Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Dynamic management of UDDI registries in a wireless environment of web services: Concepts, architecture, operation, and deployment

Published: 01 April 2007 Publication History

Abstract

This paper presents mechanisms for the dynamic management of the content of several Universal Description, Discovery, and Integration (UDDI) registries. These mechanisms are deployed in the context of a wireless environment of Web services. By content, it is meant the announcements of Web services that providers submit to a UDDI registry. Unlike other initiatives in the Web services domain that consider a single UDDI registry and a wired communication infrastructure, this paper is concerned with the fact that: several UDDI registries are deployed, there is no wired communication infrastructure between the UDDI registries, and absence of a centralized component for coordinating the UDDI-registries. The solution presented integrates users and software agents into what we call messengers. Initially, software agents reside in users' mobile devices and cache a description of the Web services that satisfy their users' needs. Each time a user is in the vicinity of a UDDI registry, her software agent interacts with that registry, so the details stored on Web services are submitted.

References

[1]
Abowd, G., Iftode, L., & Mitchell, H. (2005). The smart phone: A first platform for pervasive computing (Guest editors' introduction). IEEE Pervasive Computing, 4(2), 18-19. (April-June).
[2]
Bagci, F., Petzold, J., Trumler, W., & Ungerer, T. (2003). Ubiquitous mobile agent system in a P2P-network. In Proceedings of the System Support for Ubiquitous Computing Workshop at the Fifth Annual Conference on Ubiquitous Computing (UbiComp'2003), Seattle, Washington. Berlin Heidelberg New York: Springer.
[3]
Bellavista, P., Corradi, A., & Stefanelli, C. (2002). The ubiquitous provisioning of internet services to portable devices. IEEE Pervasive Computing, 1(3), 81-87. (July/September).
[4]
Bellur, U., & Narendra, N. C. (2005). Towards service orientation in pervasive computing systems. In Proceedings of the International Conference of Information Technology Code and Computing (ITCC'2005), Las Vegas, USA, (pp. 289-295). Washington, DC: IEEE Computer Society.
[5]
Benatallah, B., Sheng, Q. Z., & Dumas, M. (2003). The Self-Serv environment for web services composition. IEEE Internet Computing, 7(1), 40-48. (January/February).
[6]
Brézillon, P. (2003). Focusing on context in human-centered computing. IEEE Intelligent Systems, 18(3), 62-66. (May/June).
[7]
Budak Arpinar, I., Aleman-Meza, B., Zhang, R., & Maduko, A. (2004). Ontology-driven web services composition platform. In Proceedings of the IEEE International Conference on E-commerce Technology (CEC'2004) San Diego, USA(pp. 146-152). Washington, DC: IEEE Computer Society.
[8]
Casati, F., Shan, E., Dayal, U., & Shah, M.-C. (2003). Business-oriented management of web services. Communications of the ACM, 46(10), 55-60. (October).
[9]
Castano, A., Ferrara, S., Montanelli, S., Pagani, E., & Rossi, G. P. (2003). Ontology-addressable contents in P2P networks. In Proceedings of the First Workshop on Semantics in Peer-to-peer and Grid Computing held in Conjunction with the Twelfth International World Wide Web Conference (WWW'2003) Budapest, Hungary (pp. 55-68). New York, NY: ACM.
[10]
Curbera, F., Duftler, M., Khalaf, R., Nagy, W., Mukhi, N., & Weerawarana, S. (2002). Unraveling the web services web: An introduction to SOAP, WSDL, and UDDI. IEEE Internet Computing, 6(2), 86-93. (March/April).
[11]
Gupta, V., & Gupta, S. (2001). KSSL: Experiments in wireless internet security. Technical report, Sun Microsystems, SMLI TR-2001-103.
[12]
Hristova, N., O'Hare, G. M. P., & Lowen, T. (2003). Agent-based ubiquitous systems: 9 lessons learnt. In Proceedings of the System Support for Ubiquitous Computing Workshop at the Fifth Annual Conference on Ubiquitous Computing (UbiComp'2003) Seattle, Washington. Berlin Heidelberg New York: Springer.
[13]
Huhns, M. (2002). Agents as web services. IEEE Internet Computing, 6(4), 93-95. (July/August).
[14]
Ishibashi, B., & Bouataba, R. (2005). Topology and mobility considerations in mobile ad hoc networks. In Ad Hoc Networks Journal. (Elsevier)(in press).
[15]
Jennings, N., Sycara, K., & Wooldridge, M. (1998). A roadmap of agent research and development. Autonomous Agents and Multi-agent Systems, 1(1), 7-38. (Kluwer Academic Publishers).
[16]
José, R., Moreira, A., & Rodrigues, H. (2003). The AROUND architecture for dynamic location-based services. Mobile Networks and Applications, 8(4), 377-387. (Kluwer Academic Publishers).
[17]
Karakasidis, A., & Pitoura, E. (2002). DBGlobe: A data-centric approach to global computing. In Proceedings of the 22nd International Conference on Distributed Computing Systems Workshops (ICDCSW'2002) Vienna, Austria(pp. 735-740). Washington, DC: IEEE Computer Society.
[18]
Kim, M., & Kotz, D. (2005). Classifying the mobility of users and the popularity of access points. In Proceedings of the International Workshop on Location-and Context-awareness (LoCA'2005) held in conjunction with the Third International Conference on Pervasive Computing(PERVASIVE'2005)X Munich, Germany(pp. 19-24). Berkeley, CA: USENIX.
[19]
Kuno, H., & Sahai, A. (2002). My agent wants to talk to your service: Personalizing web services through agents. Technical Report HPL-2002-114, HP Laboratories, Palo Alto, CA USA.
[20]
Maamar, Z., Ben-Younes, K., & Al-Khatib, G. (2003). Scenarios of supporting mobile users in wireless networks. In Proceedings of the Second International Workshop on Wireless Information Systems (WIS'2003) held in conjunction with the 5th International Conference on Enterprise Information Systems (ICEIS'2003) Angers, France(pp. 12-20). Angers, France: ICEIS.
[21]
Maamar, Z., Benatallah, B., & Mansoor, W. (2003). Service chart diagrams--Description & application. In Proceedings of the Alternate Tracks of the Twelfth International World Wide Web Conference (WWW'2003) Budapest, Hungary. New York, NY: ACM.
[22]
Mandry, T., Pernul, G., & Rohm, W. R. (2000-2001). Mobile agents on electronic markets-- Opportunities, risks, agent protection, International Journal of Electronic Commerce, 5(2), 47. (Winter).
[23]
Parikh, T. S. (2005). Using mobile phones for secure, distributed document processing in the development world. IEEE Pervasive Computing, 4(2), 74-81. (April-June).
[24]
Penserini, L., Liu, L., Mylopoulos, J., Panti, M., & Spalazzi, L. (2003). Cooperation strategies for agent-based P2P systems. Web Intelligence and Agent Systems: An International Journal, 1(1), 3-21. (IOS Press).
[25]
Ratsimor, O., Joshi, A., Finin, T., & Yesha, Y. (2003). eNcentive: A framework for intelligent marketing in mobile peer-to-peer environments. In Proceedings of the 5th International Conference on Electronic Commerce (ICEC'2003) Pittsburgh, PA, USA(pp. 87-94). New York, NY: ACM.
[26]
Schilit, B., Adams, N., & Want, R. (1994). Context-aware computing applications. In Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications, Santa Cruz, California, USA(pp. 85-90). Washington, DC: IEEE Computer Society.
[27]
uddi.org. UDDI Technical White Paper. http://www.uddi.org/,(2000). (Visited August 2003).
[28]
Valavanis, E., Ververidis, C., Vazirgiannis, M., Polyzos, G. C., & Norvag, K. (2003). MobiShare: Sharing context-dependent data & services from mobile sources. In Proceedings of the 2003 IEEE/WIC International Conference on Web Intelligence (WI'2003) Halifax, Canada (p. 263). Washington, DC: IEEE Computer Society.
[29]
Varadharajan, V., & Foster D. (2003). A security architecture for mobile agent-based applications. World Wide Web: Internet and Web Information Systems, 6(1). (Kluwer).
[30]
Verma, K., Sivashanmugam, K., Sheth, A., Patil, A., Oundhakar, S., & Miller, J. (2003). METEORS WSDI: A scalable infrastructure of registries for semantic publication and discovery of web services. Journal of Information Technology and Management, 6(1), 17-39. (also appeared as Technical Report 03-006, LSDIS Lab, Computer Science Department, University of Georgia, February 2003).
[31]
Wallach, D., Balfanz, D., Dean, D., & Felten, E. (2003). Understanding java stack inspection. In IEEE Symposium on Security and Privacy, Oakland, California, USA(pp. 52-63). Washington, DC: IEEE Computer Society.
[32]
Wieland, K. (2003). The long road to 3G. International Telecommunications Magazine, 37(2). (February).
[33]
Yunos, H. M., Gao, J. Z., & Shim, S. (2003). Wireless advertising's challenges and opportunities. IEEE Computer, 26(5), 30-37. (May).

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Journal of Intelligent Information Systems
Journal of Intelligent Information Systems  Volume 28, Issue 2
April 2007
92 pages

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 01 April 2007

Author Tags

  1. Agent
  2. Security
  3. UDDI
  4. Web service
  5. Wireless

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media