WS-REST 2011.
Second International Workshop on RESTful Design.
Chairs: Cesare Pautasso, Erik Wilde, Rosa Alarcon.
<br>
Frameworks Session. David Duggal and William Malyk.
Implementation of Agent Based Dynamic Distributed ServiceCSCJournals
The concept of distributed computing implies a network / internet-work of independent nodes which are logically configured in such a manner as to be seen as one machine by an application. They have been implemented in many varying forms and configurations, for the optimal processing of data. Agents and multi-agent systems are useful in modeling complex distributed processes. They focus on support for (the development of) large-scale, secure, and heterogeneous distributed systems. They are expected to abstract both hardware and software vis-à-vis distributed systems. For optimizing the use of the tremendous increase in processing power, bandwidth, and memory that technology is placing in the hands of the designer, a Dynamically Distributed Service (to be positioned as a service to a network / internet-work) is proposed. The service will conceptually migrate an application on to different nodes. In this paper, we present the design and implementation of an inter-mobility (migration) mechanism for agents. This migration is based on FIPA ACL messages. We also evaluate the performance of this implementation.
A Simplified Cost Efficient Distributed System architecture which relies on replication and recovery techniques using monitoring service, proxy service to handle service calls and a specialized server architecture which serves as both backup and standby service provider.
Ontology Mapping for Dynamic Multiagent Environment IJORCS
Ontologies are essential for the realization of the Semantic Web, which in turn relies on the ability of systems to identify and exploit relationships that exist between and within ontologies. As ontologies can be used to represent different domains, there is a high need for efficient ontology matching techniques that can allow information to be easily shared between different heterogeneous systems. There are various systems were proposed recently for ontology mapping. Ontology mapping is a prerequisite for achieving heterogeneous data integration on the Semantic Web. The vision of the Semantic Web implies that a large number of ontologies present on the web need to be aligned before one can make use of them. At the same time, these ontologies can be used as domain-specific background knowledge by the ontology mapping systems to increase the mapping precision. However, these ontologies can differ in representation, quality, and size that pose different challenges to ontology mapping. In this paper, we analyzed the various challenges of recently introduced Multi-Agent Ontology Mapping Framework, DSSim and we have integrated an efficient feature called QoS-Web Services Composition with DSSsim. ie we have improved this framework with QoS based Service Compositions Mechanism. From our experimental results, it is established that this developed QoS based Web Services Compositions Mechanism for Multiagent Ontology Mapping Framework minimizing uncertain reasoning and improves matching time, which are encouraging results of our proposed work.
Interoperability for Intelligence Applications using Data-Centric MiddlewareGerardo Pardo-Castellote
Presentation at the May 2012 Intelligence Workshop held in Rome Italy.
Interoperability is key to reducing cost in the development and maintenance of applications that span multiple providers or must be supported over long periods of time. This presentation describes the role of network middleware technologies in such systems and how the use of a data-centric middleware, such as OMG DDS, makes developing such systems easier and more cost-effective.
Implementation of Agent Based Dynamic Distributed ServiceCSCJournals
The concept of distributed computing implies a network / internet-work of independent nodes which are logically configured in such a manner as to be seen as one machine by an application. They have been implemented in many varying forms and configurations, for the optimal processing of data. Agents and multi-agent systems are useful in modeling complex distributed processes. They focus on support for (the development of) large-scale, secure, and heterogeneous distributed systems. They are expected to abstract both hardware and software vis-à-vis distributed systems. For optimizing the use of the tremendous increase in processing power, bandwidth, and memory that technology is placing in the hands of the designer, a Dynamically Distributed Service (to be positioned as a service to a network / internet-work) is proposed. The service will conceptually migrate an application on to different nodes. In this paper, we present the design and implementation of an inter-mobility (migration) mechanism for agents. This migration is based on FIPA ACL messages. We also evaluate the performance of this implementation.
A Simplified Cost Efficient Distributed System architecture which relies on replication and recovery techniques using monitoring service, proxy service to handle service calls and a specialized server architecture which serves as both backup and standby service provider.
Ontology Mapping for Dynamic Multiagent Environment IJORCS
Ontologies are essential for the realization of the Semantic Web, which in turn relies on the ability of systems to identify and exploit relationships that exist between and within ontologies. As ontologies can be used to represent different domains, there is a high need for efficient ontology matching techniques that can allow information to be easily shared between different heterogeneous systems. There are various systems were proposed recently for ontology mapping. Ontology mapping is a prerequisite for achieving heterogeneous data integration on the Semantic Web. The vision of the Semantic Web implies that a large number of ontologies present on the web need to be aligned before one can make use of them. At the same time, these ontologies can be used as domain-specific background knowledge by the ontology mapping systems to increase the mapping precision. However, these ontologies can differ in representation, quality, and size that pose different challenges to ontology mapping. In this paper, we analyzed the various challenges of recently introduced Multi-Agent Ontology Mapping Framework, DSSim and we have integrated an efficient feature called QoS-Web Services Composition with DSSsim. ie we have improved this framework with QoS based Service Compositions Mechanism. From our experimental results, it is established that this developed QoS based Web Services Compositions Mechanism for Multiagent Ontology Mapping Framework minimizing uncertain reasoning and improves matching time, which are encouraging results of our proposed work.
Interoperability for Intelligence Applications using Data-Centric MiddlewareGerardo Pardo-Castellote
Presentation at the May 2012 Intelligence Workshop held in Rome Italy.
Interoperability is key to reducing cost in the development and maintenance of applications that span multiple providers or must be supported over long periods of time. This presentation describes the role of network middleware technologies in such systems and how the use of a data-centric middleware, such as OMG DDS, makes developing such systems easier and more cost-effective.
Management High-level overview of the OMG Data Distribution Service (DDS)Gerardo Pardo-Castellote
This document provides a good management-lever introduction to the Data-Distribution Service (DDS) technology and capabilities. It was prepared by the OMG at the request of the US Navy in order to educate on the data-centric software architectural principles of DDS and how they can help meet its agility and cost-control requirements.
InfoSec Technology Management of User Space and Services Through Security Thr...ecarrow
The focus of this paper will demonstrate the need to clearly define
and segregate various user space environments in the enterprise
network infrastructure with controls ranging from administrative
to technical and still provide the various services needed to
facilitate the work space environment and administrative
requirements of an enterprise system. Standards assumed are
industry practices and associated regulatory requirements with
implementations as they apply to the various contextual
applications. This is a high level approach to understanding the
significance and application of an effective secure network
infrastructure. The focus is on end user needs and the associated
services to support those needs. Conceptually user space is a
virtual area allocated to the end user needs identified with specific
services to support those needs by creating a virtual playground.
To manage risk, the concept of creating a "security threat gateway
(STG)" isolates and secures each user space with its associated
services. Emphasis will be placed on the functional managerial
process and application of the STG, safeguarding one user space
from another, to facilitate the use of the needed services to
perform the operational tasks of the organization. When user’s
needs and associated components are clearly identified, then it is
possible for anyone to use this model as a template, to guide them
in creating an effective strategy for their own network security.
This approach is practical in orientation and application, focusing
on a high level perspective and assumes the reader already has a
low level technical background for a tactical implementation in
mitigating risk to the enterprise network infrastructure.
A DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical Systemsijseajournal
Cyber-Physical Systems (CPSs) involve the interconnection of heterogeneous computing devices which are
closely integrated with the physical processes under control. Often, these systems are resource-constrained
and require specific features such as the ability to adapt in a timeliness and efficient fashion to dynamic
environments. Also, they must support fault tolerance and avoid single points of failure. This paper
describes a scalable framework for CPSs based on the OMG DDS standard. The proposed solution allows
reconfiguring this kind of systems at run-time and managing efficiently their resources.
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDSijgca
Grid computing or computational grid is always a vast research field in academic, as well as in industry also. Computational grid provides resource sharing through multi-institutional virtual organizations for dynamic problem solving. Various heterogeneous resources of different administrative domain are virtually distributed through different network in computational grids. Thus any type of failure can occur at any point of time and job running in grid environment might fail. Hence fault tolerance is an important and challenging issue in grid computing as the dependability of individual grid resources may not be guaranteed. In order to make computational grids more effective and reliable fault tolerant system is necessary. The objective of this paper is to review different existing fault tolerance techniques applicable in grid computing. This paper presents state of the art of various fault tolerance technique and comparative study of the existing algorithms.
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
Cloud computing is an important transition that makes change in service oriented computing
technology. Cloud service provider follows pay-as-you-go pricing approach which means consumer uses as
many resources as he need and billed by the provider based on the resource consumed. CSP give a quality of
service in the form of a service level agreement. For transparent billing, each billing transaction should be
protected against forgery and false modifications. Although CSPs provide service billing records, they cannot
provide trustworthiness. It is due to user or CSP can modify the billing records. In this case even a third party
cannot confirm that the user’s record is correct or CSPs record is correct. To overcome these limitations we
introduced a secure billing system called THEMIS. For secure billing system THEMIS introduces a concept of
cloud notary authority (CNA). CNA generates mutually verifiable binding information that can be used to
resolve future disputes between user and CSP. This project will produce the secure billing through monitoring
the service level agreement (SLA) by using the SMon module. CNA can get a service logs from SMon and stored
it in a local repository for further reference. Even administrator of a cloud system cannot modify or falsify the
data.
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend companies are migrating business critical and sensitive data stored in database to cloud-hosted and Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious little attention has been paid to authentication in the cloud. In this paper we have designed a new effective authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the authentication problem in cloud. The proposed solution which we have provided is based mainly on improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized or not. The results showed that this scheme is very strong and difficult to break it.
Distributed reflection denial of service attack: A critical review IJECEIAES
As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on the internet is a prime target for cyberattacks. A denial-of-service (DoS) attack is accountable for the majority of these cyberattacks. Although various solutions have been proposed by researchers to mitigate this issue, cybercriminals always adapt their attack approach to circumvent countermeasures. One of the modified DoS attacks is known as distributed reflection denial-of-service attack (DRDoS). This type of attack is considered to be a more severe variant of the DoS attack and can be conducted in transmission control protocol (TCP) and user datagram protocol (UDP). However, this attack is not effective in the TCP protocol due to the three-way handshake approach that prevents this type of attack from passing through the network layer to the upper layers in the network stack. On the other hand, UDP is a connectionless protocol, so most of these DRDoS attacks pass through UDP. This study aims to examine and identify the differences between TCP-based and UDP-based DRDoS attacks.
The Fourth International Workshop on RESTful Design, WS-REST 2013
REST in Brazil - Industry Keynote
On learning REST, and its impact on the design of massive applications in Brazil
Fulfilling the Hypermedia Constraint via HTTP OPTIONS, The HTTP Vocabulary In...ruyalarcon
WS-REST 2011.
Second International Workshop on RESTful Design.
Chairs: Cesare Pautasso, Erik Wilde, Rosa Alarcon.
<br>
Hypermedia and Model-Driven Development Session. Tomas Steiner and Jan Algermissen
Management High-level overview of the OMG Data Distribution Service (DDS)Gerardo Pardo-Castellote
This document provides a good management-lever introduction to the Data-Distribution Service (DDS) technology and capabilities. It was prepared by the OMG at the request of the US Navy in order to educate on the data-centric software architectural principles of DDS and how they can help meet its agility and cost-control requirements.
InfoSec Technology Management of User Space and Services Through Security Thr...ecarrow
The focus of this paper will demonstrate the need to clearly define
and segregate various user space environments in the enterprise
network infrastructure with controls ranging from administrative
to technical and still provide the various services needed to
facilitate the work space environment and administrative
requirements of an enterprise system. Standards assumed are
industry practices and associated regulatory requirements with
implementations as they apply to the various contextual
applications. This is a high level approach to understanding the
significance and application of an effective secure network
infrastructure. The focus is on end user needs and the associated
services to support those needs. Conceptually user space is a
virtual area allocated to the end user needs identified with specific
services to support those needs by creating a virtual playground.
To manage risk, the concept of creating a "security threat gateway
(STG)" isolates and secures each user space with its associated
services. Emphasis will be placed on the functional managerial
process and application of the STG, safeguarding one user space
from another, to facilitate the use of the needed services to
perform the operational tasks of the organization. When user’s
needs and associated components are clearly identified, then it is
possible for anyone to use this model as a template, to guide them
in creating an effective strategy for their own network security.
This approach is practical in orientation and application, focusing
on a high level perspective and assumes the reader already has a
low level technical background for a tactical implementation in
mitigating risk to the enterprise network infrastructure.
A DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical Systemsijseajournal
Cyber-Physical Systems (CPSs) involve the interconnection of heterogeneous computing devices which are
closely integrated with the physical processes under control. Often, these systems are resource-constrained
and require specific features such as the ability to adapt in a timeliness and efficient fashion to dynamic
environments. Also, they must support fault tolerance and avoid single points of failure. This paper
describes a scalable framework for CPSs based on the OMG DDS standard. The proposed solution allows
reconfiguring this kind of systems at run-time and managing efficiently their resources.
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDSijgca
Grid computing or computational grid is always a vast research field in academic, as well as in industry also. Computational grid provides resource sharing through multi-institutional virtual organizations for dynamic problem solving. Various heterogeneous resources of different administrative domain are virtually distributed through different network in computational grids. Thus any type of failure can occur at any point of time and job running in grid environment might fail. Hence fault tolerance is an important and challenging issue in grid computing as the dependability of individual grid resources may not be guaranteed. In order to make computational grids more effective and reliable fault tolerant system is necessary. The objective of this paper is to review different existing fault tolerance techniques applicable in grid computing. This paper presents state of the art of various fault tolerance technique and comparative study of the existing algorithms.
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
Cloud computing is an important transition that makes change in service oriented computing
technology. Cloud service provider follows pay-as-you-go pricing approach which means consumer uses as
many resources as he need and billed by the provider based on the resource consumed. CSP give a quality of
service in the form of a service level agreement. For transparent billing, each billing transaction should be
protected against forgery and false modifications. Although CSPs provide service billing records, they cannot
provide trustworthiness. It is due to user or CSP can modify the billing records. In this case even a third party
cannot confirm that the user’s record is correct or CSPs record is correct. To overcome these limitations we
introduced a secure billing system called THEMIS. For secure billing system THEMIS introduces a concept of
cloud notary authority (CNA). CNA generates mutually verifiable binding information that can be used to
resolve future disputes between user and CSP. This project will produce the secure billing through monitoring
the service level agreement (SLA) by using the SMon module. CNA can get a service logs from SMon and stored
it in a local repository for further reference. Even administrator of a cloud system cannot modify or falsify the
data.
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend companies are migrating business critical and sensitive data stored in database to cloud-hosted and Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious little attention has been paid to authentication in the cloud. In this paper we have designed a new effective authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the authentication problem in cloud. The proposed solution which we have provided is based mainly on improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized or not. The results showed that this scheme is very strong and difficult to break it.
Distributed reflection denial of service attack: A critical review IJECEIAES
As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on the internet is a prime target for cyberattacks. A denial-of-service (DoS) attack is accountable for the majority of these cyberattacks. Although various solutions have been proposed by researchers to mitigate this issue, cybercriminals always adapt their attack approach to circumvent countermeasures. One of the modified DoS attacks is known as distributed reflection denial-of-service attack (DRDoS). This type of attack is considered to be a more severe variant of the DoS attack and can be conducted in transmission control protocol (TCP) and user datagram protocol (UDP). However, this attack is not effective in the TCP protocol due to the three-way handshake approach that prevents this type of attack from passing through the network layer to the upper layers in the network stack. On the other hand, UDP is a connectionless protocol, so most of these DRDoS attacks pass through UDP. This study aims to examine and identify the differences between TCP-based and UDP-based DRDoS attacks.
The Fourth International Workshop on RESTful Design, WS-REST 2013
REST in Brazil - Industry Keynote
On learning REST, and its impact on the design of massive applications in Brazil
Fulfilling the Hypermedia Constraint via HTTP OPTIONS, The HTTP Vocabulary In...ruyalarcon
WS-REST 2011.
Second International Workshop on RESTful Design.
Chairs: Cesare Pautasso, Erik Wilde, Rosa Alarcon.
<br>
Hypermedia and Model-Driven Development Session. Tomas Steiner and Jan Algermissen
XML Technologies for RESTful Services Developmentruyalarcon
WS-REST 2011.
Second International Workshop on RESTful Design.
Chairs: Cesare Pautasso, Erik Wilde, Rosa Alarcon.
<br>
Frameworks Session. Cornelia Davis and Tom Maguire
RestFS: Resources and Services are Filesystems, Tooruyalarcon
WS-REST 2011.
Second International Workshop on RESTful Design.
Chairs: Cesare Pautasso, Erik Wilde, Rosa Alarcon.
<br>
Frameworks Session. Joseph Kaylor, Konstantin Laufer and George Thiruvathukal.
Hecate, Managing Authorization with RESTful XMLruyalarcon
WS-REST 2011.
Second International Workshop on RESTful Design.
Chairs: Cesare Pautasso, Erik Wilde, Rosa Alarcon.
<br>
Security Session. Sebastian Graf, Vyacheslav Zholudev, Lukas Lewandowski and Marcel Waldvogel.
Ideate Framework (www.ideate.com). Presented at WS-REST 2011, Hyderabad India. A Resource-Oriented Framework that can dynamically coordinate resources in a virtual information layer to perform as services, without middleware indirection. Ideate delivers the Read-Write-Execute Web.
Orleans: Cloud Computing for Everyone - SOCC 2011Jorgen Thelin
Orleans is a software framework for building reliable, scalable, and elastic cloud applications. Its programming model encourages the use of simple concurrency patterns that are easy to understand and employ correctly. It is based on distributed actor-like components called grains, which are isolated units of state and computation that communicate through asynchronous messages. Within a grain, promises are the mechanism for managing both asynchronous messages and local task-based concurrency. Isolated state and a constrained execution model allow Orleans to persist, migrate, replicate, and reconcile grain state. In addition, Orleans provides lightweight transactions that support a consistent view of state and provide a foundation for automatic error handling and failure recovery.
We implemented several applications in Orleans, varying from a messaging-intensive social networking application to a data- and compute-intensive linear algebra computation. The programming model is a general one, as Orleans allows the communications to evolve dynamically at runtime. Orleans enables a developer to concentrate on application logic, while the Orleans runtime provides scalability, availability, and reliability.
Managing Complexity Across Today’s Application Delivery Chain:Six key indicat...Compuware APM
Managing Complexity Across Today’s Application Delivery Chain:
Six key indicators for prioritizing application performance improvements
Today’s application delivery chain is harder to manage than ever. Applications ranging from mission-critical legacy systems to innovative productivity tools running on employee-owned smartphones all must be delivered flawlessly. Additionally, technologies like virtualization, the cloud and WAN optimization make managing performance even more complex. As each new application generation is deployed on top of existing assets, managing system-wide application availability and performance becomes increasingly dependent on a growing collection of incompatible tools, informal processes and multiple – often siloed – stakeholders.
This complexity is only going to grow. In this webinar, you will learn how to tame complexity and optimally manage application availability and performance.
• J.P. Garbani, of Forrester Research, highlights new research that assesses the complexity in IT operations, both now and in the future.
• Compuware’s Steve Tack details a strategic approach that will allow customers to plan and implement a coherent, structured APM framework based on the concept of an APM “Performance Journey.”
You'll learn :
• six key indicators that will reveal your APM problem areas
• how to develop a performance journey roadmap based on five core areas of APM best practices in order to manage and monitor application complexity more efficiently
• how to achieve the following goals:
• increase productivity while lowering costs
• maintain and improve service quality
• adopt new service demand quickly and efficiently
• align IT goals to meet business needs
• what the future holds for IT operations
Enabling Innovators for the Era of the Social Enterprise: presented to Triple Helix 9 conference at Stanford University to address the opportunities for expanding the Silicon Valley model to emerging economies
We have evolved an IT system that is ubiquitous and pervasive and integrated into most aspects of our lives. Many of us are working on 4th and 5th level refinements in efficiency and functionality. But, we stand on the shoulders of those who came before and this restricts our freedom of action. The prior work has left us with an ecosystem which is the living embodiment
of our state-of-the-art. While we work on integration, refinement, broader application and efficiency, the results must move seamlessly into the ecosystem. Fundamental concepts are
being researched in the lab and may rebuild the world we all live in, until that happens, we must work within the ecosystem.
Dear Students
Ingenious techno Solution offers an expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us:
enquiry@ingenioustech.in
044-42046028 or 8428302179.
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
Kristiaan De Roeck at UX Antwerp Meetup - 30 January 2018UX Antwerp Meetup
UX Antwerp Meetup, 30th of January, 2018 - organised by UXprobe https://www.uxpro.be/
Kristiaan De Roeck, senior IT architect and consultant at IBM
"How IOT, Cloud and Cognitive technology interconnect "
This talk positions "cloud", Internet of Things (IOT) and data analysis to each other. After generating massive amounts of information from the IOT, data is collected, stored and formatted in the Cloud. Then, based on Cognitive technology, data is analyzed with the goal of showing some unexpected outcome. This analysis can be used for any UX-oriented development, and generate insights for new UX perspectives. Kristiaan will describe some case studies; each of the subjects' first "stand alone" analysis, then combined in a bigger context to understand their dependencies.
Bio: Kristiaan De Roeck is a senior IT architect and consultant with 36 years of experienced in solution design, system architecture, information management, service management, and digital transformation projects. Kristiaan works for IBM.
Reactive programming is an asynchronous programming paradigm, concerned with streams of information and the propagation of changes. This differs from imperative programming, where that paradigm uses statements to change a program’s state. Reactive Architecture is nothing more than the combination of reactive programming and software architectures. Also known as reactive systems, the goal is to make the system responsive, resilient, elastic, and message-driven.
Ontologies for Emergency & Disaster Management Stephane Fellah
Ogc meeting march 2014
OGC OWS-10 Cross-Community Interoperability
Ontologies for Emergency & Disaster Management
(The application of geospatial linked data)
Distributed affordance: An Open-World Assumption for Hypermediaruyalarcon
WS-REST 2013
Distributed Affordance
An Open-World Assumption for Hypermedia
Ruben Verborgh, Michael Hausenblas, Thomas Steiner, Erik Mannens,
Rik Van de Walle
Teaching Old Services New Tricks: Adding HATEOAS Support as an Afterthoughtruyalarcon
WS-REST 2011.
Second International Workshop on RESTful Design.
Chairs: Cesare Pautasso, Erik Wilde, Rosa Alarcon.
<br>
Hypermedia and Model-Driven Development Session. Olga Liskin, Leif Singer and Kurt Schneider.
WS-REST 2011.
Second International Workshop on RESTful Design.
Chairs: Cesare Pautasso, Erik Wilde, Rosa Alarcon.
<br>
Hypermedia and Model-Driven Development Session. Silvia Schreier
A Framework for Obligation Fulfillment in REST Servicesruyalarcon
WS-REST 2011.
Second International Workshop on RESTful Design.
Chairs: Cesare Pautasso, Erik Wilde, Rosa Alarcon.
<br>
Security Session. John Field, Stephen Graham and Tom Maguire
REST and Linked Data: a match made for domain driven development?ruyalarcon
WS-REST 2011.
Second International Workshop on RESTful Design.
Chairs: Cesare Pautasso, Erik Wilde, Rosa Alarcon.
<br>
Kevin Page and David De Roure
REST and Linked Data: a match made for domain driven development?
A Resource Oriented Framework for Context-Aware Enterprise Applications
1. A Resource Oriented Framework for
Context-Aware Enterprise Applications
WS-REST 2011
Hyderabad, India
March 28, 2011
Dave Duggal
Consilience International LLC
dave@ideate.com
William Malyk
Consilience International LLC
bill@ideate.com
Copyright 2011, Consilience International LLC
2. Presentation Flow
1. Background
• A Resource-Oriented Framework
• Out-of-Band Context
• Connectedness - It’s a Small World After All
• READ-WRITE-EXECUTE
• Emergent Process
• Implementations
2. System Design
• Everything is a Resource
• Distributed
• Virtualized Information Layer
• A Canonical Method
• Conceptual Architecture
3. Relationship to REST
• Alignment with REST Constraints
4. References
Copyright 2011, Consilience International LLC 2
3. A Resource-Oriented Framework
A Context-Aware Information System implemented as a RESTful
Intermediary.
All system communications are based on a Uniform Interface.
Clients traverse links consistent with HATEOS.
Generative - all payloads, including generalized next steps, are
generated dynamically
No Domain Specific Languages, just generalized capabilities from
coordinated Resources.
A Framework for Situationally-Aware Composite Applications and
Emergent Process.
Copyright 2011, Consilience International LLC 3
4. Out-of-Band Context
The System exploits out-of-band context to return targeted responses
that optimize business relevance and support precise in-flight
application of policies (i.e. business rules; system governance;
transaction controls).
Out-of-Band context includes any URI accessible to the system via its
virtual information layer (e.g. data; business entities; program code;
RESTful Services; RESTfully encapsulated legacy systems; etc.).
Since context is temporal URIs are volatile; responses are run-time
constructions – clients cannot cache.
The System provides Lifecycle Management of all system Resources
with automatic version control and roll-back capability. Version is part
of context, applications co-evolve with their constituent Resources.
Copyright 2011, Consilience International LLC 4
5. Connectedness - It’s a Small World After All
Virtual Information layer induces a graph information model, the
system is a ‘Small World Network’.
An Agent fetches Out-of-Band Context based on machine and user
generated metadata tags as guided by Metaprograms and policies.
Copyright 2011, Consilience International LLC 5
6. READ-WRITE-EXECUTE
Coordinates loosely-coupled Resources (Nouns) to act like Services
(Verbs) without the cost, indirection, or latency of middleware-centric
approaches (i.e. no ESB, BPEL, BPMN, CEP, etc).
Interoperability with the opportunity to consolidate patterns by
devolving capabilities from middleware to generalizable capabilities of a
system of systems.
Moves web from Read/Write (CRUD) to Read/Write/Execute, where
execute is RESTful coordination of loosely-coupled distributed Resources.
Read Write Execute
Web 1.0 Yes No No
Web 2.0 Yes Yes No
Web 3.0 Yes Yes Yes
Copyright 2011, Consilience International LLC 6
7. Emergent Process
Interaction-driven system supports emergent processes without
limitations of finite state map.
The degree of structure (i.e. control logic) is a runtime variable. The
system balances interests, as flexible as possible for business relevance
and as procedural as necessary for compliance.
Addresses a gap in process collaboration technologies; current product
offerings are either structured/procedural (e.g. ERP; Expert Systems;
BPMS; etc.) or unstructured/ad hoc (e.g. activity streams; email; case
management) that offer flexibility, but cannot provide for reporting or
compliance.
Copyright 2011, Consilience International LLC 7
8. Implementations
Targeted at complex, long-running, human-centered, indeterminate
goal-driven work that are impacted by events and characterized by
exceptions – ‘knowledge-work’.
Initially focused on R&D sector with deployments and test sites around
the world, and in discussions with Enterprise Architects at Financial
Companies, Hotel Chains, and other Industries.
Copyright 2011, Consilience International LLC 8
9. Everything is a Resource
A Sole First-Class Citizen
Data/Entities
Program Code/Meta-Programs
Services
Legacy Systems
Copyright 2011, Consilience International LLC 9
10. Distributed
Data/Entities
Program Code
Services
Legacy Systems
Copyright 2011, Consilience International LLC 10
11. Virtualized Information Layer
Data/Entities
Program Code
Services
Legacy Systems
Copyright 2011, Consilience International LLC 11
12. A Canonical Method
Mashup as Information Integration Model
Request
Custom
Response
Intermediary ∞ Resourcesn
Resource
Utilitiesn
Representation
Step 1: Serial Mash-up to Progressively Evaluate what Generalized Action is Required
Step 2: Serial Mash-up to Progressively Customize Generalized Action
Step 3: Serial Mash-up to Identify Valid Transitions (Next Possible Generalized Actions)
Deliver Custom System Response, Update Resource Lifecycles, Dissolve Container
Copyright 2011, Consilience International LLC 12
14. Alignment with REST Constraints
Constraint Support Notes
Client-Server (5.1.2) Full
All state is maintained as Resource state. Application state is not separately persisted by
State-less (5.1.3) Partial
server or client. System uses Out-of-Band context to enrich system response.
Cache-ability (5.1.4) Partial Intermediary can cache during execution, but no client caching due to volatility of URIs.
Uniform Interface (5.1.5) Full
Identification of Resources Full All Resources addressed by URIs.
Manipulation of Resources
Full
through Representations
Self-descriptive messages Full
All state is maintained in Resources. Application state is not separately persisted by server
Hypermedia as the engine of
Full or client. Client does not maintain application state. Client is supplied with a set of next
application state
valid transitions as part of the payload of each interaction.
Layered System (5.1.6) Full The agent acts as a client to any additional intermediaries required.
Code-On-Demand (5.1.7)
Full
optional
Copyright 2011, Consilience International LLC 14
15. References
1. Abowd, G. D., Dey, A. K., Brown, P. J., Davies, N., Smith, M. and Steggles, P. 1999. “Towards a Better Understanding of Context and Context-
Awareness”, Proceedings of the 1st international symposium on Handheld and Ubiquitous Computing, p.304-307, September 27-29, 1999,
Karlsruhe, Germany.
2. Beer, S. 1972. “Brain of the Firm”. ISBN: 978-0-471-94839-1.
3. Box, G. E. P. 1979. "Robustness in the Strategy of Scientific Model Building", Robustness in Statistics: Proceedings of a Workshop. Launer RL,
Wilkinson GN, eds. New York: Academic Press; 1979:40.
4. Chakravorty, S. S. 2010. “Where Process-Improvement Projects Go Wrong”. Wall Street Journal, January 25, 2010.
5. Chase, R B., Jacobs, F. R., Aquilano, N. J. 2006. Operations Management for Competitive Advantage (11th ed.). New York: McGraw-Hill/Irwin.
6. DeGarmo, T. 2010. “Message from the Editor”, TechnologyForecast, 2010, Issue 1. Copyright PricewaterhouseCoopers LLP.
7. Drucker, P. F. 1966. The Effective Executive.
8. Duggal, D. and Malyk, W. 2009. Resource Processing Using an Intermediary for Context-Based Customization of Interaction Deliverables. USPTO
Patent application and EPO PCT.
9. Fielding, R.T. 2000. “Architectural Styles and the Design of Network-based Software Architectures”, PhD Dissertation.
10. Flynn, T. P. 2011. “Cutting through complexity”, KPMG International Annual Review 2010. Copyright 2011, KPMG International Collaborative.
11. Hagel III, J., Seely Brown, J. 2010. Designing for Propensity. Blog: http://blogs.hbr.org/bigshift/2010/12/designing-for-propensity.html
12. Kulkarni, D. and Tripathi, A. R. 2010. “A Framework for Programming Robust Context-Aware Applications”, IEEE Trans. Software Eng. 36(2): 184-
197 (2010).
13. Le Clair, C. and Miers, D. 2010. Forrester Update: Dynamic Case Management.
14. McCoy, D. W. 2010. Context-Enhanced Performance: Reducing Process Stagnation and Chaos. Gartner analyst report, September 20, 2010.
15. Ploesser, K, Recker, J., and Rosemann, M. 2010, “Supporting Context-Aware Process Design: Learnings from a Design Science Study”, 6th
International Workshop on Business Process Design (BPD’10).
16. Taylor, F. W. 1911. The Principles of Scientific Management.
17. Tseng, M.M., Jiao, J. 2001. Mass Customization, in: Handbook of Industrial Engineering, Technology and Operation Management (3rd ed.). New
York, NY: Wiley. ISBN 0-471-33057-4.
18. van der Aalst, W. M. P., Adams, M., ter Hofstede, A. H. M., Pesic, M. and Schonenberg, H. 2009. “Flexibility As a Service”, Proceedings of the 1st
International Workshop on Mobile Business Collaboration (MBC’09), volume 5667 of Lecture Notes in Computer Science, pages 319-333,
Brisbane, Australia, April 2009. Springer.
19. Walid, T. 2007. “Resource Aware Programming”. GoogleTechTalks, http://www.youtube.com/watch?v=7MIK_ppEXno.
Copyright 2011, Consilience International LLC 15
16. Dave Duggal
Consilience International LLC
dave@ideate.com
William Malyk
Consilience International LLC
bill@ideate.com
www.ideate.com
Copyright 2011, Consilience International LLC