Normal view MARC view ISBD view

Advances in Service-Oriented and Cloud Computing : Workshops of ESOCC 2013, Málaga, Spain, September 11-13, 2013, Revised Selected Papers.

By: Canal, Carlos.
Contributor(s): Villari, Massimo.
Material type: TextTextSeries: eBooks on Demand.Publisher: Berlin/Heidelberg : Springer Berlin Heidelberg, 2013Copyright date: ©2013Description: 1 online resource (397 pages).Content type: text Media type: computer Carrier type: online resourceISBN: 9783642453649.Subject(s): Service-oriented architecture (Computer science)-Congresses | Cloud computing-CongressesGenre/Form: Electronic books.Additional physical formats: Print version:: Advances in Service-Oriented and Cloud Computing : Workshops of ESOCC 2013, Málaga, Spain, September 11-13, 2013, Revised Selected PapersDDC classification: 004.6 LOC classification: TK5105.5828 .A383 2013Online resources: Click here to view this ebook.
Contents:
Intro -- Preface -- Organization -- Table of Contents -- CLIoT Workshop Papers -- SNPS: An OSGi-Based Middleware for Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 3 The SNPS Middleware -- 3.1 Core and Related Components -- 3.2 Sensor Layer Integration -- 3.3 Web Service Integration -- 4 SNPSDataModel -- 5 Building and Composing Virtual Sensors -- 6 Conclusion -- References -- CoSIP: A Constrained Session Initiation Protocol for the Internet of Things -- 1 Introduction -- 2 Related Work -- 3 CoSIP -- 4 IoT Application Scenarios -- 4.1 CoAP Service Discovery -- 4.2 Session Establishment -- 4.3 Subscribe/Notify Applications -- 5 Protocol Evaluation -- 6 Conclusions -- References -- Design of a Message-Oriented Middleware for Cooperating Clouds -- 1 Introduction -- 2 Related Works -- 3 Motivation -- 4 Service Provisioning: A Planetary System Model -- 4.1 Design Overview -- 4.2 Cloud Utility Combinations with MOM4C: The Cloud Facility -- 5 MOM4CArchitecture -- 5.1 Two-Layer Architecture -- 5.2 Communication System -- 6 Conclusion -- References -- The Core Approach of SAaaS in Action: The Planning Agent -- 1 Introduction and Motivations -- 2 Background and RelatedWork -- 2.1 SAaaS -- 2.2 OGC: Sensor Web Enablement -- 2.3 State of the Art -- 3 Overview of the Hypervisor -- 4 Planning Agent -- 5 The Implementation -- 6 Conclusions -- References -- CLOUSO Workshop Papers -- peaCS-Performance and Efficiency Analysis for Cloud Storage -- 1 Motivation -- 2 Overview about Multiplexing Cloud Storage Controllers and Libraries -- 2.1 Controllers, Integrators, Gateways and Filesystems -- 2.2 Data Pre-processing Libraries -- 3 The peaCS Test Framework -- 3.1 peaCS Architecture -- 3.2 Performance Determination -- 3.3 Efficiency Determination -- 3.4 Functional Testing and Calculations -- 3.5 Test Run Examples -- 4 Related Research -- 5 Conclusion.
References -- Delegation for On-boarding Federation Across Storage Clouds -- 1 Introduction -- 2 Related Work -- 2.1 Access Control in a Federation -- 3 Vision Cloud at a Glance -- 4 On-boarding -- 5 Identity and Access Management Systems for Access Control -- 5.1 Concept of Delegation -- 5.2 Difference between Web Single Sign On (SSO) and Web Delegation -- 6 A Brief Presentation of OAuth 2.0 and SAML2Del -- 6.1 SAML2Del -- 6.2 Comparison of SAML2Del Versus OAuth 2.0 -- 7 Delegation Solution for On-boarding in VISION Cloud -- 8 Conclusions and Future Work -- References -- Availability Assessment of a Vision Cloud Storage Cluster -- 1 Introduction -- 2 The VISION Cloud Storage Environment -- 2.1 The Proposed Storage Cloud Environment -- 2.2 GPFS-SNC as Underlying Distributed File System -- 3 Problem Formulation -- 4 The Model -- 5 Results -- 6 Conclusions -- References -- Data Reliability in Multi-provider Cloud Storage Service with RRNS -- 1 Introduction -- 2 Related Work -- 3 Redundant Residue Number System -- 4 Data Availability and Confidentiality in a Multi-provider Cloud Storage Providers -- 5 Performance Evaluation -- 6 Conclusion and Future Work -- References -- Automated Provisioning of SaaS Applications over IaaS-Based Cloud Systems -- 1 Introduction -- 2 Related Works -- 3 Background -- 3.1 OpenStack -- 3.2 Juju -- 3.3 BPEL -- 4 Architecture -- 5 Implementation Details -- 6 Conclusion and Future Works -- References -- Open Source Issues with Cloud Storage Software -- 1 Introduction -- 2 License Issues -- 3 Open Source Project Quality -- 4 Conclusions -- References -- FOCLASA Workshop Papers -- A Calculus of Computational Fields -- 1 Introduction -- 2 Computational Fields -- 3 From Global to Local -- 4 The Computational Field Calculus -- 5 Properties -- 6 Conclusion, Related and Future Work -- References.
Trace- and Failure-Based Semantics for Bounded Responsiveness -- 1 Introduction -- 2 Preliminaries -- 2.1 Petri Nets -- 2.2 Open Nets and Environments -- 3 Bounded Responsiveness -- 3.1 A Trace-Based Semantics for Bounded Responsiveness -- 3.2 Deriving the Coarsest Precongruence for Bounded Responsiveness -- 3.3 Decidability of F+ b -Refinement -- 4 Final Bounded Responsiveness -- 5 Conclusion -- References -- On the Introduction of Time in Distributed Blackboard Rules -- 1 Introduction -- 2 Timing Context-Awareness -- 3 Discrete Time Points -- 4 Continuous Time Intervals -- 4.1 Absolute Time Approach -- 4.2 Relative Time Approach -- 5 Implementation -- 5.1 General Principles -- 5.2 Implementation Techniques -- 6 Related Work -- 6.1 Chemical Models -- 6.2 Reactive Models -- 6.3 Final Remarks -- 7 Conclusions -- References -- Data Abstraction in Coordination Constraints -- 1 Introduction -- 2 Motivation -- 3 Coordination as Constraints -- 3.1 Guarded Commands -- 3.2 Reo as Constraints -- 3.3 Well-Defined Formulas -- 3.4 Verifying Well-Definedness -- 4 Data Abstraction -- 4.1 Precomputed Domain Invariants -- 4.2 Predicate Abstraction -- 4.3 Soundness and Completeness -- 5 Evaluation -- 5.1 Test Cases -- 5.2 Results and Discussion -- 6 Related Work -- 7 Conclusions -- References -- Global Consensus through Local Synchronization -- 1 Introduction -- 2 Preliminaries: Port Automata -- 3 A New Local Product Operator -- 4 Substituting with , a Cheaper Characterization -- 5 Note on Associativity -- 6 Related Work and Conclusion -- References -- On Density in Coordination Languages -- 1 Introduction -- 2 DenseBach -- 2.1 Language Definition -- 2.2 Transition System -- 2.3 Observables and Operational Semantics -- 3 Comparisons of Bach and Dense Bach -- 3.1 Modular Embedding -- 3.2 Summary of Results -- 3.3 Formal Propositions and Proofs -- 4 Conclusion.
References -- A Tag Contract Framework for Heterogeneous Systems -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Tag Behaviors -- 3.2 Operational Tag Machines -- 3.3 Tag Machine Composition -- 4 A Contract Framework for Heterogeneous Systems -- 4.1 Tag Machine Operators -- 5 Conclusions -- References -- Matching Cloud Services with TOSCA -- 1 Introduction -- 2 Background: TOSCA -- 3 Matching Service Templates with Node Types -- 3.1 Exact Matching -- 3.2 Plug-in Matching -- 3.3 Flexible Matching -- 3.4 White-Box Matching -- 4 Related Work -- 5 Concluding Remarks -- References -- MoCSoP Workshop Papers -- First Hand Developer Experiences of Social Devices -- 1 Introduction -- 2 Background -- 3 Experiment -- 4 Developer Experiences -- 4.1 Understandablity -- 4.2 Acceptability -- 4.3 Coordination Aspects -- 4.4 Programmability -- 4.5 Reusability of Code -- 4.6 Deployment Aspects -- 5 Related Work -- 6 Open Questions -- 7 Conclusions -- References -- Social Index: A Content Discovery Application for Ad Hoc Communicating Smart Phones -- 1 Introduction -- 2 Related Work -- 3 Social Index Design -- 4 Social Index Simulator -- 5 User Tests with Social Index Simulator -- 6 Privacy -- 7 Open Issues and Future Work -- 8 Conclusions -- References -- Mobile Web Service Infrastructure Supporting Successful Aging -- 1 Introduction -- 2 State of the Art -- 3 Architecture -- 4 Scenario Description -- 5 Implementation -- 6 Opportunities and Challenges -- 7 Future Work and Outlook -- References -- Cloud and Web Services Integration for mHealth Telerehabilitation Support -- 1 Introduction -- 2 CloudRehab -- 2.1 Approach -- 2.2 Platform Overview -- 2.3 Functionalities -- 2.4 Architecture -- 2.5 Platform Applications -- 3 Related Work -- 4 Conclusions and Future Work -- References -- Architecting Infrastructures for Cloud-Enabled Mobile Devices -- 1 Introduction.
2 Cloud-Enabled Mobile Devices -- 2.1 Service Deployment Technology on Mobile Devices: CMED as Servers -- 2.2 CEMD as an Alternative to Client/Server Mobile Architectures -- 2.3 CEMD Supporting the Distributed Processing of Individual Social Profiles -- 2.4 CEMD Towards Privacy Awareness -- 2.5 CEMD as the 'Digital Interface' of Users -- 3 People-As-A-Service -- 3.1 Description -- 3.2 Architecture -- 3.3 nimBees -- 4 Discussion -- 5 Conclusions and Future Work -- References -- WAS4FI Workshop Papers -- Improving Security Assurance of Services through Certificate Profiles -- 1 Introduction -- 2 Related Work -- 3 Certificate Profile -- 3.1 Profile Structure -- 4 Profile-Based Certificate Management -- 4.1 Profile-Based Creation of Certificates -- 4.2 Profile Conformance Verification of Certificates -- 5 Proof-of-Concept Realization -- 5.1 ASSERT Certificate -- 5.2 ASSERT Profile -- 5.3 ASSERT Profile Example -- 6 Conclusions and Future Work -- References -- A Domain-Specific Model for Data Quality Constraints in Service Process Adaptations -- 1 Introduction -- 2 Scenario - Service-Based Content Processing -- 2.1 Scenario Introduction -- 2.2 Challenges and Scenario Analysis -- 3 Domain-Specific Model for Quality Constraints -- 3.1 Content -- 3.2 Provenance -- 3.3 Process -- 4 ConstraintsandRules -- 4.1 Requirements and Examples -- 4.2 Formalisation -- 5 Implementation - Policy Definition and Adaptation -- 6 Related Work -- 7 Conclusions -- References -- Run-Time Verification of Behaviour-Aware Mashups in the Internet of Things -- 1 Introduction -- 2 Motivating Our Approach -- 2.1 Problem Statement: Static Verification of Behaviour-Aware Mashups -- 2.2 Background -- 2.3 Approach and Contribution -- 3 Run-Time Verification of Mashups of Things -- 3.1 Detecting and Blocking Invalid Invocations at Run-Time.
3.2 Validating Behaviour with Automatically Generated Rules.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
TK5105.5828 .A383 2013 (Browse shelf) https://ebookcentral.proquest.com/lib/uttyler/detail.action?docID=3096889 Available EBC3096889

Intro -- Preface -- Organization -- Table of Contents -- CLIoT Workshop Papers -- SNPS: An OSGi-Based Middleware for Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 3 The SNPS Middleware -- 3.1 Core and Related Components -- 3.2 Sensor Layer Integration -- 3.3 Web Service Integration -- 4 SNPSDataModel -- 5 Building and Composing Virtual Sensors -- 6 Conclusion -- References -- CoSIP: A Constrained Session Initiation Protocol for the Internet of Things -- 1 Introduction -- 2 Related Work -- 3 CoSIP -- 4 IoT Application Scenarios -- 4.1 CoAP Service Discovery -- 4.2 Session Establishment -- 4.3 Subscribe/Notify Applications -- 5 Protocol Evaluation -- 6 Conclusions -- References -- Design of a Message-Oriented Middleware for Cooperating Clouds -- 1 Introduction -- 2 Related Works -- 3 Motivation -- 4 Service Provisioning: A Planetary System Model -- 4.1 Design Overview -- 4.2 Cloud Utility Combinations with MOM4C: The Cloud Facility -- 5 MOM4CArchitecture -- 5.1 Two-Layer Architecture -- 5.2 Communication System -- 6 Conclusion -- References -- The Core Approach of SAaaS in Action: The Planning Agent -- 1 Introduction and Motivations -- 2 Background and RelatedWork -- 2.1 SAaaS -- 2.2 OGC: Sensor Web Enablement -- 2.3 State of the Art -- 3 Overview of the Hypervisor -- 4 Planning Agent -- 5 The Implementation -- 6 Conclusions -- References -- CLOUSO Workshop Papers -- peaCS-Performance and Efficiency Analysis for Cloud Storage -- 1 Motivation -- 2 Overview about Multiplexing Cloud Storage Controllers and Libraries -- 2.1 Controllers, Integrators, Gateways and Filesystems -- 2.2 Data Pre-processing Libraries -- 3 The peaCS Test Framework -- 3.1 peaCS Architecture -- 3.2 Performance Determination -- 3.3 Efficiency Determination -- 3.4 Functional Testing and Calculations -- 3.5 Test Run Examples -- 4 Related Research -- 5 Conclusion.

References -- Delegation for On-boarding Federation Across Storage Clouds -- 1 Introduction -- 2 Related Work -- 2.1 Access Control in a Federation -- 3 Vision Cloud at a Glance -- 4 On-boarding -- 5 Identity and Access Management Systems for Access Control -- 5.1 Concept of Delegation -- 5.2 Difference between Web Single Sign On (SSO) and Web Delegation -- 6 A Brief Presentation of OAuth 2.0 and SAML2Del -- 6.1 SAML2Del -- 6.2 Comparison of SAML2Del Versus OAuth 2.0 -- 7 Delegation Solution for On-boarding in VISION Cloud -- 8 Conclusions and Future Work -- References -- Availability Assessment of a Vision Cloud Storage Cluster -- 1 Introduction -- 2 The VISION Cloud Storage Environment -- 2.1 The Proposed Storage Cloud Environment -- 2.2 GPFS-SNC as Underlying Distributed File System -- 3 Problem Formulation -- 4 The Model -- 5 Results -- 6 Conclusions -- References -- Data Reliability in Multi-provider Cloud Storage Service with RRNS -- 1 Introduction -- 2 Related Work -- 3 Redundant Residue Number System -- 4 Data Availability and Confidentiality in a Multi-provider Cloud Storage Providers -- 5 Performance Evaluation -- 6 Conclusion and Future Work -- References -- Automated Provisioning of SaaS Applications over IaaS-Based Cloud Systems -- 1 Introduction -- 2 Related Works -- 3 Background -- 3.1 OpenStack -- 3.2 Juju -- 3.3 BPEL -- 4 Architecture -- 5 Implementation Details -- 6 Conclusion and Future Works -- References -- Open Source Issues with Cloud Storage Software -- 1 Introduction -- 2 License Issues -- 3 Open Source Project Quality -- 4 Conclusions -- References -- FOCLASA Workshop Papers -- A Calculus of Computational Fields -- 1 Introduction -- 2 Computational Fields -- 3 From Global to Local -- 4 The Computational Field Calculus -- 5 Properties -- 6 Conclusion, Related and Future Work -- References.

Trace- and Failure-Based Semantics for Bounded Responsiveness -- 1 Introduction -- 2 Preliminaries -- 2.1 Petri Nets -- 2.2 Open Nets and Environments -- 3 Bounded Responsiveness -- 3.1 A Trace-Based Semantics for Bounded Responsiveness -- 3.2 Deriving the Coarsest Precongruence for Bounded Responsiveness -- 3.3 Decidability of F+ b -Refinement -- 4 Final Bounded Responsiveness -- 5 Conclusion -- References -- On the Introduction of Time in Distributed Blackboard Rules -- 1 Introduction -- 2 Timing Context-Awareness -- 3 Discrete Time Points -- 4 Continuous Time Intervals -- 4.1 Absolute Time Approach -- 4.2 Relative Time Approach -- 5 Implementation -- 5.1 General Principles -- 5.2 Implementation Techniques -- 6 Related Work -- 6.1 Chemical Models -- 6.2 Reactive Models -- 6.3 Final Remarks -- 7 Conclusions -- References -- Data Abstraction in Coordination Constraints -- 1 Introduction -- 2 Motivation -- 3 Coordination as Constraints -- 3.1 Guarded Commands -- 3.2 Reo as Constraints -- 3.3 Well-Defined Formulas -- 3.4 Verifying Well-Definedness -- 4 Data Abstraction -- 4.1 Precomputed Domain Invariants -- 4.2 Predicate Abstraction -- 4.3 Soundness and Completeness -- 5 Evaluation -- 5.1 Test Cases -- 5.2 Results and Discussion -- 6 Related Work -- 7 Conclusions -- References -- Global Consensus through Local Synchronization -- 1 Introduction -- 2 Preliminaries: Port Automata -- 3 A New Local Product Operator -- 4 Substituting with , a Cheaper Characterization -- 5 Note on Associativity -- 6 Related Work and Conclusion -- References -- On Density in Coordination Languages -- 1 Introduction -- 2 DenseBach -- 2.1 Language Definition -- 2.2 Transition System -- 2.3 Observables and Operational Semantics -- 3 Comparisons of Bach and Dense Bach -- 3.1 Modular Embedding -- 3.2 Summary of Results -- 3.3 Formal Propositions and Proofs -- 4 Conclusion.

References -- A Tag Contract Framework for Heterogeneous Systems -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Tag Behaviors -- 3.2 Operational Tag Machines -- 3.3 Tag Machine Composition -- 4 A Contract Framework for Heterogeneous Systems -- 4.1 Tag Machine Operators -- 5 Conclusions -- References -- Matching Cloud Services with TOSCA -- 1 Introduction -- 2 Background: TOSCA -- 3 Matching Service Templates with Node Types -- 3.1 Exact Matching -- 3.2 Plug-in Matching -- 3.3 Flexible Matching -- 3.4 White-Box Matching -- 4 Related Work -- 5 Concluding Remarks -- References -- MoCSoP Workshop Papers -- First Hand Developer Experiences of Social Devices -- 1 Introduction -- 2 Background -- 3 Experiment -- 4 Developer Experiences -- 4.1 Understandablity -- 4.2 Acceptability -- 4.3 Coordination Aspects -- 4.4 Programmability -- 4.5 Reusability of Code -- 4.6 Deployment Aspects -- 5 Related Work -- 6 Open Questions -- 7 Conclusions -- References -- Social Index: A Content Discovery Application for Ad Hoc Communicating Smart Phones -- 1 Introduction -- 2 Related Work -- 3 Social Index Design -- 4 Social Index Simulator -- 5 User Tests with Social Index Simulator -- 6 Privacy -- 7 Open Issues and Future Work -- 8 Conclusions -- References -- Mobile Web Service Infrastructure Supporting Successful Aging -- 1 Introduction -- 2 State of the Art -- 3 Architecture -- 4 Scenario Description -- 5 Implementation -- 6 Opportunities and Challenges -- 7 Future Work and Outlook -- References -- Cloud and Web Services Integration for mHealth Telerehabilitation Support -- 1 Introduction -- 2 CloudRehab -- 2.1 Approach -- 2.2 Platform Overview -- 2.3 Functionalities -- 2.4 Architecture -- 2.5 Platform Applications -- 3 Related Work -- 4 Conclusions and Future Work -- References -- Architecting Infrastructures for Cloud-Enabled Mobile Devices -- 1 Introduction.

2 Cloud-Enabled Mobile Devices -- 2.1 Service Deployment Technology on Mobile Devices: CMED as Servers -- 2.2 CEMD as an Alternative to Client/Server Mobile Architectures -- 2.3 CEMD Supporting the Distributed Processing of Individual Social Profiles -- 2.4 CEMD Towards Privacy Awareness -- 2.5 CEMD as the 'Digital Interface' of Users -- 3 People-As-A-Service -- 3.1 Description -- 3.2 Architecture -- 3.3 nimBees -- 4 Discussion -- 5 Conclusions and Future Work -- References -- WAS4FI Workshop Papers -- Improving Security Assurance of Services through Certificate Profiles -- 1 Introduction -- 2 Related Work -- 3 Certificate Profile -- 3.1 Profile Structure -- 4 Profile-Based Certificate Management -- 4.1 Profile-Based Creation of Certificates -- 4.2 Profile Conformance Verification of Certificates -- 5 Proof-of-Concept Realization -- 5.1 ASSERT Certificate -- 5.2 ASSERT Profile -- 5.3 ASSERT Profile Example -- 6 Conclusions and Future Work -- References -- A Domain-Specific Model for Data Quality Constraints in Service Process Adaptations -- 1 Introduction -- 2 Scenario - Service-Based Content Processing -- 2.1 Scenario Introduction -- 2.2 Challenges and Scenario Analysis -- 3 Domain-Specific Model for Quality Constraints -- 3.1 Content -- 3.2 Provenance -- 3.3 Process -- 4 ConstraintsandRules -- 4.1 Requirements and Examples -- 4.2 Formalisation -- 5 Implementation - Policy Definition and Adaptation -- 6 Related Work -- 7 Conclusions -- References -- Run-Time Verification of Behaviour-Aware Mashups in the Internet of Things -- 1 Introduction -- 2 Motivating Our Approach -- 2.1 Problem Statement: Static Verification of Behaviour-Aware Mashups -- 2.2 Background -- 2.3 Approach and Contribution -- 3 Run-Time Verification of Mashups of Things -- 3.1 Detecting and Blocking Invalid Invocations at Run-Time.

3.2 Validating Behaviour with Automatically Generated Rules.

Description based on publisher supplied metadata and other sources.

There are no comments for this item.

Log in to your account to post a comment.