Abstract:
A system for selecting services that are used for a composite service, may include an accessing unit and a processing unit. The accessing unit may be configured to access: tasks of the composite service, transactional requirements of the tasks, services that are configured to fulfill the tasks, and transactional properties of the services. The processing unit may be configured to: compute conditions for services that are configured to fulfill a task and select a service configured to fulfill the task and having transactional properties that fulfill the conditions, wherein the conditions are computed using data comprising the transactional requirements of the tasks.
Abstract:
Embodiments include a system for tracing a collaborative workflow. The system includes an event collector and a transition engine. The event collector may be configured to receive data that represents an event of the collaborative workflow. The collaborative workflow has a local workflow part and a global workflow part. The transition engine may be configured to compute a new instance state of a model of the collaborative workflow. The new instance state represents an instance of the collaborative workflow obtained through the event of the collaborative workflow. The new instance state complies with rules of a local model of the local workflow part and with rules of a global model of the global workflow part.
Abstract:
A method includes providing a model which allows to define acceptable sets of security features ((sfk(W))k ∈ [1,1]) associated with a workflow model (W) representing a composite web service (C), and to enable to advertise security features (SMS(si)) which are supported by candidate web services (si), and defining, based on the model, an assignment procedure which allows to build, a secure compliant composite web service, where the assignment procedure is an iterative process in that web services are assigned to workflow tasks one after the other such that after each iteration a subset of the at least one acceptable set of security features which is supported by the web services already assigned is analyzed in view of the next succeeding workflow task of the workflow model so as to be successively completed to the at least one acceptable set of security features by compliant candidate web services.
Abstract:
Systems and methods for automatically organizing and achieving a pre-given task by means of plurality of robots, each robot having a robot specific set of functionalities, are described. In an example implementation, a method can include the following steps: providing and exposing, for each robot, a semantic description of the robot's robot specific functionalities by respective semantic web services; providing a semantic description of the pre-given task; matching the semantically described task with the semantic web services describing the robot specific functionalities; and combining automatically a coordinated set of the plurality of robots according to the matching result, such that the task is achieved when the robots are sequentially working upon invocation.
Abstract:
Performing an untraceable secret matching between a first credential associated with a first property of a first user and a second credential associated with a second property of a second user includes receiving the first credential, receiving a matching reference formed so the first user can detect a matching of the first property with a remote property from a credential of another user, supplying a first nonce value to the second user, receiving a hidden version of the second credential from the second user formed by the second user on the basis of the second credential, the first nonce value supplied by the first user and a random value locally generated on a side of the second user, and performing the matching by combining the first credential and the received hidden credential with the first nonce value and comparing the combination with the matching reference.
Abstract:
Performing an untraceable secret matching between a first credential associated with a first property of a first user and a second credential associated with a second property of a second user includes receiving the first credential, receiving a matching reference formed so the first user can detect a matching of the first property with a remote property from a credential of another user, supplying a first nonce value to the second user, receiving a hidden version of the second credential from the second user formed by the second user on the basis of the second credential, the first nonce value supplied by the first user and a random value locally generated on a side of the second user, and performing the matching by combining the first credential and the received hidden credential with the first nonce value and comparing the combination with the matching reference.
Abstract:
A method includes associating an access policy with content. The access policy specifies at least one access condition to be satisfied prior to a content recipient accessing the content. An encryption key is provided to a content source, the encryption key being associated with the access policy and to be used by the content source to encrypt the content. At a trusted third party, the determination is made regarding whether the at least one access condition is satisfied. A decryption key is selectively provided from the trusted third party to the content recipient based on the at least one access condition being satisfied. The decryption key is associated with the access policy and may be used by the content recipient to decrypt the content.
Abstract:
A system for selecting services that are used for a composite service, may include an accessing unit and a processing unit. The accessing unit may be configured to access: tasks of the composite service, transactional requirements of the tasks, services that are configured to fulfill the tasks, and transactional properties of the services. The processing unit may be configured to: compute conditions for services that are configured to fulfill a task and select a service configured to fulfill the task and having transactional properties that fulfill the conditions, wherein the conditions are computed using data comprising the transactional requirements of the tasks.
Abstract:
To allow workflow execution on a plurality of local devices such as in a pervasive environment in a decentralized manner, the present application proposes a method and architecture for executing a workflow on a device, the workflow comprising one or more task activities (tn) comprising actions performed by devices participating in the workflow and routing activities (rin) used to transfer control and data between devices, wherein the method comprises the operations of: receiving a message representing an incoming routing activity (rij); generating from the workflow a local part (Wn) to be executed on the device; executing task activities comprised by the generated local part (Wn) on the device; performing a request to a discovery service in order to obtain one or several identifications of next devices; and sending one or more messages representing a routing activity (rij) to the one or more next devices thus identified.
Abstract:
An example embodiment includes a device assigned to fulfill a task of a composite service. The device may include a processing unit to determine a further device to fulfill a further task of the composite service. The further device may have a transactional property that complies with a transactional requirement of the composite service. The device may further include a communication unit to send task data to the further device. The task data may include input data to fulfill the further task.