Web Service Security Through Business Logic
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 6
Abstract
Service Computing has recently gained significant momentum to enable the IT services and computing technology to perform business services more efficiently and effectively. Presently the service computing concentrates on inventing and establishing business models which leads to better QoS driven targeting services. So replacing existing business model by QoS driven business model would be the future preference of service computing environment. Further, the most critical and challenging part of web service computing is handling of non functional aspect that may occur during service composition and service execution process. There are many non-functional aspects are involved during service composition and execution at run time. One such a business model solution is called Business Logic Model (BLM) which is proposed in this paper, the primarily aim is to design and implement the business logic for functional and non functional aspect targeting successful service computation. One of the important feature of this model is to manage exceptions occurs during service composition in execution time. The distinct ability of the proposed model is managing the runtime exception is proved with the help of a set of QoS parameters that are especially satisfying the service computational criteria such as computability, traceability, security and decidability.
Authors and Affiliations
M. S. SALEEM BASHA , M. THIRUMARAN , P. DHAVACHELVAN
A surface descriptor of surface matching base on normal angle of surface data
Three dimensional surface matching is an important problem in computer vision. The process of surface matching is to match similar regions or correspondences across multiple surfaces with unknown relative poses. Many sur...
INVESTMENT PORTFOLIO MANAGER- MOBILE APPLICATION
The application of this project is to help the user keep track of his investments and manage his portfolio anytime, anywhere. A system of this sort finds its applications in trading, keeping track of the user's/company's...
CONTROLLING BURST LOSS RATIO IN OBS USING FEEDBACK CONTROL AND DYNAMIC TECHNIQUES
Optical Burst Switching(OBS) is a switching technique used in optical network where data is sent as bursts. In this switching technique single burst loss can influence loss of multiple data. Hence Burst Loss Ratio (BLR)...
Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks
A novel self-organizing hierarchical architecture is proposed for improving the scalability properties of ad-hoc wireless networks. This paper focuses on the design and evaluation of routing protocols applicable to this...
Cloud Computing: A solution to Geographical Information Systems (GIS) Cloud Computing and GIS
Geographical Information Systems or Geospatial Information Systems (GIS) is a collection of tools that captures, stores, analyzes, manages, and presents data that are linked to geographical locations. GIS plays an essent...