June 11-13, 2003Michael Weiss, FIW 031 Feature Interactions in Web Services Michael Weiss Carleton University.

Slides:



Advertisements
Similar presentations
1 From Grids to Service-Oriented Knowledge Utilities research challenges Thierry Priol.
Advertisements

Programming Languages for End-User Personalization of Cyber-Physical Systems Presented by, Swathi Krishna Kilari.
0 General information Rate of acceptance 37% Papers from 15 Countries and 5 Geographical Areas –North America 5 –South America 2 –Europe 20 –Asia 2 –Australia.
Standardizing Usable Security and Privacy: Taking It To the Next Level, or Settling for Less? Mary Ellen Zurko, IBM Maritza Johnson, Columbia University.
The New World of Security for Business Travellers Anurag Lal Senior Vice President Strategic Services & Business Development Wi-Fi Business Development.
Distributed Heterogeneous Data Warehouse For Grid Analysis
Zhang Fu, Marina Papatriantafilou, Philippas Tsigas Chalmers University of Technology, Sweden 1 ACM SAC 2010 ACM SAC 2011.
Software Connectors. Attach adapter to A Maintain multiple versions of A or B Make B multilingual Role and Challenge of Software Connectors Change A’s.
GenSpace: Exploring Social Networking Metaphors for Knowledge Sharing and Scientific Collaborative Work Chris Murphy, Swapneel Sheth, Gail Kaiser, Lauren.
Metrics for Evaluating ICEBERG ICEBERG Retreat Breakout Session Jan 11, 2000 Coordinators: Chen-Nee Chuah & Jimmy Shih.
Chapter 5: Principles of Service- Oriented Computing Service-Oriented Computing: Semantics, Processes, Agents – Munindar P. Singh and Michael N. Huhns,
درس مهندسی نیازمندی ها استاد دکتر عبداله زاده دانشجو خیرالنسا مرچانت Dealing with NFR : Three Experimental Studies of a Process-Oriented Approach.
Requirements (recap)‏
Teamcenter™ Security Services SSO
E-Profile-based Security for Critical Transactions in Web Applications Written by: Jean Stephan et al., 2009 Reported by: Renato Casipe, 2/15/2010.
Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European.
Systems Engineering Foundations of Software Systems Integration Peter Denno, Allison Barnard Feeney Manufacturing Engineering Laboratory National Institute.
Decentralized Information Spaces for Composition and Unification of Services (DISCUS)  Successor to OzWeb  Builds on WebServices  (Relatively) Static.
DISTRIBUTED PROCESS IMPLEMENTAION BHAVIN KANSARA.
Cloud Usability Framework
Community Manager A Dynamic Collaboration Solution on Heterogeneous Environment Hyeonsook Kim  2006 CUS. All rights reserved.
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
Android Security Enforcement and Refinement. Android Applications --- Example Example of location-sensitive social networking application for mobile phones.
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
Chapter 5: Principles of Service- Oriented Computing Service-Oriented Computing: Semantics, Processes, Agents – Munindar P. Singh and Michael N. Huhns,
Web Policy Zeitgeist Panel SWPW 2005 – Galway, Ireland Piero Bonatti, November 7th, 2005.
Digital Object Architecture
Supporting Heterogeneous Users in Collaborative Virtual Environments using AOP CoopIS 2001 September 5-7, Trento, Italy M. Pinto, M. Amor, L. Fuentes,
SAMANVITHA RAMAYANAM 18 TH FEBRUARY 2010 CPE 691 LAYERED APPLICATION.
Master Thesis Defense Jan Fiedler 04/17/98
Composing Adaptive Software Authors Philip K. McKinley, Seyed Masoud Sadjadi, Eric P. Kasten, Betty H.C. Cheng Presented by Ana Rodriguez June 21, 2006.
AMPol-Q: Adaptive Middleware Policy to support QoS Raja Afandi, Jianqing Zhang, Carl A. Gunter Computer Science Department, University of Illinois Urbana-Champaign.
Cohesive Design of Personalized Web Applications Presented by Yinghua Hu Schwabe, D. Mattos Guimaraes, R. Rossi, G. Pontificia Univ. Catolica do Rio de.
Secure Credential Manager Claes Nilsson - Sony Ericsson
Model-Driven Analysis Frameworks for Embedded Systems George Edwards USC Center for Systems and Software Engineering
EU Project proposal. Andrei S. Lopatenko 1 EU Project Proposal CERIF-SW Andrei S. Lopatenko Vienna University of Technology
Topic Rathachai Chawuthai Information Management CSIM / AIT Review Draft/Issued document 0.1.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
An Ontological Framework for Web Service Processes By Claus Pahl and Ronan Barrett.
Semantic Web Technologies Research Topics and Projects discussion Brief Readings Discussion Research Presentations.
Rob Smith April 21, /18 GOLD Project Update Meeting GOLD an infrastructural approach to virtual organisations.
Telecom and Informatics 1 Security and Privacy in Distributed Services Trial lecture: Security and Privacy in Distributed Services Richard Torbjørn Sanders.
A Context Model based on Ontological Languages: a Proposal for Information Visualization School of Informatics Castilla-La Mancha University Ramón Hervás.
1 Integrating security in a quality aware multimedia delivery platform Paul Koster 21 november 2001.
1 Yield Analysis and Increasing Engineering Efficiency Spotfire Users Conference 10/15/2003 William Pressnall, Scott Lacey.
NGCWE Expert Group EU-ESA Experts Group's vision Prof. Juan Quemada NGCWE Expert Group IST Call 5 Preparatory Workshop on CWEs 13th.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Team Skill 2 Understanding User and Stakeholder Needs Interviewing (10)
CONCLUSION The conclusion of this work is that it is possible to develop a problem-solving method providing evolutionary computational support to general.
Globus and PlanetLab Resource Management Solutions Compared M. Ripeanu, M. Bowman, J. Chase, I. Foster, M. Milenkovic Presented by Dionysis Logothetis.
Dispatching Java agents to user for data extraction from third party web sites Alex Roque F.I.U. HPDRC.
Secure middleware patterns E.B.Fernandez. Middleware security Architectures have been studied and several patterns exist Security aspects have not been.
Social Information Processing March 26-28, 2008 AAAI Spring Symposium Stanford University
Internet 2 and DoDHE: Research Issues From The iSchool Perspective Mike Eisenberg Dean and Professor The Information School University of Washington, Oct.
File: 05_RETS_Implementation_Best_Practices.PPT 1 RETS Implementation Practices RETS Implementation Best Practices  Business Case  RETS Features  RETS.
Turning Software into a Service – The Critique Paul Kopacz Brian Moore.
Project Undertaken By, Anita.K Subalakshmi.S Suseela.J.S Guide: Mrs.M.J.Jeyasheela Rakkini AP/CSE Third Review.
IoT R&I on IoT integration and platforms INTERNET OF THINGS
Issues need harmonization
When Personalization Becomes Too Personal Gkarnara Christina Ph. D
Supporting Mobile Collaboration with Service-Oriented Mobile Units
Model-Driven Analysis Frameworks for Embedded Systems
Health IT Policy Committee Workgroup Evolution
Mobile Agents.
Distributed systems: How did we get here?
CSCE 813 Internet Security Fall 2012
SharePoint Online Authentication Patterns
SAMANVITHA RAMAYANAM 18TH FEBRUARY 2010 CPE 691
Service-Oriented Computing: Semantics, Processes, Agents
Example Use Case for Attribute Authorities and Token Translation Services - the case for eduGAIN Andrea Biancini.
Presentation transcript:

June 11-13, 2003Michael Weiss, FIW 031 Feature Interactions in Web Services Michael Weiss Carleton University

June 11-13, 2003Michael Weiss, FIW 032 Web Services Web services are a way of packaging and publishing functionality to the network for use by other applications Web services can aggregate other web services from a web of services to provide a higher-level set of features

June 11-13, 2003Michael Weiss, FIW 033 Web Services Paradigm for constructing distributed applications –Lack of centralized control (# businesses) –Diversity of technology platforms –Rapid evolution of business environment Much work to date on low level concerns –Publishing, discovering, and invoking of services Service integration raise significant challenges –Little research on managing interactions

June 11-13, 2003Michael Weiss, FIW 034 Composition of Web Services Explicit composition –Flow Implicit composition –Parallelism –Side effect side effect uses

June 11-13, 2003Michael Weiss, FIW 035 Feature Interaction Problem Coordination of features so that their composition achieves the desired result at application level –We use "feature" and "service" interchangably here Root causes (from telephony) –Conflicting goals –Competition for resources –Changing assumptions –Design evolution –… ? (web services)

June 11-13, 2003Michael Weiss, FIW 036 Functional and Non-Functional Most interactions studied of functional nature –eg between (the functions of) CW and CFB However, each functional composition impacts the satisfaction of non-functional requirements –Mostly neglected by current research! It makes sense to talk of non-functional features –Usability, privacy, availability, security, … Feature interactions in web services not really studied (some work on SoC, AOP, …)

June 11-13, 2003Michael Weiss, FIW 037 Non-Functional Features

June 11-13, 2003Michael Weiss, FIW 038 Example: Personalized Services m-Commerce –Personalization through information filtering –Based on user identity, profile, and the user's location Many design issues –Dynamic assembly –Trust (service quality, bias, …) –Privacy concerns –Security –Semantic ambiguity –…

June 11-13, 2003Michael Weiss, FIW 039 Functional Composition Notation: Goal- Oriented Requirements Language (GRL)

June 11-13, 2003Michael Weiss, FIW 0310 implemented as

June 11-13, 2003Michael Weiss, FIW 0311 Non-Functional Composition Undesirable Feature Interaction

June 11-13, 2003Michael Weiss, FIW 0312 Resolving the Feature Interaction Refactoring

June 11-13, 2003Michael Weiss, FIW 0313 Analysis Current identity services such as Passport blur the line between authentication and authorization –Identifying the user (authentication) –Giving site access to user profile (authorization) Once user authenticates to Passport-enabled site all information is shared with the site Potential solution is to restrict identity service to authentication, and control access to profile within user agent (eg following the P3P proposal)

June 11-13, 2003Michael Weiss, FIW 0314 Example: Restaurant Finder Dynamic assembly of information services based on the user's profile & current location

June 11-13, 2003Michael Weiss, FIW 0315

June 11-13, 2003Michael Weiss, FIW 0316 implemented as

June 11-13, 2003Michael Weiss, FIW 0317

June 11-13, 2003Michael Weiss, FIW 0318 Refactoring Resolving the Feature Interaction

June 11-13, 2003Michael Weiss, FIW 0319 Analysis Dynamic assembly of heterogeneous information services of unknown quality Issue of quality of the recommendations (eg coverage of restaurants), and bias (eg if only the restaurants that have paid a fee are listed) Potential solution: use trusted portal that makes the selection of localized services transparent, and polices the quality of the recommendations

June 11-13, 2003Michael Weiss, FIW 0320 Conclusion Feature interaction in web services –Functional and non-functional Our research on non-functional interactions –Use of GRL framework Goal is to develop a benchmark for FIWS –Set of interactions between web services Patterns for service composition –Represent NFRs as patterns