Results 1 - 10
of
1,121
Principled design of the modern web architecture
- ACM Trans. Internet Techn
"... The World Wide Web has succeeded in large part because its software architecture has been designed to meet the needs of an Internet-scale distributed hypermedia system. The modern Web architecture emphasizes scalability of component interactions, generality of interfaces, independent deployment of c ..."
Abstract
-
Cited by 531 (14 self)
- Add to MetaCart
The World Wide Web has succeeded in large part because its software architecture has been designed to meet the needs of an Internet-scale distributed hypermedia system. The modern Web architecture emphasizes scalability of component interactions, generality of interfaces, independent deployment of components, and intermediary components to reduce interaction latency, enforce security, and encapsulate legacy systems. In this paper, we introduce the Representational State Transfer (REST) architectural style, developed as an abstract model of the Web architecture to guide our redesign and definition of the Hypertext Transfer Protocol and Uniform Resource Identifiers. We describe the software engineering principles guiding REST and the interaction constraints chosen to retain those principles, contrasting them to the constraints of other architectural styles. We then compare the abstract model to the currently deployed Web architecture in order to elicit mismatches between the existing protocols and the applications they are intended to support.
An architecture for privacy-sensitive ubiquitous computing
- In MobiSYS ’04: Proceedings of the 2nd international conference on mobile systems, applications, and services
, 2004
"... Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in designing software architectures and in creating interactions that are effective in helping end-users manage their privacy ..."
Abstract
-
Cited by 231 (16 self)
- Add to MetaCart
(Show Context)
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in designing software architectures and in creating interactions that are effective in helping end-users manage their privacy. To address this problem, we present Confab, a toolkit for facilitating the development of privacy-sensitive ubiquitous computing applications. The requirements for Confab were gathered through an analysis of privacy needs for both end-users and application developers. Confab provides basic support for building ubiquitous computing applications, providing a framework as well as several customizable privacy mechanisms. Confab also comes with extensions for managing location privacy. Combined, these features allow application developers and end-users to support a spectrum of trust levels and privacy needs.
RESTful Web Services vs. “Big” Web Services: Making the Right Architectural Decision
- WWW 2008
, 2008
"... Recent technology trends in the Web Services (WS) domain indicate that a solution eliminating the presumed complexity of the WS- * standards may be in sight: advocates of REpresentational State Transfer (REST) have come to believe that their ideas explaining why the World Wide Web works are just as ..."
Abstract
-
Cited by 151 (16 self)
- Add to MetaCart
(Show Context)
Recent technology trends in the Web Services (WS) domain indicate that a solution eliminating the presumed complexity of the WS- * standards may be in sight: advocates of REpresentational State Transfer (REST) have come to believe that their ideas explaining why the World Wide Web works are just as applicable to solve enterprise application integration problems and to simplify the plumbing required to build service-oriented architectures. In this paper we objectify the WS- * vs. REST debate by giving a quantitative technical comparison based on architectural principles and decisions. We show that the two approaches differ in the number of architectural decisions that must be made and in the number of available alternatives. This discrepancy between freedom-from-choice and freedom-of-choice explains the complexity difference perceived. However, we also show that there are significant differences
Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control
, 2006
"... Permission is hereby granted to make and distribute verbatim copies of this document without royalty or fee. Permission is granted to quote excerpts from this documented provided the original source is properly cited. ii When separately written programs are composed so that they may cooperate, they ..."
Abstract
-
Cited by 124 (11 self)
- Add to MetaCart
(Show Context)
Permission is hereby granted to make and distribute verbatim copies of this document without royalty or fee. Permission is granted to quote excerpts from this documented provided the original source is properly cited. ii When separately written programs are composed so that they may cooperate, they may instead destructively interfere in unanticipated ways. These hazards limit the scale and functionality of the software systems we can successfully compose. This dissertation presents a framework for enabling those interactions between components needed for the cooperation we intend, while minimizing the hazards of destructive interference. Great progress on the composition problem has been made within the object paradigm, chiefly in the context of sequential, single-machine programming among benign components. We show how to extend this success to support robust composition of concurrent and potentially malicious components distributed over potentially malicious machines. We present E, a distributed, persistent, secure programming language, and CapDesk, a virus-safe desktop built in E, as embodiments of the techniques we explain.
Improved annotation of the blogosphere via autotagging and hierarchical clustering
, 2006
"... Tags have recently become popular as a means of annotating and organizing Web pages and blog entries. Advocates of tagging argue that the use of tags produces a ’folksonomy’, a system in which the meaning of a tag is determined by its use among the community as a whole. We analyze the effectiveness ..."
Abstract
-
Cited by 120 (1 self)
- Add to MetaCart
(Show Context)
Tags have recently become popular as a means of annotating and organizing Web pages and blog entries. Advocates of tagging argue that the use of tags produces a ’folksonomy’, a system in which the meaning of a tag is determined by its use among the community as a whole. We analyze the effectiveness of tags for classifying blog entries by gathering the top 350 tags from Technorati and measuring the similarity of all articles that share a tag. We find that tags are useful for grouping articles into broad categories, but less effective in indicating the particular content of an article. We then show that automatically extracting words deemed to be highly relevant can produce a more focused categorization of articles. We also show that clustering algorithms can be used to reconstruct a topical hierarchy among tags, and suggest that these approaches may be used to address some of the weaknesses in current tagging systems.
Amazon S3 for Science Grids: a Viable Solution?
"... Abstract – With the maturing of grid infrastructures, the interest in outsourcing the basic grid services is increasing. In science grids, data storage is one such fundamental service: indeed, in many virtual organizations terabytes of new data are produced each day and much more is processed. Recen ..."
Abstract
-
Cited by 105 (2 self)
- Add to MetaCart
(Show Context)
Abstract – With the maturing of grid infrastructures, the interest in outsourcing the basic grid services is increasing. In science grids, data storage is one such fundamental service: indeed, in many virtual organizations terabytes of new data are produced each day and much more is processed. Recently, Amazon.com has introduced a novel storage utility, the Simple Storage Service (S3). S3 aims to provide data storage as a low-cost, highly available service, with a simple ‘pay-as-you-go ’ billing model. This article evaluates S3 as a black box and reasons whether S3 is an appropriate service for science grids. In the process, it identifies requirements for a storage service for this particular type of community, including security features and a more diversified pool of storage resources with different capabilities and a more flexible pricing scheme. I.
BibSonomy: A social bookmark and publication sharing system
- Proceedings of the Conceptual Structures Tool Interoperability Workshop at the 14th International Conference on Conceptual Structures
, 2006
"... Abstract. Social bookmark tools are rapidly emerging on the Web. In such systems users are setting up lightweight conceptual structures called folksonomies. The reason for their immediate success is the fact that no specific skills are needed for participating. In this paper we specify a formal mode ..."
Abstract
-
Cited by 90 (12 self)
- Add to MetaCart
(Show Context)
Abstract. Social bookmark tools are rapidly emerging on the Web. In such systems users are setting up lightweight conceptual structures called folksonomies. The reason for their immediate success is the fact that no specific skills are needed for participating. In this paper we specify a formal model for folksonomies and briefly describe our own system BibSonomy, which allows for sharing both bookmarks and publication references in a kind of personal library. 1
hRESTS: an HTML Microformat for Describing RESTful Web Services
- In Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence (WI-08
, 2008
"... and other research outputs hRESTS: An HTML microformat for describing RESTful web services Conference Item How to cite: ..."
Abstract
-
Cited by 79 (5 self)
- Add to MetaCart
(Show Context)
and other research outputs hRESTS: An HTML microformat for describing RESTful web services Conference Item How to cite:
Non-Intrusive Monitoring and Service Adaptation for WS-BPEL
, 2008
"... Web service processes currently lack monitoring and dynamic (runtime) adaptation mechanisms. In highly dynamic processes, services frequently need to be exchanged due to a variety of reasons. In this paper we present VieDAME, a system which allows monitoring of BPEL processes according to Quality of ..."
Abstract
-
Cited by 77 (10 self)
- Add to MetaCart
Web service processes currently lack monitoring and dynamic (runtime) adaptation mechanisms. In highly dynamic processes, services frequently need to be exchanged due to a variety of reasons. In this paper we present VieDAME, a system which allows monitoring of BPEL processes according to Quality of Service (QoS) attributes and replacement of existing partner services based on various (pluggable) replacement strategies. The chosen replacement services can be syntactically or semantically equivalent to the BPEL interface. Services can be automatically replaced at runtime without any downtime of the overall system. We implemented our solution with an aspect-oriented approach by intercepting SOAP messages and allow services to be exchanged during runtime with little performance penalty costs, as shown in our experiments, thereby making our solution suitable for high-availability BPEL environments.