MedTransact: Transaction Support for Mediation with Remote Service Providers

Size: px
Start display at page:

Download "MedTransact: Transaction Support for Mediation with Remote Service Providers"

Transcription

1 MedTransact: Transaction Support for Mediation with Remote Service Providers Paulo F. Pires 1, 2 Louiqa Raschid 3 Abstract: There are many service providers that provide services on the internet via Web accessible servers. In order to effectively develop applications in this environment, it is important to provide a way to integrate these services so they can be used to built distributed applications. A system that integrates these services must deal with the dissimilar transaction capabilities of remote servers. In this paper, we present MedTransact, a mediator system that coordinates dissimilar service capabilities of remote service providers. MedTransact supports distributed transaction semantics across the mediator and the remote service providers. We describe the MedTransact architecture and discuss how distributed transactions are supported. Keywords: Distributed transaction management, mediator systems, transaction semantics. 1. Introduction Wrapper mediator systems ([11],[15],[22],[29])have been successfully developed to mediate the query capability of remote (database or non-database) sources and to provide information integration at the mediator level. Typically these projects support transactions within the mediator but the transaction semantics is not extended to the remote services. Supporting a transaction service that is extended to the remote servers is critical if we wish to implement E-business services based on wrapper mediator systems. There has been extensive research in transaction support in distributed computing systems ([6],[7],[21],[25],[26],[27]) and in workflow management systems ([10],[14],[19],[23],[28]). While these projects address the support of distributed transactions, they do not consider mediating the service capabilities of autonomous remote service providers. This is a significant difference, since remote service providers will support dissimilar capabilities with respect to commit, and abort semantics. Thus, implementing a transaction semantics across the remote servers becomes much more difficult, compared to a scenario where all distributed components support identical transaction behavior. We note that current commercial E-business products ([13],[18]) are not able to mediate service providers with different transaction capabilities. MedTransact is an attempt to mediate dissimilar service capabilities of remote service providers, while supporting distributed transaction semantics across the mediator and the remote service providers. In this paper, we describe a motivating example of application semantics at the mediator level. It involves a travel agent negotiating with flight, hotel and car reservation services. This scenario is typical of current online E-business services. The example will illustrate the need to specify application level semantics and to implement distributed transaction semantics across the remote service providers. We then describe the MedTransact approach, and the three main contributions to support distributed transactions. The first is a language to specify remote service capability and to map remote service capability to a mediator service. The second contribution is to specify application semantics over the 1 CNPq Brazil grant holder. 2 Computer Science Department COPPE, Federal University of Rio de Janeiro, Brazil. pires@cos.ufrj.br 3 Maryland Bussiness School and UMIACS, University of Maryland. louiqa@umiacs.umd.edu

2 mediator services. The third contribution is a platform to implement distributed transactions over the remote service providers. MedTransact uses the application semantics and the remote server capability to produce safe execution plans that implement transactions at the mediator level. A (limited) prototype implementation of MedTransact is being built and will be available in March Related work There is much work on supporting distributed transactions across autonomous remote servers. Heterogeneous database systems, and workflow systems are the main research areas that have research on this issue. The area of heterogeneous distributed database systems has been focused on supporting transactions in heterogeneous distributed database systems in the face of incompatible concurrency control sub-systems and/or uncooperative transaction managers. A good survey of the relevant work can be found in ([5],[25]). Transaction management in these system are performed at two levels, at a local level by the preexisting transaction managers of the local databases (LTMs) and at a global level by a global transaction manager (GTM) superimposed on them. The split of control between GTM and LTMs generates the need of managing the autonomy of individual remote servers and the consistency requirements of the global transactions. Most of the work on transaction management in heterogeneous distributed database addresses the issue of data consistency in global transactions, while preserving different aspects of remote server autonomy. Approaches in the literature dealing with workflows [12] can be described as those based on multidatabase and extended transactions ([1],[7],[8],[30]), active database and rule-based approaches ( [3],[4]) combinations of the above two [9], and office and process-automation ( [16],[17],[19]). Workflow systems support the specification of intra- and inter-transaction state dependencies, and correctness dependencies such as serialization, visibility, cooperation and temporal dependencies. While these works address the support of distributed transactions, they do not consider aspects of transaction support when mediating the service capabilities of autonomous remote service providers. MedTransact exploit the transaction capabilities of remote servers and the semantic information of the application execution behavior to provide distributed transaction. This is a significant difference, since remote service providers can be integrated in the system despite of their dissimilar capabilities with respect to commit, and abort semantics. 2. Motivating Example We consider a travel agency application since its semantics are well understood. A user X wants to travel from Miami to Washington D.C. to attend a conference. X wants to leave Miami on May 10 and return on May 15. X also wants to rent a car in Washington D.C. If no car is available, X wants to stay in the conference hotel. The application involves making flight, hotel, and car rental reservations. If no flight or hotel is available, the whole trip is cancelled. If a car cannot be rented, the trip can still proceed. Therefore, the application will successfully terminate if a flight and hotel reservation occurs, irrespective of the result of the car reservation. One plan to arrange this trip is to first make the flight reservation, and if it succeeds, then make the car reservation, and then make the hotel reservation. This plan may take longer to return results due to its sequential execution. To improve the response time, an alternate plan is that flight and car reservations could be executed in parallel, provided we can undo the car reservation, should the need arise. The above example, while simple, must be properly specified in order to be correctly executed in an environment of remote service providers. First, we need to select the appropriate remote service providers. In this example, we need to select remote sources that provide services of flight, hotel and car reservations. Next, we need to query those sources to determine the available flights, hotels and cars in accordance with some constraints. For example we need to find flights from Miami to D.C. on May 10, and cars to rent in

3 D.C. that are available from May 10 to May 15. There are 3 metro D.C. airports, so we must check that the car can be picked up at the particular D.C. airport where the flight arrives. The constraints related to the flight reservation are based only on static information, i.e. information that is known when the application starts. On the other hand, the acceptable car reservations are those made at the arrival airport, whose identity is not known when the application starts. Thus, the constraints for the car reservation include both static information and dynamic information that is only known during execution. Therefore, there is an implied dependency between the car reservation and the flight reservation. One way to implement this dependency is to first make the flight reservation and if it commits to make a car reservation. Suppose instead that we make these reservations in parallel. Then, when a flight reservation commits, the system must verify if there is a car reservation that matches the flight reservation. If so, the application can successfully terminate. Otherwise, the system must continue trying to make a car reservation until an acceptable car reservation is made or there are no more car reservations. The application will successfully terminate if the flight and appropriate hotel reservations commit, and it will fail if either the flight or the hotel reservation fails. Car reservations that do not match the successful flight reservation may need to be undone. A simplified version of this example will be used in the paper. 3. Architecture The MedTransact system shown in Figure 1 is designed to support distributed transactions based on existing autonomous services of remote service providers. To achieve this goal the architecture must provide the following: 1) A mechanism to specify application semantics (execution behavior) at the mediator level. Applications are specified at the mediator level without knowledge of remote service providers. This feature allows the addition of new remote service providers to existing applications. 2) A mechanism to specify the services and the transaction semantics of the remote service providers, and to define the mappings from the remote service to the mediator service. 3) A mechanism to define and implement coordination among system components to support distributed transactions with autonomous service providers with dissimilar transaction semantics. Semantic information from the application (mediator level) and the transaction semantics of the remote service providers must be used to provide distributed transaction semantics at the mediator level. % & #!! " $$! " #!! " #! % &! " #! % &! " $$ #! $$ Figure 1 - Mediator architecture.

4 3.1 Specifying Remote Services and Mediator Services. Remote Service Provider (RSP) objects specify the service description of a set of related services of a remote server. An RSP object describes each service interface and its commit and abort actions. Each RSP object is defined by an identifier rid and a set of supported services svc. Each svc is a 6-tuple (sid, input, output, req, cd, tsd), as follows: a) sid: service name. b) input: a set of input attributes that correspond to the bindings accepted by the service. c) output: a set of output attributes returned by sid. The input and output describe the interface of the service sid. d) req: required attributes (a subset of input) that are required by the service. e) cd: content description is a set of tuples (att, dom), where att is an attribute of input or output, and dom is a subset of the domain of this attribute. For every attribute in input and output, there must be a tuple (att, dom) in cd. f) tsd: transaction semantics description is a pair (abs, aba), such that: i) abs: a Boolean value. A value yes means that the service supports aborts. ii) aba: a service name representing the action that must be taken to abort the service, when abs is yes. This is a value from sid, a service name of a service provided by a known RSP. In the case that the abort action is directly supported by RSP, then the value of aba is NULL. Figure 2 shows example RSP objects, and Table 1 shows their transaction semantics. The RSP object ' ( )* + publishes two services: ), *, )- (./0 1 and 2 ( 1 2, 34, *, )- (./0 1. The transaction semantic description (tsd) of ), *, )- (./0 1 indicates that it supports the abort action, and that the abort action must execute another service 2 ( 1 2, 34, *, )- (./ : ; < = > 8? A = BC D EF GH I J K L M N O P Q R S N TU V WX Y Z I J K L M N J U N TL S WX Y X I [ \ ] ^ _ ` a b a cd e f gh i j a b k e i k a l` a b a cd e f gh i m c a b a cd e f gh i nk h o a p k e i k a l` a b a cd e f gh i i h i q ll r stu v w x y ca b a cd e f gh i j a b i q ll z q ck { e b a i h i q ll } w ~ sx y ` a b a cd e f gh i i h i q ll Table 1 Transaction Semantics for ƒ, ˆ and Š Œ RSP objects. The RSP object ƒ publishes two services: Œ Œ ˆ Ž and Œ ƒ. The transaction semantic description (tsd) of Œ ƒ indicates that there is no transaction support for abort, while Œ Œ ˆ Ž indicates that there is transaction support for abort, and no additional action is needed. The RSP object specification could be implemented using the RDF model[2]. An specification of an RSP object in RDF is in [24].

5 // remote services providers // The remote service provider that makes car reservations. (// RSP Name: Cars1; { (reservation, {pickupplace, date}, {code}, (yes, cancelreservation(reservation.code)); // (cancelreservation, {code}, {msg}, (no,null))}) (// RSP Name: CarsN; { }) // The remote service provider that makes flight reservations. (// RSP Name: Flights1; { (reservation, {originairport, destinationairport,date}, {code, price}, (yes, none)); // (purchase, {code}, {msg}, (no, null)}); // The remote service provider that makes hotel reservations. (//RSP Name: Hotels1; { (reservation, {city, category, date}, {code}, (no, null)}); Figure 2 Specification of RSP objects. Mediator Service Providers (MSP) specify a set of related mediator services. A mediator service does not provide a service implementation, and each mediator service is mapped to one or more RSP services. For simplicity, we assume that MSP uses identical attributes and content descriptions as RSP, and so the mapping is trivial. A MSP object is defined by a tuple (mid, svc) where mid is the name of the MSP object, and svc is a set of services provided by mid. svc is described by a quadruple (sid, input, output, req), where input, output and req are the same definition used by RSP.

6 // The mediator service provider that makes flight reservations. (// Mediator Service Name : MFlights; { (reservation, {<input>}, {<output>},{<required att.>}); // (purchase, {<input>}, {<output>},{<required att.>}) } Figure 3 Specification of MSP objects. 3.2 Specifying Application Semantics. A MedTransact Application object is a program specification that is built upon services provided by Mediator Service Provider (MSP) objects. It describes interactions among its component services and the expected application transaction behavior. An Application object is described by a 7-tuple (id, smid, input, ssr, cons, prg, ms): a) id: the name of the Application object. b) smid: a nonempty set of MSP objects participating in the application. c) input: a set of input attributes accepted by the application. d) ssr: a set of services supported by the application object. This set is a subset of services provided by MSP objects appearing in smid. Each service is specified by a tuple (mid, srv) such that: i) mid is the identification of the MSP object supporting the service. ii) srv is a set of services provided by the MSP appearing in mid and supported by the Application object. e) cons: a set of constraints on service attributes. These constraints may be domain value restrictions, domain range restrictions, or a matching condition between two attribute values (join condition). Each constraint has an associated context representing when the constraint must be valid. f) prg: a program that implements the execution flow of MSP services. We borrow ideas from [20] to describe execution flow. Suppose P and Q are two services or subprograms. Then, we can describe a program using the following three operators applied to P and Q: P Q P Q Sequential execution of P and Q Parallel execution of P and Q cond P, Q Selection between P and Q depending on value of condition cond The sequential execution operator indicates that P must precede Q. The parallel execution operator specifies that P and Q may execute in parallel. A selection of P or Q selects exactly one depending on the value of the Boolean expression cond. The scope of all constraints in cons must be specified in prg. The expression c[p] indicates that the constraint c is verified during the execution of the service or subprogram P.

7 g) ms: a set of mandatory services defining the termination state of the application. The application reaches a successful termination state if and only if all services contained in the set of mandatory services commit. š object utilizes three MSP objects, œ š ž Ÿ, œ, and œ Ÿ. Figure 4 shows an Application object specification that implements the travel planning application. The // Mediator: Description of the travel planning application. TravelPlanning ( // MSP objects: (MFlights F, MCars R, MHotels H); // Input attributes: {String conferencehotel}; // Component services: (F,{reservation}), (R,{reservation}), (H,{reservation}); // Constraints: {c1: R.pickupPlace = F.reservation.destinationAirport, c2 R.reservation.code IS NULL, c3: H.hotelName = conferencehotel} // Application execution flow: ( c1 [ R.reservation ] F.reservation) ( c2 c3[ H.reservation ], H.reservation ); ) // Mandatory services: (F.reservation, H.reservation) Figure 4 Specification of the travel planning application object. Constraints describe dependencies among MSP objects. For example, the constraint indicates a match of attributes š of cars and š Ÿš Ÿš ª š Ÿ of flights. The execution flow of is as follows. The application starts with the parallel execution of car ««±² ³ ««±² ³ and flight services. The constraint must be verified after the execution of these two services, i.e., «the «car ±² ³ must be picked up at the destination airport. This is followed by the selection operator. If the car fails, i.e., ««±² ³ is not true, then the application executes hotel with constraint µ Constraint ««±² µ ³ ««±² ³ verifies that the hotel Ÿš must be made only in the conference hotel. Otherwise, if the car succeeds, the hotel is executed without any constraint. Ÿš The mandatory services indicate that the application successfully terminate if the flight and hotel Ÿš Ÿš services commit, irrespective of the success of the car service. 4. MedTransact Application Execution The execution flow of the MedTransact application object could be implemented in several ways. Thus a MedTransact application object can have multiple execution plans. The choice of plans is increased since each MSP object could map to multiple RSP objects and services. The goal of MedTransact application planning is to generate safe plans for executing an application, and then to choose an efficient plan. A safe plan must respect semantic knowledge of the application object and the RSP object.

8 The application object specifies execution flow, constraints and mandatory services. Each mediator object and service maps to a RSP object and service, each of which has some particular transaction capabilities. We use this knowledge to generate transaction constraints on the mediator service. These transaction constraints on mediator services are used in generating safe plans. We use an example to illustrate how a safe plan is obtained. Consider the following application execution flow: Application execution flow: (P Q); Mandatory services: (Q); The application execution flow defines the parallel execution of services P and Q while the mandatory services specification indicates that the commit of service Q is required to successfully terminate the application. We consider the following cases: Suppose both P and Q were successful or only Q was successful. Then the application is successful. Suppose P was successful but Q did not commit. Since Q is a mandatory service the application is unsuccessful. Thus, P must be aborted, consequently we have a mandatory abort constraint on service P. We therefore have the transaction constraint that service P must support mandatory abort, if P and Q are to execute in parallel. There is no transaction constraint on Q. On the other hand, if we replace the parallel execution of P and Q with the sequential execution (Q P), then we will not have a transaction constraint on P. Suppose that the application execution behavior was (P Q) and both P and Q were mandatory services. In this case, there is a mandatory abort transaction constraint on both P and Q. We have only described how a safe plan is generated for a simple program. In general, a program will be decomposed into subprograms, and safe execution plans are generated for each subprogram. 5. Conclusions We have described MedTransact, a system designed to mediate dissimilar service capabilities of remote service providers, while supporting distributed transaction semantics across the mediator and the remote service providers. MedTransact makes use of the application transaction semantics and the description of remote service transaction capabilities to enforce distributed transactions. Future work involves remote service discovery and mapping from discovered remote services to mediator services. A prototype of MedTransact will be available in March It will be capable of generating execution plans for a (limited) application object, i.e., for limited program execution flow. References [1] Ansari M., et.al., Using Flexible Transactions to Support Multi-System Telecommunication Applications, Proc. of the 18th VLDB Conference, August (1992). [2] Brickley, D., and Guha, R.V., Resource Description Framework (RDF) schema specification, Technical Report WWW-Consortium (1999). [3] Dayal U., Hsu M., and Ladin R., A Transactional Model for Long-Running Activities, Proc. of the 17th VLDB Conference, September (1991). [4] Dayal U., Hsu M., and Ladin R., Organizing Long-Running Activities with Triggers and Transactions. Proc. of ACM SIGMOD Conf. on Management of Data (1990). [5] Elmagarmid A. and Pu C., eds., Special Issue on Heterogeneous Databases, ACM Comp. Surveys vol. 22, no. 3 (1990).

9 [6] Elmagarmid A., ed. Transaction Models for Advanced Database Applications. Morgan-Kaufmann, February (1992). [7] Elmagarmid A.K., et al., A Multidatabase Transaction Model for InterBase. Proc. of the 16th VLDB Conference (1990). [8] Garcia-Molina H., et. al. Coordinating Multi-transaction Activities, Technical Report CS-TR , Princeton University, February [9] Georgakopoulos D., et. al., Specification and Management of Extended Transactions in a Programmable Transaction Environment, Proc. of the Intl. Conf. on Data Engineering, February (1994). [10] Georgakopoulos, D., Hornick, M., and Sheth, A., An overview of workflow management: from process modeling to workflow automation infrastructure, Intl. Journal on distributed and parallel databases, vol. 3, no. 2, (1995). [11] Haas, L., et al., Optimizing Queries across Diverse Data Sources, Proceedings of VLDB Conference (1997). [12] Hsu M., ed. Special Issue on workflow and Extended Transaction Systems), vol.16, no. 2, June (1993). [13] IBM White Paper, The IBM WebSphere software platform and patterns for e-business - invaluable tools for IT architects of the new economy. docs/wswhitepaper.pdf (2000). [14] Lawrence,P., ed., WfMC Workflow Handbook. John Wiley & Sons Ltd (1997). [15] Levy,A.Y., et al., Querying Heterogeneous Information Sources Using Source Descriptions. Proceedings of the VLDB Conference (1996). [16] McCarthy D. and Sarin S., Workflow and Transaction in InConcert. In [12]. [17] Medina-Mora R., Wong H., and Flores P., ActionWorkflow TM as the Enterprise Integration Technology. In [12]. [18] Microsoft White Paper, A Blueprint for Building Web Sites Using the Microsoft Windows DNA Platform. whitepapers.asp (2000). [19] Miller,J.A, et al., WebWork: METEOR2 s Web-Based Workflow Management System, Journal of Intelligent Information Systems, vol.10, no. 2 (1998). [20] Milner, R., Communication and Concurrency, International Series in Computer Science. Prentice- Hall, Englewood Cliffs, NJ (1989). [21] Özsu,M.T., Dayal,U., and Valduriez,P., eds., Distributed Object Management, Morgan-Kaufmann, San Mateo, CA (1994). [22] Papakonstantinou,Y., et al., Describing and Using Query Capabilities of Heterogeneous Sources. Proceedings of the VLDB Conference (1997). [23] Paul,S., Park,E., and Chaar,J., RainMan: a Workflow System for the Internet, Proc. of USENIX Symp. on Internet Technologies and Systems (1997). [24] Pires,P.F., Raschid,L., MedTransact: Transaction Support for Mediation with Remote Service Providers, In preparation, Technical Report, UMIACS, University of Maryland (2000). [25] Pitoura,E., Bukhres,O.A., Elmagarmid,A.K., Object Orientation in Multidatabase Systems, ACM Computing Surveys, vol. 27, no. 2, (1995). [26] Ramamritham,K., Chrysanthis,P.K., ed., Advances in Concurrency Control and Transaction Processing, IEEE Computer Society Press, CA (1997) [27] Ranno,F., Shrivastava,S.K., and Wheater,S.M., A Language for Specifying the Composition of Reliable Distributed Applications, The 18th International Conference on Distributed Computing Systems (ICDCS '98), Amsterdam, The Netherlands (1998). [28] Rusinkiewicz,M., and Sheth,A., Specification and execution of transactional workflows, in: Modern database systems, ed. W. Kim, ACM Press, (1995). [29] Tomasic, A., et. al., Scaling access to distributed heterogeneous data sources with Disco. IEEE Transactions on Knowledge and Data Engineering (1998). [30] Wachter H. and Reuter A., The ConTract Model. Chapter 7, In [6] (1992).

Extending Multidatabase Transaction Management Techniques to Software Development Environments

Extending Multidatabase Transaction Management Techniques to Software Development Environments Purdue University Purdue e-pubs Computer Science Technical Reports Department of Computer Science 1993 Extending Multidatabase Transaction Management Techniques to Software Development Environments Aidong

More information

Supporting Telecom Business Processes by means of Workflow Management and Federated Databases

Supporting Telecom Business Processes by means of Workflow Management and Federated Databases Supporting Telecom Business Processes by means of Workflow Management and Federated Databases Wim Nijenhuis and Willem Jonker Service Development and Support KPN Research PO Box 15000, 9700 CD Groningen

More information

Techniques to Produce Good Web Service Compositions in The Semantic Grid

Techniques to Produce Good Web Service Compositions in The Semantic Grid Techniques to Produce Good Web Service Compositions in The Semantic Grid Eduardo Blanco Universidad Simón Bolívar, Departamento de Computación y Tecnología de la Información, Apartado 89000, Caracas 1080-A,

More information

A Review of Distributed Workflow Management Systems

A Review of Distributed Workflow Management Systems A Review of Distributed Workflow Management Systems F. Ranno and S. K. Shrivastava Department of Computing Science, Newcastle University, Newcastle upon Tyne, NE1 7RU, UK. Abstract: An increasing number

More information

Data Integration using Agent based Mediator-Wrapper Architecture. Tutorial Report For Agent Based Software Engineering (SENG 609.

Data Integration using Agent based Mediator-Wrapper Architecture. Tutorial Report For Agent Based Software Engineering (SENG 609. Data Integration using Agent based Mediator-Wrapper Architecture Tutorial Report For Agent Based Software Engineering (SENG 609.22) Presented by: George Shi Course Instructor: Dr. Behrouz H. Far December

More information

Workflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment

Workflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment Workflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment Peter Y. Wu wu@rmu.edu Department of Computer & Information Systems Robert Morris University

More information

A Multidatabase System as 4-Tiered Client-Server Distributed Heterogeneous Database System

A Multidatabase System as 4-Tiered Client-Server Distributed Heterogeneous Database System A Multidatabase System as 4-Tiered Client-Server Distributed Heterogeneous Database System Mohammad Ghulam Ali Academic Post Graduate Studies and Research Indian Institute of Technology, Kharagpur Kharagpur,

More information

Protecting Database Centric Web Services against SQL/XPath Injection Attacks

Protecting Database Centric Web Services against SQL/XPath Injection Attacks Protecting Database Centric Web Services against SQL/XPath Injection Attacks Nuno Laranjeiro, Marco Vieira, and Henrique Madeira CISUC, Department of Informatics Engineering University of Coimbra, Portugal

More information

XML DATA INTEGRATION SYSTEM

XML DATA INTEGRATION SYSTEM XML DATA INTEGRATION SYSTEM Abdelsalam Almarimi The Higher Institute of Electronics Engineering Baniwalid, Libya Belgasem_2000@Yahoo.com ABSRACT This paper describes a proposal for a system for XML data

More information

Business Rules Modeling for Business Process Events: An Oracle Prototype

Business Rules Modeling for Business Process Events: An Oracle Prototype JOURNAL OF COMPUTERS, VOL. 7, NO. 9, SEPTEMBER 2012 2099 Business Rules Modeling for Business Process Events: An Oracle Prototype Rajeev Kaula Computer Information Systems Department, Missouri State University,

More information

Virtual Data Integration

Virtual Data Integration Virtual Data Integration Helena Galhardas Paulo Carreira DEI IST (based on the slides of the course: CIS 550 Database & Information Systems, Univ. Pennsylvania, Zachary Ives) Agenda Terminology Conjunctive

More information

Data Grids. Lidan Wang April 5, 2007

Data Grids. Lidan Wang April 5, 2007 Data Grids Lidan Wang April 5, 2007 Outline Data-intensive applications Challenges in data access, integration and management in Grid setting Grid services for these data-intensive application Architectural

More information

A Novel Cloud Computing Data Fragmentation Service Design for Distributed Systems

A Novel Cloud Computing Data Fragmentation Service Design for Distributed Systems A Novel Cloud Computing Data Fragmentation Service Design for Distributed Systems Ismail Hababeh School of Computer Engineering and Information Technology, German-Jordanian University Amman, Jordan Abstract-

More information

Collaborative Commerce and Knowledge Management

Collaborative Commerce and Knowledge Management & Knowledge and Process Management Volume 9 Number 1 pp 43 53 (2002) DOI: 10.1002/ kpm.132 Collaborative Commerce and Knowledge Management Bhavani Thuraisingham 1, Amar Gupta 2, Elisa Bertino 3 and Elena

More information

Building A Smart Academic Advising System Using Association Rule Mining

Building A Smart Academic Advising System Using Association Rule Mining Building A Smart Academic Advising System Using Association Rule Mining Raed Shatnawi +962795285056 raedamin@just.edu.jo Qutaibah Althebyan +962796536277 qaalthebyan@just.edu.jo Baraq Ghalib & Mohammed

More information

Consistency for Web Services Applications

Consistency for Web Services Applications Consistency for Web Services Applications Paul Greenfield, Dean Kuo, Surya Nepal CSIRO ICT Centre Locked Bag 17 North Ryde, NSW 1670 Australia firstname.lastname@csiro.au Alan Fekete School of Information

More information

Smooth and Flexible ERP Migration between both Homogeneous and Heterogeneous ERP Systems/ERP Modules

Smooth and Flexible ERP Migration between both Homogeneous and Heterogeneous ERP Systems/ERP Modules 28.8.2008 Smooth and Flexible ERP Migration between both Homogeneous and Heterogeneous ERP Systems/ERP Modules Lars Frank Department of Informatics, Copenhagen Business School, Howitzvej 60, DK-2000 Frederiksberg,

More information

MIT Sloan School of Management

MIT Sloan School of Management MIT Sloan School of Management Working Paper 4259-02 October 2002 Directions for Web and E-Commerce Applications Security Bhavani Thuraisingham, Chris Clifton, Amar Gupta, Elisa Bertino, Elena Ferrari

More information

MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS

MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS Tao Yu Department of Computer Science, University of California at Irvine, USA Email: tyu1@uci.edu Jun-Jang Jeng IBM T.J. Watson

More information

Integration of Heterogeneous Databases based on XML

Integration of Heterogeneous Databases based on XML ISSN:2249-5789 Integration of Heterogeneous Databases based on XML Venciya.A Student, Department Of Computer Science And Engineering, SRM University,Kattankulathur, Venciya.a@gmail.com Abstract As companies

More information

A Secure Model for Medical Data Sharing

A Secure Model for Medical Data Sharing International Journal of Database Theory and Application 45 A Secure Model for Medical Data Sharing Wong Kok Seng 1,1,Myung Ho Kim 1, Rosli Besar 2, Fazly Salleh 2 1 Department of Computer, Soongsil University,

More information

Ontological Identification of Patterns for Choreographing Business Workflow

Ontological Identification of Patterns for Choreographing Business Workflow University of Aizu, Graduation Thesis. March, 2010 s1140042 1 Ontological Identification of Patterns for Choreographing Business Workflow Seiji Ota s1140042 Supervised by Incheon Paik Abstract Business

More information

Ontology-Based Discovery of Workflow Activity Patterns

Ontology-Based Discovery of Workflow Activity Patterns Ontology-Based Discovery of Workflow Activity Patterns Diogo R. Ferreira 1, Susana Alves 1, Lucinéia H. Thom 2 1 IST Technical University of Lisbon, Portugal {diogo.ferreira,susana.alves}@ist.utl.pt 2

More information

Modelling Long-Lived Health Care Workflow Transactions

Modelling Long-Lived Health Care Workflow Transactions Modelling Long-Lived Health Care Workflow Transactions Christopher Meli and George Fernandez ehealth Education c.meli@ehe.edu.au g.fernandez@ehe.edu.au Abstract. Due to the increasing automation of health

More information

A MEDIATION LAYER FOR HETEROGENEOUS XML SCHEMAS

A MEDIATION LAYER FOR HETEROGENEOUS XML SCHEMAS A MEDIATION LAYER FOR HETEROGENEOUS XML SCHEMAS Abdelsalam Almarimi 1, Jaroslav Pokorny 2 Abstract This paper describes an approach for mediation of heterogeneous XML schemas. Such an approach is proposed

More information

A Case Study of Question Answering in Automatic Tourism Service Packaging

A Case Study of Question Answering in Automatic Tourism Service Packaging BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, Special Issue Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0045 A Case Study of Question

More information

Horizontal Aggregations In SQL To Generate Data Sets For Data Mining Analysis In An Optimized Manner

Horizontal Aggregations In SQL To Generate Data Sets For Data Mining Analysis In An Optimized Manner 24 Horizontal Aggregations In SQL To Generate Data Sets For Data Mining Analysis In An Optimized Manner Rekha S. Nyaykhor M. Tech, Dept. Of CSE, Priyadarshini Bhagwati College of Engineering, Nagpur, India

More information

Architecture for ERP System Integration with Heterogeneous E-Government Modules 1

Architecture for ERP System Integration with Heterogeneous E-Government Modules 1 102 Chapter 7 Architecture for ERP System Integration with Heterogeneous E-Government Modules 1 Lars Frank Copenhagen Business School, Denmark ABSTRACT ERP (Enterprise Resource Planning) systems consist

More information

Issues in Implementing Service Oriented Architectures

Issues in Implementing Service Oriented Architectures Issues in Implementing Service Oriented Architectures J. Taylor 1, A. D. Phippen 1, R. Allen 2 1 Network Research Group, University of Plymouth, United Kingdom 2 Orange PCS, Bristol, United Kingdom email:

More information

Integrating Heterogeneous Data Sources Using XML

Integrating Heterogeneous Data Sources Using XML Integrating Heterogeneous Data Sources Using XML 1 Yogesh R.Rochlani, 2 Prof. A.R. Itkikar 1 Department of Computer Science & Engineering Sipna COET, SGBAU, Amravati (MH), India 2 Department of Computer

More information

CS2Bh: Current Technologies. Introduction to XML and Relational Databases. Introduction to Databases. Why databases? Why not use XML?

CS2Bh: Current Technologies. Introduction to XML and Relational Databases. Introduction to Databases. Why databases? Why not use XML? CS2Bh: Current Technologies Introduction to XML and Relational Databases Spring 2005 Introduction to Databases CS2 Spring 2005 (LN5) 1 Why databases? Why not use XML? What is missing from XML: Consistency

More information

Service Oriented Architecture (SOA) An Introduction

Service Oriented Architecture (SOA) An Introduction Oriented Architecture (SOA) An Introduction Application Evolution Time Oriented Applications Monolithic Applications Mainframe Client / Server Distributed Applications DCE/RPC CORBA DCOM EJB s Messages

More information

Enhancing ECA Rules for Distributed Active Database Systems

Enhancing ECA Rules for Distributed Active Database Systems Enhancing ECA Rules for Distributed Active Database Systems 2 Thomas Heimrich 1 and Günther Specht 2 1 TU-Ilmenau, FG Datenbanken und Informationssysteme, 98684 Ilmenau Universität Ulm, Abteilung Datenbanken

More information

Associate Professor, Department of CSE, Shri Vishnu Engineering College for Women, Andhra Pradesh, India 2

Associate Professor, Department of CSE, Shri Vishnu Engineering College for Women, Andhra Pradesh, India 2 Volume 6, Issue 3, March 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue

More information

Data Integration for Capital Projects via Community-Specific Conceptual Representations

Data Integration for Capital Projects via Community-Specific Conceptual Representations Data Integration for Capital Projects via Community-Specific Conceptual Representations Yimin Zhu 1, Mei-Ling Shyu 2, Shu-Ching Chen 3 1,3 Florida International University 2 University of Miami E-mail:

More information

Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques

Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques Sean Thorpe 1, Indrajit Ray 2, and Tyrone Grandison 3 1 Faculty of Engineering and Computing,

More information

Component-based Development Process and Component Lifecycle Ivica Crnkovic 1, Stig Larsson 2, Michel Chaudron 3

Component-based Development Process and Component Lifecycle Ivica Crnkovic 1, Stig Larsson 2, Michel Chaudron 3 Component-based Development Process and Component Lifecycle Ivica Crnkovic 1, Stig Larsson 2, Michel Chaudron 3 1 Mälardalen University, Västerås, Sweden, ivica.crnkovic@mdh.se 2 ABB Corporate Research,

More information

The Architecture Of An Active Data Base Management System*

The Architecture Of An Active Data Base Management System* The Architecture Of An Active Data Base Management System* Dennis R. McCarthy Xerox Advanced Information Technology 4 Cambridge Center Cambridge, MA 02142 ARPANET mccarthy@ait.xerox.com Umeshwar Dayal

More information

Adaptable Transaction Processing in the Web Services Domain

Adaptable Transaction Processing in the Web Services Domain Adaptable Transaction Processing in the Web Services Domain Yan Wang and Weihai Yu Department of Computer Science University of Tromsø {wang,weihai}@cs.uit.no Abstract The advent of Web Services technologies

More information

GOAL-BASED INTELLIGENT AGENTS

GOAL-BASED INTELLIGENT AGENTS International Journal of Information Technology, Vol. 9 No. 1 GOAL-BASED INTELLIGENT AGENTS Zhiqi Shen, Robert Gay and Xuehong Tao ICIS, School of EEE, Nanyang Technological University, Singapore 639798

More information

An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents

An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents M. Anber and O. Badawy Department of Computer Engineering, Arab Academy for Science and Technology

More information

An Object Oriented Role-based Access Control Model for Secure Domain Environments

An Object Oriented Role-based Access Control Model for Secure Domain Environments International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer

More information

Querying Combined Cloud-Based and Relational Databases

Querying Combined Cloud-Based and Relational Databases Querying Combined Cloud-Based and Relational Databases Minpeng Zhu and Tore Risch Department of Information Technology, Uppsala University, Sweden Minpeng.Zhu@it.uu.se Tore.Risch@it.uu.se Abstract An increasing

More information

Exercise 1: Relational Model

Exercise 1: Relational Model Exercise 1: Relational Model 1. Consider the relational database of next relational schema with 3 relations. What are the best possible primary keys in each relation? employ(person_name, street, city)

More information

Enterprise Application Designs In Relation to ERP and SOA

Enterprise Application Designs In Relation to ERP and SOA Enterprise Application Designs In Relation to ERP and SOA DESIGNING ENTERPRICE APPLICATIONS HASITH D. YAGGAHAVITA 20 th MAY 2009 Table of Content 1 Introduction... 3 2 Patterns for Service Integration...

More information

Internet Based Inter-Business Process Management: A Federated Approach

Internet Based Inter-Business Process Management: A Federated Approach Internet Based Inter-Business Process Management: A Federated Approach Giacomo Piccinelli, Floriana Marcello*, Gabriele Zugliani* Internet Business Management Department HP Laboratories Bristol HPL-98-87

More information

Automating Service Negotiation Process for Service Architecture on the cloud by using Semantic Methodology

Automating Service Negotiation Process for Service Architecture on the cloud by using Semantic Methodology Automating Process for Architecture on the cloud by using Semantic Methodology Bhavana Jayant.Adgaonkar Department of Information Technology Amarutvahini College of Engineering Sangamner, India adgaonkarbhavana@yahoo.in

More information

Generating Web Applications from Process Models

Generating Web Applications from Process Models Generating Web Applications from Process Models Jan Schulz-Hofen, Silvan Golega Hasso-Plattner-Institute for Software Systems Engineering Prof.-Dr.-Helmert-Str. 2-3 D-14482 Potsdam, Germany {jan.schulz-hofen,

More information

Semantic Description of Distributed Business Processes

Semantic Description of Distributed Business Processes Semantic Description of Distributed Business Processes Authors: S. Agarwal, S. Rudolph, A. Abecker Presenter: Veli Bicer FZI Forschungszentrum Informatik, Karlsruhe Outline Motivation Formalism for Modeling

More information

Semantic Information Retrieval from Distributed Heterogeneous Data Sources

Semantic Information Retrieval from Distributed Heterogeneous Data Sources Semantic Information Retrieval from Distributed Heterogeneous Sources K. Munir, M. Odeh, R. McClatchey, S. Khan, I. Habib CCS Research Centre, University of West of England, Frenchay, Bristol, UK Email

More information

XQuery and the E-xml Component suite

XQuery and the E-xml Component suite An Introduction to the e-xml Data Integration Suite Georges Gardarin, Antoine Mensch, Anthony Tomasic e-xmlmedia, 29 Avenue du Général Leclerc, 92340 Bourg La Reine, France georges.gardarin@e-xmlmedia.fr

More information

Personalized e-learning a Goal Oriented Approach

Personalized e-learning a Goal Oriented Approach Proceedings of the 7th WSEAS International Conference on Distance Learning and Web Engineering, Beijing, China, September 15-17, 2007 304 Personalized e-learning a Goal Oriented Approach ZHIQI SHEN 1,

More information

Introduction to Service Oriented Architectures (SOA)

Introduction to Service Oriented Architectures (SOA) Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction

More information

virtual class local mappings semantically equivalent local classes ... Schema Integration

virtual class local mappings semantically equivalent local classes ... Schema Integration Data Integration Techniques based on Data Quality Aspects Michael Gertz Department of Computer Science University of California, Davis One Shields Avenue Davis, CA 95616, USA gertz@cs.ucdavis.edu Ingo

More information

Towards Trusted Semantic Service Computing

Towards Trusted Semantic Service Computing Towards Trusted Semantic Service Computing Michel Deriaz University of Geneva, Switzerland Abstract. This paper describes a new prototype of a semantic Service Oriented Architecture (SOA) called Spec Services.

More information

Mining various patterns in sequential data in an SQL-like manner *

Mining various patterns in sequential data in an SQL-like manner * Mining various patterns in sequential data in an SQL-like manner * Marek Wojciechowski Poznan University of Technology, Institute of Computing Science, ul. Piotrowo 3a, 60-965 Poznan, Poland Marek.Wojciechowski@cs.put.poznan.pl

More information

USAGE OF BUSINESS RULES IN SUPPLY CHAIN MANAGEMENT

USAGE OF BUSINESS RULES IN SUPPLY CHAIN MANAGEMENT TOTAL LOGISTIC MANAGEMENT No. 2 2009 PP. 5 13 Bartłomiej GAWEŁ, Anna PILCH USAGE OF BUSINESS RULES IN SUPPLY CHAIN MANAGEMENT Abstract: The growth of efficiency in supply chain management depends on the

More information

A Dynamic Query Processing Architecture for Data Integration Systems

A Dynamic Query Processing Architecture for Data Integration Systems A Dynamic Query Processing Architecture for Data Integration Systems Luc Bouganim Ý, Françoise Fabret, C. Mohan Þ, Patrick Valduriez Ý PRiSM Versailles, France Luc.Bouganim@prism.uvsq.fr INRIA Rocquencourt,

More information

Six Strategies for Building High Performance SOA Applications

Six Strategies for Building High Performance SOA Applications Six Strategies for Building High Performance SOA Applications Uwe Breitenbücher, Oliver Kopp, Frank Leymann, Michael Reiter, Dieter Roller, and Tobias Unger University of Stuttgart, Institute of Architecture

More information

Using Logs to Increase Availability in Real-Time. Tiina Niklander and Kimmo Raatikainen. University of Helsinki, Department of Computer Science

Using Logs to Increase Availability in Real-Time. Tiina Niklander and Kimmo Raatikainen. University of Helsinki, Department of Computer Science Using Logs to Increase Availability in Real-Time Main-Memory Tiina Niklander and Kimmo Raatikainen University of Helsinki, Department of Computer Science P.O. Box 26(Teollisuuskatu 23), FIN-14 University

More information

Adel Shru 2. One Kendall Square. This and related papers are available at the following web page:

Adel Shru 2. One Kendall Square. This and related papers are available at the following web page: Database Requirements for Workow Management in a High-Throughput Genome Laboratory 1 Anthony J. Bonner 2 bonner@db.toronto.edu Adel Shru 2 shrufi@db.toronto.edu Steve Rozen 3 steve@genome.wi.mit.edu 2

More information

i-questionnaire A Software Service Tool for Data

i-questionnaire A Software Service Tool for Data i-questionnaire A Software Service Tool for Data Analysis in e-business 1 ANDY S.Y. LAI, 2 Y.C. POON 1, Department of Information and Communications Technology, Hong Kong Institute of Vocational Education,

More information

Data Integration and ETL Process

Data Integration and ETL Process Data Integration and ETL Process Krzysztof Dembczyński Intelligent Decision Support Systems Laboratory (IDSS) Poznań University of Technology, Poland Software Development Technologies Master studies, second

More information

SmartLink: a Web-based editor and search environment for Linked Services

SmartLink: a Web-based editor and search environment for Linked Services SmartLink: a Web-based editor and search environment for Linked Services Stefan Dietze, Hong Qing Yu, Carlos Pedrinaci, Dong Liu, John Domingue Knowledge Media Institute, The Open University, MK7 6AA,

More information

Chinese Wall Security for Decentralized Workflow Management Systems

Chinese Wall Security for Decentralized Workflow Management Systems Chinese Wall Security for Decentralized Workflow Management Systems Vijayalakshmi Atluri, 1 Soon Ae Chun 1 and Pietro Mazzoleni 2 1 MSIS Department and CIMIC, Rutgers University 180 University Avenue,

More information

Automatic Annotation Wrapper Generation and Mining Web Database Search Result

Automatic Annotation Wrapper Generation and Mining Web Database Search Result Automatic Annotation Wrapper Generation and Mining Web Database Search Result V.Yogam 1, K.Umamaheswari 2 1 PG student, ME Software Engineering, Anna University (BIT campus), Trichy, Tamil nadu, India

More information

Workflow Management Design and Implementation

Workflow Management Design and Implementation Distributed Global Transaction Support for Workflow Management Applications Jochem Vonk, Paul Grefen, Erik Boertjes, Peter Apers Center for Telematics and Information Technology (CTIT) University of Twente

More information

A methodology for secure software design

A methodology for secure software design A methodology for secure software design Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca Raton, FL 33431 ed@cse.fau.edu 1. Introduction A good percentage of the

More information

COMPUTER AUTOMATION OF BUSINESS PROCESSES T. Stoilov, K. Stoilova

COMPUTER AUTOMATION OF BUSINESS PROCESSES T. Stoilov, K. Stoilova COMPUTER AUTOMATION OF BUSINESS PROCESSES T. Stoilov, K. Stoilova Computer automation of business processes: The paper presents the Workflow management system as an established technology for automation

More information

Visual Interfaces for the Development of Event-based Web Agents in the IRobot System

Visual Interfaces for the Development of Event-based Web Agents in the IRobot System Visual Interfaces for the Development of Event-based Web Agents in the IRobot System Liangyou Chen ACM Member chen_liangyou@yahoo.com Abstract. Timely integration and analysis of information from the World-Wide

More information

An Algorithmic Approach to Database Normalization

An Algorithmic Approach to Database Normalization An Algorithmic Approach to Database Normalization M. Demba College of Computer Science and Information Aljouf University, Kingdom of Saudi Arabia bah.demba@ju.edu.sa ABSTRACT When an attempt is made to

More information

INTEGRATION OF XML DATA IN PEER-TO-PEER E-COMMERCE APPLICATIONS

INTEGRATION OF XML DATA IN PEER-TO-PEER E-COMMERCE APPLICATIONS INTEGRATION OF XML DATA IN PEER-TO-PEER E-COMMERCE APPLICATIONS Tadeusz Pankowski 1,2 1 Institute of Control and Information Engineering Poznan University of Technology Pl. M.S.-Curie 5, 60-965 Poznan

More information

A Rule-Oriented Concurrent Architecture to Effect Adaptiveness for Integrated Manufacturing Enterprises

A Rule-Oriented Concurrent Architecture to Effect Adaptiveness for Integrated Manufacturing Enterprises A Rule-Oriented Concurrent Architecture to Effect Adaptiveness for Integrated Manufacturing Enterprises Cheng Hsu and Gilbert Babin Decision Sciences and Engineering Systems, Rensselaer Polytechnic Institute,

More information

Scientific versus Business Workflows

Scientific versus Business Workflows 2 Scientific versus Business Workflows Roger Barga and Dennis Gannon The formal concept of a workflow has existed in the business world for a long time. An entire industry of tools and technology devoted

More information

E-mail Listeners. E-mail Formats. Free Form. Formatted

E-mail Listeners. E-mail Formats. Free Form. Formatted E-mail Listeners 6 E-mail Formats You use the E-mail Listeners application to receive and process Service Requests and other types of tickets through e-mail in the form of e-mail messages. Using E- mail

More information

A Multi-Agent Approach to a Distributed Schedule Management System

A Multi-Agent Approach to a Distributed Schedule Management System UDC 001.81: 681.3 A Multi-Agent Approach to a Distributed Schedule Management System VYuji Wada VMasatoshi Shiouchi VYuji Takada (Manuscript received June 11,1997) More and more people are engaging in

More information

A Framework for Developing the Web-based Data Integration Tool for Web-Oriented Data Warehousing

A Framework for Developing the Web-based Data Integration Tool for Web-Oriented Data Warehousing A Framework for Developing the Web-based Integration Tool for Web-Oriented Warehousing PATRAVADEE VONGSUMEDH School of Science and Technology Bangkok University Rama IV road, Klong-Toey, BKK, 10110, THAILAND

More information

1.2 Requirements on Infrastructure for Network Centric Service Applications

1.2 Requirements on Infrastructure for Network Centric Service Applications The Coyote approach for Network Centric Service Applications: Conversational Service Transactions, a Monitor and an Application Style Asit Dan and Francis Parr IBM T. J. Watson Research Center Hawthorne,

More information

Using Provenance to Improve Workflow Design

Using Provenance to Improve Workflow Design Using Provenance to Improve Workflow Design Frederico T. de Oliveira, Leonardo Murta, Claudia Werner, Marta Mattoso COPPE/ Computer Science Department Federal University of Rio de Janeiro (UFRJ) {ftoliveira,

More information

Semantic Errors in SQL Queries: A Quite Complete List

Semantic Errors in SQL Queries: A Quite Complete List Semantic Errors in SQL Queries: A Quite Complete List Christian Goldberg, Stefan Brass Martin-Luther-Universität Halle-Wittenberg {goldberg,brass}@informatik.uni-halle.de Abstract We investigate classes

More information

Context-Aware Access Control for Pervasive Access to Process-Based Healthcare Systems

Context-Aware Access Control for Pervasive Access to Process-Based Healthcare Systems ehealth Beyond the Horizon Get IT There S.K. Andersen et al. (Eds.) IOS Press, 2008 2008 Organizing Committee of MIE 2008. All rights reserved. 679 Context-Aware Access Control for Pervasive Access to

More information

Security for Workflow Systems Vijay Atluri, Rutgers University

Security for Workflow Systems Vijay Atluri, Rutgers University Security for Workflow Systems Vijay Atluri, Rutgers University 1. What are Workflow Systems? Organizations constantly reengineer and optimize their business processes to reduce costs, deliver timely services,

More information

A business view for NGN service usage

A business view for NGN service usage A business view for NGN service usage Emmanuel Bertin 1, Idir Fodil 1, Noel Crespi 2 1 France Telecom, R&D division 2 Institut National des Télécommunications (GET-INT) Abstract. Next Generation Networks

More information

4. Concepts and Technologies for B2C, B2E, and B2B Transaction

4. Concepts and Technologies for B2C, B2E, and B2B Transaction 4. Concepts and Technologies for B2C, B2E, and B2B Transaction 4.4 Exchanging Information within Open Business Communities 4.4.1 Pre-Internet B2B standards: EDI, Interactive EDI, Universal EDI, OpenEDI

More information

Software development life cycle. Software Engineering - II ITNP92 - Object Oriented Software Design. Requirements. Requirements. Dr Andrea Bracciali

Software development life cycle. Software Engineering - II ITNP92 - Object Oriented Software Design. Requirements. Requirements. Dr Andrea Bracciali Software development life cycle Software life cycle: Software Engineering - II ITNP92 - Object Oriented Software Design Dr Andrea Bracciali Module Co-ordinator 4B86 abb@cs.stir.ac.uk Spring 2014 (elicitation)

More information

Performance of monitoring and control application in Active Database Management Systems Sumeer Kumar, Sumit Kumar

Performance of monitoring and control application in Active Database Management Systems Sumeer Kumar, Sumit Kumar Performance of monitoring and control application in Active Database Management Systems Sumeer Kumar, Sumit Kumar Abstract: In this manuscript, the authors have tried to sort out the performance analysis

More information

Best practices oriented business process operation and design

Best practices oriented business process operation and design Best practices oriented business process operation and design Julija Stecjuka, Janis Makna, Marite Kirikova Institute of Applied Computer Systems, Riga Technical University, 1 Kalku, Riga, LV-1658 Latvia

More information

Preparing Data Sets for the Data Mining Analysis using the Most Efficient Horizontal Aggregation Method in SQL

Preparing Data Sets for the Data Mining Analysis using the Most Efficient Horizontal Aggregation Method in SQL Preparing Data Sets for the Data Mining Analysis using the Most Efficient Horizontal Aggregation Method in SQL Jasna S MTech Student TKM College of engineering Kollam Manu J Pillai Assistant Professor

More information

Processes integration and coordination in collaborative models to supply chain management

Processes integration and coordination in collaborative models to supply chain management Processes integration and coordination in collaborative models to supply chain management PhD student: Ing. VILLARREAL, Pablo David RESEARCH AREA Supply Chain Management, Agent-oriented Software Engineering,

More information

Bastian Koller HLRS High Performance Computing Center Stuttgart, University of Stuttgart Nobelstrasse 19 70550 Stuttgart +49-711-68565891

Bastian Koller HLRS High Performance Computing Center Stuttgart, University of Stuttgart Nobelstrasse 19 70550 Stuttgart +49-711-68565891 Negotiating SLAs with Dynamic Pricing Policies Peer Hasselmeyer NEC Laboratories Europe, IT Research Division, NEC Europe, Ltd. Rathausallee 10 53757 Sankt Augustin, Germany +49-2241-92520 hasselmeyer@it.neclab.eu

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1: Introduction Database System Concepts, 5th Ed. See www.db book.com for conditions on re use Chapter 1: Introduction Purpose of Database Systems View of Data Database Languages Relational Databases

More information

Model-Checking Verification for Reliable Web Service

Model-Checking Verification for Reliable Web Service Model-Checking Verification for Reliable Web Service Shin NAKAJIMA Hosei University and PRESTO, JST nkjm@i.hosei.ac.jp Abstract Model-checking is a promising technique for the verification and validation

More information

Cross Organizational Workflow Management Systems

Cross Organizational Workflow Management Systems Cross Organizational Management Systems Venkatesh Patil & Avinash Chaudhari Tata Consultancy Services, India Paper presented at Product Data Technology Europe 2002 At Centro Ricerche Fiat, Turin, Italy

More information

REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES

REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES Miss.Monali K.Narse 1,Chaitali S.Suratkar 2, Isha M.Shirbhate 3 1 B.E, I.T, JDIET, Yavatmal, Maharashtra, India, monalinarse9990@gmail.com 2 Assistant

More information

Contents RELATIONAL DATABASES

Contents RELATIONAL DATABASES Preface xvii Chapter 1 Introduction 1.1 Database-System Applications 1 1.2 Purpose of Database Systems 3 1.3 View of Data 5 1.4 Database Languages 9 1.5 Relational Databases 11 1.6 Database Design 14 1.7

More information

Extending Data Processing Capabilities of Relational Database Management Systems.

Extending Data Processing Capabilities of Relational Database Management Systems. Extending Data Processing Capabilities of Relational Database Management Systems. Igor Wojnicki University of Missouri St. Louis Department of Mathematics and Computer Science 8001 Natural Bridge Road

More information

Udai Shankar 2 Deptt. of Computer Sc. & Engineering Madan Mohan Malaviya Engineering College, Gorakhpur, India

Udai Shankar 2 Deptt. of Computer Sc. & Engineering Madan Mohan Malaviya Engineering College, Gorakhpur, India A Protocol for Concurrency Control in Real-Time Replicated Databases System Ashish Srivastava 1 College, Gorakhpur. India Udai Shankar 2 College, Gorakhpur, India Sanjay Kumar Tiwari 3 College, Gorakhpur,

More information

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter

More information

Overview of major concepts in the service oriented extended OeBTO

Overview of major concepts in the service oriented extended OeBTO Modelling business policies and behaviour based on extended Open edi Business Transaction Ontology (OeBTO) Introduction Model Driven Development (MDD) provides a basis for the alignment between business

More information

Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis

Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 5 (Nov. - Dec. 2012), PP 36-41 Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis

More information