O slideshow foi denunciado.
Utilizamos seu perfil e dados de atividades no LinkedIn para personalizar e exibir anúncios mais relevantes. Altere suas preferências de anúncios quando desejar.

International Journal on Web Service Computing (IJWSC)

Web Service Computing is a recent evolution in Distributed Computing series and it is an emerging and fast growing paradigm in the present scenario. Web Service Computing is a diversified discipline suite that related to the technologies of Business Process Integration and Management, Grid / Utility / Cloud Computing paradigms, autonomic computing, as well as the business and scientific applications. It applies the theories of Science and Technology for bridging the gap between Business Services and IT Services. Service oriented computing addresses how to enable the technology to help people to perform business processes more efficiently and effectively, ultimately resulting in creating WIN-WIN strategy between the business organizations and end users. The greatest significance of the web services is their interoperability, which allows businesses to dynamically publish, discover, and aggregate a range of Web services through the Internet to more easily create innovative products, business processes and value chains both from organization and end user points of views. Due to these, this cross discipline attracts the variety of researchers from various disciplines to conduct the versatile research and experiments in this area.

  • Seja o primeiro a comentar

  • Seja a primeira pessoa a gostar disto

International Journal on Web Service Computing (IJWSC)

  1. 1. March 2021: Top 10 Downloaded Articles in Web Service Computing International Journal on Web Service Computing (IJWSC) http://airccse.org/journal/jwsc/ijwsc.html ISSN 0974 - 9322 (Online) ; 0975 - 2293 (Print)
  2. 2. SURVEY OF CLOUD COMPUTING Amira. A. Elsonbaty High Institute of Engineering & Technology in New Damietta ABSTRACT With expanding volumes of knowledgeable production and the variability of themes and roots, shapes and languages, most detectable issues related to the delivery of storage space for the information and the variety of treatment strategies in addition to the problems related to the flow of information and methods go down and take an interest in the advantage of them face the researchers. In any case, such a great significance comes with a support of a great infrastructure that includes large data centers comprising thousands of server units and other supporting equipment. The cloud is not a small, undeveloped branch of it, it is a type of computing that is based on the internet, an image from the internet. Cloud Computing is a developed technology, cloud computing, possibly offers an overall economic benefit, in that end users shares a large, centrally achieved pool of storing and computing resources, rather than owning and managing their own systems. But, it needs to be environment friendly also. This review paper gives a general overview of cloud computing, also it describes cloud computing, architecture of cloud computing, characteristics of cloud computing, and different services and deployment model of cloud computing. This paper is for anyone who will have recently detected regarding cloud computing and desires to grasp a lot of regarding cloud computing KEYWORDS cloud computing; architecture of cloud computing; characteristics of cloud computing For More Details : https://aircconline.com/ijwsc/V9N4/9418ijwsc02.pdf Volume Link : http://airccse.org/journal/jwsc/current2018.html
  3. 3. REFERENCES [1] Bharti Wadhwa, “Energy Saving Approaches for Green Cloud Computing: A Review”, Proceedings of 2014 RAECS UIET Panjab University Chandigarh, 06 - 08 March, 2014 978-1-4799-2291- 8/14/$31.00 ©2014 IEEE [2] Jasleen Kaur, Ms. Anupma Sehrawat, Ms. Neha Bishnoi, " Survey Paper on Basics of Cloud Computing and Data Security," International Journal of Computer Science Trends and Technology (IJCST) – Volume 2 Issue 3, May-Jun 2014. [3] https://en.wikipedia.org/wiki/Cloud_computing,12-9-4:30pm. [4] Yashpalsinh Jadeja, Kirit Modi, “Cloud Computing - Concepts, Architecture and Challenges” in Proceeding of International Conference on Computing, Electronics and Electrical Technologies [ICCEET], 2012. [5] Qi Zhang, Lu Cheng and Raouf Boutaba, “Cloud computing: state-of-the-art and research challenges”. Journal of Internet Services and Applications, Volume 1, Issue 1, pp 7–18, May 2010 [6] Ivanka Menken," Cloud Computing - The Complete Cornerstone Guide to Cloud Computing Best Practices Concepts, Terms, and Techniques for Successfully Planning, Implementing ... Enterprise IT Cloud ComputingTechnology", London, UK, UK ©2008 , ISBN:1921573007 9781921573002,2008. [7] Ms. Disha H. Parekh, Dr. R. Sridaran, “An Analysis of Security Challenges in Cloud Computing,” (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 4, No.1, 2013. [8] Jasleen Kaur, Ms.Anupma Sehrawat, Ms.Neha Bishnoi ,"Survey Paper on Basics of Cloud Computing and Data Security", International Journal of Computer Science Trends and Technology (IJCST) – Volume 2 Issue 3, May-Jun 2014. [9] M. Armbrust, O. Fox, R. Griffith, A. D. Joseph, Y. Katz, A. Konwinski, et al., "M.: Above the clouds: A Berkeley view of cloud computing," 2009. [10] S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, vol. 34, pp. 1-11, 2011. International Journal on Web Service Computing (IJWSC), Vol.9, No.3/4, December 2018 27 [11] Aniruddha S. Rumale, D.N.Chaudhari, ” Cloud Computing: Infrastructure as a Service,” International Journal of Inventive Engineering and Sciences (IJIES) ISSN: 2319–9598, Volume-1, Issue-3, February 2013.
  4. 4. [12] Imran Ashrafa, "An Overview of Service Models of Cloud Computing," International Journal of Multidisciplinary and Current Research 27 Aug 2014, Vol.2 [8] Yashpalsinh Jadeja; Kirit Modi, “Cloud Computing - Concepts, Architecture and Challenges” in Proceeding of International Conference on Computing, Electronics and Electrical Technologies [ICCEET], 2012. [13] Xu Wang, Beizhan Wang, Jing Huang, “Cloud computing and its key techniques” in Proceeding of IEEE Conference, 2011. [14] Michael Boniface, Bassem Nasser, Juri Papay, Stephen C. Phillips, Arturo Servin, Xiaoyu Yang, Zlatko Zlatev, Spyridon V. Gogouvitis, Gregory Katsaros, Kleopatra Konstanteli, George Kousiouris, Andreas Menychtas, Dimosthenis Kyriazis, “Platform-as-a-Service Architecture for Real-time Quality of Service Management in Clouds,” Fifth International Conference on Internet and Web Applications and Services, 2010.
  5. 5. A COMPARATIVE STUDY OF PROCESS MEDIATOR CCOMPONENTS THAT SUPPORT BEHAVIORAL INCOMPATIBILITY Kanmani Munusamy 1 , Harihodin Selamat2 , Suhaimi Ibrahim3 and Mohd Sapiyan Baba4 1, 2, 3 Advanced Informatics School (AIS), Universiti Teknologi Malaysia (UTM), Malaysia. 1 kanmani3@live.utm.my, 2 harihodin@utm.my, 3 suhaimiibrahim@utm.my 4 Faculty of Computer Science & Information Technology, University Malaya (UM), Malaysia. 4 pian@um.edu.my ABSTRACT Most businesses these days use the web services technology as a medium to allow interaction between a service provider and a service requestor. However, both the service provider and the requestor would be unable to achieve their business goals when there are miscommunications between their processes. This research focuses on the process incompatibility between the web services and the way to automatically resolve them by using a process mediator. This paper presents an overview of the behavioral incompatibility between web services and the overview of process mediation in order to resolve the complications faced due to the incompatibility. Several state-of the-art approaches have been selected and analyzed to understand the existing process mediation components. This paper aims to provide a valuable gap analysis that identifies the important research areas in process mediation that have yet to be fully explored. KEYWORDS Web services, semantic web services, web service mediation, web service adaptation and behavioral incompatibility For More Details : http://airccse.org/journal/jwsc/papers/0911wsc02.pdf Volume Link : http://airccse.org/journal/jwsc/current2011.html
  6. 6. REFERENCES [1] S.G.H. Tabatabaei, A.V. Dastjerdi, W.M.N.W. Kadir, S. Ibrahim, and E. Sarafian, “Security conscious AI-planning-based composition of semantic web services,” International Journal of Web Information Systems, vol. 6, no. 3, 2010, pp. 203-229. 0 1 2 3 4 5 6 7 8 Support for both control and data flow Support semantic and reasoning Automatic in generation of… Automation in mismatches… Automation in identification of… Automation in generating the… Scalable to support generic scenario Support complex case study Implemented with evaluation [2] M. Kanmani, I. Suhaimi, K. Mojtaba, M. Keyvan, and T. Sayed Gholam Hassan (2010), "An evaluation of process mediation approaches in web services", Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services, Paris, France, ACM pp. 48-55. [3] M. Keyvan, I. Suhaimi, K. Mojtaba, M. Kanmani, and T. Sayed Gholam Hassan (2010), "A comparative evaluation of semantic web service discovery approaches", Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services, Paris, France, ACM [4] Thirumaran.M, Dhavachelvan.P, and Thanigaivel.K, “Business Rule Management Framework for Enterprise Web Services,” International Journal on Web Service Computing ( IJWSC ), vol. 1, no. 2, 2010, pp. 15-29. [5] S. Arroyo, M.A. Sicilia, and J.M. Dodero, “Choreography frameworks for business integration: Addressing heterogeneous semantics,” Computers in Industry, vol. 58, no. 6, 2007, pp. 487-503. [6] D. Fensel, and C. Bussler, “The web service modeling framework WSMF,” Electronic Commerce Research and Applications, vol. 1, no. 2, 2002, pp. 113-137. [7] D.M. Yellin, and R.E. Strom, “Protocol specifications and component adaptors,” ACM Transactions on Programming Languages and Systems, vol. 19, no. 2, 1997, pp. 292-333. [8] M. Stollberg, E. Cimpian, and D. fensel (2005), "Mediating Capabilities with DeltaRelations", in M. Hepp, A. polleres, F. Harmelen, and M. Genesereth (eds), First International Workshop on Mediation in Semantic Web Services (MEDIATE 2005) conjuction with 3rd International Conference on Service-Oriented Computing (ICSOC 2005), Amsterdam, Netherlands pp. 51-66. [9] D. Martin, M. Burstein, J. Hobbs, O. Lassila, D. McDermott, S. McIlraith, S. Narayanan, M. Paolucci, B. Parsia, T. Payne, E. Sirin, N. Srinivasan, and K. Sycara (2004), "OWL-S: Semantic Markup for Web Services ", W3C Member Submission, Retrieved from: http://www.w3.org/Submission/OWL-S/, Last Access: 28 June 2011 [10] J.d. Bruijn, C. Bussler, J. Domingue, D. Fensel, M. Hepp, U. Keller, M. Kifer, J. Kopecky, H. Lausen, E. Oren, A. Polleres, D. Roman, J. Scicluna, and M. Stollberg (2005), "Web
  7. 7. Service Modeling Ontology (WSMO)", W3C Member Submission, Retrieved from: http://www.w3.org/Submission/WSMO/, Last Access: 28 June 2011 [11] H.R. Motahari Nezhad, B. Benatallah, A. Martens, F. Curbera, and F. Casati (2007), "Semiautomated adaptation of service interactions", in 16th International World Wide Web Conference, WWW2007, Banff, AB, pp. 993-1002. [12] S. Wei, M. Xiaoxing, D. Wanchun, and J. Lü (2008), "Toward a model-based approach to dynamic adaptation of composite services", in Proceedings of the IEEE International Conference on Web Services, ICWS 2008, Beijing, pp. 561-568. [13] T. Wei, R. Fangyan, F. Yushun, and Z. Jun (2007), "Compatibility analysis and mediationaided composition for BPEL services", Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Bangkok, pp. 1062-1065. [14] R. Mateescu, P. Poizat, and G. Salaün, “Adaptation of Service Protocols Using Process Algebra and On-the-Fly Reduction Techniques,” Service-Oriented Computing – ICSOC 2008, 2008, pp. 84-99. [15] S. Dustdar, J. Fiadeiro, A. Sheth, M. Dumas, M. Spork, and K. Wang, “Adapt or Perish: Algebra and Visual Notation for Service Interface Adaptation,” Business Process Management, Lecture Notes in Computer Science 4102, Springer Berlin / Heidelberg, 2006, pp. 65-80. [16] E. Cimpian, and A. Mocan (2005), "Process Mediation In WSMX", in E. Cimpian (Ed.), Vienna, p. 29. International Journal on Web Service Computing (IJWSC), Vol.2, No.3, September 2011 29 [17] R. Mizoguchi, Z. Shi, F. Giunchiglia, E. Cimpian, A. Mocan, and M. Stollberg, “Mediation Enabled Semantic Web Services Usage,” The Semantic Web – ASWC 2006, Lecture Notes in Computer Science 4185, Springer Berlin / Heidelberg, 2006, pp. 459-473. [18] X. Li, Y. Fan, S. Madnick, and Q.Z. Sheng, “A pattern-based approach to protocol mediation for web services composition,” Information and Software Technology, vol. 52, no. 3, 2009, pp. 304-323. [19] J. Camara, G. Salaun, and C. Canal, “Composition and run-time adaptation of mismatching behavioural interfaces,” Journal of Universal Computer Science, vol. 14, no. 13, 2008, pp. 2182-2211. [20] L. Bordeaux, G. Salaun, D. Berardi, and M. Mecella (2005), "When are two web services compatible?", in M.C. Shan, U. Dayal, and M. Hsu (eds), Lecture Notes in Computer Science, Toronto, Ont., Vol. 3324, pp. 15-28.
  8. 8. [21] A. Brogi, and R. Popescu, “Service adaptation through trace inspection,” International Journal of Business Process Integration and Management, vol. 2, 2007, pp. 9-16. [22] W. Kongdenfha, H.R. Motahari-Nezhad, B. Benatallah, F. Casati, and R. Saint-Paul, “Mismatch patterns and adaptation aspects: A foundation for rapid development of web service adapters,” IEEE Transactions on Services Computing, vol. 2, no. 2, 2009, pp. 94- 107. [23] L. Kuang, S. Deng, J. Wu, and Y. Li (2009), "Towards adaptation of service interface semantics", in 2009 IEEE International Conference on Web Services, ICWS 2009, Los Angeles, CA, pp. 279-286. [24] R. Seguel, R. Eshuis, and P. Grefen (2010), "Generating Minimal Protocol Adaptors for Loosely Coupled Services", in Web Services (ICWS), 2010 IEEE International Conference on, pp. 417-424. [25] G. Wiederhold, “Mediators in the architecture of future information systems,” Computer, vol. 25, no. 3, 1992, pp. 38-49. [26] G. Grahne, and V. Kiricenko (2005), "Process Mediation in Extended Roman Model", in M. Hepp, A. polleres, F. Harmelen, and M. Genesereth (Eds.) First International Workshop on Mediation in Semantic Web Services (MEDIATE 2005) conjuction with 3rd International Conference on Service-Oriented Computing (ICSOC 2005), Amsterdam, Netherlands pp. 17- 33. [27] W. Tan, Y. Fan, and M. Zhou, “A petri net-based method for compatibility analysis and composition of web services in business process execution language,” IEEE Transactions on Automation Science and Engineering, vol. 6, no. 1, 2009, pp. 94-106. [28] R. Vaculin, R. Neruda, and K. Sycara, “The process mediation framework for semantic Web services,” International Journal of Agent-Oriented Software Engineering, vol. 3, no. 1, 2009, pp. 27-58. [29] L. Ardissono, R. Furnari, G. Petrone, and M. Segnan, “Interaction protocol mediation in web service composition,” International Journal of Web Engineering and Technology, vol. 6, no. 1, 2010, pp. 4-32. [30] Z. Zhou, S. Bhiri, L. Shu, and M. Hauswirth (2009), "Formal verification of mediated web service interactions considering client's expected behaviours", in 2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2009, Washington, DC. [31] B. Benatallah, F. Casati, D. Grigori, H.R. Motahari Nezhad, and F. Toumani (2005), "Developing adapters for web services integration", in O. Pastor, and J.F. Cunha (eds), Lecture Notes in Computer Science, Porto, Vol. 3520, pp. 415-429.
  9. 9. [32] E. Cimpian, and A. Mocan (2005), "WSMX process mediation based on choreographies", Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Nancy, pp. 130-143. International Journal on Web Service Computing (IJWSC), Vol.2, No.3, September 2011 30 [33] K. Wang, M. Dumas, C. Ouyang, and J. Vayssière (2008), "The service adaptation machine", in Proceedings of the 6th IEEE European Conference on Web Services, ECOWS'08, Dublin, pp. 145-154. [34] X. Li, Y. Fan, J. Wang, L. Wang, and F. Jiang (2008), "A pattern-based approach to development of service mediators for protocol mediation", in 7th IEEE/IFIP Working Conference on Software Architecture, WICSA 2008, Vancouver, BC, pp. 137-146. [35] R. Mateescu, P. Poizat, and G. Salaun (2007), "Behavioral adaptation of component compositions based on process algebra encodings", in ASE'07 - 2007 ACM/IEEE International Conference on Automated Software Engineering, Atlanta, GA, pp. 385-388.
  10. 10. BUSINESS RULE MANAGEMENT FRAMEWORK FOR ENTERPRISE WEB SERVICES Thirumaran. M1 and Ilavarasan. E2 and Thanigaivel. K3 and Abarna. S4 1 Department of Computer science and Engineering, Pondicherry Engg College, India. thirumaran@pec.edu 2 Department of Computer science and Engineering, Pondicherry Engg College, India. eilavarasan@pec.edu 3 Department of Computer science and Engineering, Pondicherry Engg College, India. thanigaivel20@pec.edu 4 Department of Computer science and Engineering, Pondicherry Engg College, India. abarna.pec@gmail.com ABSTRACT Making a business rule extraction more dynamic is an open issue, and we think it is feasible if we decompose the business process structure in a set of rules, each of them representing a transition of the business process. As a consequence the business process engine can be realized by reusing and integrating an existing Rule Engine. We are proposing a way for extracting the business rules and then to modify it at the runtime. Business rules specifies the constraints that affect the behaviors and also specifies the derivation of conditions that affect the execution flow. The rules can be extracted from use cases, specifications or system code. But since not many enterprises capture their business rules in a structured, explicit form like documents or implicit software codes, they need to be identified first, before being captured and managed. These rules change more often than the processes themselves, but changing and managing business rules is a complex task beyond the abilities of most business analysts. The capturing process focuses on the identification of the potential business rules sources. As business logic requirements change, business analysts can update the business logic without enlisting the aid of the IT staff. The new logic is immediately available to all client applications. In current trend the rules are modified or changed in the static time phase. But this paper provides to change the rules at the run time. Here the rules are extracted from the services and can be a changed dynamically. The existing rules are modified and attached to source code without hindering service to the end user which can be achieved with source control systems. When the rules are revised, it provides a path in budding new business logic. This new business logic can be adopted for the efficient software development. KEYWORDS Dynamic Rule Execution, Business process, Business rules, Business Rules Approaches. For More Details : http://airccse.org/journal/jwsc/papers/1210ijwsc02.pdf Volume Link : http://airccse.org/journal/jwsc/currentissue.html
  11. 11. REFERENCES [1] Chun Ouyang , “From Business Process Models to Process-Oriented Software Systems” [2] Michael zur Muehlen, “Business Process and Business Rule Modeling Languages for Compliance Management: A Representational Analysis”, Twenty-Sixth International Conference on Conceptual Modeling - ER 2007 - Tutorials, Posters, Panels and Industrial Contributions, Auckland, New Zealand. Figure 2. Dynamic rule Extraction [3] Josef Schiefer, “Event-Driven Rules for Sensing and Responding to Business Situations”. [4] Claire Costello, “ Orchestrating Supply chain Interactions using Emerging Process Description Languages and Business Rules”. [5] Anca Andreescu, “ A General Software Development Process Suitable for Explicit Manipulation of Business Rules” [6] Milan Milanović1, “ Modeling Service Orchestrations with a Rule-enhanced Business Process Language” [7] Olegas Vasilecas,” Ensuring Consistency of Information Systems Rules Models”. [8] Anis Charfi, “ Hybrid Web Service Composition: Business Processes Meet Business Rules”. [9] Bruno de Moura Araujo, “ A method for Validating the Compliance of Business Processes to Business Rules”. [10] Nicholas Zsifkov, “ Business Rules Domains and Business Rules Modeling”. [11] Antonio Oliveira, “ Filho Change Impact Analysis from Business Rules”. [12] Jose F. Mejia Bernal, “ Dynamic Context-Aware Business Process: A Rule-Based Approach Supported by Pattern Identification”. [13] Timon C. Du and Hsing-Ling Chen ,“Building a Multiple-Criteria Negotiation Support System”, IEEE transactions on knowledge and data engineering, vol. 19, no. 6, June 2007. [14] Sam Weber, Hoi Chan, Lou Degenaro, Judah Diament, Achille Fokoue-Nkoutche, and Isabelle Rouvellou, “Fusion: A System For Business Users To Manage Program Variability”, IEEE Transaction on software engineering , Nov 2008. [15] H. M. Sneed, “Extracting Business Logic from Existing COBOL Programs as a Basis for Redevelopment”, 9th International Workshop on Program Comprehension, Toronto, Canada, 2001, pp. 167-175.
  12. 12. [16] Sangseung Kang, “Design of Rule Object Model for Business Rule Systems”, 1996,pp. 818-822. [17] Olga Levina, “Extracting Business Logic from Business Process Models”, 2010 IEEE. [18] Mohammed Alawairdhi, “A Business-Logic Based Framework for Evolving Software Systems”, 2009 33rd Annual IEEE International Computer Software and Applications Conference. [19] Olegas Vasilecas, “Ensuring Consistency of Information Systems Rules Models”, the International Multiconference on Computer Science and Information Technology, 2008. [20] Anis Charfi, “ Hybrid Web Service Composition: Business Processes Meet Business Rules”, ICSOC'04, November 15–19, 2004, New York, New York, USA. [21] Jose F. Mejia Bernal, “ Dynamic Context-Aware Business Process: A Rule-Based Approach Supported by Pattern Identification”, SAC’10, March 22-26, 2010, Sierre, Switzerland. [22] Gulnoza Ziyaeva, Eunmi Choi, and Dugki Min, “Content-Based Intelligent Routing and Message Processing in Enterprise Service Bus”, International Conference on Convergence and Hybrid Information Technology, 2008 [23] en.wikipedia.org/wiki/Business_rule
  13. 13. USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES Selwa ELFIRDOUSSI EMINES, School of Industrial Management, University Mohamed 6 Polytechnic, 43150, Benguerir, Morocco, ABSTRACT Efficient supply chain management calls for robust analytical and optimal models to automate its process. Therefore, information technology is an essential ingredient that integrates these tools in supply chain. With the emergence of wireless, the high technologies and the reliability of mobile devices, mobile web services draw a promising horizon facing economic challenges. They offer new personalized services to each actor in the supply chain on their mobile devices at anytime and anywhere. This paper presents a literature review of mobile web service implemented on the industry context based on the supply chain management approach. First, a large definition of mobile web service and some proposal architecture are exposed. Then the paper discuss some generic related work on mobile web service focusing on supply chain management. Finally some challenges on m-service oriented supply chain management are proposed. KEYWORDS Mobile web service; smart industry; Supply chain management; Service Oriented Architecture. For More Details : https://aircconline.com/ijwsc/V9N2/9218ijwsc01.pdf Volume Link : http://airccse.org/journal/jwsc/current2018.html
  14. 14. REFERENCES [1] J. T. Mentzer, W. DeWitt, J. S. Keebler, S. Min, N. W. Nix, C. D. Smith et Z. G. Zacharia, «Defining Supply Chain Mangement,» Journal of Business logistics, vol. 22, n° %12, pp. 1-25, 2001. [2] S. c. Graham, «Integrating the supply chain,» International Journal of Physical Distribution & Materials Management, vol. 19, n° %18, pp. 3-8, 1989. [3] K. Elgazzar, P. Martin et H. Hassanein, «Mobile Web Services: State of the Art and Challenges,» International Journal of Advanced Computer Science and Applications, vol. 5, n° %13, pp. 173-188, 2014. [4] E. Elabd, P. M. El-Kafrawy et E. M. Abou-Nassar, «Semantic-based Web Services Selection for Mobile,» chez The 9th International Conference on INFOrmatics and Systems, 2014. [5] S. Berger, S. Mcfaddin, C. Narayanaswami et M. Raghunath, «Web services on mobile devicesimplementation and experience,» Mobile Computing Systems and Applications, pp. 100-109, 2003. [6] F. AlShahwan et K. Moessner, «Providing SOAP Web services and RESTful Web services from mobile hosts,» chez Internet and Web Applications and Services, 2010. [7] S. Hamida, Une approche basée agent mobile pour le m-service web sémantique, BISKRA: Université Mohamed Khider, 2014. [8] T. M. Voigt, T. Naumowicz, H. Ritter et J. Schiller, «Performance considerations for mobile web services,» Computer Communications, p. 1097–1105, 2007. [9] M. Treiber, C. Scherling et S. Dustdar, «Applying SOA Principles on Mobile Platforms,» chez International Conference on Software Engineering, Honolulu, 2010. [10] F. Hirsch, J. Kemp et J. Ilkka, Mobile web services: architecture and implementation, John Wiley & Sons, 2007. [11] S. Oh et G. C. Fox, «HHFR: A new architecture for Mobile Web Services Principles and Implementations,» Technical paper, 2005. [12] A. COBÂRZAN, «Consuming Web Services on Mobile Platforms,» Informatica Economică, vol. 14, n° %13, pp. 98-105, 2010. [13] M. Chen, D. Zhang et L. Zhou, «Providing web services to mobile users: the architecture design of an m-service portal,» Int. J. Mobile Communications, vol. 3, n° %11, pp. 1-18, 2005.
  15. 15. [14] S. Abhishek et V. Rohit, «A novel web service directory framework for mobile environments,» chez International conferance on Web Services (ICWS), Anchorage, 2014. [15] V. D. a. W. L. Sonja Zaplata, «Realizing Mobile Web Services for Dynamic Applications,» AIS Transactions on Enterprise Systems, vol. 2, n° %11, pp. 3-12, 2009. [16] H. Artail, K. Fawaz et A. Ghandour, «A Proxy-Based architecture for dynamic discovery and invocation of Web Services from mobile devices,» IEEE Transactions on Services Computing, vol. 5, n° %11, pp. 99-115, 2012. [17] S. Elfrirdoussi, Z. Jarir et M. Quafafou, «Popularity based Web Service Search,» chez 19th International Conference on web service, Hawai, 2012. [18] S. N. Srirama, M. Jarke et W. Prinz, «Mobile web services mediation framework,» chez ACM/IFIP/USENIX International Middleware Conference, New York, 2007. International Journal on Web Service Computing (IJWSC), Vol.9, No.2, June 2018 11 [19] K. Elgazzar, H. Hassanein et P. Martin, «Cloud-based mobile Web service discovery,» Pervasive and Mobile Computing, vol. 13, p. 67–84, 2014. [20] M. Adacal et A. Bener, «Mobile Web services: a new agent-based framework,» IEEE Internet Computing, vol. 10, n° %13, pp. 58-65, 2006. [21] S. N. Srirama, M. Jarke et W. Prinz, «MWSMF: A Mediation Framework Realizing Scalable Mobile Web Service Provisioning,» chez International conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications, 2008 [22] S. N. Srirama, M. Jarke, H. Zhu et H. Prinz, «Scalable mobile web service discovery in peer to peer networks,» chez Internet and Web Applications and Services, 2008. [23] K. Elgazzar, P. Martin et H. Hassanein, «Personalized Mobile Web Service Discovery,» chez World Congress on Services, Santa Clara Marriott, CA, USA, 2013. [24] R. Kumar et V. K. Kiran, «Dynamic Discovery and Invocation of Web services Through Android Mobile,» International Journal of Engineering Trends and Technology, vol. 4, n° %17, pp. 3182- 3185, 2013. [25] F. AlShahwan et M. Faisal, «Mobile cloud computing for providing complex mobile web services,» chez Mobile Cloud Computing, Services, and Engineering, San Francisco, 2014. [26] C. Chang et S. Ling, «Towards an Infrastructure-less SOA for Mobile Web Service Composition,» chez arXiv preprint arXiv:, 1304.5045.
  16. 16. [27] H. YANG, H. LUO et F. YE, «Security in mobile ad hoc networks: challenges and solutions,» IEEE wireless communications, pp. 38-47, 2004. [28] S. N. Rirama, M. Jarke et Prinz, «A performance evaluation of mobile web services security,» chez 3rd International Conference on Web Information Systems and Technologies, 2007. [29] A. Gunasekaran et E. W. Ngai, «Information systems in supply chain integration and management,» European Journal of Operational Research, vol. 159, n° %12, pp. 269-295, 2004. [30] K. Croxton , S. Garcia-Dastugue et D. M. Lambert, «The Supply Chain Management Processes,» The International Journal of Logistics Management, vol. 12, n° %12, pp. 13- 36, 2001. [31] T. L. Rakestraw, R. V. Eunni et R. R. Kasuganti, «The mobile apps industry: A case study,» Journal of Business Cases and Applications, vol. 9, n° %11, pp. 1-26, 2013. [32] A. Light, S. Punnett et K. Webb, Mobile Innovation: Ontario’s Growing Mobile Content, Services, and Applications, Toronto: Mobile Experience Innovation Centre, 2012. [33] O. Irena et R. Knut, «Mobile Business in Logistics,» In GI Jahrestagung, pp. 530-536, 2006. [34] Ö. Åke, S. Linus, L. Per et D. Jerker, «Mobile Medical Applications Made Feasible Through Use of EIS Platforms,» chez Instrumentation and Measurement Technology Conference, USA, 2003. [35] R. Michaelides, Z. Michaelides et D. Nicolaou, «Optimisation of logistics operations using GPS technology solutions: a case study,» chez POMS conference, Vancouver, 2010. [36] K. S. Chinchu et G. Selvakumar, «Web Service based e-logistics application,» International Journal of Modern Engineering Research, pp. 084-088, 2012. [37] R. Angeles, «supply-chain applications and implementation issues,» Information systems management, vol. 22, n° %11, pp. 51-65, 2005 [38] T. Kelepouris, K. Pramatari et G. Doukidis, «RFID-enabled traceability in the food supply chain,» Industrial Management & Data Systems, vol. 107, n° %12, pp. 183-200, 2007. [39] Q. Shi et X. Ding, «Mobile Internet based construction supply chain management: A critical review,» Automation in Construction., 2016. [40] S. Taylor, «The New Mobile World Order : Perspectives on the Future of the Mobile Industry,» Cisco, 2012.
  17. 17. [41] S. Elfrirdoussi, Z. Jarir et M. Quafafou, «Discovery and Visual Interactive WS Engine based on popularity: Architecture and Implementation,» International Journal of Software Engineering and Its Applications, pp. 213-228, 2014. [42] S. Elfrirdoussi, Z. Jarir et M. Quafafou, «Web Service Composition Based on Popularity,» chez CS & IT CSCP, 2014.
  18. 18. PXPATHV: PREVENTING XPATH INJECTION VULNERABILITIES IN WEB APPLICATIONS V.Shanmughaneethi Computer Centre, National Institute of Technical Teachers Training and Research (NITTTR), Govt. of India Taramani, Chennai, India shanneethi@gmail.com R.Ravichandran Resource Centre, National Institute of Technical Teachers Training and Research (NITTTR), Govt. of India Taramani, Chennai, India keelairavi@hotmail.com S.Swamynathan Dept. IST, CEG, Anna University Chennai, India swamyns@annauniv.edu ABSTRACT Generally, most Web applications use relational databases to store and retrieve information. But, the growing acceptance of XML technologies for documents it is logical that security should be integrated with XML solutions. In a web application, an improper user inputs is a main cause for a wide variety of attacks. XML Path or XPath language is used for querying information from the nodes of an XML document. XPath Injection is an attack technique, much like SQL injection, exists when a malicious user can insert arbitrary XPath code into form fields and URL query parameters in order to inject this code directly into the XPath query evaluation engine. Through the crafted input a malicious user would bypass authentication or to access restricted data from the XML data source.Hence, we proposed an approach to detect XPath injection attack in XML databases at runtime. Our approach intercept XPath expression and parse the XQuery expression to find the inputs to be placed in the expression. The identified inputs are used to design an XML file and it would be validated through a schema. KEYWORDS XPath Injection, SQL Injection, XQuery, Web Application Security, XSLT, XML Schema, XML Security, Command Injection For More Details : http://airccse.org/journal/jwsc/papers/0911wsc05.pdf Volume Link : http://airccse.org/journal/jwsc/current2011.html
  19. 19. REFERENCES [1] Zhendong Su, Gary Wassermann, “The Essence of Command Injection Attacks in Web Applications”, Proceedings of the thirty third ACM symposium on Principles of Programming Languages,South Carolina,2006,pp. 372-382. [2] Amit Kelvin, “Blind XPath Injection”, a whitepaper from Watchfire, Director of Security and Research, Sanctum, 2005. [3] Jaime Blasco, “Introduction to XPath Injection Techniques”, Hakin9, Conference on IT Underground, Czech Republic, 2007, pp.no 23-31. [4] Dimitris Mitropoulos, Vassilios Karakoidas, and Diomidis Spinellis, “Fortifying Applications against XPath Injection Attacks”, MCIS 2009: 4th Mediterranean Conference on Information Systems, 2009, Athens, pp.no 1169–1179. [5] Nuno Antunes, Nuno Laranjeiro, Marco Vieira, Henrique Madeira, “ Effective Detection 1 2 3 4 5 6 7 8 9 10 0 50 100 150 200 250 Response Time Without PXpathV module (ms) Response Time With PXpathV module (ms) International Journal on Web Service Computing (IJWSC), Vol.2, No.3, September 2011 64 of SQL/XPath Injection Vulnerabilities in Web Services”, IEEE International Conference on Services Computing,Portugal, 2009, pp. 260-267 [6] Gabriel Hermosillo, Roberto Gomez, Lionel Seinturier, Laurence Duchien , “Using Aspect Programming to Secure Web Applications”, Journal of Software,Vol. 6, No. 2,Vienna,2008,pp. 53-63. [7] Jinghua Groppe,Sven Groppe, “ Filtering unsatisfiable XPath queries”, Journal Data & Knowledge Engineering , Vol.64 No. 1,Amsterdam, 2008,pp.no 134-169. [8] XML Path Language (XPath) version 2.0, http://www.w3.org/TR/XPath [9] OWASP Guide, http://www.owasp.org/index.php/Blind_XPath_Injection [10] Vieira, M., Antunes, N., Madeira, H., “Using Web Security Scanners to Detect Vulnerabilities in Web Services”, Intl.Conf. on Dependable Systems and Networks, Lisbon, 2009. [11] Laranjeiro, N., Vieira, M., Madeira, H., “Protecting Database Centric Web Services against SQL/XPath Injection Attacks”, DEXA 2009, Linz, Austria, September 2009 [12] Wu, R., Hisada, H. and Ranaweera, R., ‘‘Static analysis of web security in generic syntax format’’, The 2009 International Conference on Internet Computing (ICOMP 2009), Las Vegas, NV, pp. 58-63
  20. 20. [13] Velu Shanmughaneethi, Ra. Yagna Pravin and S. Swamynathan “XIVD: Runtime Detection of XPath Injection Vulnerabilities in XML Databases through Aspect Oriented Programming” Communications in Computer and Information Science, 1, Volume 198, Advances in Computing and Information Technology (ACITY 2011), Part 1, Pages 192- 201
  21. 21. DYNAMIC WEB SERVICE COMPOSITION BASED ON NETWORK MODELING WITH STATISTICAL ANALYSIS AND BACKTRACKING M.SureshKumar 1 and P.Varalakshmi 2 1 Research Scholar, Anna University, Chennai, suresh.priya.kumar@gmail.com 2 Department of Information Technology, MIT Campus, Anna University, Chennai, varanip@gmail.com ABSTRACT A Web service is a software system designed to support interoperable machine-to-machine interaction over a network. Web services provide a standard means of interoperating between different software applications, running on a variety of platforms and/or frameworks. One of the main advantages of the usage of web services is its ability to integrate with the other services through web service composition and realize the required functionality. This paper presents a new paradigm of dynamic web services composition using network analysis paired with backtracking. An algorithm called “Zeittafel” for the selection and scheduling of services that are to be composed is also presented. With the proposed system better percentage of job success rate is obtained compared to the existing methodology. KEYWORDS Dynamic composition, PERT, backtracking, tour planner For More Details : http://airccse.org/journal/jwsc/papers/3212ijwsc02.pdf Volume Link : http://airccse.org/journal/jwsc/current2012.html
  22. 22. REFERENCES [1] Web Services Architecture http://www.w3.org/TR/ws-arch/ [2] Thomas Erl, SOA Principles http://www.soaprinciples.com/ [3] P.Sandhya and Dr. M. Lakshmi, “A Novel Approach for Realizing Business Agility through Temporally Planned Automatic Web Service Composition using Network Analysis” , International Conference On Semantic Web & Web Services SWWS 2011. [4] Gexin Li, Aixin Zu, Chengwen Wu, Zhengzhong Wang, “Web service composition based on backtracking”, Second International Conference on Artificial Intelligence, Management Science and Electronic Commerce AIMSEC 2011. [5] Program Evaluation and Review Technique (PERT) http://en.wikipedia.org/wiki/Program_Evaluation_and_Review_Technique [6] Backtracking http://en.wikipedia.org/wiki/Backtracking [7] Incheon Paik, Daisuke Maruyama “Automatic Web Services Composition Using Combining HTand CSP” Seventh International Conference on Computer And Information Technology, IEEE 2007 [8] Sayed Gholam Hassan Tabatabaei, “Web Service Composition Approaches to Support Dynamic E- Business Systems”, Communications of the IBIMA, 2008 [9] Farhan Hassan Khan, M.Younus Javed, Saba Bashir , “QoS Based Dynamic Web Services Composition & Execution”, International Journal of Computer Science and Information Security, Vol. 7, No. 2, February 2010 [10] Yilan Gu and Mikhail Soutchanski. “ A Logic For Decidable Reasoning About Services” Proceedings of AAAI-06 workshop on AIDriven Technologies for Services-Oriented Computing 2006. [11] A. Marconi, M. Pistore, and P. Traverso. "Implicit vs. Explicit Data-Flow Requirements in Web Service Composition Goals". In Proceeding of the 4th International Conference on ServiceOriented Computing (ICSOC06), volume 4294 of Lecture Notes in Computer Science (LNCS), Chicago, Illinois, USA, 2006. Springer. [12] Michael Hu, Howard Foster “Using a Rigorous Approach for Engineering Web Services Compositions: A Case Study”. IEEE International Conference on Services Computing, Vol 2, July 2005
  23. 23. [13] Daniela Barreirs claro, Patrick Albers , Jin-kao Hao “Selecting Web Services for Optimal Composition” 2nd International Workshop On Semantic And Dynamic Web Processes (SDWP 2005).
  24. 24. SPEEDING UP THE WEB CRAWLING PROCESS ON A MULTI-CORE PROCESSOR USING VIRTUALIZATION Hussein Al-Bahadili1 , Hamzah Qtishat2 , Reyadh S. Naoum2 1 Faculty of Information Technology, Petra University, Amman, Jordan hbahadili@uop.edu.jo 2 Faculty of Information Technology, Middle East University, Amman, Jordan hamzah.qtishat@yahoo.com,rnaoum@meu.edu.jo ABSTRACT A Web crawler is an important component of the Web search engine. It demands large amount of hardware resources (CPU and memory) to crawl data from the rapidly growing and changing Web. So that the crawling process should be a continuous process performed from time-to-time to maintain up-to-date crawled data. This paper develops and investigates the performance of a new approach to speed up the crawling process on a multi-core processor through virtualization. In this approach, the multi-core processor is divided into a number of virtual-machines (VMs) that can run in parallel (concurrently) performing different crawling tasks on different data. It presents a description, implementation, and evaluation of a VM-based distributed Web crawler. In order to estimate the speedup factor achieved by the VM-based crawler over a non- virtualization crawler, extensive crawling experiments were carried-out to estimate the crawling times for various numbers of documents. Furthermore, the average crawling rate in documents per unit time is computed, and the effect of the number of VMs on the speedup factor is investigated. For example, on an Intel® Core™ i5-2300 CPU @2.80 GHz and 8 GB memory, a speedup factor of ~1.48 is achieved when crawling 70000 documents on 3 and 4 VMs. KEYWORDS Web search engine; Web crawler; virtualization; virtual machines; distributed crawling; multi- core processor; distribution methodologies; processor-farm methodology. For More Details : http://airccse.org/journal/jwsc/papers/4113ijwsc02.pdf Volume Link : http://airccse.org/journal/jwsc/current2013.html
  25. 25. REFERENCES [1] B. Croft, D. Metzler, &T. Strohman (2009). Search Engines: Information Retrieval in Practice. Addison Wesley. [2] M. Levene (2005). An Introduction to Search Engine and Web Navigation. Addison Wesley. [3] WorldWideWebSize (2012). The size of the World Wide Web. http://www.worldwidewebsize.com. [4] T. Calishain. (2004). Web Search Garage. Prentice Hall. [5] C. Olston&M. Najork (2010). Web Crawling. Now Publishers Inc. [6] Q. Tan (2009). Designing New Crawling and Indexing Techniques for Web Search Engines. VDM Verlag. [7] W. Gao, H. C. Lee, &Y. Miao (2006). Geographically Focused Collaborative Crawling. Proceedings of the 15th International Conference on World Wide Web (WWW’06), pp. 287-296. [8] D. Mukhopadhyay, S. Mukherjee, S.Ghosh, S. Kar, &Y. C. Kim(2006). Architecture of a Scalable Dynamic Parallel WebCrawler with High Speed Downloadable Capability for a Web Search Engine. Proceedings of the 6th International Workshop on Multimedia Signal Processing & Transmission (MSPT’06). pp. 103-108. Jeonju, Korea. [9] S. Tongchim, P.Srichaivattana, C.Kruengkrai, V.Sornlertlamvanich, &H. Isahara(2006).Collaborative Web Crawler over High-speed Research Network. Proceedings of the 1st International Conference on Knowledge, Information and Creativity Support Systems, pp. 302-308. August 1-4. Ayutthaya, Thailand. [10] Boldi, P., Codenotti, B., Santini, M., & Vigna, S. (2004). UbiCrawler: A Scalable Fully Distributed Web Crawler. Software: Practice and Experience, Vol. 34, Issue 8, pp. 711 – 726. [11] J. Cho,&H. Garcia-Molina (2002). Parallel Crawlers. Proceedings of the 11th International Conference on World Wide Web (WWW’02). May 7-11. Honolulu, Hawaii, USA. [12] V. Shkapenyuk&T. Suel (2002).Design and Implementation of a High-Performance Distributed Web Crawler.Proceedings of the 18th International Conference on Data Engineering, pp.357-368. February 26- March 1. San Jose, CA, USA. [13] I. Hernandez, C. R.Rivero, D. Ruiz, &R. Corchuelo (2012) An Architecture for Efficient Web Crawling. Lecture Notes in Business Information Processing, Vol. 112, pp. 228-234
  26. 26. [14] S. Ghoshal (2011). Computer Architecture and Organization. Pearson Education. [15] J. Laudon L.Spracklen (2007). The ComingWave of Multithreaded Chip Microprocessors. International Journal of Parallel Programming, Vol. 35, No. 3, pp. 299-330. [16] T. L. Floyd (2009). Digital Fundamentals. 10th Edition. Prentice Hall. [17] H. Al-Bahadili&S. Al-Saab (2011).Development of a Novel Compressed Index-Query Web Search Engine Model. International Journal of Information Technology and Web Engineering (IJITWE), Vol. 6, No. 3, pp. 39-56. [18] J. Smith &R. Nair (2005). Virtual Machines: Versatile Platforms for Systems and Processes. The Morgan Kaufmann Series in Computer Architecture and Design. [19] N. Smyth (2010). Xen Virtualization Essentials. Payload Media. [20] C. Takemura &L. Crawford (2009). The Book of Xen: A Practical Guide for the System Administrator. 1st Edition. No Starch Press. [21] J. Cho, H. Garcia-Molina &L. Page (1998). Efficient Crawling Through URL Ordering.Proceedings of the 7th International World-Wide Web Conference (WWW 1998), April 14-18, Brisbane, Australia. [22] S. Chakrabarti, M. van den Berg, &B. Dom (1999). Focused Crawling: A New Approach to Topic-Specific Web Resource Discovery. Computer Networks, Vol 31, Issue 11-16, pp. 1623–1640 [23] C. Chung &C. L. A. Clarke (2002). Topic-Oriented Collaborative Crawling. Proceedings of the ACM Conference on Information and Knowledge Management (CIKM’02), November 4–9. McLean, Virginia, USA. International Journal on Web Service Computing (IJWSC), Vol.4, No.1, March 2013 37 [24] H. Yan, J. Wang, X. Li, & L. Guo (2002). Architectural Design and Evaluation of an Efficient Webcrawling System. Journal of System and software, Vol. 60, Issue 3, pp.185- 193. [25] T. Takahashi, H. Soonsang, K. Taura, & A. Yonezawa (2002). World Wide Web Crawler. Proceedings of the 11th International Conference on World Wide Web (WWW 2002), May 7-11, Honolulu, Hawaii, USA. [26] B. T. Loo, O. Cooper, & S. Krishnamurthy(2004). Distributed Web Crawling over DHTs. University of California, Berkeley. EECS Technical Report Identifier: CSD-04-1305. Retrieved on 12 August 2012 fromhttp://techreports.lib.berkeley.edu/accessPages/CSD-04- 1305.
  27. 27. [27] Y. Hafri&C. Djeraba(2004). High Performance Crawling System. Proceedings of the 6th ACM SIGMM International Workshop on Multimedia Information Retrieval (MIR’04), pp. 299-306, October 10-16, New York, USA. [28] J. Exposto, J. Macedo, A. Pina, A. Alves, &J. Rufino (2005). Geographical Partition for Distributed Web Crawling. Proceedings of the 2nd International ACM Workshop on Geographic Information Retrieval (GIR 2005), ACM Press, pp. 55-60, Bremen, Germany. [29] D. H. P. Chau, S. Pandit, S. Wang, &C. Faloutsos (2007). Parallel Crawling for Online Social Networks. Proceedings of the International Conference on World Wide Web (WWW 2007). May 8-12. PP. 201-210. Banff, Alberta, Canada. [30] S. Ibrahim, H. Jin, L. Lu, L. Qi, S. Wu, &X. Shi (2009). Evaluating MapReduce on Virtual Machines: The Hadoop Case. Lecture Notes in Computer Science, Vol. 5931, pp. 519-528. [31] J. M. Hsieh, S. D. Gribble, &H. M. Levy (2010). The Architecture and Implementation of an Extensible Web Crawler. Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI '10). April 28-30. San Jose, California, USA. [32] S. Anbukodi&K. M. Manickam (2011). Reducing Web Crawler Overhead Using Mobile Crawler. International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT 2011). pp. 926-932. March 23-24. Nagercoil, India. [33] Xen (2012). http://www.xen.org. [34] F. Hartl (2012). Nutch How It Works. http://www.florianhartl.com/nutch-how-it- works.html. [35] T. White (2012). Hadoop: The Definitive guide. 3rd Edition. O'Reilly Media. [36] H. M. Qtishat (2012). Developing a Virtual-Machine-Based Distributed Web Crawling Model. MSc Thesis. Faculty of Information Technology, Middle East University, Amman, Jordan. [37] M. Fleury&A. Downton (2004). Pipelined Processor Farms: Structured Design for Embedded Parallel Systems. John Wiley & Sons. [38] S. Roosta (2000). Parallel Processing and Parallel Algorithms: Theory and computation. Springer Verlag. New York, USA.
  28. 28. WEB SERVICE COMPOSITION PROCESSES: A COMPARATIVE STUDY Aram AlSedrani and Ameur Touir Department of Computer Science, King Saud University, Riyadh, KSA ABSTRACT Service composition is the process of constructing new services by combining several existing ones. It considered as one of the complex challenges in distributed and dynamic environment. The composition process includes, in general, the searching for existing services in a specific domain, and selecting the appropriate service, then coordinating composition flow and invoking services. Over the past years, the problem of web service composition has been studied intensively by researchers. Therefore, a significant amount of solutions and new methods to tackle this problem are presented. In this paper, our objective is to investigate algorithms and methodologies to provide a classification of existing methods in each composition phase. Moreover, we aim at conducting a comparative study to discover the main features and limitation in each phase in order to assist future research in this area. KEYWORDS Service composition, Composition planning, Discovery method, Selection method, Execution method. For More Details : https://aircconline.com/ijwsc/V7N1/7116ijwsc01.pdf Volume Link : http://airccse.org/journal/jwsc/current2016.html
  29. 29. REFERENCES [1] M. H. Valipour, B. Amirzafari, K. N. Maleki, and N. Daneshpour, “A Brief Survey of Software Architecture Concepts and Service Oriented Architecture,” in IEEE International Conference on Computer Science and Information Technology, 2009, pp. 34–38. [2] R. Yin, “Study of Composing Web Service Based on SOA,” in Proceedings of the 2nd International Conference on Green Communications and Networks, 2013, vol. 2, no. Gcn 2012, pp. 209–214. [3] J. Rao and X. Su, “A Survey of Automated Web Service Composition Methods,” in Proceedings of the First international conference on Semantic Web Services and Web Process Composition, 2004, vol. 3387, pp. 43–54. [4] V. Portchelvi, V. P. Venkatesan, and G. Shanmugasundaram, “Achieving Web Services Composition – a Survey,” Softw. Eng., vol. 2, no. 5, pp. 195–202, 2012. [5] F. Zeshan and R. Mohamad, “Semantic Web Service Composition Approaches : Overview and Limitations,” Int. J. New Comput. Archit. Their Appl., vol. 1, no. 3, pp. 640–651, 2011. [6] P. Bertoli, A. Cimatti, M. Pistore, and P. Traverso, “A Framework for Planning with Extended Goals under Partial Observability,” in ICAPS-03 Proceedings, 2003, pp. 215– 224. [7] S. Kumar, “Agent-Based Semantic Web Service Composition,” New York, NY: Springer, 2012, pp. 15–25. [8] P. Kungas and M. Matskin, “Semantic Web Service Composition Through a P2P-Based Multi-agent Environment,” in Proceedings of the Fourth International Workshop on Agents and Peer-to- Peer Computing, 2005, pp. 106–119. [9] L. Wei, L. Junzhou, L. Bo, Z. Xiao, and C. Jiuxin, “Multi-agent based QoS-aware Service Composition,” in IEEE International Conference on Systems, Man and Cybernetics, 2010, pp. 3125– 3132. [10] M. Klusch, “Semantic Web Service Description,” in Intelligent Service Coordination in the Semantic Web, Birkhauser Basel publishing, 2008, pp. 41–68. [11] A. KIM, M. KANG, C. MEADOWS, E. IOUP, and J. SAMPLE, “A Framework for Automatic Web Service Composition,” Washington, USA, 2009. [12] G. Baryannis, O. Danylevych, D. Karastoyanova, K. Kritikos, P. Leitner, F. Rosenberg, and B. Wetzstein, “Service Composition,” in The S-Cube Book, Springer, 2010, pp. 57–87.
  30. 30. [13] J. Korhonen, L. Pajunen, and J. Puustjärvi, “Automatic Composition of Web Service Workflows Using a Semantic Agent,” in Proceedings of the IEEE/WIC International Conference on Web Intelligence, 2003, pp. 566–569 [14] W. Van Der-Aalst, K. Van Hee, and G. Houben, “Modelling and Analysing Workflow using a Petrinet Based Approach,” in Proceedings of the second Workshop on Computer- Supported Cooperative Work, Petri nets and related for- malisms, 1994, pp. 31–50 [15] BPMN, “Business Process Modeling Notation,” Object Management Group, 2011. [Online]. Available: http://www.bpmn.org/. [16] M. Carman, L. Serafini, and P. Traverso, “Web Service Composition as Planning,” in Workshop on Planning for Web Services in ICAPS’03, 2003. [17] J. Peer, “Web Service Composition as AI Planning – a Survey,” Switzerland, 2005. [18] B. Bonet and H. Geffner, “Planning as Heuristic Search: New Results,” ECP, pp. 360–372, 1999. [19] V. levizou and D. Plexousaki, “Enhanced Specifications for Web Service Composition,” in proceedings of the European Conference on Web Services, 2006, pp. 223–232. [20] K. Nariai, I. Paik, and M. Shinozawa, “Planning and Composition of Web services with Dynamic Constraints Using Situation Calculus,” in Proceedings of The Fifth International Conference on Computer and Information Technology (CIT’05), 2005, pp. 1009–1013. [21] S. J. Samuel, R. G. Road, and T. Nadu, “an Approach for Graph Based Planning and Quality Driven Composition of Web Services,” Indian J. Comput. Sci. Eng., vol. 2, no. 5, pp. 672–679, 2011. [22] F. Lecue, E. Silva, and L. F. Pires, “A Framework for Dynamic Web Services Composition,” in Proceedings of the 2nd ECOWS Workshop on Emerging Web Services Technology, 2007, pp. 59–75. International Journal on Web Service Computing (IJWSC), Vol.7, No.1, March 2016 20 [23] S. Narayanan and S. A. McIlraith, “Simulation, Verifcation and Automated Composition of Web Services,” in WWW ’02: Proceedings of the eleventh international conference on World Wide Web, 2002, pp. 77–88. [24] M. Ghallab, D. Nau, and P. Traverso, “Hierarchical Task Network Planning,” in Automated Planning Theory and Practice, First., San Francisco: Elsevier Inc., 2004, pp. 229–262. [25] B. B. Anderson, J. V. Hansen, and P. B. Lowry, “Creating automated Plans for Semantic Web Applications Through Planning as Model Checking,” Expert Syst. Appl., vol. 36, no. 7, pp. 10595– 10603, 2009.
  31. 31. [26] A. Farooq and R. Arshad, “An Efficient Technique for Web Services Identification,” Int. J. Multidiscip. Sci. Eng., vol. 2, no. 1, pp. 26–30, 2011. [27] S. Pakari, E. Kheirkhah, and M. Jalali, “Web Service Discovery Methods And Techniques : A Review.,” vol. 4, no. 1, pp. 1–14, 2014. [28] H. Xiao, Y. Zou, J. Ng, and L. Nigul, “An Approach for Context-Aware Service Discovery and Recommendation,” in IEEE International Conference on Web Services, 2010, pp. 163– 170. [29] N. H. Rostami, E. Kheirkhah, and M. Jalali, “Web Services Composition Methods and Techniques: A Review,” Int. J. Comput. Sci. Eng. Inf. Technol., vol. 3, no. 6, pp. 15–29, 2013. [30] D. Fensel, F. M. Facca, E. Simperl, and I. Toma, “Web Service Modeling Ontology,” in Semantic Web Services, Springer Berlin Heidelberg, 2011, pp. 107–129. [31] J. Sangers, F. Frasincar, F. Hogenboom, and V. Chepegin, “Semantic Web Service Discovery Using Natural Language Processing Techniques,” Expert Syst. Appl., vol. 31, pp. 1–27, 2013. [32] T. Amudha, N. Saritha, and P. Usha, “A Multi-agent Based Framework for Dynamic Service Discovery and Access Using Matchmaking Approach,” in International Conference on Intelligent Agent & Multi-Agent Systems, 2009, pp. 1–4. [33] M. Klusch, B. Fries, and K. Sycara, “OWLS-MX : A Hybrid Semantic Web Service Matchmaker for OWL-S Services,” Web Semant. Sci. Serv. Agents World Wide Web, vol. 7, no. 2, pp. 121–133, 2009. [34] . Zhou, N. A. Abdullah, and Z. Shi, “A Hybrid P2P Approach to Service Discovery in the Cloud,” I.J. Inf. Technol. Comput. Sci., vol. 1, pp. 1–9, 2011. [35] M. Moghaddam and J. G. Davis, “Service Selection in Web Service Composition: A Comparative Review of Existing Approaches,” in Web Services Foundations, First., A. Bouguettaya, Q. Z. Sheng, and F. Daniel, Eds. New York: Springer, 2014, pp. 321–346. [36] L. Zeng, B. Benatallah, A. H. H. Ngu, M. Dumas, J. Kalagnanam, and H. Chang, “QoS- Aware Middleware for Web Services Composition,” IEEE Trans. Softw. Eng., vol. 30, no. 5, pp. 311–327, May 2004. [37] L. Ai, “QoS-Aware Web Service Composition using Genetic Algorithms,” Queensland University of Technology, 2011. [38] A. Hilton and T. Culver, “Constraint Handling for Genetic Algorithms in Optimal Remediation Design,” J. Water Resour. Plan. Manag., vol. 126, no. 3, pp. 128–137, 2000.
  32. 32. [39] F. Rosenberg, P. Celikovic, A. Michlmayr, P. Leitner, and S. Dustdar, “An End-to-End Approach for QoS-Aware Service Composition,” in IEEE International Enterprise Distributed Object Computing Conference, 2009, pp. 151–160. [40] F. Rosenberg, P. Celikovic, A. Michlmayr, P. Leitner, and S. Dustdar, “A Stochastic Programming Approach for QoS-Aware Service Composition,” in Eighth IEEE International Symposium on Cluster Computing and the Grid (CCGRID), 2008, pp. 226– 233. [41] X. Xie and K. Chen, “An AHP-Based Evaluation Model for Service Composition,” in Computational Science and Its Applications - ICCSA, 2006, pp. 756–766. [42] J. Figueira, V. Mousseau, and B. Roy, “ELECTRE Methods,” in Multiple Criteria Decision Analysis, Springer, 2005, pp. 133–162. [43] S. Dasgupta, “A Semantic Framework for Event-Driven Service Composition" A Dissertation in Computer Science and Telecommunications and Computer Networking Presented to the Faculty of the University of Missouri Kansas City in partial fulfillment of the requirements for t,” University of Missouri Kansas City, 2011 [44] A. Karande, M. Karande, and B B Meshram, “Choreography and Orchestration using Business Process Execution Language for SOA with Web Services,” Int. J. Comput. Sci. Issues IJCSI´11, vol. 8, no. 2, pp. 224–232, 2011. [45] J. P. Sousa, V. Poladian, D. Garlan, and B. Schmerl, “Task-based Adaptation for Ubiquitous Computing,” IEEE Trans. Syst. Man. Cybern., vol. 36, no. 3, pp. 328–340, 2006. [46] F. Casati, S. Ilnicki, L. Jin, V. Krishnamoorthy, and M.-C. Shan, “Adaptive and Dynamic Service Composition in eFlow,” in proceeding of 12th International Conference Advanced Information Systems Engineering (CAiSE), 2000, pp. 13–31. [47] K. Kritikos, S. Kubicki, and E. Dubois, “Goal-based Business Service Composition,” Serv. Oriented Comput. Appl., vol. 7, no. 4, pp. 231–257, 2013. [48] J. Rao, P. Küngas, and M. Matskin, “Composition of Semantic Web Services Using Linear Logic Theorem Proving,” Inf. Syst., vol. 31, no. 4–5, pp. 340–360, 2006. [49] L. Chen, M. Li, and J. Cao, “A Rule-Based Workflow Approach for Service Composition,” Parallel Distrib. Process. Appl., vol. 3758, no. 03, pp. 1036–1046, 2005. [50] Z. Ying, C. Junliang, C. Bo, and Z. Yang, “Using ECA Rules to Manage Web Service Composition for Multimedia Conference System,” in 2nd IEEE International Conference on Broadband Network & Multimedia Technology, 2009, pp. 545–549.
  33. 33. A LITERATURE REVIEW ON TRUST MANAGEMENT IN WEBSERVICES ACCESS CONTROL R.Joseph Manoj1 and Dr.A.Chandrasekar2 1 Research Scholar, Manonmaniam Sundaranar University, Tirunelveli, Tamilnadu, India & Associate Professor, Department of MCA, St.Joseph’s College of Engineering, Chennai, India, 2 Professor, Department of CSE, St.Joseph’s College of Engineering, Chennai, India ABSTRACT Web Service is a reusable component which has set of related functionalities that service requesters can programmatically access from the service provider and manipulate through the Web. One of the main security issue is to secure web services from the malicious requesters. Since trust plays an important role in many kinds of human communication, it allows people to work under insecurity and with the risk of negative cost, many researchers have proposed different trust based web services access control model to prevent malicious requesters. In this literature review, various existing trust based web services access control model have been studied also investigated how the concept of a trust level is used in the access control policy of a service provider to allow service requester to access the web services. KEYWORDS Web Services, Access model, security, trust, trust model. For More Details : http://airccse.org/journal/jwsc/papers/4313ijwsc01.pdf Volume Link : http://airccse.org/journal/jwsc/current2013.html
  34. 34. REFERENCES [1] S. Haibo and H.Fan, "A context-aware role-based access control model for web services," in IEEE International Conference on e- Business Engineering, 2005. ICEBE 2005 [2] E. Yuan, J. Tong, B. A. H. Inc, “Attributed based access control for web services," in 2005 IEEE International Conference on Web Services, 2005. ICWS 2005. Proceedings, 2005 [3] R.Joseph manoj, A.Chandrasekar, M.D.Anto Praveena, Gandhi Desai “AFTAC: Attribute, Feedback and Time Decay based Access Control for web services”,(ICCCIT 2012) [4] Hien Trang Nguyen, Weiliang Zhao, Jian Yang, “A Trust and Reputation Model Based on Bayesian Network for Web Services”, 2010 IEEE International Conference on Web Services [5] V.Mareeswari, Dr. E. Sathiyamoorthy, “A Survey on Trust in Semantic Web Services” International Journal of Scientific & Engineering Research, Volume 3, Issue 2, February- 2012 [6] Srividya K Bansal, Ajay Bansal, M. Brian Blake, Trust-based Dynamic Web Service Composition using Social Network Analysis, IEEE Workshop on Business Applications of Social Network, 13th December 2010. [7] Damjan Kovac, Denis Trcek, Qualitative trust modeling in SOA, Journal of Systems Architecture 55 (2009) 255–263 [8] Donovan Artz, Yolanda Gil,” A survey of trust in computer science and the Semantic Web”. [9] Stefania Galizia, Alessio Gugliotta and John Domingue, A Trust Based Methodology for Web Service Selection, International Conferences on Semantic Computing, 2007. [10] Surya Nepal, Wanita Sherchan and Athman Bouguettaya, A Behaviour-Based Trust Model for Service Web, IEEE international Conference on Service Oriented Computing and Applications, 2010. [11] Xing Su, Minjie Zhang, Yi Mu, Kwang Mong Sim, PBTrust: A Priority-Based Trust Model for Service Selection in General Service-Oriented Environments, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing. [12] Yijiao Zhu a, Junhao Wen a, Mingwen Qin a, Guoli Zhou, Web Service Selection Mechanism with QoS and Trust Management, Journal of Information & Computational Science 8: 12 (2011) 2327– 2334. [13] Manling Zhu, Lin Liu, Zhi Jin, A Social Trust Model for Services, AWRE 2006 Adelaide, Australia
  35. 35. [14] R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. 2003. Propagation of Trust and Distrust. Proceedings of the 13th Annual International World Wide Web Conference, NewYork, International Journal on Web Service Computing (IJWSC), Vol.4, No.3, September 2013 18 [15] L Ding, L Zhou, T Finin, Trust Based Knowledge Outsourcing for Semantic Web Agents, WIC International Conference on Web Intelligence (WI 2003), 2003 [16] S.D. Kamvar, M.T. Schlosser, H. Garcia-Molina. “The Eigen-Trust algorithm for reputation management in P2P networks”, In Proc. 12th Int. World Wide Web Conf., 2003. [17] Y Gil, D Artz, Towards content trust of web resources, Proceedings of the 15th international conference on World Wide Web, 2006 [18] Yarden Katz and Jennifer Golbeck, Social network-based trust in prioritized default logic in Proceedings of the twenty-first national conference on artificial intelligence (aaai-06), 2006. [19] Y. Gil, V. Ratnakar. Trusting Information Sources One Citizen at a Time. Proc. 1st Int. Semantic Web conf.(ISWC), Sardinia, Italy, 2002 [20] Sapna Singh*, Archana Puri*, Shiksha Smreti Singh*, Anurika Vaish*, S.Venkatesan* A Trust Based pproach For Secure Access Control In Information Centric Network [21] Cesar Ali “CATRAC: Context Aware Trust and Role based Access Control for composite web services” 10th IEEE international Conference on computer and information technology (CIT 2010) [22] Shanshan Song, Kai Hwang, and Mikin Macwan, “Fuzzy Trust Integration for Security Enforcement in Grid Computing” NPC 2004, LNCS 3222, pp. 9-21. [23] Wang Meng; Hongxia Xia; Huazhu Song, “A Dynamic Trust Model Based on Recommendation Credibility in Grid Domain”, International Conference CiSE, 2009. [24] Gao Ying; Zhan Jiang, “A layered trust model based on behavior in service grid“, 2nd International Conference ICACC, 2010. [25] Kai Wei; Shaohua Tang, “A Multi-level Trust Evaluation Model based on D-S Theory for Grid”, International Conference CIS '09. 2009. [26] Vivekananth.P “A Behavior Based Trust Model for Grid Security”, International Journal of Computer Applications, Volume 5– No.6, 2010.
  36. 36. [27] Shangzhu Jin ; Jun peng Access control for web services based on feedback and time decay” Proc 9th IEEE Int.Conf on cognitive Informatics 2010. [28] Tie-Yan Li, Huafei Zhu, Kwok-Yan Lam: “A Novel Two-Level Trust Model for Grid”. ICICS 2003. [29] Wu Xiaonian; Zhang Runlian; Zhou Shengyuan; Ma Chunbo, “Behavior Trust Computation Model Based on Risk Evaluation in the Grid Environment”, WRI World Congress WCSE '09, 2009. [30] Bhanwar, S.; Bawa, S, “Establishing and Evaluating Trust in a Grid Environment”, 10th International symposium ISPAN’09, 2009 [31] Renagaramanujam Srinivasan and Srivaramangai P. “A Comprehensive Trust Model for Improved Reliability in Grid.”, International Journal of Computer Applications Volume5- No.7,August 2010 [32] Takabi H, Amini M, and Jalili R, “Trust-Based User-Role Assignment in Role-Based Access Control,” ACS/IEEE International Conference on Computer Systems and Applications2007, The University of Arizona, Amman, Jordan: AICCSA 2007 [33] X. Wang, J. Luo, A. Song and T. Ma, “Semantic Access Control in Grid Computing”. Proc. 11th International Conference on Parallel and Distributed Systems, 2005. [34] Scott D. Stoller,” Trust Management for Web Services”, 2005 [35] Meriam Jemel, Nadia Ben Azzouna, Khaled Ghedira” Towards a Dynamic Access Control Model for E-government Web Services”, IEEE Asia-Pacific Services Computing Conference,2010 [36] Mui, L., Mohtashemi, M., Halberstadt, A.: “A computational model of trust and reputation”. In: 35th Annual Hawai International Conference on System Sciences (HICSS’02). Volume 7.IEEE Computer Society
  37. 37. A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS Mathur Mohit Asst. Professor, Department of IT &CS Jagan Institute of Management Studies (Affiliated to GGSIP University, New Delhi), Rohini, Delhi, India. mohitmathur19@yahoo.co.in ABSTRACT Cloud computing is generally believed to the most gifted technological revolution in computing and it will soon become an industry standard. It is believed that cloud will replace the traditional office setup. However a big question mark exists over the network performance when the cloud traffic explodes. We call it “explosion” as in future we know that various cloud services replacing desktop computing will be accessed via cloud and the traffic increases exponentially. This journal aims at addressing some of these doubts better called “dangers” about the network performance, when cloud becomes a standard globally and providing a comprehensive solution to those problems. Our study concentrates on, that despite of offering better round-trip times and throughputs, cloud appears to consistently lose large amounts of the data that it is required to send to the clients. In this journal, we give a concise survey on the research efforts in this area. Our survey findings show that the networking research community has converged to the common understanding that a measurement infrastructure is insufficient for the optimal operation and future growth of the cloud. Despite many proposals on building an network measurement infrastructure from the research community, we believe that it will not be in the near future for such an infrastructure to be fully deployed and operational, due to both the scale and the complexity of the network. We also suggest a set of technologies to identify and manage cloud traffic using IP header DS field, QoS protocols, MPLS/IP Header Compression, Use of high speed edge routers and cloud traffic flow measurement. In the solution DS Field of IP header will be used to recognize the cloud traffic separately, QOS protocols provide the cloud traffic, the type of QOS it requires by allocating resources and marking cloud traffic identification. Further the MPLS/IP Header Compression is performed so that the traffic can pass through the existing network efficiently and speedily. The solution also suggests deployment of high speed edge routers to improve network conditions and finally it suggest to measure the traffic flow using meters for better cloud network management. Our solutions assume that cloud is being assessed via basic public network. KEYWORDS Cloud computing, traffic, Round trip time, Throughput, IP, DS field, MPLS, RSVP, Sampling, and Compression. For More Details : http://airccse.org/journal/jwsc/papers/1210ijwsc01.pdf Volume Link : http://airccse.org/journal/jwsc/currentissue.html
  38. 38. REFERENCES [1] Beard, H., 2008. Cloud Computing Best Practices for Managing and Measuring Processes for OnDemand Computing, Applications and Data Centers in the Cloud with S LA’s. Amazon.com: Emereo. [2] LaMonica, M., 2008. Amazon storage 'cloud' service goes dark, ruffles Web 2.0 feathers | Webware - CNET. [3] Weiss, A., 2007. Computing in the clouds, netWorker, 11(4) [4] Rajkumar Buyya, Chee Shin Yeo, and Srikumar Venu- gopal, Market Oriented Cloud Computing: Vision, Hype and Reality for delivering IT Services as Computing Utilities 10 Elucidation of upcoming traffic problems in Cloud Computing [5] BRODKIN, J. Loss of customer data spurs closure of online storage service ’The Linkup’. Network World (August 2008). [6] BECHTOLSHEIM, A. Cloud Computing and Cloud Networking talk at UC Berkeley, December 2008. [7] MCCALPIN, J. Memory bandwidth and machine balance in current high performance computers. IEEE Technical Committee on Computer Architecture Newsletter (1995), 19– 25. [8] RANGAN, K. The Cloud Wars: $100+ billion at stake. Tech. rep., Merrill Lynch, May 2008. [9] Network-based Measurements on Cloud Computing Services-Vinod Venkataraman Ankit Shah Department of Computer SciencesThe University of Texas at Austin, Austin, TX 78712-0233 Yin Zhang [10] Davie, B. and Rekhter, Y., "MPLS Technology and Applications," Morgan Kaufmann, 2000
  39. 39. [11] Black, U., "MPLS and Label Switching Networks," Prentice Hall, 2001 [12] Armitage, G., "Quality of Service in IP Networks, Morgan Kaufmann, 2000 [13] E. Rosen, A. Viswanathan, and R. Callon: Multiprotocol Label Switching Architecture. Internet Drafts, August 1999. [14] R. Braden, Ed., L. Zhang, S. Berson, S. Herzog, and S. Jamin: Resource ReSerVation Protocol (RSVP) – Version 1 Functional Spec- ification. RFC2205, September 1997. [15] T. Li and Y. Rekhter: A Provider Architecture for Differentiated Services and Traffic Engi- neering (PASTE). RFC2430, October 1998. [16] K. Nichols, S. Blake, F. Baker, and D. Black: Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers. RFC2474, December 1998. N. McKeown, M. Izzard, A. Mekkittikul, B. [17] White Paper : Internet QoS: A Big Picture Xipeng Xiao and Lionel M. Ni Department of Computer Science 3115 Engineering Building Michigan State University East Lansing, MI 48824-1226 [18] White Paper : MPLS DiffServ: A Combined Approach by Asha Rahul Sawant, Jihad Qaddour Applied Computer Science,Illinois State University [19] Uyless Black, MPLS and label Switching Networks, Prentice Hall, Upper Saddle River, 2002 [20] S. Blake, An Architecture for Differentiated Services, RFC 2475, December 1998 [21] Cisco Systems, Diffserv –The Scalable End-to-End QoS Model, http://www.cisco.com/warp/public/cc/pd/iosw/ioft /iofwft/prodlit/difse_wp.htm [22] White Paper Quality of Service and MPLS Methodologies by ipinfusion Inc. [23] CESNET technical report number 14/2004 Notes to Flow-Based Traffic Analysis System Design Tom Kosnar7.12. 2004 [24] White paper : Managing Incoming Traffic by Ashok Singh Sairam Supervisor: Prof. Gautam Barua Dept. of CSE, IIT Guwahati,,India. [25] “Can we Afford a Cloud?” by Mohit Mathur, Nitin Saraswat published in ICACCT’08, APIIT Panipat, India [26] “Assessment of Strong User Authentication Techniques in cloud based Computing” by Mohit Mathur, Nitin Saraswat published in IACC’09, Thapar University, Patiala,India.
  40. 40. [27] Internet Traffic Explosion by 2015 - Next Phase is Rich Media for Infrastructure 2.0 February 2, International Journal on Web Service Computing (IJWSC), Vol.1, No.2, December 2010 13 2009 Posted by John Furrier in Technology [28] Sampled Based Estimation of Network Traffic Flow Characteristics by Lili Yang George Michailidis Department of Statistics Department of Statistics University of Michigan University of Michigan Ann Arbor, MI 48109 Ann Arbor, MI 48109 [29] Yang, L and Michailidis, G. (2006), Estimating Network Traffic Characteristics based on Sampled Data, Technical Report, Department of Statistics, The University of Michigan. [30] Mori, T., Uchida, M. and Kawahara, R. (2004), Identifying elephant flows through periodically sampled packets, Proceedings ACM SIGCOMM, 115-120. [31] White Paper : Monitoring network traffic using sflow technology on ex series ethernet switches by Juniper Networks, 2010. [32] Bandwidth Estimation for Best-Effort Internet Traffic by Jin Cao, William S. Cleveland and Don X. Sun. [33] Cloud Computing Initiative using Modified Ant Colony Framework by Soumya Banerjee, Indrajit Mukherjee, and P.K. Mahanti., World Academy of Science, Engineering and Technology 56 2009. [34] Duffield, N. (2004), Sampling for passive Internet measurement: A Review, Statistical Science, 19, 472-498

×