Conference Paper

Service Delivery Framework - An Architectural Strategy for Next-Generation Service Delivery in Business Network

SAP Res. (Brisbane), SAP AG, Brisbane, QLD, Australia
DOI: 10.1109/SRII.2011.15 Conference: SRII Global Conference (SRII), 2011 Annual
Source: IEEE Xplore

ABSTRACT The next-generation of service-oriented architecture (SOA) needs to scale for flexible service consumption, beyond organizational and application boundaries, into communities, ecosystems and business networks. In wider and, ultimately, global settings, new capabilities are needed so that business partners can efficiently and reliably enable, adapt and expose services. Those services can then be discovered, ordered, consumed, metered and paid for, through new applications and opportunities, driven by third-parties in the global "village". This trend is already underway, in different ways, through different early adopter market segments. This paper proposes an architectural strategy for the provisioning and delivery of services in communities, ecosystems and business networks - a Service Delivery Framework (SDF). The SDF is intended to support multiple industries and deployments where a SOA platform is needed for collaborating partners and diverse consumers. Specifically, it is envisaged that the SDF allows providers to publish their services into network directories so that they can be re-purposed, traded and consumed, and leveraging network utilities like B2B gateways and cloud hosting. To support these different facets of service delivery, the SDF extends the conventional service provider, service broker and service consumer of the Web Services Architecture to include service gateway, service hoster, service aggregator and service channel maker.

0 Bookmarks
 · 
124 Views
  • [Show abstract] [Hide abstract]
    ABSTRACT: Through the rise of cloud computing, on-demand applications, and business networks, services are increasingly being exposed and delivered on the Internet and through mobile communications. So far, services have mainly been described through technical interface descriptions. The description of business details, such as pricing, service-level, or licensing, has been neglected and is therefore hard to automatically process by service consumers. Also, third-party intermediaries, such as brokers, cloud providers, or channel partners, are interested in the business details in order to extend services and their delivery and, thus, further monetize services. In this paper, the constructivist design of the Unified Service Description Language (USDL), aimed at describing services across the human-to-automation continuum, is presented. The proposal of USDL follows well-defined requirements which are expressed against a common service discourse and synthesized from currently available service description efforts. USDL's concepts and modules are evaluated for their support of the different requirements and use cases.
    Information Systems. 03/2013; 38(1):155–181.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Security is a key barrier to the broader adoption of cloud computing. The real and perceived risks of providing, accessing and controlling services in multitenant cloud environments can slow or preclude the migration to services by IT organizations. In a non-virtualized environment, the separation provided by physical infrastructure is assumed to provide a level of protection for applications and data. In the cloud, this traditional physical isolation between applications no longer exists. Cloud infrastructure is multi-tenant, with multiple applications utilizing a shared common physical infrastructure. This provides the benefit of much more efficient resource utilization. However, because the physical barriers between applications have been eliminated, it is important to establish compensating security controls to minimize the potential for malware to spread through the cloud. Newer types of malware threats, such as rootkit attacks, can be increasingly difficult to detect using traditional antivirus products. These threats use various methods of concealment to remain undetected as they infect key system components such as hypervisors and drivers. This increases the likelihood that the malware can operate in the background, spread through a cloud environment, and cause greater damage over time. This paper explores challenges in deploying and managing services in a cloud infrastructure from a security perspective, and as an example, discusses work that Intel is doing with partners and the software vendor ecosystem to enable a security enhanced platform and solutions with security anchored and rooted in hardware and firmware to increase visibility and control in the cloud.
    SRII Global Conference (SRII), 2012 Annual; 01/2012
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Utility Computing has facilitated the creation of new markets that has made it possible to realize the long held dream of delivering IT as a Utility. Even though utility computing is in its nascent stage today, the proponents of utility computing envisage that it will become a commodity business in the upcoming time and utility service providers will meet all the IT requests of the companies. This paper takes a cross-sectional view at the emergence of utility computing along with different requirements needed to realize utility model. It also surveys the current trends in utility computing highlighting diverse architecture models aligned towards delivering IT as a utility. Different resource management systems for proficient allocation of resources have been listed together with various resource scheduling and pricing strategies used by them. Further, a review of generic key perspectives closely related to the concept of delivering IT as a Utility has been taken citing the contenders for the future enhancements in this technology in the form of Grid and Cloud Computing.
    06/2013;