. Existing mobile service computing solutions give users little control over the release of this information. In this paper, we present a privacy-aware information brokerage framework called MUPPET that incorporates three novel techniques to give users control over the release of their data. First, it introduces operation-focused access control, a purpose-based access control model that supports flexible and fine-grain policies using typed operation labels. Second, MUPPET includes a purpose detector that has a number of techniques to detect the active purpose in a pervasive environment. Third, our system allows reward-driven information exchange, a protocol for explicit communication and negotiation of justifications and rewards supporting tunable privacy policies based on ongoing evaluation of the information exchange. To validate our design, the MUPPET prototype has been integrated with a personalized coupon offering application for two different service providers in an experimental retail kiosk setting. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rule-based XML Mediation for Data Validation and Privacy Anonymization

    Page(s): 21 - 28
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (377 KB) |  | HTML iconHTML  

    XML mediation for data validation and privacy anonymization of very large complicated XML messages defined in some industry-specific specifications such as HL7 is becoming increasingly important in SOA because a lot of applications depend on various kinds of hard-coded data validation and privacy anonymization functions, which makes it difficult to keep consistency of the functions among the applications in SOA when the schema of the XML messages in the specifications is updated. This paper proposes a uniform rule-based approach to realize the functions as an XML mediation separated from the applications, which makes it easy to maintain consistency of the functions even when they are updated in accord with the changes to the specifications. Therefore, application developers can readily utilize the mediation with many applications in SOA without additional modification to the applications. Our approach allows the developers to define a set of rules that consist of two components: 1) constraint conditions in a conceptual data notation in the XML message, and 2) actions performed only when the conditions are satisfied. In order to make the rules independent from both the implementation-specific data representation and the industry-specific knowledge, we automatically transform the rules into the implementation-specific data representation using two more factors; one is the data mappings from the data notation in the rules to the concrete data representation in the implementation, and the other is the implied data relationships hidden in the rules. It is very important to take into consideration a general way to import the implied knowledge because it often depends on the industry-specific data structure and it is usually given outside of the mediation system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Policy Distribution Service for Proactive Fraud Management over Financial Data Streams

    Page(s): 31 - 38
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (430 KB) |  | HTML iconHTML  

    With the ever-increasing number of unmanned customer interaction channels (e.g. Internet and mobile banking), financial platforms are becoming subject to an expanding collection of system attacks due to their unique potential for large scale monetary theft. Significant challenge therefore remains in keeping fraud policy repositories current to prevent financial loss and customer inconvenience, due to the rapid rate at which fraudsters re-engineer their methods and deploy new system attacks. Accordingly, fraud policy development based upon mining of an institution's transactional data provides only an isolated view of industry behaviour with no support for the exchange of fraud policy data with other institutions that are likely to experience similar behavioural attacks as fraudsters horizontally permeate their efforts through analogous sector organisations. This paper proposes a policy distribution service for the automated collection, analysis and distribution of emerging fraud policy definitions through a collaborative policy sharing model. A key aspect of the service is the creation of an industry wide policy knowledge base within a centralised mediator component and distribution of policies using a common modelling formalism which maybe mapped into multiple disparate target fraud management implementations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Two Stage Heuristic Algorithm for Solving the Server Consolidation Problem with Item-Item and Bin-Item Incompatibility Constraints

    Page(s): 39 - 46
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (339 KB) |  | HTML iconHTML  

    The problem of server sprawl is common in data centers of most business organizations. It is most often the case that an application is run on dedicated servers. This leads to situations where organizations end up having numerous servers that remain under-utilized most of the times. The servers, in such scenarios, are allocated more resources (disk, cpu and memory) than are justified by their present workloads. Consolidating multiple underutilized servers into a fewer number of non-dedicated servers that can host multiple applications is an effective tool for businesses to enhance their returns on investment. The problem can be modeled as a variant of the bin packing problem where items to be packed are the servers being consolidated and bins are the target servers. The sizes of the servers/items being packed are resource utilizations which are obtained from the performance trace data. Here we describe a novel two stage heuristic algorithm for taking care of the "bin-item" incompatibility constraints that are inherent in any server consolidation problem. The model is able to solve extremely large instances of problem in a reasonable amount of time. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a Service Management System in Virtualized Infrastructures

    Page(s): 47 - 51
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (326 KB) |  | HTML iconHTML  

    Service-oriented Architecture (SOA) is becoming the prevalent architectural style for the creation of agile and flexible enterprise IT infrastructures. Services, as the key elements of Service-oriented Computing (SOC), can be composed in very efficient way to support flexible business processes and to adapt application systems quickly to new business requirements. Virtualization technologies offer cost-effective and rapid resource scalability as well as greater flexibility in providing hardware resources to service demands. However, also service-oriented applications need to be tested, monitored and maintained; thus the management aspect of Service-oriented infrastructures is often neglected. We propose a Service Management System that enhances the management of infrastructures for SOC and describes a first step towards the self-management of services in infrastructures with virtualized hardware resources. This paper provides a core set of components and required management functions that must be considered in providing a Service Management System for SOC. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Policy-Based Automation to Improve Solution Engineering in IT Services

    Page(s): 52 - 59
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (256 KB) |  | HTML iconHTML  

    IT out sourcing service providers are increasingly being challenged to reduce costs while improving the quality of service implementation and delivery. A key contributor to those goals can be an improved methodology for services solution engineering - which involves analysis of the client's requirements and environment, mapping the information to the capabilities of the service provider, documenting the design and implementation of each service, and defining transformations of the customer's environment to the target IT infrastructure defined by the overall design that facilitates more efficient service delivery. One such improved methodology leverages reuse, in the form of a taxonomy of standardized service offerings and a repository of standardized service designs they can be mapped to. In this paper, we describe a prototype system that provides automation for such a methodology by encoding design policies that are used to assist the services solution architect gather relevant information from the customer and cross check design decisions. The approach demonstrates how the notion of computer-aided design can be applied to the world of IT services and introduced in an incremental manner. This paper presents the system architecture, discusses the sources and models of knowledge, and illustrates how this knowledge can be used with specific examples from the services field. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fault Tolerance Approach for Enterprise Applications

    Page(s): 63 - 72
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (412 KB) |  | HTML iconHTML  

    Service oriented architectures (SOAs) have emerged as a preferred solution to tackle the complexity of large-scale, complex, distributed, and heterogeneous systems. Key to successful operation of these systems is their reliability and availability. In this paper, we propose an approach to creating fault tolerant SOA implementations based on an architectural pattern called Rich Services. Our approach is model-driven, focuses on interaction specifications as the means for defining services and managing their failures, and is technology independent. We leverage an enterprise service bus (ESB) framework to implement a system based on the fault tolerant Rich Service pattern. We evaluate our approach by measuring availability and reliability of an experimental system in the e-business domain. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • External Business Environment Analysis with RSS/Web

    Page(s): 73 - 80
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (392 KB) |  | HTML iconHTML  

    The purpose of this article is to introduce the system that analyzes external business environment utilizing RSS or web news. The proposed system will visualize positioning of companies in an industry. The positioning analysis shows the company priority issues in changing market. Conventionally, such information is collected and regenerated manually by analysts. Our technique retrieves RSS or web news, applies characteristic analysis for each sentence in the content, evaluates the sentences with business rules, and performs macro analysis based on the Five Forces analysis. This technique will grasp competitive powers of companies in the specific industry and will discover the differentiation factors of the company. The authors apply the proposed system to the optical network industry, and the system revealed that rivalry among the existing competitors was the most influential force in the industry. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Business Transformation Workbench: A Practitioner's Tool for Business Transformation

    Page(s): 81 - 88
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (395 KB) |  | HTML iconHTML  

    Business transformation is a key management initiative that attempts to align people, process and technology of an enterprise more closely with its business strategy and vision. It is an essential part of the competitive business cycle. Existing consulting methods and tools do not address issues such as scalability of methodology, knowledge management, asset reuse, and governance well, to name a few. This paper presents business transformation workbench, a practitioner's tool for business transformation addressing these problems. It implements a methodical approach that was devised to analyze business transformation opportunities and make business cases for transformation initiatives and thereby provides decision-support to the consultants. It provides an intuitive way to evaluate and understand various opportunities in staff and IT consolidation and process standardization. It embodies structured analytical models, both qualitative and quantitative, to enhance the consultants' practices. BT workbench has been instantiated with data from finance management domain and applied to address a client situation as a case study. An alpha testing of the tool was conducted with about dozen practitioners. 90% of the consultants who tested the BT workbench tool felt that the tool would help them do a better job during a client engagement. The tool is currently being piloted with customer engagements in a large IT consulting organization. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Built-to-Order Service Engineering for Enterprise IT Discovery

    Page(s): 91 - 98
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (313 KB) |  | HTML iconHTML  

    Enterprise IT environments are complex: business applications rely on distributed middleware running on diverse hardware with components depending on each other in many unexpected ways. Discovery of applications' dependency on IT is a critical step in managing application and IT infrastructure together. Many tools and practices have emerged to discover and report IT assets and applications' dependency on the IT assets. However, our experience in the field shows that there are significant challenges in effectively deploying the tools. There is a critical need to research and develop flexible processes, methods, and practices, and architecture-level support for them in the tools to enable successful discovery using a "built-to-order" approach. In this paper we discuss our experiences with an advanced application-data relationship discovery tools in large scale enterprise environments and based on these experiences we identify three main challenges of effective discovery. They are: deployment process and related security issues; unavailability of software and administration-related information; and tool integration. To address these challenges, here we demonstrate a holistic approach that includes flexible processes, methods, and practices in the tools for achieving the necessary built-to order capability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework for Service Interoperability Analysis using Enterprise Architecture Models

    Page(s): 99 - 107
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1614 KB) |  | HTML iconHTML  

    Good IT decision making is a highly desirable property that can be furthered by the use of enterprise architecture, an approach to IT management using diagrammatic models. In order to support decision making, the models must be amenable to various kinds of analysis. It is desirable that the models support the sought after analysis effectively since creation of enterprise architecture models often is a demanding task. This paper suggests a framework for enterprise service interoperability analysis and a metamodel containing the information needed to perform the analysis. The paper also illustrates the use of the framework and metamodel in a fictional example. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Context Model for B2B Collaborations

    Page(s): 108 - 115
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (622 KB) |  | HTML iconHTML  

    Context-awareness (CA) has been applied in different domains, particularly in ubiquitous computing, to provide better value-added services. CA has also been used, albeit sporadically, in business related applications. This paper discusses an on-going research effort in enhancing Business-to-Business (B2B) collaborations through context awareness, specifically to support the formation of short and dynamic connectivity between partners collaborating in a supply chain. Through an understanding of context awareness and how companies evaluate and select prospective suppliers, a B2B Context Model is proposed to discover and match suitable partners. The prospective partners are represented as services in a service-oriented architecture (SOA) paradigm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Three Factors to Sustainable Service System Excellence: A Case Study of Service Systems

    Page(s): 119 - 126
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (750 KB) |  | HTML iconHTML  

    Prior service science work defines a service system as dynamic configuration of people, technology, organizations, and shared information from both service providers and clients that co-creates value [1]. Although such an abstraction is important, it does not directly address core issues we face in today's service industry, such as sustainable service excellence. This paper expands such prior service science work by analyzing how service systems evolve over time and what factors are critical to sustain service excellence. The paper identified and analyzed three factors attributing to the service system health throughout its lifecycle phases: the instilling of the value co-creation concept in the service system, the balancing of innovation and commoditization dynamics, and the configuration of core resources in the service system, i.e., people, technology, organization, and shared information. The analysis is derived from many real-world case studies in the information analytics service area. Key recommendations and lessons learned are presented as well. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constructing Service Oriented Dynamic Virtual Enterprises in Chinese Apparel Industry

    Page(s): 127 - 134
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (328 KB) |  | HTML iconHTML  

    Service oriented computing technologies facilitate design and implementation of virtual enterprises. By keeping the systems of business partners as autonomous and lose coupled service components, the service oriented paradigm supports flexible integration of heterogeneous systems or components within virtual enterprises. Taking a real world project in Chinese apparel industry as an example, this paper firstly analyzed the challenges in virtual enterprise construction. Then it presented a service oriented framework that supports IT-enabled heterogeneous resource sharing and dynamic virtual enterprise construction. According to the deployments in apparel companies in China, we conclude that the framework presented in this paper facilitates the construction of dynamic virtual enterprises with process services, participant management and message based inter-organizational process collaborations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of Execution Centric Payment Issues in E-contracts

    Page(s): 135 - 142
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (368 KB) |  | HTML iconHTML  

    A contract is a legal agreement involving parties, activities, clauses and payments. The activities are to be executed by the parties satisfying the clauses, in accordance with the associated terms of payment. An e-contract is a contract modeled, specified, executed, controlled and monitored by a software system. In this paper, we study payment issues in e-contracts. Payments are meant for, and so are closely related to, the execution of activities specified in the contract. We consider (i) the payment amount for the execution of an activity, (ii) the time of payment relative to the execution and (Hi) tracking the payment against the execution of the activity. For the first two, we use an execution model that enables representing a variety of states encountered in the generally complex executions of the activities in a contract. For tracking, we use a multi-level composition model for the activities. Our study brings out various issues that need to be addressed in designing a payment monitoring system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling Service Systems for Collaborative Innovation in the Enterprise Software Industry - The St. Gallen Media Reference Model Applied

    Page(s): 145 - 152
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (357 KB) |  | HTML iconHTML  

    As organizational structures shift from centralized and hierarchical structures to decentralized and loosely coupled networks, value creation and innovation processes are changing as well. Especially in the services sector, we observe a shift from closed and company-internal innovation processes to more open and collaborative forms of innovation (e.g. via various types of communities that emerge in enterprises' surrounding ecosystems). Communities of co-innovation or innovation networks can be described from a service systems perspective. In this work, a modelling approach to generally describe service systems is developed leveraging the St. Gallen Media Reference Model (MRM). A specific instantiation of this model is presented that allows for modelling service systems in terms of communities of co-innovation. The model is applied for the case of co-innovation in the enterprise software ecosystem of the SAP AG. The approach fosters understanding, organizing and managing such new networks of collaborative innovation in service science. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Differentiating Commoditized Services in a Services Marketplace

    Page(s): 153 - 160
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (350 KB) |  | HTML iconHTML  

    In a services marketplace where a service is provided by multiple service providers, service offerings have to be differentiated against competitor services. Differentiation helps to sustain as well as grow market share. Strategies to differentiate service offerings have to be unintrusive - without requiring major changes to the existing service realization mechanisms. In this paper, we present a strategy for service providers to differentiate their commoditized services. We show how to identify and document differentiating aspects of a service. By unintrusively manipulating these differentiation aspects we can differentiate services from that of competition. We specify these differentiating aspects as service policies using the WS-Policy framework. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Graphical Approach to Providing Infrastructure Recommendations for IT

    Page(s): 161 - 168
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (417 KB) |  | HTML iconHTML  

    We present SPIRIT, a Service for Providing Infrastructure Recommendations for Information Technology. SPIRIT allows maintenance support providers for Small-to-Medium Businesses (SMBs) to recommend solutions which are standardized (SMBs usually cannot afford customized IT solutions), flexible (accommodating as much as possible the customer's existing IT environment), and cost-effective (minimizing the cost of upgrading the customer's environment). SPIRIT works by first aligning the customer's IT infrastructure with a "template" describing the best practices recommended by the maintenance support provider. This step is done using an efficient graph algorithm that finds the most cost-effective transformations of the customer's environment that are consistent with the template. Then the aligned environment can be upgraded by choosing from a standard set of well understood, highly automated (and therefore economical) options. We show that the algorithm performs well on both real and synthetic data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.