• Title/Summary/Keyword: SOA (Service-Oriented Architecture)

Search Result 169, Processing Time 0.024 seconds

Behavior-level Service Composition by Variable Abstraction

  • Kil, Hyun-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.9
    • /
    • pp.59-67
    • /
    • 2019
  • The service composition based on Service-Oriented Architecture(SOA) can make us view various machines or its functionalities in the Web or Internet-of-Things environment as 'service', and efficiently create new value-added services that users want by compositing different services if there is no service to satisfy the client. The service composition problem with respect to behavioral descriptions deals with the automatic synthesis of a coordinator service that controls a set of services to reach a goal state. Despite its importance, however, solving the service composition problem with only partial observations remains to be doubly exponential in the number of variables in service descriptions, rendering any attempts to compute an exact solution for modest size impractical. Toward this challenge, in this paper, we propose novel approximation-based approaches using abstraction methods. We empirically validate that our proposals can solve realistic problems efficiently.

ITU-T 응용서비스 보안 및 서비스 지향 구조(SOA) 국제표준화 동향

  • Lim, Hyung-Jin;Seo, Dae-Hee;Nah, Jae-Hoon
    • Review of KIISC
    • /
    • v.21 no.2
    • /
    • pp.53-60
    • /
    • 2011
  • 국제표준화기구 ITU-T에서는 연구그룹(Study Group)17이 정보통신 응용보안에 관한 표준화를 리드하는 연구그룹으로, 산하 4개의 연구과제(Question)를 구성하여 정보보호 국제표준을 개발하고 있다. 이 연구과제들 중 Q.7(의장, 나재훈, ETRI)에서는 안전한 응용 서비스라는 범주로 안전한 응용 프로토콜, 웹서비스 보안, P2P(Peer-to-Peer) 보안 등 정보통신환경의 응용서비스 보호에 적용될 수 있는 국제표준들의 개발을 담당하고 있다. Q.8(의장, Liang Wei, CATR)에서는 서비스 지향 구조라는 범주로 SOA(Service Oriented Architecture) 기술 및 통신 보안에 관련된 국제표준들의 개발을 담당하고있다. 현재 Q.7에서는 총 7건의 국제표준을 제정하였으며, 총 6건의 표준초안들이 개발중에 있다. Q.8의 경우는 현재 총3건의 표준초안들이 개발중에 있다. 본 논문에서는 해당 연구과제들의 표준화 현황과 향후 추진 방향을 제시한다.

A Study On SOA(Service-Oriented Architecture) based for XML Security (XML보안 환경에서 SOA에 관한 연구(硏究))

  • Shin, Seung-Jung;Choi, Jae-Ju;Kwack, Kae-Dal
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.1043-1046
    • /
    • 2008
  • 다양한 비즈니스 변화는 기업 내부 및 기업 간의 E-비즈니스, B2B와 M&A 분야에서 서비스 및 시스템 통합의 필요성이 요구 되었다. 구현 방법으로 분산 객체 기술을 사용 되었으나 공개 표준 부재로 시스템 통합을 어렵게 하였다. XML기반 기술의 발달은 웹 서비스 통합 측면에서 유연성을 제공하였으나 정보 보안에 대한 취약점을 가지고 있었다. 이를 해결하기 위한 방안으로 디지털 서명과 WS-Security 논함으로써 XML 보안 환경 하에서 서비스 통합에 구현 방법을 제시 하는데 목적이 있다.

A Message Monitoring Framework for Tracing Messages on JBI-based Enterprise Service Bus (JBI 기반 ESB 환경에서 효과적인 메시지 추적을 위한 메시지모니터링 프레임워크)

  • Choi, Jae-Hyun;Park, Jae-Won;Lee, Nam-Yong
    • Journal of Information Technology Services
    • /
    • v.9 no.2
    • /
    • pp.179-192
    • /
    • 2010
  • In order to resolve the problems of traditional Enterprise Application Integration (EAI) for system integration and to establish flexible enterprise IT environments, Enterprise Service Bus(ESB) which have distributed architecture and support Service Oriented Architecture(SOA) has introduced. Particularly, JBI which developed by the Java Community Process is most widely used to implement ESB for advantages of Java technology. In ESB based on JBI, reliable message delivery is very important to ensure stability of services and systems because it is a message driven architecture. But, it is difficult to verify messages and trace messages when system fault or service error occurred because JBI specification is not enough to address them. In this paper we has proposed the Message Monitoring Framework for JBI-based ESBs which for using in monitoring messages efficiently. It provides foundations for gathering and tracing message-related information about component installation, message exchange, service deploy by using proxy-based change tracking and delegation mechanism for data processing. The proxy which used in our solutions collects data about message automatically when it changed, and the delegation mechanism provides users flexibility for data processing. Also, we describe the performance evaluation results of our solution which is acceptable. We expect to it enables users to ensure reliability and stability of the JBI-based ESB by systematic monitoring and managing messages being used to interact among components.

A Design for Security Functional Requirements of IoT Middleware System (IoT(Internet of Things) 시스템 미들웨어 보안기능요구사항 설계)

  • Jung, Hyun Mi;Jeong, Kimoon;Cho, Han Jin
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.63-69
    • /
    • 2017
  • The middleware in the IoT system is software that acts as a messenger to connect and exchange data between humans and objects, objects and objects. IoT middleware exists in various forms in all areas, including hardware, protocol, and communication of different kinds, which are different in form and purpose. However, IoT middleware exists in various forms across different areas, including hardware, protocol, and communication of different types and purposes. Therefore, even if the system is designed differently for each role, it is necessary to strengthen the security in common. In this paper, we analyze the structure of IoT middleware using Service Oriented Architecture(SOA) approach and design system security requirements based on it. It was defined: Target Of Evaluation(TOE) existing system development method and the object is evaluated by Common Criteria(CC) for verification based otherwise. The proposed middleware system will be correlated with the security problem definition and the security purpose, which will be the basis for implementing the security enhanced IoT system.

Ontology-based Semantic Matchmaking for Service-oriented Mission Operation (서비스 지향 임무 수행을 위한 온톨로지 기반 시맨틱 매칭 방법)

  • Song, Seheon;Lee, SangIl;Park, JaeHyun
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.3
    • /
    • pp.238-245
    • /
    • 2016
  • There are technological, operational and environmental constraints at tactical edge, which are disconnected operation, intermittent connectivity, and limited bandwidth (DIL), size, weight and power (SWaP) limitations, ad-hoc and mobile network, and so on. To overcome these limitations and constraints, we use service-oriented architecture (SOA) based technologies. Moreover, the operation environment is highly dynamic: requirements change in response to the emerging situation, and the availability of resources needs to be updated constantly due to the factors such as technical failures. In order to use appropriate resources at the right time according to the mission, it needs to find the best resources. In this context, we identify ontology-based mission service model including mission, task, service, and resource, and develop capability-based matching in tactical edge environment. The goal of this paper is to propose a capability-based semantic matching for dynamic resource allocation. The contributions of this paper are i) military domain ontologies ii) semantic matching using ontology relationship; and (iii) the capability-based matching for the mission service model.

A Study for u-Healthcare Networking Technology Framework Approach Based on Secure Oriented Architecture(SOA) (Secure Oriented Architecture(SOA)에 기반한 u-Healthcare 네트워크 보안기술 프레임워크 모델)

  • Kim, Jeom Goo;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.101-108
    • /
    • 2013
  • Sensor network configurations are for a specific situation or environment sensors capable of sensing, processing the collected information processors, and as a device is transmitting or receiving data. It is presently serious that sensor networks provide many benefits, but can not solve the wireless network security vulnerabilities, the risk of exposure to a variety of state information. u-Healthcare sensor networks, the smaller the sensor node power consumption, and computing power, memory, etc. restrictions imposing, wireless sensing through the kind of features that deliver value, so it ispossible that eavesdropping, denial of service, attack, routing path. In this paper, with a focus on sensing of the environment u-Healthcare system wireless security vulnerabilities factors u-Healthcare security framework to diagnose and design methods are presented. Sensor network technologies take measures for security vulnerabilities, but without the development of technology, if technology is not being utilized properly it will be an element of threat. Studies suggest that the u-Healthcare System in a variety of security risks measures user protection in the field of health information will be used as an important guide.

Mobile Office Construction on a Geotechnical Information System (지반정보시스템 기반의 Mobile Office 구축)

  • Kim, Su-Young;Jung, Seung-Hyun;Kang, Yu-Jin;Cho, Wan-Sup
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.5
    • /
    • pp.125-135
    • /
    • 2010
  • Mobile office is becoming common as advances in mobile devices such as PDAs, Smart-phones, or wireless Internet. In this paper, we construct a mobile office environment on a geotechnical information system(GIS). Especially, web services and XML technology combined with SOA (service oriented services) are adopted for various types of mobile devices and services in a minimum cost. Web service and XML can provide an excellent SW reusability, extensibility, and interoperability even for heterogeneous distributed systems. Applications can exploit web services by just knowing server's address. Prototype system integrates a client in Visual Basic.Net and server in Java via the web services and XML data exchange. We verify effectiveness of the approach through the implementation of prototype system.

Service-Dependability-Case based Self-Adaptation in Service-Oriented Environment (서비스 지향 컴퓨팅 환경에서 서비스 안정성 케이스 기반 자가 적응 방법)

  • Jung, Changhee;Lee, Seok-Won
    • Journal of KIISE
    • /
    • v.42 no.11
    • /
    • pp.1339-1348
    • /
    • 2015
  • In a distributed system environment based on a service-oriented architecture, separate systems collaborate to achieve the goals of the entire system by using services provided other systems. A service quality violation from using one service can cause runtime system failure in the environment. The existing self-adaptation methods follow fault tolerance mechanism that responds to a failure after a service quality violation. In other words, these methods are limited to responsive action. Therefore, a service-dependability-case based self-adaptation mechanism is necessary to preserve the dependability of the self-adaptive system. This paper demonstrates that the service-dependability-case based self-adaptation mechanism is better than QoS(quality of service)-based self-adaptation with fault tolerance to preserve the dependability of the self-adaptive system. Additionally, this paper suggests a method to present and analyze service dependability by using GSN(Goal Structuring Notation) which is the existing modeling method for the presentation of assurance cases, an action mechanism adapted using an analysis result of service-dependability-cases, a methods of leveraging the service-dependability-case based self-adaptation mechanism by following the service's life cycle, and the framework architecture including the major components and the interactions between the components in the control loop of the self-adaptation process.

Design and Implementation of Service Broker for Call-Taxi Web Services (콜택시 웹 서비스를 위한 서비스 중개자 설계 및 구현)

  • Lee Choon oh;Jang Woo hyuk;Han Dong-soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11b
    • /
    • pp.358-360
    • /
    • 2005
  • 서비스 지향 구조 (Service-Oriented Architecture)는 독립적으로 구성된 렙 서비스(Web Services)들을 프로세스 중심적으로 연결시키기에 적합한 소프트웨어 시스템 구성 방식이다. 하지만 SOA의 규모가 커질수록 제공되는 서비스들의 숫자 또한 증가하게 될 것이며 그런 상황에서 사용자가 원하는 서비스를 직접 찾아 이용하는 것은 불가능하다. UDDI는 사용자에게 기술적인 정보만을 제공하기 때문에 이러한 문제를 적절하게 해결할 수 없다. 그에 비해 서비스 통합(Service Integration)은 서비스들이상호 동작하여 사용자에게 통합된 서비스를 제공할 수 있기 때문에 UDDI의 한계를 극복할 수 있다. 하지만 서비스 통합의 장점과 영향들은 아직 분명하게 규명하지 못하였다. 이 논문에서는 서비스 통합의 한 형태인 서비스 중개자(Service Broker)클 구현하고 평가하였다. 구현된 중개자의 비지니스 모델은 콜 택시 서비스이며, 콜택시 서비스 중개자는 접근성, 확장성, 재사용성, 유연성, 안정성 등에서 향상된 기능들을 제공하였다.

  • PDF