SSME: How to Solve it
The challenge of delivering services that are reliable, secure, and trustworthy in a timely and cost effective manner is a key to global competitiveness. To meet this challenge, Ser vice Science, Management, and Engineering (SSME) needs rigorous, mathematically-based underpinnings in support of conceptual and computational tools for modeling services in a composable fashion. Such tools should lead to rapid and accurate design, verification, validation, and deployment. As services, by their very nature, cross boundaries between a wide range of organizations and individuals, this develop ment must involve principles, methods, and tools from engi neering, information studies, management, law, etc.
KeywordsBusiness Process Safety Property Cross Boundary MapReduce Programming Model Program Composition
Unable to display preview. Download preview PDF.
- Thomas Ball, Ella Bounimova, Byron Cook, Vladimir Levin, Jakob Lichtenberg, Con McGarvey, Bohus Ondrusek, Sriram K. Rajamani, and Abdullah Ustuner, Thorough static analysis of device drivers, Proceedings of the First EuroSys Conference, 2006, in press.Google Scholar
- Thomas Ball and Sriram K. Rajamani, Automatically validating temporal safety properties of interfaces, SPIN 2001: Workshop on Model Checking of Software, Springer LNCS 2057, 2001, pp. 103-122.Google Scholar
- N.G. Carr, The end of corporate computing, MIT Sloan Management Review 46 (2005), 66-73.Google Scholar
- Jeffrey Dean and Sanjay Ghemawat, MapReduce: Simplified data processing on large clusters, 6th Symposium on Operating Systems Design and Implementation, 2005, pp. 137-150.Google Scholar
- Tony Hoare, Jajadev Misra, and M. Shankar, The IFIP working conference on verified software: Theories, tools, experiments, IFIP Conference Report, 2005, available as http://vstte.ethz.ch/report.html.
- Cliff Jones, Peter O’Hearn, and Jim Woodcock, Verified software: A grand challenge, IEEE Computer (2006), 93-95.Google Scholar
- G. Polya, How to solve it, 2nd ed., Princeton University Press, 1957.Google Scholar
- M.E. Porter, Strategy and the internet, Harvard Business Review (March 2001), 1-19.Google Scholar
- M. M. Swift, B. N. Bershad, and H. M. Levy, Improving the reliability of commodity operating systems, SOSP 03: Symposium on Operating System Principles, 2003, pp. 207-222.Google Scholar
- Kaijun Tan, Jason Crampton, and Carl A. Gunter, The consistency of task-based authorization constraints in workflow systems, Proceedings of 17th IEEE Computer Security Foundations Workshop, 2004, pp. 155-171.Google Scholar
- J. Zhu, Z. Tian, T. Li, W. Sun, S. Ye, W. Ding, C. C. Wang, G. Wu, L. Weng, S. Huang, B. Liu, and D. Chou, Model-driven business process integration and management: A case study with the Bank SinoPac regional service platform, IBM Journal of Research and Development 48 (2004), 646-669.CrossRefGoogle Scholar