The challenge of delivering services that are reliable, secure, and trustworthy in a timely and cost effective manner is a key to global competitiveness. To meet this challenge, Ser vice Science, Management, and Engineering (SSME) needs rigorous, mathematically-based underpinnings in support of conceptual and computational tools for modeling services in a composable fashion. Such tools should lead to rapid and accurate design, verification, validation, and deployment. As services, by their very nature, cross boundaries between a wide range of organizations and individuals, this develop ment must involve principles, methods, and tools from engi neering, information studies, management, law, etc.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Thomas Ball, Ella Bounimova, Byron Cook, Vladimir Levin, Jakob Lichtenberg, Con McGarvey, Bohus Ondrusek, Sriram K. Rajamani, and Abdullah Ustuner, Thorough static analysis of device drivers, Proceedings of the First EuroSys Conference, 2006, in press.
Thomas Ball and Sriram K. Rajamani, Automatically validating temporal safety properties of interfaces, SPIN 2001: Workshop on Model Checking of Software, Springer LNCS 2057, 2001, pp. 103-122.
N.G. Carr, The end of corporate computing, MIT Sloan Management Review 46 (2005), 66-73.
Jeffrey Dean and Sanjay Ghemawat, MapReduce: Simplified data processing on large clusters, 6th Symposium on Operating Systems Design and Implementation, 2005, pp. 137-150.
Tony Hoare, Jajadev Misra, and M. Shankar, The IFIP working conference on verified software: Theories, tools, experiments, IFIP Conference Report, 2005, available as http://vstte.ethz.ch/report.html.
Cliff Jones, Peter O’Hearn, and Jim Woodcock, Verified software: A grand challenge, IEEE Computer (2006), 93-95.
G. Polya, How to solve it, 2nd ed., Princeton University Press, 1957.
Gerald Popek and Robert Goldberg, Formal requirements for virtualizable third generation architectures, Communications of the ACM 17 (1974), 412-421.
M.E. Porter, Strategy and the internet, Harvard Business Review (March 2001), 1-19.
Roland T. Rust and Carol Miu, What academic research tells us about service, Communications of the ACM 49 (2006), 49-54.
M. M. Swift, B. N. Bershad, and H. M. Levy, Improving the reliability of commodity operating systems, SOSP 03: Symposium on Operating System Principles, 2003, pp. 207-222.
Kaijun Tan, Jason Crampton, and Carl A. Gunter, The consistency of task-based authorization constraints in workflow systems, Proceedings of 17th IEEE Computer Security Foundations Workshop, 2004, pp. 155-171.
J. Zhu, Z. Tian, T. Li, W. Sun, S. Ye, W. Ding, C. C. Wang, G. Wu, L. Weng, S. Huang, B. Liu, and D. Chou, Model-driven business process integration and management: A case study with the Bank SinoPac regional service platform, IBM Journal of Research and Development 48 (2004), 646-669.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Chin, SK., Royer, J.S., Wilkinson, A. (2008). SSME: How to Solve it. In: Hefley, B., Murphy, W. (eds) Service Science, Management and Engineering Education for the 21st Century. Service Science: Research and Innovations in the Service Economy. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-76578-5_41
Download citation
DOI: https://doi.org/10.1007/978-0-387-76578-5_41
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-76577-8
Online ISBN: 978-0-387-76578-5
eBook Packages: Business and EconomicsBusiness and Management (R0)