SSME: How to Solve it

  • Shiu-Kai Chin
  • James S. Royer
  • Alex Wilkinson
Part of the Service Science: Research and Innovations in the Service Economy book series (SSRI)

The challenge of delivering services that are reliable, secure, and trustworthy in a timely and cost effective manner is a key to global competitiveness. To meet this challenge, Ser vice Science, Management, and Engineering (SSME) needs rigorous, mathematically-based underpinnings in support of conceptual and computational tools for modeling services in a composable fashion. Such tools should lead to rapid and accurate design, verification, validation, and deployment. As services, by their very nature, cross boundaries between a wide range of organizations and individuals, this develop ment must involve principles, methods, and tools from engi neering, information studies, management, law, etc.


Business Process Safety Property Cross Boundary MapReduce Programming Model Program Composition 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Thomas Ball, Ella Bounimova, Byron Cook, Vladimir Levin, Jakob Lichtenberg, Con McGarvey, Bohus Ondrusek, Sriram K. Rajamani, and Abdullah Ustuner, Thorough static analysis of device drivers, Proceedings of the First EuroSys Conference, 2006, in press.Google Scholar
  2. [2]
    Thomas Ball and Sriram K. Rajamani, Automatically validating temporal safety properties of interfaces, SPIN 2001: Workshop on Model Checking of Software, Springer LNCS 2057, 2001, pp. 103-122.Google Scholar
  3. [3]
    N.G. Carr, The end of corporate computing, MIT Sloan Management Review 46 (2005), 66-73.Google Scholar
  4. [4]
    Jeffrey Dean and Sanjay Ghemawat, MapReduce: Simplified data processing on large clusters, 6th Symposium on Operating Systems Design and Implementation, 2005, pp. 137-150.Google Scholar
  5. [5]
    Tony Hoare, Jajadev Misra, and M. Shankar, The IFIP working conference on verified software: Theories, tools, experiments, IFIP Conference Report, 2005, available as
  6. [6]
    Cliff Jones, Peter O’Hearn, and Jim Woodcock, Verified software: A grand challenge, IEEE Computer (2006), 93-95.Google Scholar
  7. [7]
    G. Polya, How to solve it, 2nd ed., Princeton University Press, 1957.Google Scholar
  8. [8]
    Gerald Popek and Robert Goldberg, Formal requirements for virtualizable third generation architectures, Communications of the ACM 17 (1974), 412-421.CrossRefGoogle Scholar
  9. [9]
    M.E. Porter, Strategy and the internet, Harvard Business Review (March 2001), 1-19.Google Scholar
  10. [10]
    Roland T. Rust and Carol Miu, What academic research tells us about service, Communications of the ACM 49 (2006), 49-54.CrossRefGoogle Scholar
  11. [11]
    M. M. Swift, B. N. Bershad, and H. M. Levy, Improving the reliability of commodity operating systems, SOSP 03: Symposium on Operating System Principles, 2003, pp. 207-222.Google Scholar
  12. [12]
    Kaijun Tan, Jason Crampton, and Carl A. Gunter, The consistency of task-based authorization constraints in workflow systems, Proceedings of 17th IEEE Computer Security Foundations Workshop, 2004, pp. 155-171.Google Scholar
  13. [13]
    J. Zhu, Z. Tian, T. Li, W. Sun, S. Ye, W. Ding, C. C. Wang, G. Wu, L. Weng, S. Huang, B. Liu, and D. Chou, Model-driven business process integration and management: A case study with the Bank SinoPac regional service platform, IBM Journal of Research and Development 48 (2004), 646-669.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2008

Authors and Affiliations

  • Shiu-Kai Chin
    • 1
  • James S. Royer
    • 1
  • Alex Wilkinson
    • 2
  1. 1.L.C. Smith College of Engineering & Computer ScienceSyracuse UniversitySyracuse
  2. 2.School of Information StudiesSyracuse UniversitySyracuse

Personalised recommendations