Summer SOC July 2 nd – July 7 th Aniketos platform: Design of a trustworthy composite service 1.

Slides:



Advertisements
Similar presentations
Web 2.0 Programming 1 © Tongji University, Computer Science and Technology. Web Web Programming Technology 2012.
Advertisements

Art Foundations Exam 1.What are the Elements of Art? List & write a COMPLETE definition; you may supplement your written definition with Illustrations.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Andrea Maurino Web Service Design Methodology Batini, De Paoli, Maurino, Grega, Comerio WP2-WP3 Roma 24/11/2005.
Nick Feamster CS 6262 Spring 2009
1DAML PI meeting, October DAML and Agents DAML and Agents Breakout Session DAML PI Meeting 17 October 2002 Tim Finin.
17 Copyright © 2005, Oracle. All rights reserved. Deploying Applications by Using Java Web Start.
Designing Services for Grid-based Knowledge Discovery A. Congiusta, A. Pugliese, Domenico Talia, P. Trunfio DEIS University of Calabria ITALY
PubMed Limits Here is the Limits page. Searches can be limited by restricting terms to fields or setting specific date or record tagging parameters.
List and Search Grants Chapter 2. List and Search Grants 2-2 Objectives Understand the option My Grants List Grant Screen Viewing a Grant Understand the.
Coordinate Plane Practice The following presentation provides practice in two skillsThe following presentation provides practice in two skills –Graphing.
0 - 0.
ALGEBRAIC EXPRESSIONS
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
MULTIPLYING MONOMIALS TIMES POLYNOMIALS (DISTRIBUTIVE PROPERTY)
ADDING INTEGERS 1. POS. + POS. = POS. 2. NEG. + NEG. = NEG. 3. POS. + NEG. OR NEG. + POS. SUBTRACT TAKE SIGN OF BIGGER ABSOLUTE VALUE.
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
Weather and Climate Year 9 End of topic review.
1 Access Control. 2 Objects and Subjects A multi-user distributed computer system offers access to objects such as resources (memory, printers), data.
Copyright 2006 Digital Enterprise Research Institute. All rights reserved. MarcOnt Initiative Tools for collaborative ontology development.
Excel Functions. Part 1. Introduction 2 An Excel function is a formula or a procedure that is performed in the Visual Basic environment, outside the.
4. Internet Programming ENG224 INFORMATION TECHNOLOGY – Part I
Configuration management
Text 1 July, 2010 DCMS: Training Manual Campaign Management.
Policy based Cloud Services on a VCL platform Karuna P Joshi, Yelena Yesha, Tim Finin, Anupam Joshi University of Maryland, Baltimore County.
1 Web-Enabled Decision Support Systems Access Introduction: Touring Access Prof. Name Position (123) University Name.
August 2012 This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit
O X Click on Number next to person for a question.
© S Haughton more than 3?
Delegated Admin Tool Add User Training Module. Honeywell Proprietary Honeywell.com  2 Document control number Accessing Delegated Admin Tool To access.
Delegated Admin Tool Edit User Profile Training Module.
1 Directed Depth First Search Adjacency Lists A: F G B: A H C: A D D: C F E: C D G F: E: G: : H: B: I: H: F A B C G D E H I.
CREATING A PAYMENT REQUEST FOR VENDOR IN SYSTEM
Take from Ten First Subtraction Strategy -9 Click on a number below to go directly to that type of subtraction problems
Linking Verb? Action Verb or. Question 1 Define the term: action verb.
Getting Started with D2A
Lecture plan Outline of DB design process Entity-relationship model
Past Tense Probe. Past Tense Probe Past Tense Probe – Practice 1.
Combine Like Terms. Simplify the Given Expression Below:
Executional Architecture
Properties of Exponents
The General Ontology Evaluation Framework (GOEF) & the I-Choose Use Case A Proposed Infrastructure for the Ontology Development Lifecycle Joanne S. Luciano,
Essentials for Design JavaScript Level One Michael Brooks
IAEA Training in Emergency Preparedness and Response Development of Simulation Exercise Work Session (Drill) Module WS-012.
Macromedia Dreamweaver MX 2004 – Design Professional Dreamweaver GETTING STARTED WITH.
16/11/ IRS-II: A Framework and Infrastructure for Semantic Web Services Motta, Domingue, Cabral, Gaspari Presenter: Emilia Cimpian.
Aniketos project demonstration Secure and Trustworthy Composite Services H3G – Dec 21 st, 2012.
Aniketos project presentation Secure and Trustworthy Composite Services Wind – July 13 th,2012.
Addition 1’s to 20.
25 seconds left…...
Test B, 100 Subtraction Facts
11 = This is the fact family. You say: 8+3=11 and 3+8=11
Week 1.
Vanderbilt Business Objects Users Group 1 Linking Data from Multiple Sources.
To the Assignments – Work in Progress Online Training Course
We will resume in: 25 Minutes.
Solving Addition and Subtraction Inequalities
1 Unit 1 Kinematics Chapter 1 Day
FIND THE AREA ( ROUND TO THE NEAREST TENTHS) 2.7 in 15 in in.
O X Click on Number next to person for a question.
TASK: Skill Development A proportional relationship is a set of equivalent ratios. Equivalent ratios have equal values using different numbers. Creating.
1 Web Services Based partially on Sun Java Tutorial at Also, XML, Java and the Future of The Web, Jon Bosak. And WSDL.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 31 Slide 1 Service-centric Software Engineering 1.
1/16 Steven Leung Introduction to HTML/CGI/JavaScript Intro to HTML/CGI/JavaScript How the Web Works HTML: Basic Concept CGI: Basic Concept JavaScript:
The PLASTIC Model to HUTN transformation tool UDA.
User Interface. The Protocol Interface The service we have tested is a clock: the control point sends a request to the device (demo device in this case)
Ontology-derived Activity Components for Composing Travel Web Services Matthias Flügge Diana Tourtchaninova
Web service.
Presentation transcript:

Summer SOC July 2 nd – July 7 th Aniketos platform: Design of a trustworthy composite service 1

Summer SOC 2012 A service provider wants to offer a service that takes in input the geographical position of a user and shows in a webpage a set of information: A map showing the position Weather information Point of interests in the surroundings The service provider wants the service to be trustworthy, so he asks the service designer to exploit the tools made available through the Aniketos platform 2 Reference scenario for the demo

Summer SOC 2012 The trustworthiness value is evaluated by the Trustworthiness Prediction module and is a combination of: Cognitive trust of the user, based on the service and service provider reputation. Non-cognitive trust, based on objective and measurable properties of the service such as QoS attributes (reliability, performance, availability) 3 About trustworthiness in Aniketos…

Summer SOC Service Composition Framework (SCF) The SCF is a design time module available in the Aniketos environment allowing a service designer to build executable composition plans To use the framework the service designer must be authenticated

Summer SOC SCF: get started with BPMN modelling Once authenticated, the service designer can start the BPMN modelling

Summer SOC BPMN model of InfoService From the description of the service in terms of functionality, the service designer decides to use different atomic services and compose them according to the BPMN drafted in the SCF editor

Summer SOC 2012 The service designer is in charge of designing a composite service with a specific requirement on trusthworthiness value The trustworthiness requirement is expressed as a consumer policy written in ConSpec grammar The file location is included in an extensionElements tag in the xml representing the BPMN 7 BMPN annotated with trustworthiness requirement

Summer SOC 2012 An excerpt of the resulting xml for the annotated BPMN is shown below: 8 Annotated BPMN

Summer SOC 2012 To make the composition plans the SCF has to bind real web services to the service tasks in the BPMN The binding process entails: Service discovery using the ServiceType as search filter The SCF shows the operations offered by the web services matching the request based on the ServiceType Selection of the specific operation the service designer wants to use in order to compose the InfoService If the same operation is offered by different atomic services the service designer will see just one operation 9 Service discovery and selection of the service operation

Summer SOC Discovery and selection: GeoCoding example (1/2)

Summer SOC 2012 and selects getCoordinates ( ) 11 Discovery and selection: GeoCoding example (2/2) The service designer discovers operations offered by GeoCoding type services ( ) 1 2 The service designer isn’t aware of how many web services offer that operation, it’s the SCF which will bind the different services to the service task when making composition plans

Summer SOC 2012 Creation of composition plans 12 Once the service designer has selected an operation for each service task the SCF is ready to create the composition plans When the service designer clicks on “Create composition plans” button, the SCF shows a set of functionally valid composition plans

Summer SOC 2012 The SCF has created 12 composition plans: this is explained by the number of web services offering the same operation: Geocoding type: bound to 2 web services PointOfInterest type: bound to 3 web services WeatherForecast type: bound to 1 web services Map type: bound to 2 web services WebPageInfoCollector type: bound to 1 web services Thus the number of composition plans is 2 X 3 X 1 X 2 X 1 = Composition plans created by the SCF

Summer SOC 2012 The composition plans ensure functionality but do not consider the trustworthiness requirement The composition plans have to be checked against the requirements specified for the trustworthiness value This check is performed by the Secure Composition Planner Module which receives the composition plans from the SCF and returns those ones that fulfill the trustworthiness requirement 14 Selection of trustworthy composition plans

Summer SOC 2012 The SCPM invokes the Trustworthiness prediction module to evaluate the trustworthiness value for the set of composition plans received from the SCF The trustworthiness value of the composite service is evaluated using the weakest link principle The Trustworthiness module evaluates the trustworthiness value for each service taking part in the composition The lowest value is returned as the trustworthiness value of the composite service 15 Trustworthiness prediction for composite services

Summer SOC 2012 When the service designer clicks on “Verify All” button the SCPM selects the composition plans that fulfils the trustworthiness requirement 16 Trustworthy composite services In order to visualize the Trustworthiness value of the composition plans the service designer selects “Order By” Trustworthiness and clicks on “Order/Rank” button

Summer SOC Last steps: upload and deploy The service designer selects one of the trustworthy composition plans and can Upload the BPMN to an Activiti Engine Deploy it to a web application server

Summer SOC