For computer science courses focusing on distributed systems. This book systematically answers critical management and technical questions about the modern IT infrastructure, in particular, middleware.
Many applications follow the distributed computing paradigm, in which parts of the application are executed on different network-interconnected computers. The extension of these applications in terms of number of users or size has led to an unprecedented increase in the scale of the infrastructure that supports them. Large-Scale Distributed Computing and Applications: Models and Trends offers a coherent and realistic image of today's research results in large scale distributed systems, explains state-of-the-art technological solutions for the main issues regarding large scale distributed systems, and presents the benefits of using large scale distributed systems and the development process of scientific and commercial distributed applications.
This module of the handbook presents e-Business Models and Applications. Topics include e-Business evolution into Next Generation Real-time Enterprises, strategic issues, the role of eMarkets, ERPs, CRMs, ASPs, eProcurement, supply chains, portals, mobile applications, data warehouses and data mining to address strategic issues, and a planning methodology.
The Internet is revolutionizing retail merchandising and shopping. Software agents are capable of automating the more routine, tedious and time-consuming tasks involved in the trading process. Internet Commerce and Software Agents: Cases, Technologies and Opportunities addresses some major Internet commerce issues and the challenges to be met in achieving automated and secure Internet trading.
This book focuses on recent developments in representational and processing aspects of complex data-intensive applications. Until recently, information systems have been designed around different business functions, such as accounts payable and inventory control. Object-oriented modeling, in contrast, structures systems around the data--the objects--that make up the various business functions. Because information about a particular function is limited to one place--to the object--the system is shielded from the effects of change. Object-oriented modeling also promotes better understanding of requirements, clear designs, and more easily maintainable systems. This book focuses on recent developments in representational and processing aspects of complex data-intensive applications. The chapters cover "hot" topics such as application behavior and consistency, reverse engineering, interoperability and collaboration between objects, and work-flow modeling. Each chapter contains a review of its subject, followed by object-oriented modeling techniques and methodologies that can be applied to real-life applications. Contributors F. Casati, S. Ceri, R. Cicchetti, L. M. L. Delcambre, E. F. Ecklund, D. W. Embley, G. Engels, J. M. Gagnon, R. Godin, M. Gogolla, L. Groenewegen, G. S. Jensen, G. Kappel, B. J. Krämer, S. W. Liddle, R. Missaoui, M. Norrie, M. P. Papazoglou, C. Parent, B. Perniei, P. Poncelet, G. Pozzi, M. Schreft, R. T. Snodgrass, S. Spaccapietra, M. Stumptner, M. Teisseire, W. J. van den Heuevel, S. N. Woodfield
Software architecture is a primary factor in the creation and evolution of virtually all products involving software. It is a topic of major interest in the research community where pronusmg formalisms, processes, and technologies are under development. Architecture is also of major interest in industry because it is recognized as a significant leverage point for manipulating such basic development factors as cost, quality, and interval. Its importance is attested to by the fact that there are several international workshop series as well as major conference sessions devoted to it. The First Working IFIP Conference on Software Architecture (WICSAl) provided a focused and dedicated forum for the international software architecture community to unify and coordinate its effort to advance the state of practice and research. WICSA 1 was organized to facilitate information exchange between practising software architects and software architecture researchers. The conference was held in San Antonio, Texas, USA, from February 22nd to February 24th, 1999; it was the initiating event for the new IFIP TC-2 Working Group on Software Architecture. This proceedings document contains the papers accepted for the conference. The papers in this volume comprise both experience reports and technical papers. The proceedings reflect the structure of the conference and are divided into six sections corresponding to the working groups established for the conference.
Enterprises all over the world are experiencing a rapid development of networked computing for applications that are required for the daily survival of an organization. Client-server computing offers great potential for cost-effective networked computing. However, many organizations have now learned that the cost of maintenance and support of these networked distributed systems far exceeds the cost of buying them. Computer Supported Creative Work (CSCW) is the new evolving area that promotes the understanding of business processes and relevant communication technologies. Cooperative Management of Enterprise Networks uses CSCW as the medium for conveying ideas on the integration of business processes with network and systems management. This book will be useful for systems management professionals wishing to know about business process integration; business managers wishing to integrate their tasks with network/systems management; software system developers wishing to adopt participatory design practices; and students and researchers.
This book provides a recent and relevant coverage based on a systematic approach. Especially suitable for practitioners and managers, the book has also been classroom tested in IS/IT courses on security. It presents a systematic approach to build total systems solutions that combine policies, procedures, risk analysis, threat assessment through attack trees, honeypots, audits, and commercially available security packages to secure the modern IT assets (applications, databases, hosts, middleware services and platforms) as well as the paths (the wireless plus wired network) to these assets. After covering the security management and technology principles, the book shows how these principles can be used to protect the digital enterprise assets. The emphasis is on modern issues such as e-commerce, e-business and mobile application security; wireless security that includes security of Wi-Fi LANs, cellular networks, satellites, wireless home networks, wireless middleware, and mobile application servers; semantic Web security with a discussion of XML security; Web Services security, SAML (Security Assertion Markup Language)and .NET security; integration of control and audit concepts in establishing a secure environment. Numerous real-life examples and a single case study that is developed throughout the book highlight a case-oriented approach. Complete instructor materials (PowerPoint slides, course outline, project assignments) to support an academic or industrial course are provided. Additional details can be found at the author website (www.amjadumar.com)