This month's theme includes the following featured articles:
Interacting with the SOA-Based Internet of Things:
Discovery, Query, Selection, and On-Demand Provisioning of Web Services
This process and system architecture enable developers and business process designers to dynamically query, select, and use running instances of services, or deploy new ones on demand, in the context of composite, real-world business applications. More »
Secure Virtual Machine Execution under an Untrusted OS
A proposed virtualization architecture provides a secure run-time environment, network interface, and secondary storage for a guest VM, leading to improved security in an untrusted management environment. More »
Benchmarking Vulnerability Detection Tools
for Web Services
Learn about a benchmarking approach to assess and compare the effectiveness of vulnerability-detection tools in web services environments. More »
A Heuristic Algorithm for Trust-Oriented Service Provider Selection in Complex Social Networks
Searching for service providers via social networks requires the evaluation of those providers' trustworthiness along a social trust path. An efficient heuristic algorithm, H_OSTP, could solve this challenging problem. More »
A Reference Model for Master of Science Program
in Services Computing
Despite the increasing importance of services computing in the IT and business sectors, few systematic guidelines exist for building graduate programs in this field. This reference model can help academic institutions and accreditation agencies develop relevant curricula. More »
Services computing cuts across various disciplines to cover the science and technology of bridging the gap between business services and IT services. The underlying technology suite includes Web services and service-oriented architecture (SOA), cloud computing, business consulting methodology and utilities, and business process modeling, transformation, and integration. In terms of scope, services computing covers the whole lifecycle of the services innovation process, which includes
- business componentization,
- services modeling, creation, realization, annotation, deployment, discovery, composition, delivery, monitoring, optimization, and management, and
- service-to-service collaboration.
The goal of services computing is to enable IT services and computing technology to create, operate, and manage business services more efficiently and effectively.
In this month's theme, I would like to share with you some example papers from IEEE Transactions on Services Computing and conferences sponsored by the IEEE Computer Society's Technical Committee on Services Computing (TC-SVC).
In "Interacting with the SOA-Based Internet of Things: Discovery, Query, Selection, and On-Demand Provisioning of Web Services," Dominique Guinard and his coauthors apply the SOA concept to couple functionality of embedded real-world devices. Their infrastructure lets users dynamically query, select, and use real-world services.
In "Secure Virtual Machine Execution under an Untrusted OS," Chunxiao Li, Anand Raghunathan, and Niraj K. Jha attack one critical virtualization problem in cloud computing. They propose a virtualization architecture to provide a secure execution environment on a virtualized computing platform under the assumption of an untrusted management operating system.
In "Benchmarking Vulnerability Detection Tools for Web Services," Nuno Antunes and Marco Vieira propose a benchmarking approach to assess and compare the effectiveness of tools for detecting vulnerabilities in web services.
In "A Heuristic Algorithm for Trust-Oriented Service Provider Selection in Complex Social Networks," Guanfeng Liu and colleagues tackle the issue of finding trustworthy service providers through social networks. They propose a heuristic algorithm to find the optimal social trust path in a social network structure modeled as a Multi-Constrained Optimal Path (MCOP) selection problem.
In "A Reference Model for Master of Science Program in Services Computing," my coauthors and I present a reference model of a master's program in services computing, to serve as curriculum guidelines for academic institutions and accreditation agencies. The program recommends a set of core and elective courses.
I also take this opportunity to share with you some related links to information about major activities sponsored by TC-SVC and other resources. I hope that you enjoy this theme and find this information useful.
2012 Isn't the End of the World
The IPv4 address space will be exhausted by 2012 or sooner. It's time to implement IPv6 everywhere in the Internet and to assure full connectivity among all IPv6-capable devices and subnetworks. More »
Toward Mobile Eye-Based Human-Computer Interaction
Advances in mobile eye-tracking equipment and automated eye-movement analysis now allow for investigating eye movements during natural behavior and promise to bring eye-based interaction into people's everyday lives. More »
Security and Privacy Challenges in Cloud Computing Environments
Explore roadblocks and solutions to providing a trustworthy cloud computing environment. More »
The Dawn of Predictive Chip Yield Design: Along and Beyond the Memory Lane
A simulation technique that distorts the natural Monte Carlo sampling function produces more samples in important regions of the design space. More »
An Integrated Framework for Avatar Data Collection from the Virtual World
To mine the rich social media data in virtual worlds, an integrated framework combines bot- and spider-based approaches to collect avatar behavioral and profile data. More »
Advanced Architectures and Execution Models to Support Green Computing
Creating the next generation of power-efficient parallel computers requires rethinking. New execution models are required to span all scales, from desktop to supercomputer. More »
Where in the World Is Carmen Sandiego (and Is She a Software Engineer)?
Are cultural differences in how software engineering is practiced so profound that even a super spy couldn't fool her colleagues? More »
Using Tracing to Diagnose or Monitor Systems
In today's increasingly complex systems and multicore technologies, more and more problems can only be diagnosed via tracing tools. Here's a look at LTTng. More »