Service-oriented architecture (SOA) and its

Similar documents
INTERNATIONAL CONFERENCE ON ENGINEERING DESIGN ICED 03 STOCKHOLM, AUGUST 19-21, 2003

AGENTS AND AGREEMENT TECHNOLOGIES: THE NEXT GENERATION OF DISTRIBUTED SYSTEMS

Bridging the Gap between the User s Digital and Physical Worlds with Compelling Real Life Social Applications

BI TRENDS FOR Data De-silofication: The Secret to Success in the Analytics Economy

Design for value DfV

CPE/CSC 580: Intelligent Agents

Globalizing Modeling Languages

Games. Episode 6 Part III: Dynamics. Baochun Li Professor Department of Electrical and Computer Engineering University of Toronto

Liquid Benchmarks. Sherif Sakr 1 and Fabio Casati September and

DESIGNING CHAT AND VOICE BOTS

Semantic Privacy Policies for Service Description and Discovery in Service-Oriented Architecture

Context-Aware Interaction in a Mobile Environment

The Study on the Architecture of Public knowledge Service Platform Based on Collaborative Innovation

Architectural Mismatch: Why Reuse Is Still So Hard

Structural Analysis of Agent Oriented Methodologies

Strategic Plan for CREE Oslo Centre for Research on Environmentally friendly Energy

SDN Architecture 1.0 Overview. November, 2014

Is People-Structure-Tasks-Technology Matrix Outdated?

Methodology for Agent-Oriented Software

the role of mobile computing in daily life

Compendium Overview. By John Hagel and John Seely Brown

Towards a Global Partial Operational Picture Based on Qualitative Spatial Reasoning

WG/STAIR. Knut Blind, STAIR Chairman

A Research and Innovation Agenda for a global Europe: Priorities and Opportunities for the 9 th Framework Programme

Are your company and board ready for digital transformation?

UNIT-III LIFE-CYCLE PHASES

GROUP OF SENIOR OFFICIALS ON GLOBAL RESEARCH INFRASTRUCTURES

Interoperable systems that are trusted and secure

Pan-Canadian Trust Framework Overview

HARNESSING TECHNOLOGY

WORKSHOP ON BASIC RESEARCH: POLICY RELEVANT DEFINITIONS AND MEASUREMENT ISSUES PAPER. Holmenkollen Park Hotel, Oslo, Norway October 2001

Patterns and their impact on system concerns

Report to Congress regarding the Terrorism Information Awareness Program

PhD Student Mentoring Committee Department of Electrical and Computer Engineering Rutgers, The State University of New Jersey

Beyond the switch: explicit and implicit interaction with light Aliakseyeu, D.; Meerbeek, B.W.; Mason, J.; Lucero, A.; Ozcelebi, T.; Pihlajaniemi, H.

COUNCIL OF THE EUROPEAN UNION. Brussels, 9 December 2008 (16.12) (OR. fr) 16767/08 RECH 410 COMPET 550

COMMISSION RECOMMENDATION. of on access to and preservation of scientific information. {SWD(2012) 221 final} {SWD(2012) 222 final}

IS STANDARDIZATION FOR AUTONOMOUS CARS AROUND THE CORNER? By Shervin Pishevar

InSciTe Adaptive: Intelligent Technology Analysis Service Considering User Intention

How to Keep a Reference Ontology Relevant to the Industry: a Case Study from the Smart Home

Advances and Perspectives in Health Information Standards

PROJECT FINAL REPORT

Durham Research Online

ULS Systems Research Roadmap

Failures: Their definition, modelling & analysis

Foundations Required for Novel Compute (FRANC) BAA Frequently Asked Questions (FAQ) Updated: October 24, 2017

CONSENT IN THE TIME OF BIG DATA. Richard Austin February 1, 2017

ECON 312: Games and Strategy 1. Industrial Organization Games and Strategy

Innovation & Globalization: Yin and Yang. Symphony Services Breakout Session May 9, 11:00 a.m. Room 210

Imagine that partner has opened 1 spade and the opponent bids 2 clubs. What if you hold a hand like this one: K7 542 J62 AJ1063.

GOALS TO ASPECTS: DISCOVERING ASPECTS ORIENTED REQUIREMENTS

Technology and Competitiveness in Vietnam

NASA s Strategy for Enabling the Discovery, Access, and Use of Earth Science Data

Information Systems Frontiers CALL FOR PAPERS. Special Issue on: Digital transformation for a sustainable society in the 21st century

Agreement Technologies Action IC0801

Getting the evidence: Using research in policy making

An Ontology for Modelling Security: The Tropos Approach

Relation-Based Groupware For Heterogeneous Design Teams

Mixed-Initiative Aspects in an Agent-Based System

Summary of the Report by Study Group for Higher Quality of Life through Utilization of IoT and Other Digital Tools Introduced into Lifestyle Products

ULS Systems Research Roadmap

Adopting Standards For a Changing Health Environment

SMART MANUFACTURING: A Competitive Necessity. SMART MANUFACTURING INDUSTRY REPORT Vol 1 No 1.

Designing for recovery New challenges for large-scale, complex IT systems

Robotic automation goes mainstream: Accenture announces agreement with IPsoft

EHR Optimization: Why Is Meaningful Use So Difficult?

Science Impact Enhancing the Use of USGS Science

Burgundy : Towards a RIS3

Initial communication and dissemination plan. Elias Alevizos, Alexander Artikis, George Giannakopoulos. Scalable Data Analytics Scalable Algorithms,

UNIVERSITIES AND TECHNOLOGY TRANSFER PATENT ATTORNEYS TRADE MARK ATTORNEYS

The Technology Economics of the Mainframe, Part 3: New Metrics and Insights for a Mobile World

APPROXIMATE KNOWLEDGE OF MANY AGENTS AND DISCOVERY SYSTEMS

ACCENTURE INDONESIA HELPS REALIZE YOUR

The skilled collaborators - the winners in a digitized maritime sector

Trenton Public Schools. Fourth Grade Technological Literacy 2013

Frequently Asked Questions

Media Literacy Expert Group Draft 2006

A Journal for Human and Machine

Towards Digital Ecosystems

DIGITAL TRANSFORMATION IN GOVERNMENT

Digital Transformation Delivering Business Outcomes

Bridging law and technology

How can boards tackle the Essential Eight and other emerging technologies?

A Unified Model for Physical and Social Environments

UDIS Programme of Inquiry

ENHANCED HUMAN-AGENT INTERACTION: AUGMENTING INTERACTION MODELS WITH EMBODIED AGENTS BY SERAFIN BENTO. MASTER OF SCIENCE in INFORMATION SYSTEMS

Victor O. Matthews (Ph.D)

Digital Transformation Delivering Business Outcomes

The Space Economy and Space Innovation in 2016

Engaging UK Climate Service Providers a series of workshops in November 2014

WEB-BASED QUALITY CONTROL OF PRECAST CONCRETE

Towards a multi-view point safety contract Alejandra Ruiz 1, Tim Kelly 2, Huascar Espinoza 1

Catholijn M. Jonker and Jan Treur Vrije Universiteit Amsterdam, Department of Artificial Intelligence, Amsterdam, The Netherlands

Brief to the. Senate Standing Committee on Social Affairs, Science and Technology. Dr. Eliot A. Phillipson President and CEO

An Integrated Modeling and Simulation Methodology for Intelligent Systems Design and Testing

A Reconfigurable Citizen Observatory Platform for the Brussels Capital Region. by Jesse Zaman

Julie L. Marble, Ph.D. Douglas A. Few David J. Bruemmer. August 24-26, 2005

Digital Transformation Delivering Business Outcomes

Resource Review. In press 2018, the Journal of the Medical Library Association

The 2018 Publishing Landscape: Technological Horizons. Lyndsey Dixon Editorial Director, APAC Journals Taylor & Francis Group

Transcription:

Why Services eed Social etworks Zakaria Maamar Zayed University, Dubai Hakim Hacid Alcatel-Lucent Bell Labs, Paris Michael. Huhns University of South Carolina Service-oriented architecture (SOA) and its flagship implementation technology known as s have changed the way software engineers design and develop today s enterprise applications. s help organizations maintain an operative presence on the Internet. Acting as building blocks that can provide and transform data, s connect together to create new on-demand value-added composite s. Although SOA practitioners advocate regularly for its benefits, SOA s current state doesn t really sustain these benefits: current SOA applications are designed primarily for closed environments, are static at runtime, and rely mainly on formal features and methods. The use of social networks of s can remove these limitations. Services Fall Short of Their Potential The current state of SOA has limited the widespread use of s (or s complying with SOA principles in general) because several important issues remain unresolved, including where to advertise s for better and immediate exposure, how to discover s with respect to user needs, how to trust s when they re found, and how to smoothly replace s when they fail. These issues have made s fall short of their potential because s know only about themselves, not about their users or peers; limit users intervention considerably and operate as black boxes; consider only their own internal functional and nonfunctional details during execution and ignore other external details, such as past user interactions; can t delegate their invocations; don t instantaneously and voluntarily cooperate with each other or self-organize; and can t reconcile ontologies among each other or with their users. As pointed out in other work, 2 current incarnations of s are impractical and almost unusable, except in carefully controlled corporate environments. The problem is in the semantics used to characterize s: the semantics in WSDL descriptions, or in proposed extensions to WSDL, are inadequate for automated discovery. It was suggested 2 that a user community might be able to provide semantic descriptions via a Wikipedia-like effort. However, for appropriate and useful s to be discovered and engaged, sufficiently precise semantics for describing s must be combined with sufficiently intelligent software for understanding the semantic descriptions. Moreover, better descriptive semantics improves only the discovery part of the practical problem, not the runtime execution part. Fortunately, behavioral semantics are available in how s are used and combined, and how they behave and interact. This is the social aspect of s. Just as marshaling a social community of users could result in improved semantic descriptions of s, a similar marshaling of the runtime behaviors of socially enhanced s can be exploited to meet runtime execution objectives. The following example illustrates how s are used with no reference to social elements. To find the definition of a word in English, translate it into French, and then email it, Alice creates a mashup consisting of Dictionary, Translator, and PostTwitter s. To find the weather forecast, translate it 90 Published by the IEEE Computer Society 089-780//$26.00 20 IEEE IEEE ITERET COMPUTIG IC-5-02-Peering.indd 90

Why Services eed Social etworks into French from English, and post it on her Twitter profile, Alice creates another mashup using Weather, Translator, and PostTwitter s. Here, Alice is using Translator for the second time without questioning how it behaved/operated in the presence of Translator when it was used for the first time. Indeed, she connected Translator and PostTwitter again without paying attention to the outcome of the first connection was it successful or not? This detail isn t reported anywhere unless Alice decides to keep track of everything that she did, which is neither appropriate nor doable. Could Translator step in smoothly during the mashup development to advise Alice not to use PostTwitter, for example? Another user, Bob, wants to create a mashup that finds the weather description for his city so that he can post it on his blog. He uses the following s: MyLocation, Weather, Translator, BlogPost, tinyurl, and either PostTwitter or Email. Suppose Carol also wants to create a new mashup based on a weather forecast. Could she benefit from any of Bob s mashups? Traditionally, the answer has been no. Successful invocations and compositions aren t saved for later use, nor are unsuccessful ones. Services are treated as isolated components despite their previous interactions with other peers when complex s are built. Capturing interactions using, for example, social networks could be beneficial for software engineers who can capitalize on the known successful interactions as needs arise. The first interaction concerns the selection that led into identifying, in this case, Weather over another peer such as WeatherForecast. Both s are in competition because they do the same job, which is to provide weather information. The second interaction concerns the execution dependencies between s that can become recurrent over time. Translator and PostTwitter have participated in several joint compositions. Finally, the third interaction concerns reliability. When PostTwitter fails, Email takes over automatically. If social networks could capture all these interactions, a (SOA- compliant) would recommend the peers with whom it would like to collaborate in case of compositions, such as Weather and Translator; recommend the peers that can substitute for it in case of failure, such as PostTwitter and Email; and be aware of the peers that compete against it in case of selection, such as Translator and TranslatorWS. Collaboration, substitution, and competition are some of the links that can connect s together. To make full use of these links, we describe in another work some steps that software engineers can adopt when building s social networks: 3 identify these networks components, analyze s similarities and differences to identify in which networks these s can sign up, manage these networks growth, navigate through these networks to collect necessary details, and maintain these networks in case of changes in s. The Value of Adding Social etworks to Services When enterprises discover and engage s for business needs, they re included in compositions based on both the functionality they offer and the quality of (QoS) they can guarantee, which implies the need for contracts. However, when consumers engage and compose s, it s much more informal and dynamic, much like how people download iphone apps. But unlike iphone apps, which are monolithic and operate independently of each other, s are intended to be composed, and their functionality and QoS are interdependent with other s. Moreover, they execute remotely and with some degree of autonomy. Their discovery and subsequent engagement thus become social activities, much like the collaboration and competition supported in social networks. Social networks exemplify the tremendous popularity of 2.0 applications, which help users become proactive; colloquially, we can refer to users now as prosumers, providers and consumers at the same time. 4 Prosumers post definitions on wikis, establish groups of interest, and share tips and advice. These various operations illustrate the principles of I offer s that somebody else might need and I require s that somebody else might offer upon which SOA is built. Service offerings and requests demonstrate perfectly how people behave in today s society, imposing a social dimension on how s must be handled in terms of description, discovery, binding, and composition. What if this social dimension is the missing link? It could serve as an additional ingredient to the formal methods that support SOA needs, namely, description, discovery, binding, and composition. Weaving social elements into operation means new social s (SWSs) that will establish and maintain networks of contacts; put users either explicitly or implicitly in the heart of their life cycle, enabling additional functionalities through collaboration; rely on privileged contacts when needed; MARCH/APRIL 20 9 IC-5-02-Peering.indd 9

WSBPEL composer Invoke... Appropriate when is proprietary or pay-per-use and data exchange modest App form with other peers strong and long-lasting collaborative groups; and know with whom to partner to minimalize ontology reconciliation. We see SWSs as the result of blending social computing with oriented computing. On one hand, social computing is the computational facilitation of social studies and human social dynamics as well as the design and use of information and communication technologies that consider social context. 5 Social computing is also about collective actions, content sharing, and information dissemination in general. On the other hand, -oriented computing builds applications on the principles of offer and request, loose coupling, and crossorganization flow. 6 Blending social computing with -oriented computing leads to SWSs that know with whom they ve worked in the past and with whom they would potentially like to work in the future. These two timestamped elements constitute the memory of actions that SWSs can accumulate over time and apply in the future. In addition, they show the collective... Download Smartphone App Appropriate when computation minimal and apps minimally dependent.... Invoke WSBPEL composer Cloud execution appropriate when computation and data exchange demanding Figure. Architectures for composition and execution. Different execution configurations are suggested depending on the nature of components (s or app) involved and users nonfunctional requirements. action of a group of SWSs that share respective experiences in response to requests for developing complex value-added composite s. SWSs are expected to take the initiative in advising users how to develop and reuse value-added s. Social Services in Action In many ways, smartphone apps are like s in that they re functional components that are discovered and executed. However, they have significant differences: apps are complete and stand-alone; apps are owned and executed locally; apps aren t composable, except as informal mashups; and apps have non-standard APIs. Figure illustrates some of the differences in the way that s and apps are composed and executed, leading to a variety of architectural possibilities. The appropriate choice of architecture is based primarily on QoS, such as the amount of computation required, bandwidth of the data exchange, the system s response time, the user s privacy requirements, and whether the being provided is proprietary and charged per use. When socialized, s can provide information about how they ve behaved and been used in the past. Architecturally, s deployed in a cloud could have their social aspects exploited more easily. Establishing and maintaining s social networks can happen in three ways: Collaboration. By combining their respective functionalities, SWSs have the capacity to work together on complex user requests. Consequently, an SWS manages its own network of collaborators, so that it decides if it likes collaborating with peers based on previous experiences. It can also recommend peers. Competition. SWSs compete against each other when they offer similar functionalities. Their nonfunctional properties differentiate them when users nonfunctional requirements must be satisfied. Consequently, an SWS learns about its own network of competitors, so that it can attempt to improve its nonfunctional properties with respect to other peers. 7 Substitution. Although SWSs compete against each other, they can still help each other when they fail if they offer similar functionalities. 8 Consequently, an SWS manages its own networks of substitutes, so that it can meet its -level agreements (SLAs) when it encounters a potential failure. It can then identify its own best substitutes in response to users nonfunctional requirements. These three ways for maintaining social networks can be considered independently as a network of social behaviors. They can be the starting point of building more networks, 92 www.computer.org/internet/ IEEE ITERET COMPUTIG IC-5-02-Peering.indd 92

Why Services eed Social etworks Comparative elements Profile Description Discovery Composition Trust Advertising Table. management strategies. Basic Community ( 2.0) Social networks User profile built following regular use of s description developed by provider and then made available to all users discovery after registry screening composition driven by individual users familiar with composition techniques and constraints Trust directly established between user and provider advertisement done by its provider User level General profile built for whole community according to use of s; this profile is then distributed to all members and customized individually level description made available by provider subject to enrichment through annotations by community members and then offered to other members for use; enriched description might suffer from discrepancies collective discovery after registry screening and discovery outcome shared with other community members collective composition driven by some community members; composition outcome shared with other members; community interests prevail over individual interests trusted by members of the community based on past experiences; ranking technique can be used Enterprise level use supports advertisement, but limited within community boundaries; limited use of s because of trust concerns User profile built following regular use of s and social relations that users maintain with others; relations are either explicit or implicit description made available by provider subject to possible enrichment through annotations by members of the same social network, increasing the enriched description acceptance by the rest of this social network discovery after registry screening driven by the needs of each social network s members composition driven by the needs and previous experiences of each social network s members Trust mainly related to the strength of the social relations that users have on top of their experiences of use advertisement taken care of by users via their social contacts; better use of s because of trust in these contacts depending on the interactions that arrive between s such as delegation and supervision. Communities vs. Social etworks of Services Communities can establish connections between s. 9 However, a community-based connection offers only a limited view of the activities required in managing s. In contrast, a social-based connection offers a wider view by stressing the interactions that occur between users, between s, and between users and s. Table highlights management by comparing basic strategies to community- and social-based strategies. The comparison criteria include user profiling, description, discovery, composition, advertisement, and trust between s and users. A social network-based strategy for management, as shown in this table, intends clearly to reinforce s performance capabilities through a finegrained consideration of analysis and reasoning 0 and consideration of extra information such as past experiences rather than just information related to s. A social network-based strategy offers better exposure, use, and follow-up of s compared to basic and community-based strategies. As an example, at the composition level, social networks can include recommendations based on particular users interests (as well as their immediate social relatives) instead of considering general and static behaviors of the s composition. Another example of the social network-based strategy s strength is MARCH/APRIL 20 93 IC-5-02-Peering.indd 93

exemplified at the enterprise level by leveraging the diffusion property of a network for a better advertisement of s. s have progressed significantly from their inception for addressing business problems to their subsequent democratization to their anticipated socialization. Social networks, with their underlying principles and metrics, can offer innovative solutions to some of the issues s face today. The growing number of initiatives reflecting the blend of social computing with -oriented computing is certainly a positive sign of this area s growing importance. 8,0, References. M. Papazoglou et al., Service-Oriented Computing: State of the Art and Research Challenges, Computer, vol. 40, no., 2007, pp. 38 45. 2. C. Petrie, Practical Services, IEEE Internet Computing, vol. 3, no. 6, 2009, pp. 94 96. 3. Z. Maamar et al., Using Social etworks for Services Discovery, to be published in IEEE Internet Computing, 20. 4. C. Pedrinaci and J. Domingue, Toward the ext Wave of Services: Linked Services for the Data, J. Universal Computer Science, vol. 6, no. 3, 200, pp. 694 79. 5. F.Y. Wang et al., Social Computing: From Social Informatics to Social Intelligence, IEEE Intelligent Systems, vol. 22, no. 2, 2007, pp. 79 83. 6. M.P. Singh and M.. Huhns, Service- Oriented Computing: Semantics, Processes, Agents, John Wiley & Sons, 2005. 7. M. Alrifai, D. Skoutas, and T. Risse, Selecting Skyline Services for QoSbased Service Composition, Proc. 9th Int l World Wide Conf. (WWW 200), ACM Press, 200, pp. 20. 8. Z. Maamar et al., LinkedWS: A ovel Services Discovery Model Based on the Metaphor of Social etworks, Simulation Modelling Practice and Theory, Elsevier Science Publisher, vol. 9, no. 0, 20, pp. 2 32. 9. L. Chen et al., Towards a Knowledge-based Approach to Semantic Service Composition, Proc. 2nd Int l Semantic Conf. (ISWS 2003), Springer-Verlag, 2003, pp. 39 334. 0. A. Maaradji et al., Towards a Social etwork-based Approach for Services Composition, Proc. 200 IEEE Int l Conf. Communications (ICC 0), IEEE Press, 200, pp. 5.. M. am Ko et al., Social-etworks Connect Services, Computer, vol. 43, no. 8, 200, pp. 37 43. Zakaria Maamar is a full professor in the College of Information Technology at Zayed University, Dubai, UAE. His research interests include s, social networks, and context-aware computing. Maamar has a PhD in computer science from Laval University, Quebec City, Canada. Contact him at zakaria.maamar@zu.ac.ae. Hakim Hacid is a researcher at Bell Labs France (Alcatel-Lucent). His current research focuses on social interaction analysis to provide added value applications for users and providers. Before joining Bell Labs, Hacid was a research associate at the University of ew South Wales, where he worked with the -oriented computing group. He has a PhD in computer science from the University of Lyon, France. Contact him at hakim.hacid@alcatel-lucent.com. Michael. Huhns holds the CR Professorship and is chair of the Department of Computer Science and Engineering at the University of South Carolina. He has a PhD in electrical engineering from the University of Southern California. Huhns serves on the editorial boards for 2 journals, is a senior member of the ACM, and is a fellow of IEEE. Contact him at Huhns@sc.edu. 94 www.computer.org/internet/ IEEE ITERET COMPUTIG IC-5-02-Peering.indd 94