Advertisement

AMPol-Q: Adaptive Middleware Policy to Support QoS

  • Raja Afandi
  • Jianqing Zhang
  • Carl A. Gunter
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4294)

Abstract

There are many problems hindering the design and development of Service-Oriented Architectures (SOAs), which can dynamically discover and compose multiple services so that the quality of the composite service is measured by its End-to-End (E2E) quality, rather than that of individual services in isolation. The diversity and complexity of QoS constraints further limit the wide-scale adoption of QoS-aware SOA. We propose extensions to current OWL-S service description mechanisms to describe QoS information of all the candidate services. Our middleware based solution, AMPol-Q, enables clients to discover, select, compose, and monitor services that fulfil E2E QoS constraints. Our implementation and case studies demonstrate how AMPol-Q can accomplish these goals for web services that implement messaging.

Keywords

AMPol-Q WSEmail Adaptive Middleware Policy Service Oriented Architecture QoS Dynamic Service Discovery Security Ontologies 

References

  1. 1.
    Zeng, L., Benatallah, B., Ngu, A., Dumas, M., Kalagnanam, J., Chang, H.: Qos-aware middleware for web services composition. In: ITSE 2004: IEEE Trans. on Software Engr. (2004)Google Scholar
  2. 2.
    Casati, F., Ilnicki, S., Jin, L., Krishnamoorthy, V., Shan, M.: Adaptive and dynamic service composition in eflow. Tech. Report, HPL-200039, Software Tech. Lab. (2000)Google Scholar
  3. 3.
    Zeng, L., Benatallah, B., Dumas, M., Kalagnanam, J., Sheng, Q.: Quality driven web service composition. In: WWW 2003: Proc. of 12th Int. World Wide Web Conf. (2003)Google Scholar
  4. 4.
    Piccinelli, G., Stefanelli, C., Trastour, D.: Trusted mediation for e-service provision in electronic marketplaces. In: Fiege, L., Mühl, G., Wilhelm, U.G. (eds.) WELCOM 2001. LNCS, vol. 2232, p. 39. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  5. 5.
    Mahbub, K., Spanoudakis, G.: A framework for requirements monitoring of service based systems. In: ICSOC 2004: Proc. of the 2nd Int. Conf. on Service Oriented Computing (2004)Google Scholar
  6. 6.
    Jurca, R., Faltings, B.: Reputation-based service level agreements for web services. In: Benatallah, B., Casati, F., Traverso, P. (eds.) ICSOC 2005. LNCS, vol. 3826, pp. 396–409. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  7. 7.
    Lux, K.D., May, M.J., Bhattad, N.L., Gunter, C.A.: WSEmail: Secure Internet messaging based on Web services. In: Int. Conf. on Web Services (ICWS 2005). IEEE, Los Alamitos (2005)Google Scholar
  8. 8.
    Tsesmetzis, D., Roussaki, I.G., Papaioannou, I., Anagnostou, M.E.: Qos awareness support in web-service semantics. In: AICT-ICIW 2006 (2006)Google Scholar
  9. 9.
    Dobson, G., Lock, R., Sommerville, I.: Qosont: a qos ontology for service-centric systems. In: EUROMICRO-SEAA 2005 (2005)Google Scholar
  10. 10.
    Kagal, L., Paolucci, M., Srinivasan, N., Denker, G., Finin, T., Sycara, K.: Authorization and privacy for semantic web services. In: AAAI 2004: Workshop on Semantic Web Services (2004)Google Scholar
  11. 11.
    Uszok, A., Bradshaw, J.M., Jeffers, R., Johnson, M., Tate, A., Dalton, J., Aitken, S.: Kaos policy management for semantic web services. In: IIS 2004: IEEE Intelligent Systems (2004)Google Scholar
  12. 12.
    AMPol-Q: website (2006), http://seclab.cs.uiuc.edu/ampol/AMPol-Q
  13. 13.
    Sirin, E., Parsia, B., Hendler, J.: Filtering and selecting semantic web services with interactive composition techiques. IEEE Intelligent Systems 19(4) (2004)Google Scholar
  14. 14.
    Pathak, J., Koul, N., Caragea, D., Honavar, V.G.: A framework for semantic web services discovery. In: WIDM 2005 (2005)Google Scholar
  15. 15.
    Shuping, R.: A model for web service discovery with qos. In: ACM SIGecom (2003)Google Scholar
  16. 16.
    von Ahn, L., Blum, M., Hopper, N., Langford, J.: CAPTCHA: Using hard AI problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 294–311. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  17. 17.
    Juels, A., Brainard, J.: Client puzzles: A cryptographic defense against connection depletion attacks. In: NDSS 1999: Networks and Distributed Security Systems (1999)Google Scholar
  18. 18.
    Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139–147. Springer, Heidelberg (1993)Google Scholar
  19. 19.
    Boneh, D., Franklin, M.: Identity based ecncryption from the Weil pairing. SIAM J. of Computing 32(3), 586–615 (2003)zbMATHCrossRefMathSciNetGoogle Scholar
  20. 20.
    Afandi, R., Zhang, J., Hafiz, M., Gunter, C.A.: AMPol: Adaptive Messaging Policy. In: 4th IEEE European Conference on Web Services (ECOWS 2006), Zurich, Switzerland. IEEE Conference Publishing Services, Los Alamitos (2006)Google Scholar
  21. 21.
    Karastoyanova, D., Buchmann, A.: Development life cycle of web service-based business processes. enabling dynamic invocation of web services at run time. In: Benatallah, B., Casati, F., Traverso, P. (eds.) ICSOC 2005. LNCS, vol. 3826, Springer, Hiedelberg (2005)Google Scholar
  22. 22.
    Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C., Loingtier, J.M., Irwin, J.: Aspect-oriented programming. In: Aksit, M., Matsuoka, S. (eds.) ECOOP 1997. LNCS, vol. 1241, pp. 220–242. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  23. 23.
    Hürsch, W., Lopes, C.V.: Separation of concerns. Technical Report NU-CCS-95-03, College of Computer Science, Northeastern University, Boston, Massachusetts (1995)Google Scholar
  24. 24.
    Yu, T., Lin, K.: Service selection algorithms for composing complex services with multiple qos constraints. In: Benatallah, B., Casati, F., Traverso, P. (eds.) ICSOC 2005. LNCS, vol. 3826, pp. 130–143. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  25. 25.
    Mukhi, N.K., Konuru, R., Curbera, F.: Cooperative middleware specialization for service oriented architectures. In: WWW 2004. IEEE Computer Society, Los Alamitos (2004)Google Scholar
  26. 26.
    Mukhi, N., Plebanni, P., Silva-Lepe, I., Mikalsen, T.: Supporting policy-driven behaviors in web services: Experiences and issues. In: ICSOC 2004. IEEE Computer Society, Los Alamitos (2004)Google Scholar
  27. 27.
    Baligand, F., Monfort, V.: A concrete solution for web services adaptability using policies and aspects. In: WISE 2003: Proceedings of the Fourth International Conference on Web Information Systems Engineering. IEEE Computer Society, Los Alamitos (2004)Google Scholar
  28. 28.
    Bosloper, I., Siljee, J., Nijhuis, J., Hammer, D.: Creating self-adaptive service systems with dysoa. In: ECOWS 2005, Proceedings of the 3rd European Conference on Web Services (2005)Google Scholar
  29. 29.
    Wohlstadter, E., Tai, S., Mikalsen, T., Rouvellou, I., Devanbu, P.: Glueqos: Middleware to sweeten quality-of-service policy interaction. In: ICSE 2004: Proceedings of the 26th International Conference on Software Engineering. IEEE Computer Society, Los Alamitos (2004)Google Scholar
  30. 30.
    Bobba, R., Fatemieh, O., Khan, F., Gunter, C.A., Khurana, H.: Using attribute-based access control to enable attribute-based messaging. In: ACSAC 2006, Miami Beach, FL, Applied Computer Security Associates (2006)Google Scholar
  31. 31.
    Lee, A.J., Boyer, J.P., Olson, L.E., Gunter, C.A.: Defeasible security policy composition for web services. In: Formal Methods in Software Engineering (FMSE 2006), Alexandria, VA. ACM, New York (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Raja Afandi
    • 1
  • Jianqing Zhang
    • 1
  • Carl A. Gunter
    • 1
  1. 1.University of Illinois Urbana-ChampaignUrbanaUSA

Personalised recommendations