(IJCSIS) International Journal of Computer Science and Information Security,Vol. 8, No. 2, 2010
probability that event A
(i=1,2…k) will occur in the (s+1)
trial (s=1,2,3….) after a known event has occurred in the sthtrial, depends solely on the event that occurred in the sth trialand is not modified by supplementary information about theevent that occurred in earlier trials. A different terminology isfrequently employed in starting the theory of Markov chainsand one speaks of a certain system S, which at each instant of time can be in one of the states A
and alters its stateonly at times t
…. For Markov chains, the probabilityof passing to some state A
(i=1,2….k) at time τ(t
+1)depends only on the state the system was in at time t(t
)and does not change if we learn its state were at earlier times.II.
Modeling business logic focuses on the core functionalityof the business process, which are capsulated as web services.It requires that business process pertains exactly to the businesslogic with various business terminologies such as dependency,policy, standards, constraints, etc. As a prerequisite to thisbusiness logic model, the core functionality of the businessprocess should be analyzed for dependencies then modeledabsolutely, whereas the previous implementations of webservices were direct. Ronald et al. states that existing modelslike business rule model, business motivation model andbusiness process model concentrate on business process at theoperational level with compromising minimum range of QoSattributes . Business rule model deals with the extraction of business rules from the business logic, in order to reduce thecost and time spent in development . Business motivationmodel paves way for identifying the facts preserved in novelobjectives, thereby facilitating the business processdevelopment. Business process model provides optimization tothe business process at the designing phase. Theimplementation of a company's business model intoorganizational structures and systems is part of a company'sbusiness operations. It is important to understand that businessmodeling commonly refers to business process design at theoperational level , whereas business models and businessmodel design refer to defining the business logic of a companyat the strategic level. Business logic model aims to resolve thecomplexities involved, by decomposing the business processinto sub processes and in turn into tasks, also preserving thefunctional dependencies among the sub-processes, withoutignoring the key factors. Any service domain adopted thismodel for their web service development could be easilymanaged in terms of handling run time exceptions towardsservice reliability and manageability. Business logic model canbe applied in tandem with the above described models, therebyfacilitating service computation and composition much better.This model enables web services to realize their computationalcriteria such as computability, traceability and decidability withthe supporting QoS attributes like manageability,configurability, serviceability and dependency. Thecomputational criteria would be the best suit for the webservice community who look for exception-free web servicesor reconfigurable web services. This model would also satisfythe service consumers who approach the discovery andcomposition engines for fetching exception free or self configurable web services. Hence this model would ensure theconsumers that the services are manageable at runtime, self configurable in case of dependability, computable in total orpartial and traceable to the point of failure. Also it sustainsdependency between the business rules and business functions.
Web Service Security Analysis
The cost versus risk parameters of the business willdetermine the capability to implement security in web service. More a business can articulate the risks to its business,better it will be capable to appraise the advantage of preventivemeasurements to protect itself. The business must be capable of answering such a question.Who has to have the access to which information?How is access to data provided? Direct or brokered?Is there a need for data to be available to external partnersas well as internal consumers?What requirements does the information need in transit, inprocess and at rest?To achieve a secure web service, the application and thesecurity analysis must be analyzed conceptually and modeled.This roughly goes without saying that the big companies areobsessed by the safety and to assure the critical applications,essential information is at stake. Any movement towards webservice presents a principal opportunity to incorporate thesafety in future applications. Organization and system stakeholders are realizing that every opportunity for the businessemerges with the danger of seriously screwing things-up. Inearly web service adopters are delicious prey for the badthinking about the security analysis of the web service. Afterthe several advancement in the technology and techniques inthe context of security analysis, still the system developersfaces the problem of security and security analysis.Wide consideration to inherent the security features in theSDLC of the web service platform will enhances the safety of the web service as well as the service themselves . Thusweb service provides an opportunity to avoid such securityrelated issues and challenges or otherwise managing securitydependencies that pervade software architecture.The vendors typically emphasize the primary features of safety that they offer as key selling points in the real world of enterprise applications. Nevertheless, out of the list of obligatory features of safety, few sellers can give testimony tothe underlying safety of the product itself. So the user couldhave all the characteristics of security in the computing world,but they remain untenably insecure due to lack of analysis of the security.
Business Logic Model
Business processes and motivation models have been usedto analyze and propose new changes in accordance to changingbusiness scenarios. A process model scope does not extendoptimally to web services, whereas Business Rule modelsextract rules from the business logic and concentrate mainly onthe problem of modeling and accessing data by using efficientqueries . However they do not model the entire business
Identify applicable sponsor/s here.