SlideShare une entreprise Scribd logo
1  sur  12
E-Business:WebServices Page | 2
1. Introduction
We propose a model-driven approach, based on Web services standards,
for modeling and integrating agile business processes using Web services.
The choice of focusing on Web services technology was not arbitrary. The
large and broad adoption of this technology by enterprises will lead most
business processes to be performed using Web services. Besides, the
added value of Web services and their great interest to business process
management are beyond doubt. Web services produce, on the one hand,
loosely coupled applicative components.
On the other hand, they are the most widely used implementation
technology of SOA (Service-Oriented Architecture), which is based on the
large experiences of software and distributed component technologies.
Being founded on the XML (eXtensible Markup Language) language, the
SOAP (Simple Object Access Protocol) protocol and the UDDI (Universal
Description Discovery and Integration) repository, this technology can be
considered as an appropriate mean to ensure interoperability, data
exchange and the publication and discovery of business processes when
they can be implemented as Web services.
E-Business:WebServices Page | 3
Objectives
To benefit from Web services characteristics for managing business
processes. The purpose is to enable the production of agile business
processes through an enhanced modeling and dynamic integration.
A business process can be implemented by composing a set of published
Web services. Besides, agility can be achieved by the ability of updating a
given process through reuse of Web services dynamically discovered from
Internet.
2. Business process
A business process denotes a set of activities to be performed by given
actors through specific tools and methods according to a defined
procedure.
To specify business processes, it is therefore necessary to use concepts
such as activity, input, output, goal, role, resource and event.
Activity refers to tasks. It set of elementary tasks, homogeneous from the
point of view of their cost and performance behaviors, which produce an
output from a set of inputs.
Input is an object on what the activity must operate to produce an output.
The output is simply a result produced by the activity.
The goal of a given process is what this process aims to achieve or to
accomplish in order to meet the enterprise strategy.
The role refers to an expected behavior associated with a particular status
in the enterprise. It corresponds to a responsibility assigned to an internal
or external actor, which can be a person, group or a system.
E-Business:WebServices Page | 4
The event constitutes a fact that occurs and which can trigger an activity. It
can, for example, correspond to a time deadline or an occurring result
(output).
3. Languages and formalisms for modeling business processes
Many languages, formalisms or even frameworks have been developed
over time to meet that goal. The most important languages for business
processes are BPMN, UML and IDEF.
3.1 Business Process Model and Notation (BPMN)
BPMN is a flowchart representation of business processes. It aims to
provide, on the one hand, a fully graphical notation, easy to use and usable
at both business and technical levels, and on the other hand, a mechanism
to generate executable processes directly without using another language.
The objective of BPMN is to:
(1) support business process management, for both technical users and
business users, by providing a notation that is intuitive to business users,
yet able to represent complex process semantics.
E-Business:WebServices Page | 5
(2) To provide a standard notation readily understandable by all business
stakeholders. These include the business analysts who create and refine
the processes, the technical developers responsible for implementing
them, and the business managers who monitor and manage them.
4. Business process integration solutions
The integration consists in adopting a technique to ensure the coherence of
an information system constituted of different components, create
collaboration pathways, reuse functions, share data, and ensure the
agility of the enterprise information system. Various solutions have been
experimented to achieve the integration of applications. They can be
divided into seven classes, each one uses a specific technique:
a. Conversion
The conversion consists in using peer to peer converters in order to convert
the models and data exchange formats between applications. This type of
integration is chronologically the first integration technique that was
specifically used for data exchange. Using a converter allows converting
the sender’s data format into the receiver format. However, it requires
using as many converters as there are used formats. Thus, exchanging data
with an application which uses a new format requires conceiving a new
converter. Furthermore, it assumes that partners are known in advance,
and thereby it is adapted to A2A (Application to Application) integration
and not B2B (Business to Business) one.
E-Business:WebServices Page | 6
b. Standardization
The data integration solutions based on standardization have been
developed to avoid the problems of the converters-based integration. They
specifically consist in unifying representation and data exchange models.
This class include, as example: the XML-based standards.
c. Middlewares
The middlewares are used as intermediate softwarecomponents that make
applications communicate and abstract the heterogeneity of their
platforms. They mainly ensure messages transport and routing, but also
other services such as data transformation and transaction management.
Middlewares, such as JDBC (Java DataBase Connectivity) and ODBC (Open
DataBase Connectivity), ensure data access regardless of the databases
used.
Finally, the component-based middlewares have, in general, the advantage
of ensuring portability, security, scalability, and reusability.
d. ERP (Enterprise Resource Planning systems)
Enterpriseresourceplanning (ERP) is business management software—
usually a suite of integrated applications—that a company can useto
storeand manage data from every stage of business, including:
 Productplanning, cost and development
 Manufacturing
 Marketing and sales
 Inventory management
 Shipping and payment
E-Business:WebServices Page | 7
ERP provides an integrated real-time view of core business processes,
using common databases maintained by a database management
system. The applications that make up the system share data across the
various departments (manufacturing, purchasing, sales, accounting, etc.)
that entered the data. ERP facilitates information flow between all
business functions, and manages connections to outside stakeholders.
SAP, Oracle/Peoplesoft, SAGE ADONIX, and Microsoft are examples of
proprietary ERPs.
E-Business:WebServices Page | 8
e. BPEL (Business Process Execution Language Web Services)
It intended to execute business processes. Besides, it is fundamentally
based on the use of XML standard. This language allows interacting with
Web services to exchange XML data, and managing exceptions and
compensation in the case of rollback transactions.
In the BPEL context, each activity consists in a service invocation, a
message reception or transmission, or an exception (error message)
reception.
E-Business:WebServices Page | 9
Case Study:
As an example of a realistic case study, we consider a business
application, which is composed from a number of offered web
services. Furthermore there is an access control issue, as it
must be ensured that the web service consumer has the
necessary authority to execute the web services it requests.
The scenario is as follows. Several web services are combined to define
the business logic of an application. For example, consider an
application to find the nearest restaurant for a user and show it on a
map. This could involve web services for SMS and MMS handling in
addition to the User Location web service. Moreover, a user should not
be able to gain access to location information of an arbitrary user. This is
where the access control aspect becomes important.
E-Business:WebServices Page | 10
Therefore, in addition to the requested web services, the web service
provider may need to interact with some authorization component to
check that the current user has the correct authority to access the
requested information. In addition, the service provider may stipulate
some further conditions, such as that only one location request may be
made per session:
1. The user activates a service by sending an SMS to a service center
number. This is handled by an appropriate web service.
2. This initiates a start-session message to be sent to the Policy Access
Provider.
3. A notification is sent to the application that an SMS has arrived.
4. The application requests the user’s location from a location web
service.
5. The web service contacts the session manager within the policy
access provider to check the validity of the request.
6. If the validity check is OK the location web service will return the
location to the application, which uses it to construct the appropriate
map for the user.
7. This is then passed as an MMS to the MMS web service, which
delivers it to the user.
8. The MMS web service terminates the session with the Session
Manager.
E-Business:WebServices Page | 11
Q: Web services benefits for E-Business
Web services provide several technological and business
benefits, a few of which include:
 Application and data integration
 Versatility
 Code re-use
 Cost savings
Application and data integration
The inherent interoperability that comes with using vendor, platform,
and language independent XML technologies and the ubiquitous HTTP
as a transport mean that any application can communicate with any
other application using Web services.
Versatility
Web services are also versatile by design. They can be accessed by
humans via a Web-based client interface, or they can be accessed by
other applications and other Web services.
Code re-use
Instead of having to create a custom service for each unique
requirement, portions of a service are simply re-used as necessary.
Cost savings
All these benefits add up to significant cost savings.
E-Business:WebServices Page | 12
References
[1] Albrecht, C.C.; Dean, D.L. & Hansen, J.V. (2003). Market Place and
Technology Standards for B2Bpp. 188-209, Seattle, Washington, USA,
December 12-14, 2003
[2] Albrecht, C.C.; Dean, D.L. & Hansen, J.V. (2005). E-commerce:
Progress, Challenges, and the State of the Art, Information &
Management, Vol. 42, No. 6, (September 2005), pp. 865–875, ISSN
0378-7206

Contenu connexe

Tendances

WDSOA'05 Whitepaper: SOA and the Future of Application Development
WDSOA'05 Whitepaper: SOA and the Future of Application DevelopmentWDSOA'05 Whitepaper: SOA and the Future of Application Development
WDSOA'05 Whitepaper: SOA and the Future of Application DevelopmentRajesh Raheja
 
WEB PORTAL INTEGRATION ARCHITECTURE APPROACHES
WEB PORTAL INTEGRATION ARCHITECTURE APPROACHESWEB PORTAL INTEGRATION ARCHITECTURE APPROACHES
WEB PORTAL INTEGRATION ARCHITECTURE APPROACHESijwscjournal
 
Soa Primer
Soa PrimerSoa Primer
Soa Primervavasthi
 
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITY
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITYQOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITY
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITYcsandit
 
Service Oriented Architecture
Service Oriented ArchitectureService Oriented Architecture
Service Oriented ArchitectureMohamed Zaytoun
 
A Novel Framework for Reliable and Fault Tolerant Web Services
A Novel Framework for Reliable and Fault Tolerant Web ServicesA Novel Framework for Reliable and Fault Tolerant Web Services
A Novel Framework for Reliable and Fault Tolerant Web ServicesAbhishek Kumar
 
Study on Use Case Model for Service Oriented Architecture Development
Study on Use Case Model for Service Oriented Architecture DevelopmentStudy on Use Case Model for Service Oriented Architecture Development
Study on Use Case Model for Service Oriented Architecture Developmentijwtiir
 
SOA Fundamentals
SOA  FundamentalsSOA  Fundamentals
SOA Fundamentalsabhi1112
 
15 falko menge--_enterpise_service_bus
15 falko menge--_enterpise_service_bus15 falko menge--_enterpise_service_bus
15 falko menge--_enterpise_service_buslmphuong06
 
IT6801-Service Oriented Architecture
IT6801-Service Oriented ArchitectureIT6801-Service Oriented Architecture
IT6801-Service Oriented ArchitectureMadhu Amarnath
 
Service Oriented Architecture (SOA)
Service Oriented Architecture (SOA)Service Oriented Architecture (SOA)
Service Oriented Architecture (SOA)Biniam Asnake
 
03 Service Oriented Architecture Series - Basic SOA Architecture
03 Service Oriented Architecture Series - Basic SOA Architecture03 Service Oriented Architecture Series - Basic SOA Architecture
03 Service Oriented Architecture Series - Basic SOA ArchitecturePouria Ghatrenabi
 
CBSE VS SOA SJSU Presentation
CBSE VS SOA SJSU PresentationCBSE VS SOA SJSU Presentation
CBSE VS SOA SJSU Presentationmgp1560
 
Chapter 1 introduction
Chapter 1 introductionChapter 1 introduction
Chapter 1 introductionjam c
 

Tendances (19)

WDSOA'05 Whitepaper: SOA and the Future of Application Development
WDSOA'05 Whitepaper: SOA and the Future of Application DevelopmentWDSOA'05 Whitepaper: SOA and the Future of Application Development
WDSOA'05 Whitepaper: SOA and the Future of Application Development
 
WEB PORTAL INTEGRATION ARCHITECTURE APPROACHES
WEB PORTAL INTEGRATION ARCHITECTURE APPROACHESWEB PORTAL INTEGRATION ARCHITECTURE APPROACHES
WEB PORTAL INTEGRATION ARCHITECTURE APPROACHES
 
Soa Primer
Soa PrimerSoa Primer
Soa Primer
 
Service oriented architecture 27 May 2014
Service oriented architecture 27 May 2014Service oriented architecture 27 May 2014
Service oriented architecture 27 May 2014
 
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITY
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITYQOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITY
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITY
 
Service Oriented Architecture
Service Oriented ArchitectureService Oriented Architecture
Service Oriented Architecture
 
A Novel Framework for Reliable and Fault Tolerant Web Services
A Novel Framework for Reliable and Fault Tolerant Web ServicesA Novel Framework for Reliable and Fault Tolerant Web Services
A Novel Framework for Reliable and Fault Tolerant Web Services
 
Study on Use Case Model for Service Oriented Architecture Development
Study on Use Case Model for Service Oriented Architecture DevelopmentStudy on Use Case Model for Service Oriented Architecture Development
Study on Use Case Model for Service Oriented Architecture Development
 
SOA Fundamentals
SOA  FundamentalsSOA  Fundamentals
SOA Fundamentals
 
15 falko menge--_enterpise_service_bus
15 falko menge--_enterpise_service_bus15 falko menge--_enterpise_service_bus
15 falko menge--_enterpise_service_bus
 
Web services-Notes
Web services-NotesWeb services-Notes
Web services-Notes
 
Building Service Oriented Architecture based applications
Building Service Oriented Architecture based applicationsBuilding Service Oriented Architecture based applications
Building Service Oriented Architecture based applications
 
IT6801-Service Oriented Architecture
IT6801-Service Oriented ArchitectureIT6801-Service Oriented Architecture
IT6801-Service Oriented Architecture
 
Service Oriented Architecture (SOA)
Service Oriented Architecture (SOA)Service Oriented Architecture (SOA)
Service Oriented Architecture (SOA)
 
03 Service Oriented Architecture Series - Basic SOA Architecture
03 Service Oriented Architecture Series - Basic SOA Architecture03 Service Oriented Architecture Series - Basic SOA Architecture
03 Service Oriented Architecture Series - Basic SOA Architecture
 
CBSE VS SOA SJSU Presentation
CBSE VS SOA SJSU PresentationCBSE VS SOA SJSU Presentation
CBSE VS SOA SJSU Presentation
 
Chapter 1 introduction
Chapter 1 introductionChapter 1 introduction
Chapter 1 introduction
 
SOA Principles : 8. service statelessness
SOA Principles : 8. service statelessnessSOA Principles : 8. service statelessness
SOA Principles : 8. service statelessness
 
Soa chapter 5
Soa chapter 5Soa chapter 5
Soa chapter 5
 

En vedette

Link Analysis in Networks - or - Finding the Terrorists
Link Analysis in Networks - or - Finding the TerroristsLink Analysis in Networks - or - Finding the Terrorists
Link Analysis in Networks - or - Finding the TerroristsJames McGivern
 
Template Matching - Pattern Recognition
Template Matching - Pattern RecognitionTemplate Matching - Pattern Recognition
Template Matching - Pattern RecognitionMustafa Salam
 
Data Mining: Text and web mining
Data Mining: Text and web miningData Mining: Text and web mining
Data Mining: Text and web miningDataminingTools Inc
 
Link Analysis and Link Building in a Penguin and Disavow World
Link Analysis and Link Building in a Penguin and Disavow WorldLink Analysis and Link Building in a Penguin and Disavow World
Link Analysis and Link Building in a Penguin and Disavow WorldChristoph C. Cemper
 
LinkSUM: Using Link Analysis to Summarize Entity Data
LinkSUM: Using Link Analysis to Summarize Entity DataLinkSUM: Using Link Analysis to Summarize Entity Data
LinkSUM: Using Link Analysis to Summarize Entity DataAndreas Thalhammer
 
Tutorial 7 (link analysis)
Tutorial 7 (link analysis)Tutorial 7 (link analysis)
Tutorial 7 (link analysis)Kira
 
Sample - Extending IBM i2 Analysis with G2 Research
Sample - Extending IBM i2 Analysis with G2 ResearchSample - Extending IBM i2 Analysis with G2 Research
Sample - Extending IBM i2 Analysis with G2 ResearchG2 Research Ltd.
 
Link analysis .. Data Mining
Link analysis .. Data MiningLink analysis .. Data Mining
Link analysis .. Data MiningMustafa Salam
 
How to Combine SEO, Blogging, and Social Media For Results HubSpot
How to Combine SEO, Blogging, and Social Media For Results HubSpotHow to Combine SEO, Blogging, and Social Media For Results HubSpot
How to Combine SEO, Blogging, and Social Media For Results HubSpotHubSpot
 
Three Steps to Link Analysis Insight
Three Steps to Link Analysis InsightThree Steps to Link Analysis Insight
Three Steps to Link Analysis InsightSdushko
 

En vedette (12)

Link Analysis in Networks - or - Finding the Terrorists
Link Analysis in Networks - or - Finding the TerroristsLink Analysis in Networks - or - Finding the Terrorists
Link Analysis in Networks - or - Finding the Terrorists
 
Template Matching - Pattern Recognition
Template Matching - Pattern RecognitionTemplate Matching - Pattern Recognition
Template Matching - Pattern Recognition
 
Data Mining: Text and web mining
Data Mining: Text and web miningData Mining: Text and web mining
Data Mining: Text and web mining
 
Data mining
Data miningData mining
Data mining
 
Link Analysis and Link Building in a Penguin and Disavow World
Link Analysis and Link Building in a Penguin and Disavow WorldLink Analysis and Link Building in a Penguin and Disavow World
Link Analysis and Link Building in a Penguin and Disavow World
 
LinkSUM: Using Link Analysis to Summarize Entity Data
LinkSUM: Using Link Analysis to Summarize Entity DataLinkSUM: Using Link Analysis to Summarize Entity Data
LinkSUM: Using Link Analysis to Summarize Entity Data
 
Tutorial 7 (link analysis)
Tutorial 7 (link analysis)Tutorial 7 (link analysis)
Tutorial 7 (link analysis)
 
Sample - Extending IBM i2 Analysis with G2 Research
Sample - Extending IBM i2 Analysis with G2 ResearchSample - Extending IBM i2 Analysis with G2 Research
Sample - Extending IBM i2 Analysis with G2 Research
 
Link Analysis
Link AnalysisLink Analysis
Link Analysis
 
Link analysis .. Data Mining
Link analysis .. Data MiningLink analysis .. Data Mining
Link analysis .. Data Mining
 
How to Combine SEO, Blogging, and Social Media For Results HubSpot
How to Combine SEO, Blogging, and Social Media For Results HubSpotHow to Combine SEO, Blogging, and Social Media For Results HubSpot
How to Combine SEO, Blogging, and Social Media For Results HubSpot
 
Three Steps to Link Analysis Insight
Three Steps to Link Analysis InsightThree Steps to Link Analysis Insight
Three Steps to Link Analysis Insight
 

Similaire à Web Services-Enhanced Agile Modeling and Integrating Business Processes

EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATIONEVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATIONijwscjournal
 
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATIONEVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATIONijwscjournal
 
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATIONEVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATIONijwscjournal
 
Connected Banking Framework
Connected Banking FrameworkConnected Banking Framework
Connected Banking FrameworkKashif Akram
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Evaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web ServicesEvaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web ServicesIRJET Journal
 
Finite State Machine Based Evaluation Model For Web Service Reliability Analysis
Finite State Machine Based Evaluation Model For Web Service Reliability AnalysisFinite State Machine Based Evaluation Model For Web Service Reliability Analysis
Finite State Machine Based Evaluation Model For Web Service Reliability Analysisdannyijwest
 
AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06Jay van Zyl
 
Designing and implementing the
Designing and implementing theDesigning and implementing the
Designing and implementing theijait
 
Agent-Based Workflow
Agent-Based WorkflowAgent-Based Workflow
Agent-Based WorkflowLarry Suarez
 
Introducing BizTalk Server 2009
Introducing BizTalk Server 2009Introducing BizTalk Server 2009
Introducing BizTalk Server 2009diTii
 
A Business Process-Centric Approach To Financial Transactions
A Business Process-Centric Approach To Financial TransactionsA Business Process-Centric Approach To Financial Transactions
A Business Process-Centric Approach To Financial Transactionscorbanmiferreira
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
CONFIGURATION INERPSAAS MULTI-TENANCY
CONFIGURATION INERPSAAS MULTI-TENANCYCONFIGURATION INERPSAAS MULTI-TENANCY
CONFIGURATION INERPSAAS MULTI-TENANCYijcseit
 
Configuration inerpsaas multi tenancy
Configuration inerpsaas multi tenancyConfiguration inerpsaas multi tenancy
Configuration inerpsaas multi tenancyijcseit
 
Top 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringTop 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringConvetit
 
TOWARDS AUTOMATION OF SOA-BASED BUSINESS PROCESSES
TOWARDS AUTOMATION OF SOA-BASED BUSINESS PROCESSESTOWARDS AUTOMATION OF SOA-BASED BUSINESS PROCESSES
TOWARDS AUTOMATION OF SOA-BASED BUSINESS PROCESSESIJCSEA Journal
 
Converged open platform for enterprise
Converged open platform for enterpriseConverged open platform for enterprise
Converged open platform for enterpriseRoger Xia
 
whitepaper_workday_technology_platform_devt_process
whitepaper_workday_technology_platform_devt_processwhitepaper_workday_technology_platform_devt_process
whitepaper_workday_technology_platform_devt_processEric Saraceno
 

Similaire à Web Services-Enhanced Agile Modeling and Integrating Business Processes (20)

EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATIONEVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
 
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATIONEVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
 
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATIONEVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
 
Connected Banking Framework
Connected Banking FrameworkConnected Banking Framework
Connected Banking Framework
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Evaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web ServicesEvaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web Services
 
Finite State Machine Based Evaluation Model For Web Service Reliability Analysis
Finite State Machine Based Evaluation Model For Web Service Reliability AnalysisFinite State Machine Based Evaluation Model For Web Service Reliability Analysis
Finite State Machine Based Evaluation Model For Web Service Reliability Analysis
 
AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06
 
Designing and implementing the
Designing and implementing theDesigning and implementing the
Designing and implementing the
 
Agent-Based Workflow
Agent-Based WorkflowAgent-Based Workflow
Agent-Based Workflow
 
chapter 2.pdf
chapter 2.pdfchapter 2.pdf
chapter 2.pdf
 
Introducing BizTalk Server 2009
Introducing BizTalk Server 2009Introducing BizTalk Server 2009
Introducing BizTalk Server 2009
 
A Business Process-Centric Approach To Financial Transactions
A Business Process-Centric Approach To Financial TransactionsA Business Process-Centric Approach To Financial Transactions
A Business Process-Centric Approach To Financial Transactions
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
CONFIGURATION INERPSAAS MULTI-TENANCY
CONFIGURATION INERPSAAS MULTI-TENANCYCONFIGURATION INERPSAAS MULTI-TENANCY
CONFIGURATION INERPSAAS MULTI-TENANCY
 
Configuration inerpsaas multi tenancy
Configuration inerpsaas multi tenancyConfiguration inerpsaas multi tenancy
Configuration inerpsaas multi tenancy
 
Top 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringTop 8 Trends in Performance Engineering
Top 8 Trends in Performance Engineering
 
TOWARDS AUTOMATION OF SOA-BASED BUSINESS PROCESSES
TOWARDS AUTOMATION OF SOA-BASED BUSINESS PROCESSESTOWARDS AUTOMATION OF SOA-BASED BUSINESS PROCESSES
TOWARDS AUTOMATION OF SOA-BASED BUSINESS PROCESSES
 
Converged open platform for enterprise
Converged open platform for enterpriseConverged open platform for enterprise
Converged open platform for enterprise
 
whitepaper_workday_technology_platform_devt_process
whitepaper_workday_technology_platform_devt_processwhitepaper_workday_technology_platform_devt_process
whitepaper_workday_technology_platform_devt_process
 

Plus de Mustafa Salam

Switch-based Interconnection Networks 2
Switch-based Interconnection Networks 2Switch-based Interconnection Networks 2
Switch-based Interconnection Networks 2Mustafa Salam
 
Interconnection Networks 1
Interconnection Networks 1Interconnection Networks 1
Interconnection Networks 1Mustafa Salam
 
Arabic Handwritten Text Recognition and Writer Identification
Arabic Handwritten Text Recognition and Writer IdentificationArabic Handwritten Text Recognition and Writer Identification
Arabic Handwritten Text Recognition and Writer IdentificationMustafa Salam
 
The Burrows-Wheeler Algorithm
The Burrows-Wheeler AlgorithmThe Burrows-Wheeler Algorithm
The Burrows-Wheeler AlgorithmMustafa Salam
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategyMustafa Salam
 
Cuckoo Search & Firefly Algorithms
Cuckoo Search & Firefly AlgorithmsCuckoo Search & Firefly Algorithms
Cuckoo Search & Firefly AlgorithmsMustafa Salam
 
Cloud technology (Mashup) + Case Study
Cloud technology (Mashup) + Case StudyCloud technology (Mashup) + Case Study
Cloud technology (Mashup) + Case StudyMustafa Salam
 

Plus de Mustafa Salam (9)

Switch-based Interconnection Networks 2
Switch-based Interconnection Networks 2Switch-based Interconnection Networks 2
Switch-based Interconnection Networks 2
 
Interconnection Networks 1
Interconnection Networks 1Interconnection Networks 1
Interconnection Networks 1
 
Parallel Processing
Parallel ProcessingParallel Processing
Parallel Processing
 
Arabic Handwritten Text Recognition and Writer Identification
Arabic Handwritten Text Recognition and Writer IdentificationArabic Handwritten Text Recognition and Writer Identification
Arabic Handwritten Text Recognition and Writer Identification
 
The Burrows-Wheeler Algorithm
The Burrows-Wheeler AlgorithmThe Burrows-Wheeler Algorithm
The Burrows-Wheeler Algorithm
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
 
Cuckoo Search & Firefly Algorithms
Cuckoo Search & Firefly AlgorithmsCuckoo Search & Firefly Algorithms
Cuckoo Search & Firefly Algorithms
 
Cloud technology (Mashup) + Case Study
Cloud technology (Mashup) + Case StudyCloud technology (Mashup) + Case Study
Cloud technology (Mashup) + Case Study
 
Color Models
Color ModelsColor Models
Color Models
 

Dernier

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Dernier (20)

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Web Services-Enhanced Agile Modeling and Integrating Business Processes

  • 1.
  • 2. E-Business:WebServices Page | 2 1. Introduction We propose a model-driven approach, based on Web services standards, for modeling and integrating agile business processes using Web services. The choice of focusing on Web services technology was not arbitrary. The large and broad adoption of this technology by enterprises will lead most business processes to be performed using Web services. Besides, the added value of Web services and their great interest to business process management are beyond doubt. Web services produce, on the one hand, loosely coupled applicative components. On the other hand, they are the most widely used implementation technology of SOA (Service-Oriented Architecture), which is based on the large experiences of software and distributed component technologies. Being founded on the XML (eXtensible Markup Language) language, the SOAP (Simple Object Access Protocol) protocol and the UDDI (Universal Description Discovery and Integration) repository, this technology can be considered as an appropriate mean to ensure interoperability, data exchange and the publication and discovery of business processes when they can be implemented as Web services.
  • 3. E-Business:WebServices Page | 3 Objectives To benefit from Web services characteristics for managing business processes. The purpose is to enable the production of agile business processes through an enhanced modeling and dynamic integration. A business process can be implemented by composing a set of published Web services. Besides, agility can be achieved by the ability of updating a given process through reuse of Web services dynamically discovered from Internet. 2. Business process A business process denotes a set of activities to be performed by given actors through specific tools and methods according to a defined procedure. To specify business processes, it is therefore necessary to use concepts such as activity, input, output, goal, role, resource and event. Activity refers to tasks. It set of elementary tasks, homogeneous from the point of view of their cost and performance behaviors, which produce an output from a set of inputs. Input is an object on what the activity must operate to produce an output. The output is simply a result produced by the activity. The goal of a given process is what this process aims to achieve or to accomplish in order to meet the enterprise strategy. The role refers to an expected behavior associated with a particular status in the enterprise. It corresponds to a responsibility assigned to an internal or external actor, which can be a person, group or a system.
  • 4. E-Business:WebServices Page | 4 The event constitutes a fact that occurs and which can trigger an activity. It can, for example, correspond to a time deadline or an occurring result (output). 3. Languages and formalisms for modeling business processes Many languages, formalisms or even frameworks have been developed over time to meet that goal. The most important languages for business processes are BPMN, UML and IDEF. 3.1 Business Process Model and Notation (BPMN) BPMN is a flowchart representation of business processes. It aims to provide, on the one hand, a fully graphical notation, easy to use and usable at both business and technical levels, and on the other hand, a mechanism to generate executable processes directly without using another language. The objective of BPMN is to: (1) support business process management, for both technical users and business users, by providing a notation that is intuitive to business users, yet able to represent complex process semantics.
  • 5. E-Business:WebServices Page | 5 (2) To provide a standard notation readily understandable by all business stakeholders. These include the business analysts who create and refine the processes, the technical developers responsible for implementing them, and the business managers who monitor and manage them. 4. Business process integration solutions The integration consists in adopting a technique to ensure the coherence of an information system constituted of different components, create collaboration pathways, reuse functions, share data, and ensure the agility of the enterprise information system. Various solutions have been experimented to achieve the integration of applications. They can be divided into seven classes, each one uses a specific technique: a. Conversion The conversion consists in using peer to peer converters in order to convert the models and data exchange formats between applications. This type of integration is chronologically the first integration technique that was specifically used for data exchange. Using a converter allows converting the sender’s data format into the receiver format. However, it requires using as many converters as there are used formats. Thus, exchanging data with an application which uses a new format requires conceiving a new converter. Furthermore, it assumes that partners are known in advance, and thereby it is adapted to A2A (Application to Application) integration and not B2B (Business to Business) one.
  • 6. E-Business:WebServices Page | 6 b. Standardization The data integration solutions based on standardization have been developed to avoid the problems of the converters-based integration. They specifically consist in unifying representation and data exchange models. This class include, as example: the XML-based standards. c. Middlewares The middlewares are used as intermediate softwarecomponents that make applications communicate and abstract the heterogeneity of their platforms. They mainly ensure messages transport and routing, but also other services such as data transformation and transaction management. Middlewares, such as JDBC (Java DataBase Connectivity) and ODBC (Open DataBase Connectivity), ensure data access regardless of the databases used. Finally, the component-based middlewares have, in general, the advantage of ensuring portability, security, scalability, and reusability. d. ERP (Enterprise Resource Planning systems) Enterpriseresourceplanning (ERP) is business management software— usually a suite of integrated applications—that a company can useto storeand manage data from every stage of business, including:  Productplanning, cost and development  Manufacturing  Marketing and sales  Inventory management  Shipping and payment
  • 7. E-Business:WebServices Page | 7 ERP provides an integrated real-time view of core business processes, using common databases maintained by a database management system. The applications that make up the system share data across the various departments (manufacturing, purchasing, sales, accounting, etc.) that entered the data. ERP facilitates information flow between all business functions, and manages connections to outside stakeholders. SAP, Oracle/Peoplesoft, SAGE ADONIX, and Microsoft are examples of proprietary ERPs.
  • 8. E-Business:WebServices Page | 8 e. BPEL (Business Process Execution Language Web Services) It intended to execute business processes. Besides, it is fundamentally based on the use of XML standard. This language allows interacting with Web services to exchange XML data, and managing exceptions and compensation in the case of rollback transactions. In the BPEL context, each activity consists in a service invocation, a message reception or transmission, or an exception (error message) reception.
  • 9. E-Business:WebServices Page | 9 Case Study: As an example of a realistic case study, we consider a business application, which is composed from a number of offered web services. Furthermore there is an access control issue, as it must be ensured that the web service consumer has the necessary authority to execute the web services it requests. The scenario is as follows. Several web services are combined to define the business logic of an application. For example, consider an application to find the nearest restaurant for a user and show it on a map. This could involve web services for SMS and MMS handling in addition to the User Location web service. Moreover, a user should not be able to gain access to location information of an arbitrary user. This is where the access control aspect becomes important.
  • 10. E-Business:WebServices Page | 10 Therefore, in addition to the requested web services, the web service provider may need to interact with some authorization component to check that the current user has the correct authority to access the requested information. In addition, the service provider may stipulate some further conditions, such as that only one location request may be made per session: 1. The user activates a service by sending an SMS to a service center number. This is handled by an appropriate web service. 2. This initiates a start-session message to be sent to the Policy Access Provider. 3. A notification is sent to the application that an SMS has arrived. 4. The application requests the user’s location from a location web service. 5. The web service contacts the session manager within the policy access provider to check the validity of the request. 6. If the validity check is OK the location web service will return the location to the application, which uses it to construct the appropriate map for the user. 7. This is then passed as an MMS to the MMS web service, which delivers it to the user. 8. The MMS web service terminates the session with the Session Manager.
  • 11. E-Business:WebServices Page | 11 Q: Web services benefits for E-Business Web services provide several technological and business benefits, a few of which include:  Application and data integration  Versatility  Code re-use  Cost savings Application and data integration The inherent interoperability that comes with using vendor, platform, and language independent XML technologies and the ubiquitous HTTP as a transport mean that any application can communicate with any other application using Web services. Versatility Web services are also versatile by design. They can be accessed by humans via a Web-based client interface, or they can be accessed by other applications and other Web services. Code re-use Instead of having to create a custom service for each unique requirement, portions of a service are simply re-used as necessary. Cost savings All these benefits add up to significant cost savings.
  • 12. E-Business:WebServices Page | 12 References [1] Albrecht, C.C.; Dean, D.L. & Hansen, J.V. (2003). Market Place and Technology Standards for B2Bpp. 188-209, Seattle, Washington, USA, December 12-14, 2003 [2] Albrecht, C.C.; Dean, D.L. & Hansen, J.V. (2005). E-commerce: Progress, Challenges, and the State of the Art, Information & Management, Vol. 42, No. 6, (September 2005), pp. 865–875, ISSN 0378-7206