Toward Behavioral Web Services Using Policies

Making Web services context-aware is a challenge. This is like making Web service expose appropriate behaviors in response to changes detected in the environment. Context awareness requires a review and extension of the current execution model of Web services. This paper discusses the seamless combi...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on systems, man and cybernetics. Part A, Systems and humans Vol. 38; no. 6; pp. 1312 - 1324
Main Authors Maamar, Z., Benslimane, D., Mostefaoui, G.K., Subramanian, S., Mahmoud, Q.H.
Format Journal Article
LanguageEnglish
Published IEEE 01.11.2008
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Making Web services context-aware is a challenge. This is like making Web service expose appropriate behaviors in response to changes detected in the environment. Context awareness requires a review and extension of the current execution model of Web services. This paper discusses the seamless combination of context and policy to manage behaviors that Web services expose during composition and in response to changes in the environment. For this purpose, a four-layer approach is devised. These layers are denoted by policy, user, Web service, and resource. In this approach, behavior management and binding are subject to executing policies of types permission, obligation, restriction, and dispensation. A prototype that illustrates how context and policy are woven into Web services composition scenarios is presented as well.
AbstractList Making Web services context-aware is a challenge. This is like making Web service expose appropriate behaviors in response to changes detected in the environment. Context awareness requires a review and extension of the current execution model of Web services. This paper discusses the seamless combination of context and policy to manage behaviors that Web services expose during composition and in response to changes in the environment. For this purpose, a four-layer approach is devised. These layers are denoted by policy, user, Web service, and resource. In this approach, behavior management and binding are subject to executing policies of types permission, obligation, restriction, and dispensation. A prototype that illustrates how context and policy are woven into Web services composition scenarios is presented as well.
Author Mahmoud, Q.H.
Benslimane, D.
Mostefaoui, G.K.
Subramanian, S.
Maamar, Z.
Author_xml – sequence: 1
  givenname: Z.
  surname: Maamar
  fullname: Maamar, Z.
  organization: Zayed Univ., Dubai
– sequence: 2
  givenname: D.
  surname: Benslimane
  fullname: Benslimane, D.
– sequence: 3
  givenname: G.K.
  surname: Mostefaoui
  fullname: Mostefaoui, G.K.
– sequence: 4
  givenname: S.
  surname: Subramanian
  fullname: Subramanian, S.
– sequence: 5
  givenname: Q.H.
  surname: Mahmoud
  fullname: Mahmoud, Q.H.
BookMark eNp9j8tOwzAQRS1UJNrCD8AmP5Dix9ixl6XiJRWB1FQsI8cZg1FIkB0V8fe0tGLBgs2duzlzdSZk1PUdEnLO6Iwxai7L1cNiPuOU6l0IUPSIjJmUOufA1WjbqRY5AC9OyCSlN0oZgIExycv-08Ymu8JXuwl9tG32jHW2wrgJDlO2TqF7yZ76NriA6ZQce9smPDvcKVnfXJeLu3z5eHu_mC9zxw0MuTK2lo2wRjZe-9rzQhruJVCNTcNZ4WzNBN9WJxgoIb1kutDaKKUdWDRiSvj-r4t9ShF99RHDu41fFaPVTrj6Ea52wtVBeAvpP5ALgx1C3w3RhvZ_9GKPBkT83QIF2kgtvgGR_GSL
CODEN ITSHFX
CitedBy_id crossref_primary_10_1016_j_jksuci_2014_10_009
crossref_primary_10_1049_iet_sen_2010_0001
crossref_primary_10_1109_TSMCA_2010_2093884
crossref_primary_10_4304_jsw_7_7_1429_1439
crossref_primary_10_1109_TSMCA_2009_2027610
crossref_primary_10_1007_s11761_008_0033_4
crossref_primary_10_1109_TSMCA_2010_2044409
crossref_primary_10_1109_TSMCA_2010_2076395
Cites_doi 10.1109/ICDCSW.2007.16
10.1109/TSMCA.2006.883176
10.1109/POLICY.2004.1309166
10.1007/978-3-540-25956-5_24
10.1109/MITP.2006.124
10.1016/S0306-4379(01)00014-X
10.1109/4236.991449
10.1145/1035134.1035157
10.1109/MCSE.2004.13
10.1007/978-3-540-32258-0_9
10.1007/11575771_40
10.1007/s10619-005-1073-9
10.1109/MIS.2004.23
10.1109/POLICY.2004.1309160
10.1145/1183236.1183238
10.1109/MIS.2007.99
10.1109/MIC.2003.1167338
10.1109/TKDE.2005.82
10.1007/s10619-006-7004-6
10.1007/s10619-006-7001-9
10.1145/1047671.1047703
10.1109/POLICY.2005.1
10.1109/TSMCA.2006.871793
10.1109/ICWS.2007.152
10.1007/s10619-006-7003-7
10.1109/32.824414
10.1109/MIC.2002.1067740
ContentType Journal Article
DBID 97E
RIA
RIE
AAYXX
CITATION
DOI 10.1109/TSMCA.2008.2003460
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Sciences (General)
EISSN 1558-2426
EndPage 1324
ExternalDocumentID 10_1109_TSMCA_2008_2003460
4648958
Genre orig-research
GroupedDBID -~X
0R~
29I
4.4
5VS
6IK
85S
97E
AAJGR
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFS
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
F5P
HZ~
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
O9-
OCL
PZZ
RIA
RIE
RNS
VH1
VJK
AAYOK
AAYXX
CITATION
ID FETCH-LOGICAL-c294t-69ab5d3a95df8fbf27592f5408edd217cab132dd2c314635f5187889668c4ae93
IEDL.DBID RIE
ISSN 1083-4427
IngestDate Tue Jul 01 04:13:43 EDT 2025
Thu Apr 24 22:54:09 EDT 2025
Tue Aug 26 16:47:23 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 6
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c294t-69ab5d3a95df8fbf27592f5408edd217cab132dd2c314635f5187889668c4ae93
PageCount 13
ParticipantIDs ieee_primary_4648958
crossref_primary_10_1109_TSMCA_2008_2003460
crossref_citationtrail_10_1109_TSMCA_2008_2003460
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2008-11-01
PublicationDateYYYYMMDD 2008-11-01
PublicationDate_xml – month: 11
  year: 2008
  text: 2008-11-01
  day: 01
PublicationDecade 2000
PublicationTitle IEEE transactions on systems, man and cybernetics. Part A, Systems and humans
PublicationTitleAbbrev TSMCA
PublicationYear 2008
Publisher IEEE
Publisher_xml – name: IEEE
References ref35
ref13
ref34
ref12
ref15
clemente (ref37) 2005
ref36
ref14
ref31
ref11
ludwig (ref20) 2002
ref32
ref10
ref2
ref1
ref39
marjanovic (ref16) 2003
ref18
desai (ref29) 2004
kagal (ref27) 2005
reiff-marganiec (ref26) 2003
ref24
ref25
ref22
tonti (ref23) 2003
sheng (ref21) 2004
ref28
schuster (ref19) 2000
baresi (ref30) 2005
ref8
ref7
gavriloaie (ref33) 2004
ref9
ref4
ref3
ref6
ref5
dimitrakos (ref38) 2001
gamma (ref17) 1995
References_xml – ident: ref4
  doi: 10.1109/ICDCSW.2007.16
– ident: ref36
  doi: 10.1109/TSMCA.2006.883176
– ident: ref22
  doi: 10.1109/POLICY.2004.1309166
– start-page: 342
  year: 2004
  ident: ref33
  article-title: no registration needed: how to use declarative policies and negotiation to access sensitive resources on the semantic web
  publication-title: Proc 1st ESWSThe Semantic Web Research and Applications
  doi: 10.1007/978-3-540-25956-5_24
– ident: ref11
  doi: 10.1109/MITP.2006.124
– ident: ref18
  doi: 10.1016/S0306-4379(01)00014-X
– ident: ref2
  doi: 10.1109/4236.991449
– ident: ref7
  doi: 10.1145/1035134.1035157
– ident: ref15
  doi: 10.1109/MCSE.2004.13
– start-page: 120
  year: 2005
  ident: ref27
  publication-title: Developments in Agent Communication
  doi: 10.1007/978-3-540-32258-0_9
– year: 2005
  ident: ref37
  article-title: representing security policies in web information systems
  publication-title: Proc Int Workshop PM4W 14th Int WWW Conf
– start-page: 25
  year: 2002
  ident: ref20
  article-title: a service level agreement language for dynamic electronic services
  publication-title: Proc 4th IEEE Int WECWIS
– ident: ref6
  doi: 10.1007/11575771_40
– ident: ref31
  doi: 10.1007/s10619-005-1073-9
– start-page: 419
  year: 2003
  ident: ref23
  article-title: semantic web languages for policy representation and reasoning: a comparison of kaos, rei, and ponder
  publication-title: Proc IEEE ISWC
– ident: ref28
  doi: 10.1109/MIS.2004.23
– ident: ref34
  doi: 10.1109/POLICY.2004.1309160
– start-page: 239
  year: 2003
  ident: ref26
  publication-title: Feature Interactions in Telecommunications and Software Systems VII
– year: 2001
  ident: ref38
  article-title: towards security and trust management policies on the web
  publication-title: Proc European Research Consortium for Informatics and Mathematics Workshop Role Trust e-Business IFIP I3E Conf
– year: 2004
  ident: ref29
  publication-title: A methodology for business process development
– start-page: 322
  year: 2004
  ident: ref21
  article-title: enabling personalized composition and adaptive provisioning of web services
  publication-title: Proc 16th Int CAiSE
– ident: ref8
  doi: 10.1145/1183236.1183238
– ident: ref39
  doi: 10.1109/MIS.2007.99
– ident: ref1
  doi: 10.1109/MIC.2003.1167338
– ident: ref14
  doi: 10.1109/TKDE.2005.82
– start-page: 213
  year: 2003
  ident: ref16
  article-title: managing the normative context of composite e-services
  publication-title: Proc ICWSEurope
– ident: ref9
  doi: 10.1007/s10619-006-7004-6
– ident: ref10
  doi: 10.1007/s10619-006-7001-9
– ident: ref12
  doi: 10.1145/1047671.1047703
– ident: ref32
  doi: 10.1109/POLICY.2005.1
– start-page: 247
  year: 2000
  ident: ref19
  article-title: modeling and composing service-based and reference process-based multi-enterprise processes
  publication-title: Proc 12th Int CAiSE
– ident: ref35
  doi: 10.1109/TSMCA.2006.871793
– ident: ref5
  doi: 10.1109/ICWS.2007.152
– year: 1995
  ident: ref17
  publication-title: Design Patterns Elements of Reusable Object-Oriented Software
– start-page: 72
  year: 2005
  ident: ref30
  article-title: ws-policy for service monitoring
  publication-title: Proc 6th Workshop TES 31st Int Conf VLDB
– ident: ref24
  doi: 10.1109/POLICY.2004.1309166
– ident: ref3
  doi: 10.1007/s10619-006-7003-7
– ident: ref13
  doi: 10.1109/32.824414
– ident: ref25
  doi: 10.1109/MIC.2002.1067740
SSID ssj0014494
Score 1.9060469
Snippet Making Web services context-aware is a challenge. This is like making Web service expose appropriate behaviors in response to changes detected in the...
SourceID crossref
ieee
SourceType Enrichment Source
Index Database
Publisher
StartPage 1312
SubjectTerms Behavior
composition
Context awareness
Context modeling
Context-aware services
Environmental management
Middleware
Monitoring
Permission
policy
Prototypes
Stability
Web service
Web services
Title Toward Behavioral Web Services Using Policies
URI https://ieeexplore.ieee.org/document/4648958
Volume 38
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED61nWAA2oIoL3lgAEHaPOzUHktFVSGVhVZ0q2zHXkApgnTh13NxHlQIIaQMVuQop7Nj3xd_9x3ApfV9a0LfeiJm2kO8oT3JFWIeaakSWlG0PmdbPMbTBX1YsmUDbutcGGOMI5-Zft50Z_nJWm_yX2UDGlMuGG9CE4FbkatVnxhQ6ooeBhhS4CvDYZUg44vB_Gk2HhW0yZyKRZ0c5fcmtFVVxW0qk32YVeYUXJKX_iZTff35Q6nxv_YewF4ZXZJRMR3a0DBpB3a3NAc70C6_5g9yVUpOX3fBmzv2LLmrk_bJs1GkWkiIIxYQpyGMyPoQFpP7-XjqlYUUPB0KmnmxkIolkRQssdwqGw6ZCC3GatwkCWISLRWCUmzqCBfOiFkWcPQwIiGuqTQiOoJWuk7NMZA49DUNLAIfLjHSojzQCmFclJfwwCvqQVB5dqVLlfG82MXryqENX6zcaBTVL8vR6MFN_cxbobHxZ-9u7um6Z-nkk99vn8KOY3i47MEzaGXvG3OOYUSmLtz8-QLZoMCK
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED6VMgAD0BZEeWZgAEHaPOzUHktFVaDtQiq6RbFjL6AWQbrw67k4DxBCCCmDFTmKdXZ898XffQdwrh1HK8_RNg-otBFvSDtmAjFPrIngUhAcfca2mAajGbmf03kNrqtcGKWUIZ-pTtY0Z_nJUq6yX2VdEhDGKVuDdfT71M2ztaozA0JM2UMXgwp8qdcrU2Qc3g0fJ4N-TpzMyFjECFJ-uaFvdVWMWxnuwKQcUM4mee6sUtGRHz-0Gv874l3YLuJLq58viAbU1KIJW99UB5vQKL7nd-uiEJ2-bIEdGv6sdVOl7VtPSljlVmIZaoFlVIQRW-_BbHgbDkZ2UUrBlh4nqR3wWNDEjzlNNNNCez3KPY3RGlNJgqhExgJhKTalj1unTzV1GYJjxEJMklhxfx_qi-VCHYAVeI4krkbow2KMtQhzpUAg52dFPPDy2-CWlo1koTOelbt4iQzecHhkZiOvf1nMRhuuqmdec5WNP3u3MktXPQsjH_5--ww2RuFkHI3vpg9HsGn4HiaX8Bjq6dtKnWBQkYpTs5Y-ARlxw9M
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Toward+Behavioral+Web+Services+Using+Policies&rft.jtitle=IEEE+transactions+on+systems%2C+man+and+cybernetics.+Part+A%2C+Systems+and+humans&rft.au=Maamar%2C+Z.&rft.au=Benslimane%2C+D.&rft.au=Mostefaoui%2C+G.K.&rft.au=Subramanian%2C+S.&rft.date=2008-11-01&rft.pub=IEEE&rft.issn=1083-4427&rft.volume=38&rft.issue=6&rft.spage=1312&rft.epage=1324&rft_id=info:doi/10.1109%2FTSMCA.2008.2003460&rft.externalDocID=4648958
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1083-4427&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1083-4427&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1083-4427&client=summon