Use Cases for Reasoning with Metadata or What Have Web Services to Do with Integrity Constraints?

Author(s):  
Stefan Decker
2008 ◽  
pp. 257-297 ◽  
Author(s):  
Asif Akram ◽  
Rob Allen ◽  
Sanjay Chaudhary ◽  
Prateek Jain ◽  
Zakir Laliwala

This chapter presents a ‘Case Study’ based on the distributed market. The requirements of this Grid Business Process are more demanding than any typical business process deployed within a single organization or enterprise. Recently different specifications built on top of Web service standards have originated from the Grid paradigm to address limitations of stateless Web services. These emerging specifications are evaluated in the first part of the chapter to capture requirements of a dynamic business process i.e. Business Process Grid. In second part of the chapter, a case study with different use cases is presented to simulate various scenarios. The abstract discussion and requirements of the case study is followed by the actual implementation. The implementation is meant for the proof-of-concept rather than fully functional application.


2008 ◽  
pp. 228-256
Author(s):  
A. Kaliontzoglou ◽  
T. Karantjias ◽  
D. Polemi

Research into initiatives worldwide shows that although some of the legal and or-ganizational barriers for the adoption of new technologies in e-government have been lifted, there are still not many implementations of actual e-government ser-vices that have been designed based on a common and systematic approach. The prevailing requirements for e-government services, interoperability and security, pose major challenges to e-government architects and it is now being slowly un-derstood that Web services in combination with public key infrastructures may provide the necessary solutions. In this context, this chapter presents three innova-tive e-government services based on these technologies, focusing on their security and interoperability aspects. The goal of the chapter is to demonstrate the ser-vices’ specifications and use cases so that they may act as examples for further re-search and development.


Author(s):  
A. Kaliontzoglou ◽  
T. Karantjias ◽  
D. Polemi

Research into initiatives worldwide shows that although some of the legal and organizational barriers for the adoption of new technologies in e-government have been lifted, there are still not many implementations of actual e-government services that have been designed based on a common and systematic approach. The most prevailing requirements for e-government services, interoperability and security, pose major challenges to e-government architects and it is now being slowly understood that Web Services in combination with Public Key Infrastructures may provide the necessary solutions. In this context, this paper presents three innovative e-government services based on these technologies, fo-cusing on their security and interoperability aspects. The goal of the paper is to demonstrate the services’ specifications and use cases so that they may act as ex-amples for further research and development.


2011 ◽  
pp. 1769-1795
Author(s):  
A. Kaliontzoglou ◽  
T. Karantjias ◽  
D. Polemi

Research into initiatives worldwide shows that although some of the legal and organizational barriers for the adoption of new technologies in e-government have been lifted, there are still not many implementations of actual e-government services that have been designed based on a common and systematic approach. The most prevailing requirements for e-government services, interoperability and security, pose major challenges to e-government architects and it is now being slowly understood that Web Services in combination with Public Key Infrastructures may provide the necessary solutions. In this context, this paper presents three innovative e-government services based on these technologies, fo-cusing on their security and interoperability aspects. The goal of the paper is to demonstrate the services’ specifications and use cases so that they may act as ex-amples for further research and development.


2014 ◽  
Vol 1 (1) ◽  
pp. 9-34
Author(s):  
Bobby Suryajaya

SKK Migas plans to apply end-to-end security based on Web Services Security (WS-Security) for Sistem Operasi Terpadu (SOT). However, there are no prototype or simulation results that can support the plan that has already been communicated to many parties. This paper proposes an experiment that performs PRODML data transfer using WS-Security by altering the WSDL to include encryption and digital signature. The experiment utilizes SoapUI, and successfully loaded PRODML WSDL that had been altered with WSP-Policy based on X.509 to transfer a SOAP message.


2004 ◽  
Vol 124 (1) ◽  
pp. 176-181
Author(s):  
Tomoaki Maruo ◽  
Keinosuke Matsumoto ◽  
Naoki Mori ◽  
Masashi Kitayama ◽  
Yoshio Izumi

Sign in / Sign up

Export Citation Format

Share Document