Web Service Security Through Business Logic
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 6
Abstract
Service Computing has recently gained significant momentum to enable the IT services and computing technology to perform business services more efficiently and effectively. Presently the service computing concentrates on inventing and establishing business models which leads to better QoS driven targeting services. So replacing existing business model by QoS driven business model would be the future preference of service computing environment. Further, the most critical and challenging part of web service computing is handling of non functional aspect that may occur during service composition and service execution process. There are many non-functional aspects are involved during service composition and execution at run time. One such a business model solution is called Business Logic Model (BLM) which is proposed in this paper, the primarily aim is to design and implement the business logic for functional and non functional aspect targeting successful service computation. One of the important feature of this model is to manage exceptions occurs during service composition in execution time. The distinct ability of the proposed model is managing the runtime exception is proved with the help of a set of QoS parameters that are especially satisfying the service computational criteria such as computability, traceability, security and decidability.
Authors and Affiliations
M. S. SALEEM BASHA , M. THIRUMARAN , P. DHAVACHELVAN
Common Framework For Unix Scripting Languages
With the thousands of commands available for the command line user to write own application based on some complex shell script or other script. The complexity implies more difficulties to make an efficient monitoring, ma...
Performance Evaluation of Reactive, Proactive and Hybrid Routing Protocols in MANET
This Mobile Ad hoc Networks (MANET) is a set of wireless mobile nodes dynamically form spontaneous network which works without centralized administration. Due to this characteristic, there are some challenges that protoc...
Opinion Mining Classification Using Key Word Summarization Based on Singular Value Decomposition
With the popularity of online shopping it is increasingly becoming important for manufacturers and service providers to ask customers to review their product and associated service. Typically the number of customer revie...
Facets of Software Component Repository
The software repository is used for storing, managing, and retrieving large numbers of software components. Repositories should be designed to meet the growing and changing needs of the software development organizations...
Classifying Emotion in News Sentences: When Machine Classification Meets Human Classification
Multiple emotions are often evoked in readers in response to text stimuli like news article. In this paper, we present a method for classifying news sentences into multiple emotion categories. The corpus consists of 1000...