A Systematic Survey report on Various Frameworks and Models for Verification of Choreography in SOA
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 4
Abstract
Service- Oriented Architecture (SOA) is a mainstream strategy for improving IT performance. Web Services are self-contained internet enabled applications which are capable of performing business activities. Web Services are software services which are advertised by providers and invoked by customers using web service composition which is composed of orchestration and choreography. Orchestration refers to an executable business process that can interact with both internal and external web services. Choreography is the process that tracks the message sequences among multiple parties and sources. To carry out workflows and business processes based on web services: Business Process Execution Language (BPEL) follows the orchestration paradigm and Web Service Description Language (WS-CDL) follows choreography scenario.In this paper we present a complete survey report on choreography based frameworks and models to show message interaction in an organization and also focused on verification of choreography in SOA. After reviewing we summarizes by identifying some loopholes which causes loss of messages while being tracked by choreography.
Authors and Affiliations
Choudhury Bandana Das , Prachet Bhuyan
Merge Technique for Automated Reconstruction of Large Image
This paper present an automated reconstruction high level architectural specification of image merging for satellite image capturing system, aiming at implementing a real-time satellite image processing system for mergin...
A STUDY ON PROTOCOLS IN WIRELESS MESH NETWORK
Wireless Mesh Networks (WMN) are the networks in which each node can communicate directly with more than one peer nodes. Wireless mesh networks can self form and self heal. In this paper we discuss about the some protoco...
Database Privacy- Issues and Solutions
Data Mining, fourth and analytical step of Knowledge discovery in database process is a process of discovering new and interesting patterns in the large datasets. For example, data miner can derive different patterns bas...
An effective cluster formation with security in mobile ad hoc network
Mobile ad hoc networks have attracted much attention due to their mobility and easy deployment. However, the wireless and dynamic nature of network renders them more vulnerable to various types of security attacks than t...
Modified Reliable Energy Aware Routing Protocol For Wireless Sensor Network
In this paper, a novel reliable energy aware routing protocol is proposed, which is based on reliability and energy efficiency. Since in the wireless environment, link quality is difficult to guarantee, the reliable rout...