1. Trang chủ
  2. » Kinh Doanh - Tiếp Thị

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P46 pptx

10 249 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 10
Dung lượng 422,48 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

CP4WS manages the deployment of Web services on resources with policies.. This condition refers to some arguments like number of active component Web services line 07 that the resource s

Trang 1

step is to satisfy the needs of bodies that have

interests and/or obligations in strengthening or

restricting the execution of Web services on top

of their resources For instance, a Web service

does not obtain the necessary authorizations to

operate on a resource since this Web service does

not comply with this resource’s requirements such

as permitted execution-time CP4WS manages the

deployment of Web services on resources with

policies For standardization purposes with the

policies associated with Web services’ behaviors,

WSPL is also adopted to specify deployment

policies

Deployment Policy for

Permission.

It is about a Web service that receives the

neces-sary execution authorizations from a resource

These authorizations are based on the state of

the resource, which manifests itself using its

R-context The following illustrates a deployment

policy for permission in WSPL It states that a

resource accepts the execution request of a Web

service subject to evaluating <Condition> to true

This condition refers to some arguments like

number of active component Web services (line

07) that the resource supports their execution

and next acceptance of the resource to additional

component Web services (line 12) In the policy,

<TrueConclusion> (line 17) shows the permission

of execution, whereas <FalseConclusion> (line 20)

shows the contrary In case of positive

permis-sion of execution, yes-permispermis-sion-deployment

procedure is executed (line 18), which results in

updating the following arguments: resource&state

per active participation of W-context of the Web

service (Table 1) and number of active component

Web services of R-context of the resource

01: Policy (Aspect=”PermissionDeployment”)

02: <Rule

xmlns=”urn:oasis:names:tc:xacml:3.0:per-mission:policy:schema:wd:01”

03: xmlns:proc=”permission-deployment” RuleId=”Pe

rmissionDeploymentWS”>

04: <Condition>

05: <Apply FunctionId=”and”>

06: < A p p l y F u n c t i o n I d = ” i n t e g e r - l e s s - t h a n ” DataType=”boolean”>

07: <SubjectAttributeDesignator AttributeId=”Numbe rofActiveComponentWebServices”

08: DataType=”integer”>

09: <SubjectAttributeDesignator AttributeId=”Maximu mNumberofComponentWebServices”

10: DataType=”integer”>

11: </Apply>

12: <SubjectAttributeDesignator AttributeId=”NextAc ceptanceofComponentWebServices”

13: DataType=”boolean”>

14: </Apply>

15: </Condition>

16: <Conclusions>

17: <TrueConclusion>

18: <proc:do> yes-permission-deployment </proc: do>

19: </TrueConclusion>

20: <FalseConclusion>

21: <proc:do> no-permission-deployment </proc:do> 22: </FalseConclusion>

23: </Conclusions>

24: </Rule>

Deployment Policy for Restriction.

It consists of preventing a Web service form being executed over a resource Besides the example

of resource failure, restrictions could be geared towards the reinforcement of the execution clauses that are agreed upon between a Web service and

a resource For example a Web service binds a resource for execution before the scheduled time The following illustrates a deployment policy for restriction in WSPL It states that a Web service can be restricted from execution subject to evalu-ating <Condition> to true This condition checks that a positive permission (line 04) of execution has been issued (line 06) and the agreed execu-tion time is valid The execuexecu-tion time of a Web

Trang 2

VHUYLFHLVLGHQWL¿HGXVLQJQH[WFRPSRQHQW:HE

services per active participation argument of

R-context of the resource

01: Policy (Aspect=”RestrictionDeployment”)

02: <Rule

xmlns=”urn:oasis:names:tc:xacml:3.0:gen-eralization:policy:schema:wd:01”

03: RuleId=”RestrictionDeploymentWS”>

04: <Condition>

05: <Apply FunctionId=”and”>

06: <SubjectAttributeDesignator AttributeId=”YesPer

missionDeployment”

07: DataType=”boolean”>

08: <Apply FunctionId=”equal” DataType=”boolean”>

09: <SubjectAttributeDesignator AttributeId=”Executi

onTime” DataType=”String”>

10: </Apply>

11: </Apply>

12: </Condition>

13: <Conclusions>

14: <TrueConclusion RestrictionDeployment = “No”>

15: <FalseConclusion RestrictionDeployment =

“Yes”>

16: </Conclusions>

17: </Rule>

CP4WS TO IMPLEMENT AMIN

SCENARIO

We discuss the work we carried out following the

use of CP4WS to design the system

implement-ing Amin scenario For compatibility purposes,

Sun Microsystems’s tools are used: J2EE 1.4 to

develop Web services and XACML Open Source

to develop policies Figure 5 illustrates the

archi-tecture of this system that comprises four types

of managers It should be noted that the role

RI HDFK PDQDJHU LV DVVRFLDWHG ZLWK D VSHFL¿F

step in CP4WS Figure 6 shows some snapshots

related to the use of the system implementing

Amin scenario

The VSHFL¿FDWLRQPDQDJHU supports

design-HUV GXULQJ WKH VSHFL¿FDWLRQ RI FRPSRVLWH :HE

services This calls for identifying the appropri-DWHFRPSRQHQW:HEVHUYLFHV7KHVSHFL¿FDWLRQ

work is carried out through a composition environment, which is a set of integrated tools

that assist designers create and edit new and ex-LVWLQJVSHFL¿FDWLRQVRIFRPSRVLWH:HEVHUYLFHV respectively We use a composition environment that was developed in one of our previous proj-ects (Maamar, 2006e) This environment, also, supports translating composite Web service VSHFL¿FDWLRQV OLNH WKH RQH VKRZQ LQ )LJXUH  LQWR%3(/VSHFL¿FDWLRQ

The selection manager is responsible for

identifying the component Web services that satisfy user needs This manager is triggered upon XVHU¶VUHTXHVWDQGLGHQWL¿FDWLRQRIWKHDSSURSUL-DWHFRPSRVLWH:HEVHUYLFHVSHFL¿FDWLRQ,QWKH current system, the selection is not only driven

by the resulting functionality of the composition the user needs (e.g., to reach a meeting place by taxi or by bus according to weather conditions)

It also considers Web services QoS parameters that affect the selection process like response time, performance, and throughput These con-straints are expressed with WSPL policies The

policy manager makes Web services bind to

appropriate behaviors according to the progress

of a composition

Finally, the context manager keeps track of

the contexts of users, Web services, and resources Contexts’ arguments are of different types and their values change over time Figure 7

illus-WUDWHVWKHVSHFL¿FDWLRQRIW-context of Weather

WS using the prototype Therefore, the context

manager is supported with a real-time triggering mechanism that feeds context parameters with fresh values Details of contexts are structured DV;0/¿OHV%HIRUHVHQGLQJWKHVHOHFWHG:HE services’ addresses to the user for invocation, the

policy manager ensures that these Web services

comply with the policies reported previously

Upon approval of the policy manager, the selec-tion manager initiates the search of the resources

on which the Web services will operate Figure 8

Trang 3

Specification manager 2 Submission Selection

Manager

1 Request

Policy Manager

4 Verification Repository of

Web services

Context Manager

resources

5 Search

6 Services for invocation

Binding

Approval(yes,no)

Figure 5 Architecture of the system implementing Amin scenario

Figure 6 Snapshots from the prototype

Trang 4

shows parts of the policy that restricts the

execu-tion of Weather WS on a resource.

RELATED WORK

Web services are a very active area of Research

and Development However, to our knowledge,

few projects have aimed at suggesting design

and development methods for Web services

based on context and driven by policies We

present in the following some projects that helped

shape the steps and annotations of CP4WS These

projects mainly target design and development

methods

In CP4WS, context is part of the exercise of

modeling composite Web services Other projects

such as (Brenner, 2003) use Web services to

man-aging context provisioning Breener and Schiffers

envision that context information will typically

be provided by autonomous organizations (or

context providers), which means heterogeneity and

distribution challenges to deal with Additional

challenges are cited in (Brenner, 2003) including

what is the optimal sequence for gathering and

combining the required context information, how

to secure the whole context provisioning process,

and how is the cooperation between the providers

of context achieved, and even enforced?

In (Baresi, 2005), Baresi et al propose a

policy-based approach to monitor Web services’

functional (e.g., constraints on exchanged data)

and non-functional (e.g., security, reliability)

re-quirements In this approach Baresi et al report on

WKHGLIIHUHQWW\SHVRISROLFLHVWKDWFDQEHGH¿QHG

along the life cycle of a Web service (Mukhi, 2004)

These types are service policies, server policies,

supported policies, and requested policies

In (UWA, 2002), the Ubiquitous Web

Appli-cations (UWA) Consortium proposes a

frame-work that comprises several methodologies,

meta-models, and tools for designing ubiquitous

Web applications Organization and execution

models permit designing the business processes

that underlay such applications The organiza-tion model expresses the hierarchical relaorganiza-tions between activities of the same business process These relations are described using an UML class diagram In addition some properties (e.g., ACID properties) can be associated with each activity The execution model describes the possible execu-WLRQÀRZVRIWKHGLIIHUHQWDFWLYLWLHVWKDWFRPSRVH WKHRUJDQL]DWLRQPRGHO7KHVHÀRZVFRQVWLWXWHWKH dynamic aspect of the business process and are expressed using an UML activity diagram

In (Brambilla, 2006), Brambilla et al propose

a Web engineering method for the high-level VSHFL¿FDWLRQRISURFHVVHVDQG:HEVHUYLFHVEDVHG applications This method relies on extending the Web Modeling Notation (WebML (Ceri, 2000)) with standard process modeling concepts and Web services-based application distribution primitives Process modeling concepts expressed in the Busi-ness Process Modeling Notation (http://www.bpmn org) are added to WebML so, process requirements

in terms of interactions over the Web are expressed Web services are used as a means to deal with the process distribution requirements Interesting to note that this method has been implemented as a case tool through the use of WebRatio (http://www WebRatio.com)

In (Detroyer, 2003), De Troyer and Casteleyn work on an adaptation of the existing Web Site Design Method (WSDM) The objective is to model complex business processes in the context

of Web applications and to support some advanced features like transactions and persistence of pro-cesses Task modeling and navigational design, which are the core steps in the conceptual design

of WSDM, have been changed to accommodate the requirements of modeling complex processes The ConcurTaskTrees (CTT) notation (Paterno,

 LVPRGL¿HGWRRQO\FRQVLGHUWKUHHFDWHJRULHV

of tasks: application, interaction, and abstract Abstract task refers to the task that needs to be decomposed Application and interaction tasks refer to the tasks executed by applications and users respectively The navigation structure that

Trang 5

Figure 7 W-context of Weather Web Service

<rdf:RDF

xmlns:WC=http://www.nitk.ac.in/ sattanathan/OWLC/Context/WC#

xmlns:rdf=http://www.w3.org/1999/02/22-rdf-syntax-ns#

<rdf:Description rdf:about=”http://defaultURI/WC#”>

<WC:CorrectiveActionsPerFailureType>Nil</WC:CorrectiveActionsPerFailureType>

<WC:ResourceAndStatePerActiveParticipation>Resource1/Suspended

</WC:ResourceAndStatePerActiveParticipation>

<WC:MaximumNumberOfParticipations>10</WC:MaximumNumberOfParticipations>

<WC:ReasonsOfFailurePerActiveParticipation>Nil</WC:ReasonsOfFailurePerActiveParticipation>

<WC:RegularActions>Book Taxi</WC:RegularActions>

<WC:PrevisousWebServicesPerActiveParticipation>Nil

</WC:PrevisousWebServicesPerActiveParticipation>

<WC:NextWebServicePerActiveParticipation>TAxi or Bus Schedule

</WC:NextWebServicePerActiveParticipation>

<WC:Label>WEather</WC:Label>

<WC:Date>Dec 25, 2005 6:28:39 PM</WC:Date>

<WC:CurrentWebServicesPerActiveParticipation>Location

<WC:NextPossibiliyOfParticipation>Possible</WC:NextPossibiliyOfParticipation>

<WC:NumberOfActiveParticipations>7</WC:NumberOfActiveParticipations>

</rdf:Description>

</rdf:RDF>

Figure 8 Restriction Policy on Weather Web Service

<Policy PolicyId=”Restriction”

RuleCombiningAlgId=”urn:oasis:names:tc:xacml:1.0:rule-combining-algorithm:ordered-permit-over-rides”>

<Description>Restriction policy on WEather Web Service</Description>

<Target>

<Subjects>

<Subject>

<SubjectMatch MatchId=”urn:oasis:names:tc:xacml:1.0:function:rfc822Name-match”>

<AttributeValue DataType=”http://w3.org/ #string”>users.example.com</AttributeValue>

<SubjectAttributeDesignator AttributeId=”urn:oasis:names:tc:xacml:1.0:subject:subject-id”

DataType=”urn:oasis:names:tc:xacml:1.0:data-type:rfc822Name”/>

</SubjectMatch>

</Subject>

</Subjects>

<Resources>

<Resource>

<ResourceMatch MatchId=”urn:oasis:names:tc:xacml:1.0:function:anyURI-equal”>

<AttributeValue

DataType=”http://w3.org/ #anyURI”>http://webservice.weather.com/</Attribute-Value>

<ResourceAttributeDesignator AttributeId=”urn:oasis:names:tc:xacml:1.0:resource:resource-id”

DataType=”http://www.w3.org/2001/XMLSchema#anyURI”/>

</ResourceMatch>

</Resource>

</Resources>

<Actions>

<AnyAction/>

</Actions>

</Target>

<Rule RuleId=”RestrictionWS” Effect=”No”>

<Target>

Trang 6

describes how a user should perform tasks, is then

automatically generated for different users from

the CTT augmented with temporal relationships

between the different tasks

In (Cappiello, 2006), Cappiello and Pernici

suggest a method to solve run-time data quality

problems in self-healing Web services environments

Failures due to run-time data quality problems are

detected and the proposed method produces a list

of recovery actions for quality improvements The

main step in the method concerns working on the

warning message generator, which is in charge of

monitoring the system, detecting all the anomalies

that occur in data management, and identifying the

sources of data quality problems

A framework for analyzing and comparing

Web application design methodologies is

pre-sented in (Distante, 2007) Distante et al present

the business/user/system requirements for

de-signing business process Business requirements

FRUUHVSRQGWRWKHLGHQWL¿FDWLRQRIWKHGLIIHUHQW

activities included in a given Web transaction

and their semantic associations, and the logical/

temporal order in which such activities must be

executed by the user User requirements include

WKHVSHFL¿FDWLRQRIWKHVHWRIDFWLYLWLHVZKLFKFDQ

be suspended and resumed in case of long-lived

transactions, and the description of how an activity

can be customized depending on the state of the

ongoing transaction The system requirements

UHIHUWRWKHGH¿QLWLRQRIWKHLQIRUPDWLRQREMHFWV

affected by the execution of an activity, and the

GH¿QLWLRQDQGWKHPDQDJHPHQWRIWKHVWDWHVRID

Web transaction These design requirements are

then used to evaluate and compare two Web

ap-plication design methodologies, namely OOHDM

(Schmid, 2004) and UWA (UWA, 2002)

To wrap up this related work section, we

highlight again the features of CP4WS per

step Five steps were developed The first step

uses UML use-cases to identify and specify

users' needs The second step uses service

chart diagrams and state chart diagrams to

specify the orchestration of the component

Web services that constitute a composite Web service The third step defines the arguments that form the context of the component Web services and of other participants like users and resources that interact with these component Web services The fourth step uses WSPL to specify the policies that manage the behavior that the component Web services expose to the external environment Finally, the last step uses WSPL again to manage the performance

of the component Web services on top of the computing resources

CONCLUSION

In this chapter, we presented our CP4WS method that targets those who are responsible for the design and development of information systems based on Web Services We discussed how com-position of Web services permits addressing the VLWXDWLRQRIDXVHU¶VUHTXHVWWKDWFDQQRWEHVDWLV¿HG

by any single, available Web service, whereas a composite Web service obtained by combining

a set of available Web services might be used The core concepts of CP4WS are context, policy, service chart diagram, state chart diagram, and UHVRXUFH&3:6FRQVLVWVRI¿YHVWHSVXVHUQHHGV LGHQWL¿FDWLRQ DQG VSHFL¿FDWLRQ :HE VHUYLFHV orchestration, Web services contextualization, :HE VHUYLFHV EHKDYLRU VSHFL¿FDWLRQ DQG :HE services deployment

As part of our future work, we aim at adding WZR PRUH VWHSV WR &3:6 7KH ¿UVW VWHS ZRXOG

be dedicated to managing the exceptions that the multiple participants in Web services composition arise First, there is no guarantee that a particular Web service is still available at time of request A provider could withdraw its Web service without prior notice 6HFRQGWKHUHLVQRJXDUDQWHHWKDWWKHVSHFL¿FDWLRQ RIDFRPSRVLWH:HEVHUYLFHLVHUURUIUHH&RQÀLFWLQJ actions like concurrent acceptance and rejection, and GHDGORFNVPD\RFFXUGXULQJWKLVVSHFL¿FDWLRQH[HFX-tion Finally, there is no guarantee that a particular

Trang 7

resource is up at time of execution of a Web service

A resource could be down due to power failure The

various examples back the importance of an

addi-tional step on exception handling in CP4WS The

second step would be concerned with guidelines for

backing the correct execution of a transactional Web

service during the design phase For this purpose we

suggest mapping these guidelines onto transactional

properties (compensatable, retriable, and pivot) that

will be associated with Web services The role of

DWUDQVDFWLRQDOSURSHUW\LVWRGH¿QHWKHDFFHSWDEOH

behavior of a Web service For example the failure

of a Web service could be tolerated in one scenario

but not in another one Transactional properties that

can be associated to a Web service and a forward

adaptation algorithm to support rolling back strategy

in some complex situations are presented in detail

in (Maamar, 2007)

ACKNOWLEDGMENT

The authors would like to thank the reviewers

for their comments and suggestions of changes

7KHGHYHORSPHQWRI&3:6EHQH¿WHGIURPWKH

fruitful discussions the authors had with A

An-derson, G Kouadri-Mostéfaoui, Ph Thiran, and

S Sattanathan

REFERENCES

$JDUZDO6 6SULFN%  6SHFL¿FDWLRQ

RI$FFHVV&RQWURODQG&HUWL¿FDWLRQ3ROLFLHVIRU

Semantic Web Services Proceedings of The 6th

International Conference on Electronic

Com-merce and Web Technologies (EC-Web).

Anderson, A H (2004) An introduction to the

Web services policy language (SWPL)

Proceed-ings of The 5th IEEE International Workshop on

Policies for Distributed Systems and Networks

(POLICY)

Baresi, L., & Guinea, S., & Plebani, P (2005)

WS-policy for service monitoring Proceedings of The 6th Workshop on Technologies for E-Services (TES), in conjunction with the 31st International Conference on Very Large Data Bases (VLDB).

Booch, G., Rumbaugh, J., & Jacobson, I (1998)

7KH8QL¿HGPRGHOLQJODQJXDJHXVHUJXLGH

Ad-dison-Wesley Professional

Brambilla M., Ceri, S., & Fraternali, P (2006)

Process modeling in Web applications ACM Transactions on Software Engineering Method-ology, 15(4).

Breener, M., & Schiffers, M (2003) Applying Web services technologies to the management

of context provisioning Proceedings of The 10th Workshop of the OpenView University Associa-tion (OVUA)

Cappiello, C., & Pernici, B (2006) A Method-ology for Information Quality Management in

Self-Healing Web Services Proceedings of 11th International conference on Information Qual-ity (ICIQ).

Ceri, S., Fraternali, P & Bongio, A (2000) Web modeling language (WebML): A modeling

language for designing Web sites Computer Networks, 33(1-6).

UWA Consortium (2002) Ubiquitous Web

ap-plications Proceedings of eBusiness and eWork Conference.

Coutaz, J., Crowley, J L., Dobson, S., & Garlan,

D (2005) Context is key Communications of

the ACM, 48(3)

Curbera, F., Duftler, M., Khalaf, R., Nagy, W., Mukhi, N., & Weerawarana, S (2002) Unravel-ing the Web services Web: An introduction to

SOAP, WSDL, and UDDI IEEE Internet Com-puting, 6(2).

Damianou, N., Dulay, N., Lupu, E., & Sloman, M  7KHSRQGHUSROLF\VSHFL¿FDWLRQODQJXDJH

Trang 8

Proceedings of The 2nd IEEE International

Workshop on Policies for Distributed Systems

and Networks (POLICY).

Daniel, F., & Pernici, B (2005) Insights into Web

service orchestration and choreography

Interna-tional Journal of E-Business Research, 1(2).

Distante, D., Rossi, G., & Canfora, G

Model-ing business processes in Web applications: An

analysis framework Proceedings of the 2006 ACM

Symposium on Applied Computing (SAC)

Dustdar, S., & Schreiner, W (2005) A survey on

Web services composition International Journal

on Web and Grid Services, 1(1).

*UHHQ¿HOG3.XR'1HSDO6 )HNHWH$

(2005) Consistency for Web services applications

Proceedings of the 31st International Conference

on Very Large Data Bases (VLDB).

Horrocks, I., Patel-Schneider, P F., Boley, H.,

Tabet, S., Grosof, B., & Dean, M (2004) SWRL

A semantic Web rule language combining OWL

and RuleML W3C Submission, 21 May 2004,

http://www.w3.org/Submission/2004/SUBM-SWRL-20040521/

Kagal, L., & Finin, T (2005) Modeling

communi-cative behavior using permissions and obligations

In Developments in Agent Communication,( F

Dignum, R van Eijk, and M P Huget, eds)

Keidl, M., & Kemper, A (2004) A framework

for context-aware adaptable Web services

Pro-ceedings of The 9th International Conference on

Extending Database Technology (EDBT).

Limthanmaphon, B., & Zhang, Y (2004) Web

Service Composition Transaction Management

Proceedings of the 14th Australasian Database

Conference (ADC).

/XSX( 6ORPDQ0  &RQÀLFWVLQSROLF\

based distributed systems management IEEE

Transactions on Software Engineering, 25(6).

Maamar, Z., Benatallah, B., & Mansoor, W (2003) Service chart diagrams - description &

applica-tion Proceedings of The Alternate Tracks of the 12th International World Wide Web Conference (WWW).

Maamar, Z., Benslimane, B., Mrissa, M., & Ghedira, C (2006a) CooPS - Towards a method

for coordinating personalized services Software and System Modeling Journal Special Section on

“Service-Based Software and Systems Engineer-ing, 5(2).

Maamar, Z and Benslimane, D and Anderson,

A (2006b) Using policies to manage composite

Web services IEEE IT Professional, 8(5).

Maamar, Z., Benslimane, D., Kouadri Mostéfaoui, G., Sattanathan, S., & Ghedira, C (2006c) Devel-oping interoperable business processes using Web

services and policies Proceedings of the Second International Conference on Interoperability for Enterprise Software and Applications (I-ESA).

Maamar, Z., Benslimane, D., & Narendra, N C (2006d) What can context do for Web services?

Communications of the ACM, 49(12).

Maamar, Z., Kouadri Mostefaoui, S., & Mahmoud,

Q H (2005a) On personalizing Web services

us-ing context International Journal of E-Business Research, 1(3).

Maamar, Z., Kouadri Mostefaoui, S., & Yahyaoui,

H (2005b) Towards an agent-based and context-oriented approach for Web services composition

IEEE Transactions on Knowledge and Data Engineering, 17(5).

Maamar, Z., & Labbé, P (2003b) Moving vs inviting software agents, what is the best strategy

to adopt? Communications of the ACM, 46(7).

Maamar, Z., Narendra, N C., & Sattanathan, S (2006e) Towards an ontology-based approach for

specifying and securing Web services Journal of Information & Software Technology, 48(7).

Trang 9

Maamar, Z., Narendra, N.C., Benslimane, D., &

Sattanathan, S (2007) Policies for context-driven

transactional Web services 19th International

Conference on Advanced Information Systems

Engineering (CAISE)

D A Menascé (2002) QoS issues in Web services

IEEE Internet Computing, 6(6).

0RVHV7  ;$&0/SUR¿OHIRU:HEVHU-vices Working Draft 04, 29 September 2003,

http://www.oasis-open.org/committees/down-load.php/3661/draft-xacml-wspl-04.pdf

Mrissa, M., Benslimane, D., Maamar, Z., &

Ghedira, C (2005) Towards a semantic- and

context-based approach for composing Web

services International Journal of Web and Grid

Services, 1(3).

Mukhi, N., Plebani, P., Silva-Lepe, I., & Mikalsen,

T (2004) Supporting policy-driven behaviors in

Web services: Experiences and issues

Proceed-ings of The 2nd International Conference on

Service Oriented Computing (ICSOC).

Paterno, F., Mancini, C., & Meniconi, S (1997)

ConcurTaskTrees: A Diagrammatic Notation for

Specifying Task Models INTERACT

Confer-ence

Reiff-Marganiec, S., & Turner, K.J (2003) A policy architecture for enhancing and controlling

features In A Policy Architecture for Enhancing and Controlling Features, IOS Press.

Schlimmer, J (2004) Web services policy framework (WS-Policy) http://www-128.ibm.

com/developerworks/webservices/library/speci-¿FDWLRQZVSROIUDP/

Schmid, H A., & Rossi, G (2004) Modeling and designing processes in e-commerce applications

IEEE Internet Computing, 8(1).

Tolk, A., & Diallo, S Y (2005) Model-based

data engineering for Web services IEEE Internet Computing, 9(4).

Tonti, G., Bradshaw, J., Jeffers, R., Montanari, R., Suri, N., & Uszok, A (2003) Semantic Web languages for policy representation and reason-ing: A comparison of KAoS, Rei, and Ponder

Proceedings of The 2nd International Semantic Web Conference (ISWC).

De Troyer, O., & Casteleyn, S (2003) Model-ing Complex process for Web application with

WSDM Proceedings of the International Work-shop on Web Oriented Software Technology (IWWOST).

This work was previously published in International Journal of E-Business Research, Vol 4, Issue 3, edited by I Lee, pp 77-95, copyright 2008 by IGI Publishing (an imprint of IGI Global).

Trang 10

Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.

Chapter 2.5

Dynamic Pricing for

E-Commerce

Prithviraj Dasgupta

University of Nebraska, Omaha, USA

Louise E Moser

University of California, Santa Barbara, USA

P Michael Melliar-Smith

University of California, Santa Barbara, USA

INTRODUCTION

Over the last decade, HFRPPHUFHKDVVLJQL¿FDQWO\

changed the traditional forms of interaction among

humans in conducting business by automating

business processes over the Internet Early seller

Web sites consisted of passive text-based catalogs

of products that could be manually browsed by

potential customers Online passive catalogs were

soon replaced by dynamically updated catalogs

containing detailed product descriptions using

combinations of text and images that could be

searched in various formats and according to

different search criteria E-commerce techniques

used by sellers for operations such as price

set-ting, negotiation, and payment have matured

from manual off-line processing of sales data to

automated algorithms that dynamically determine

SULFHVDQGSUR¿WVIRUVHOOHUV0RGHUQHFRPPHUFH

processes for trading goods between buyers and

VHOOHUV FDQ EH GLYLGHG LQWR ¿YH VWDJHV VHDUFK

valuation, negotiation, payment, and delivery Depending on the type of market in which the goods are traded, some of the above stages are more important than others

There are three principal market models that are used for online trading The most common market model used by online sellers for trading goods over the Internet is the posted-price market model The other two market models, the auction model (Sandholm, Suri, Gilpin, & Levine, 2002) and the marketplace model (Chavez & Maes, 1996), are used for markets in which niche or specialty items with sporadic or uncertain demand are traded

In the posted-price market model, a seller announces the price of a product on its Web site Buyers visiting the seller’s Web site request a quote from the seller The seller responds with

a quote in response to the buyers’ requests, and the buyers examine the seller’s quote to make a purchase decision Unlike auctions and

... services Software and System Modeling Journal Special Section on

“Service-Based Software and Systems Engineer-ing, 5(2).

Maamar, Z and Benslimane, D and Anderson,

A... application, interaction, and abstract Abstract task refers to the task that needs to be decomposed Application and interaction tasks refer to the tasks executed by applications and users respectively... Proceedings of The 6th

International Conference on Electronic

Com-merce and Web Technologies (EC-Web).

Anderson, A H (2004) An introduction to the

Web

Ngày đăng: 07/07/2014, 10:20

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN