A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Thirumaran, M.
- Business Rule Management Framework for N-Tier E-Business Applications
Authors
1 Department of Computer Science Engineering, Pondicherry Engineering College, IN
Source
Data Mining and Knowledge Engineering, Vol 3, No 12 (2011), Pagination: 737-743Abstract
Business rules have attained a major role in the development of software systems for businesses. They influence the business behavior based on the decisions enforced upon a wide range of aspects. As the business requirements are subjected to frequent amendments, new business rules have to be evolved to reinstate the previously formed ones. Business analysts count on the assistance from the IS developers for this accomplishment. As business rules are set and owned by the business, provisions must be enforced for business rule management by the business analysts directly. In order to get a clear picture of what the current policies and terms in the business are, business users utilize the document as a valuable tool. Unfortunately, documents are not updated as per the modifications in the source code. Moreover, as the software becomes larger, documents become increasingly large and hence difficult to understand and maintain. Thus they turn out to be a non-useful resource in such conditions. With a motive to resolve the above issues, several tools for extracting the rules from the business program code have been developed. In this paper, a robust architecture for an extraction engine to isolate rules from the base source code has been proposed. This suggested model involves slicing of code segments which results in easy identification of domain variables which in turn would result in extraction of business rules, validating them and exchanging them with the newly formulated business policies. This is a new research dimension which paves waves for efficient and quick business rule management strategy.Keywords
Business Rule Management, Business Process Model, Slicing, Segmentation, Rule Extraction.- Fast and Secure Web Service Transaction Based on Improved Public Key Crypto System
Authors
1 Department of Computer Science and Engineering, Pondicherry Engineering College, IN
2 Pondicherry Engineering College, IN
Source
Data Mining and Knowledge Engineering, Vol 2, No 3 (2010), Pagination: 52-58Abstract
A web service is any service that is available over the Internet that uses a standardized XML messaging system which is not tied to any operating system or programming language. Web Service Security deals with quality of protection through message integrity, message confidentiality, and single message authentication. In that the well known term called WS-Security (Web Services Security) is a specification that protects SOAP messages to ensure end-to-endsecurity. To develop a secure and time effective public key cryptosystem, web services use SOAP message withMONTGOMERY’S method to improve the encryption speed enormously. Earlier RSA was chosen as a secure public key cryptosystem which has been tied up with the SOAP message communication. But the security of the RSA enabled SOAP messaging system is based on the size of the RSA key which is purely determined by the security algorithm we enforce. As the key size increases the security of the system also increases, at the same time increase in key size causes more computation time in spite of key determination. In order to speedup these encryption and decryption processes the new technique called Montgomery’s which performs modular multiplication and modular exponentiation and thereby improves the RSA computation much better than the usual method of computation. As an experiment we have implemented the algorithm in C#.NET and applied this algorithm over ASP.NET web service for E-Learning domain and observed that the performance of the proposed algorithm executes relatively faster than the traditional RSA algorithm.
Keywords
Web Services Security, RSA Using Montogomery.- An Architecture for Finite State Machine Based Web Service Composition
Authors
1 Department of Computer Science Engineering, Pondicherry Engineering College, IN
2 Pondicherry University, IN
3 Department of Computer Science and Engineering, Pondicherry Engineering College, IN
Source
Data Mining and Knowledge Engineering, Vol 2, No 5 (2010), Pagination: 104-111Abstract
As the emergence of service-oriented architecture provides a major boost for e-commerce agility, the number of available Web services is rapidly increasing. However, when there are a large number of Web services available and no single Web service satisfies the given request, one has to compose multiple web services to fulfill the goal. Web services composition refers to the process of collaborating the heterogeneous web services. Even though there are many web service composition methods exist, there is no simple, standard and scalable architecture which primarily aims to satisfy the need of user request at present. This paper presents a model of web services composition by using Finite State Machine (FSM) techniques which enables to provide effective and scalable solution for service composition by generating request satisfiable deterministic paths. FSMWC targets functional, service specific and QoS attributes which when given an information goal, attempts to find all services capable of providing the desired information. We present a model for FSM based Web Service Composition (FSMWC) and evaluate the efficiency and effectiveness of FSMWC.Keywords
FSM – Finite State Machine, WSCA – Web Service Composition Algorithm, QoS – Quality of Service.- An Evaluation of Business Rule Mining Architecture for E-Business Applications
Authors
1 Department of Computer Science and Engineering, Pondicherry Engineering College, Puducherry, IN
2 Ramanujam School of Mathematics and Computer Science, Pondicherry University, Puducherry, IN
Source
Data Mining and Knowledge Engineering, Vol 1, No 6 (2009), Pagination: 263-269Abstract
Most of the E-business applications have been developed using the standard business logic model which often failed to accommodate the new changes according to the ever-changing business scenario. The end-users who are the best evaluators of E-business systems mostly depend on the QoS parameters but when it comes to the administration of the business organization the functional requirements are the one which play a major role. In order to bridge the gap between the business experts and application developer, a standard business rule mining system is needed which also has a target of managing the reconfigurable business logic with respect to the dynamic decision made by the business experts. The architecture allows the business analyst to propose new business rules for the particular business application and even reconfigure the existing rules. This mining architecture facilitates knowledge based extraction of the business rules from any given E-business applications implemented using any type of business model. For the case work we developed the architecture for E-banking application and implemented various set of banking operation services in ASP.NET. The segmented source code of targeted business logic is provided as an input for the model and it performs rule mining and generates extended business logic as output. We have also evaluated the proposed architecture using Software Architecture Analysis Method (SAAM).Keywords
Business Logic, Business Rule Mining, E-Business, Software Architecture Analysis Method.- An Impact of Applying Business Logic Model Over Virtual Learning Environment to Evaluate the Computational Criteria
Authors
1 Department of Computer Science and Engineering, Pondicherry Engineering College, Puducherry, IN
2 Ramanujam School of Mathematics and Computer Science, Pondicherry University, Puducherry, IN