| Preface | 5 |
---|
| Organization | 6 |
---|
| Table of Contents | 10 |
---|
| Invited Papers | 13 |
---|
| Programming Support and Governance for Process-Oriented Software Autonomy | 14 |
| Introduction | 14 |
| Business Process Runtime Requirements for Self-governance | 16 |
| Implementation of Autonomic Management | 17 |
| A Simple Example | 19 |
| A Case Study | 22 |
| Architectural Autonomy | 22 |
| Behavioural Autonomy | 24 |
| Evaluation | 24 |
| Adaptation Scenario | 25 |
| Introducing Neptune to the PetShop/Pet Store | 25 |
| Results | 26 |
| Conclusions | 28 |
| References | 28 |
| Representing and Validating Digital Business Processes | 30 |
| Introduction | 30 |
| Rule-Based Business Modeling | 31 |
| Logical Models for BR Languages | 33 |
| BR vs. Semantic Web-Style Knowledge Representation | 35 |
| Combining DL and Horn Rules | 38 |
| An Example of Hybrid Reasoning | 39 |
| Hybrid Reasoning | 40 |
| Related Work | 41 |
| Conclusions | 42 |
| References | 42 |
| Part I Internet Technology | 44 |
---|
| Semi-automated Content Zoning of Spam Emails | 45 |
| Introduction | 45 |
| Content Zoning | 47 |
| Annotated Regions in Texts | 47 |
| Identification of Spam Emails | 48 |
| The COZO Explorer | 49 |
| A Spam Thesaurus | 49 |
| The Graphical User Interface | 50 |
| Selected Results | 50 |
| Zoning Pharmaceutical Spam Emails | 50 |
| Zoning Financial Spam Emails | 51 |
| Automated Image Sorting | 52 |
| Conclusions | 53 |
| References | 53 |
| Security and Business Risks from Early Design of Web-Based Systems | 55 |
| Introduction | 55 |
| Related Work | 57 |
| Security Risk Analysis | 57 |
| Preliminaries | 57 |
| Methodology | 58 |
| A Case Study | 61 |
| Web Application Design | 61 |
| Estimating Security Risks | 63 |
| Business Risk Analysis | 66 |
| Concluding Remarks | 68 |
| References | 68 |
| Designing Decentralized Service Compositions: Challenges and Solutions | 70 |
| Introduction | 70 |
| Background | 71 |
| Formal Considerations | 72 |
| Deriving Cooperating Processes | 74 |
| Dealing with the Consistency of Derived Processes | 74 |
| Putting the Deriving Operation into Practice | 75 |
| Wiring with Postset Activities | 76 |
| Wiring with Preset Activities | 78 |
| Conclusions | 80 |
| References | 80 |
| Grid Infrastructure Architecture: A Modular Approach from CoreGRID | 82 |
| Introduction | 82 |
| Functional Components of a Framework Architecture | 84 |
| Workflow Analyzer | 85 |
| Checkpointing | 86 |
| User and Account Management | 87 |
| ResourceMonitoring | 88 |
| Integration between Functional Components | 89 |
| Comparison with Other Works | 91 |
| Conclusions | 92 |
| References | 93 |
| The Privacy Advocate: Assertion of Privacy by Personalised Contracts | 95 |
| Introduction | 95 |
| Related Work | 96 |
| Negotiation Extensions | 97 |
| Requirements and Facultative Requests | 97 |
| Permissions and Prohibitions | 98 |
| Privacy Contracts | 98 |
| Privacy Advocate | 98 |
| Negotiation Process | 99 |
| Policy Evaluation | 100 |
| Protocol Issues | 103 |
| Implementation | 103 |
| Mobile PrivAd Client | 103 |
| PrivAd Server | 104 |
| Digital Signature | 104 |
| Negotiation Strategies | 104 |
| Summary and Outlook | 106 |
| References | 106 |
| Efficient Queries on XML Data through Partitioning | 108 |
| Introduction | 108 |
| Related Work | 109 |
| XPathBasics | 110 |
| Our Partitioning Method | 111 |
| Implementation Options | 113 |
| Relational Implementation | 113 |
| Native Implementation | 114 |
| Experimental Results | 115 |
| Relational Implementation | 115 |
| Native Implementation | 116 |
| Conclusions | 117 |
| References | 118 |
| Contract Based Behavior Model for Services Coordination | 119 |
| Introduction | 119 |
| Coordination Model with Transactional Behavior Properties | 121 |
| Service | 122 |
| Orchestration | 122 |
| Activity | 123 |
| Transactional Behavior Model | 124 |
| Contract | 125 |
| Atomicity Contracts | 127 |
| Defining Transactional Behavior for an e-Commerce Applica
|