Service Delivery Framework - An Architectural Strategy for Next-Generation Service Delivery in Business Network
SAP Res. (Brisbane), SAP AG, Brisbane, QLD, Australia
DOI: 10.1109/SRII.2011.15 Conference: SRII Global Conference (SRII), 2011 Annual
The next-generation of service-oriented architecture (SOA) needs to scale for flexible service consumption, beyond organizational and application boundaries, into communities, ecosystems and business networks. In wider and, ultimately, global settings, new capabilities are needed so that business partners can efficiently and reliably enable, adapt and expose services. Those services can then be discovered, ordered, consumed, metered and paid for, through new applications and opportunities, driven by third-parties in the global "village". This trend is already underway, in different ways, through different early adopter market segments. This paper proposes an architectural strategy for the provisioning and delivery of services in communities, ecosystems and business networks - a Service Delivery Framework (SDF). The SDF is intended to support multiple industries and deployments where a SOA platform is needed for collaborating partners and diverse consumers. Specifically, it is envisaged that the SDF allows providers to publish their services into network directories so that they can be re-purposed, traded and consumed, and leveraging network utilities like B2B gateways and cloud hosting. To support these different facets of service delivery, the SDF extends the conventional service provider, service broker and service consumer of the Web Services Architecture to include service gateway, service hoster, service aggregator and service channel maker.
Available from: Luis Camarinha-Matos
- "The fast adoption of cloud computing services is deepening dependencies and raising the need for new interoperable frameworks able to support moving between alternative providers. In spite of the new possibilities brought by cloud computing, namely a growing trend for business process outsourcing and proposals to structure service delivery frameworks for communities, ecosystems and business networks, interoperability among approaches remains a main issue. Even if each individual subsystem is compliant with well-established operational service level agreement (SLA), the control of the commitments depends on more than one internal IT system, what makes its satisfaction difficult to manage and maintain. "
[Show abstract] [Hide abstract]
ABSTRACT: The development of the Single Window concept (unique access/contact point for composite services) for the multimodal door-to-door freight transport management is a complex endeavour that is being addressed by the European MIELE project. Led by port authorities, the project identified the need for a novel strategy to foster collaboration among stakeholders with a diversity of processes and technology. The multimodal perspective requires a convergence and thus collaboration of maritime, railway, road, and air transport facilities as it is the case for the need of traffic information for a real-time (re)planning if some accident is hindering the current route. This requires that traffic information from different operators is integrated into the freight transport routing planner. Furthermore, a unified coordination and operations management of the existing business processes is lacking. To integrate such contexts, an open enterprise collaboration network (ECoNet) infrastructure is presented and discussed. © IFIP International Federation for Information Processing 2013.
Available from: Orestis Terzidis
[Show abstract] [Hide abstract]
ABSTRACT: Security is a key barrier to the broader adoption of cloud computing. The real and perceived risks of providing, accessing and controlling services in multitenant cloud environments can slow or preclude the migration to services by IT organizations. In a non-virtualized environment, the separation provided by physical infrastructure is assumed to provide a level of protection for applications and data. In the cloud, this traditional physical isolation between applications no longer exists. Cloud infrastructure is multi-tenant, with multiple applications utilizing a shared common physical infrastructure. This provides the benefit of much more efficient resource utilization. However, because the physical barriers between applications have been eliminated, it is important to establish compensating security controls to minimize the potential for malware to spread through the cloud. Newer types of malware threats, such as rootkit attacks, can be increasingly difficult to detect using traditional antivirus products. These threats use various methods of concealment to remain undetected as they infect key system components such as hypervisors and drivers. This increases the likelihood that the malware can operate in the background, spread through a cloud environment, and cause greater damage over time. This paper explores challenges in deploying and managing services in a cloud infrastructure from a security perspective, and as an example, discusses work that Intel is doing with partners and the software vendor ecosystem to enable a security enhanced platform and solutions with security anchored and rooted in hardware and firmware to increase visibility and control in the cloud.
Data provided are for informational purposes only. Although carefully collected, accuracy cannot be guaranteed. The impact factor represents a rough estimation of the journal's impact factor and does not reflect the actual current impact factor. Publisher conditions are provided by RoMEO. Differing provisions from the publisher's actual policy or licence agreement may be applicable.