Service specification and validation in the context of the home
نویسندگان
چکیده
We explore and discuss different ways of expressing service specifications in the context of home automation systems implemented on OSGiTM. We found that the approach used for expressing services affects the amount of service interaction in the system. Some approaches, as opposed to others, artificially increase the number of situations where services are considered to badly interact. We discuss the pros and cons of three approaches for service specification in the context of the home.
منابع مشابه
Perspectives of Big Data Quality in Smart Service Ecosystems (Quality of Design and Quality of Conformance)
Despite the increasing importance of data and information quality, current research related to Big Data quality is still limited. It is particularly unknown how to apply previous data quality models to Big Data. In this paper we review Big Data quality research from several perspectives and apply a known quality model with its elements of conformance to specification and design in the context o...
متن کاملWeb Service Choreography Verification Using Z Formal Specification
Web Service Choreography Description Language (WS-CDL) describes and orchestrates the services interactions among multiple participants. WS-CDL verification is essential since the interactions would lead to mismatches. Existing works verify the messages ordering, the flow of messages, and the expected results from collaborations. In this paper, we present a Z specification of WS-CDL. Besides ve...
متن کاملA model for specification, composition and verification of access control policies and its application to web services
Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملThe EFL Pre-Service Teacher Training in Iran: Is it Adequate or not?
Teacher training programs should provide evidence that they are preparing teacher trainees for their teaching career. However, the literature contains few evaluation reports of the layout of the pre-service EFL teacher training program in Iranian EFL context, a gap which this study tries to fill. The participants of the study were high school EFL teachers (n = 346), teacher trainees (n = 97) an...
متن کامل