Papers by International Journal on Web Service Computing (IJWSC)

IJWSC, 2025
Web Service Computing is a recent evolution in Distributed Computing series and it is an emerging... more Web Service Computing is a recent evolution in Distributed Computing series and it is an emerging and fast growing paradigm in the present scenario. Web Service Computing is a diversified discipline suite that related to the technologies of Business Process Integration and Management, Grid / Utility / Cloud Computing paradigms, autonomic computing, as well as the business and scientific applications. It applies the theories of Science and Technology for bridging the gap between Business Services and IT Services. Service oriented computing addresses how to enable the technology to help people to perform business processes more efficiently and effectively, ultimately resulting in creating WIN-WIN strategy between the business organizations and end users. The greatest significance of the web services is their interoperability, which allows businesses to dynamically publish, discover, and aggregate a range of Web services through the Internet to more easily create innovative products, business processes and value chains both from organization and end user points of views. Due to these, this cross discipline attracts the variety of researchers from various disciplines to conduct the versatile research and experiments in this area.
From these perspectives, this International Journal on Web Service Computing (IJWSC) is a quarterly open access peer-reviewed journal aims to act as a research platform to share and explore the main issues in Web Service Computing by publishing the current trends & technologies and research methods in the associated fields and thereby to promote the related research community.
International Journal on Web Service Computing (IJWSC), 2018
An ontology-based detection approach aiming to check SOAP messages for XML rewriting attacks is p... more An ontology-based detection approach aiming to check SOAP messages for XML rewriting attacks is presented. The approach comprises a SOAP message ontology and a set of policy filters. The ontology is used in preserving the message structure including its constituent elements and their relationships. The policy filters check if the message complies with denial-of-service vulnerability restrictions. Message integrity is preserved using the ontology-based checker, which checks that the message has not been modified during the transmission process. Message confidentiality is preserved by encrypting a copy of the message in a log file combined with the message. Time efficiency is achieved by executing the policy filters in a concurrent manner.

IJWSC, 2025
Web Service Computing is a recent evolution in Distributed Computing series and it is an emerging... more Web Service Computing is a recent evolution in Distributed Computing series and it is an emerging and fast growing paradigm in the present scenario. Web Service Computing is a diversified discipline suite that related to the technologies of Business Process Integration and Management, Grid / Utility / Cloud Computing paradigms, autonomic computing, as well as the business and scientific applications. It applies the theories of Science and Technology for bridging the gap between Business Services and IT Services. Service oriented computing addresses how to enable the technology to help people to perform business processes more efficiently and effectively, ultimately resulting in creating WIN-WIN strategy between the business organizations and end users. The greatest significance of the web services is their interoperability, which allows businesses to dynamically publish, discover, and aggregate a range of Web services through the Internet to more easily create innovative products, business processes and value chains both from organization and end user points of views. Due to these, this cross discipline attracts the variety of researchers from various disciplines to conduct the versatile research and experiments in this area.
From these perspectives, this International Journal on Web Service Computing (IJWSC) is a quarterly open access peer-reviewed journal aims to act as a research platform to share and explore the main issues in Web Service Computing by publishing the current trends & technologies and research methods in the associated fields and thereby to promote the related research community.

International Journal on Web Service Computing (IJWSC), 2018
Efficient supply chain management calls for robust analytical and optimal models to automate its ... more Efficient supply chain management calls for robust analytical and optimal models to automate its process. Therefore, information technology is an essential ingredient that integrates these tools in supply chain. With the emergence of wireless, the high technologies and the reliability of mobile devices, mobile web services draw a promising horizon facing economic challenges. They offer new personalized services to each actor in the supply chain on their mobile devices at anytime and anywhere. This paper presents a literature review of mobile web service implemented on the industry context based on the supply chain management approach. First, a large definition of mobile web service and some proposal architecture are exposed. Then the paper discuss some generic related work on mobile web service focusing on supply chain management. Finally some challenges on m-service oriented supply chain management are proposed.

International Journal on Web Service Computing (IJWSC), 2018
The Service Component Definition Language (SCDL) and the Web Service Business Process Execution L... more The Service Component Definition Language (SCDL) and the Web Service Business Process Execution Language (WS-BPEL) are the standards de-facto used in the modeling and implementing of ServiceComponent Architecture (SCA). However, these powerful languages lack a formal foundation for the specification and verification of the SCA properties. In this study, the use of Wright formal ADL and Ada programming language was proposed to check the behavioral properties of SCDL/WS-BPEL ServiceComponent architectures. To achieve this, the mapping of SCDL/WS-BPEL to the Wright formal ADL was suggested in order to verify the standard behavioral consistency of the source description. As a second step, the target specification could be transformed into Ada to check the specific and dynamic behavioral properties of the SCDL/WS-BPEL source architecture.

International Journal on Web Service Computing (IJWSC), 2016
Web services are playing dominant role on Internet for e-business. The compositions of these serv... more Web services are playing dominant role on Internet for e-business. The compositions of these services are used to meet business objectives. The web service choreography describes the external observable behavior of these compositions. Many compositions may available for same functionality. These compositions cannot be distinguished on the basis of functional properties. This Quality of services (QoS) may help the user to select web services and to analyze composition of the web services. Web service choreography is going to dictate implementation of workflow. This workflow consists of several tasks. Each task is implemented by web services. These services are hosted in large numbers by different service providers on different service clusters. The mapping of service and task is difficult issue in run time environment. The interoperability between services is also a great problem. The selection of services is very big issue.
In this paper we have proposed a bio-inspired selection algorithm based on dominant role and proposed a discovery infrastructure. We have also used the client behavior to improve the failure of the composition of the service.

International Journal on Web Service Computing (IJWSC), 2016
Service composition is the process of constructing new services by combining several existing one... more Service composition is the process of constructing new services by combining several existing ones. It considered as one of the complex challenges in distributed and dynamic environment. The composition process includes, in general, the searching for existing services in a specific domain, and selecting the appropriate service, then coordinating composition flow and invoking services. Over the past years, the problem of web service composition has been studied intensively by researchers. Therefore, a significant amount of solutions and new methods to tackle this problem are presented. In this paper, our objective is to investigate algorithms and methodologies to provide a classification of existing methods in each composition phase. Moreover, we aim at conducting a comparative study to discover the main features and limitation in each phase in order to assist future research in this area.

International Journal on Web Service Computing (IJWSC), 2015
Geo-Social Networks (GSNs) are collaborative systems that has the geolocated information as main ... more Geo-Social Networks (GSNs) are collaborative systems that has the geolocated information as main component. The geolocation resource integrates virtual and real worlds, allowing the comprehension about these two scenarios at same time. Based on that, this work define a process of spatial analysis of shared information on a GSN. The present work proposes the usage of six spatial features as feedback about collaborative behaviour on city. The spatial analysis aims understand if users’ collaboration change among city census sectors. Understanding how users deal with GSNs in an area, will help about collaborative patterns per urban region. As result, this work detected spatial patterns among users in the GSN Foursquare of a Brazilian city. These patterns indicates that users’ collaboration receive influences of extrinsic and intrinsic features of GSN and the comprehension about their users is a complex task.

International Journal on Web Service Computing (IJWSC), 2015
Service Oriented Architecture facilitates automatic execution and composition of web services in ... more Service Oriented Architecture facilitates automatic execution and composition of web services in distributed environment. This service composition in the heterogeneous environment may suffer from various kinds of service failures. These failures interrupt the execution of composite web services and lead towards complete system failure. The dynamic recovery decisions of the failed services are dependent on non-functional attributes of the services. In the recent years, various methodologies have been presented to provide recovery decisions based on time related QoS (Quality of Service) factors. These QoS attributes can be categorized further. Our paper categorized these attributes as space and time. In this paper, we have proposed an affinity model to quantify the location affinity for composition of web services. Furthermore, we have also suggested a replication mechanism and algorithm for taking recovery decisions based on time and space based QoS parameters and usage pattern of the services by the user.
International Journal on Web Service Computing (IJWSC), 2015
The security policies of an application can change at runtime for some reasons such as the change... more The security policies of an application can change at runtime for some reasons such as the changes on the user preferences, the performance reasons or the negotiation of security levels between the interacting parties. If these security policies are embedded in the services, their modifications require to modify the services, stop and deploy new version. Aspect oriented paradigm provides the possibility to define separated components that is named aspect. In this paper, in order to fulfill security requirements, we will classify required changes of services and for each classifications, how aspects injection will be described. Finally, we will present a pattern for each aspect of each classification.

International Journal on Web Service Computing (IJWSC), 2015
Nowadays web pages are implemented in various kinds of languages on the Web and web crawlers are ... more Nowadays web pages are implemented in various kinds of languages on the Web and web crawlers are important for search engine. Language specific crawlers are crawlers that traverse and collect the relative web pages using the successive URls of web page. There are very few research areas in crawling for Myanmar Language web sites. Most of the language specific crawlers are based on n-gram character sequences which require training documents. The proposed crawler differs from those crawlers. The proposed crawler searches and retrieves Myanmar web pages for Myanmar Language search engine. The proposed crawler detects the Myanmar character and rule-based syllable threshold is used to judgment the relevance of the pages. According to experimental results, the proposed crawler has better performance, achieves successful accuracy and storage space for search engines are lesser since it only crawls the relevant documents for Myanmar web sites.

International Journal on Web Service Computing (IJWSC), 2014
During interactions between organizations in the field of service-oriented architecture, some sec... more During interactions between organizations in the field of service-oriented architecture, some security requirements may change and new security policies addressed. Security requirements and capabilities of Web services are defined as security policies. The purpose of this paper is reconciliation of dynamic security policies and to explore the possibility of requirements of the new defined security policies.
During the process of applying the defined dynamic policy, is checked whether the service provider can accept the new policy or not. Therefore, the compatibility between existing policies and new defined policies are checked, and because the available algorithms for sharing between the two policies, resulted in duplication and contradictory assertion, in this paper for providing a compromise between the provided policy and the new policy, the fuzzy inference method mamdany is used . and by comparing the security level of proposed policy with the specified functionality, the negotiating procedure is done . The difference between the work done in this paper and previous works is in fuzzy calculation and conclusion for negotiations. the advantages of thi work is that policies are defined dynamically and applied to bpel , also can be changed independently of bpel file.
International Journal on Web Service Computing (IJWSC), 2014
The Social Web is a set of social relations that link people through World Wide Web. This Social ... more The Social Web is a set of social relations that link people through World Wide Web. This Social Web encompasses how the websites and software are designed and developed to support social relations. The new paradigms, tools and web services introduced by Social Web are widely accepted by internet users. The main drawbacks of these tools are it acts as independent data silos; hence interoperability among applications is a complex issue. This paper focuses on this issue and how best we can use semantic web technologies to achieve interoperability among applications.
International Journal on Web Service Computing (IJWSC), 2014
Most of the peers accessing the services are under the assumption that the service accessed in a ... more Most of the peers accessing the services are under the assumption that the service accessed in a P2P network is utmost secured. By means of prevailing hard security mechanisms, security goals like authentication, authorization, privacy, non repudiation of services and other hard security issues are resolved. But these mechanisms fail to provide soft security. An exhaustive survey of existing trust and reputation models in P2P network regarding service provisioning is presented and challenges are listed. Trust issues like trust bootstrapping, trust evidence procurement, trust assessment, trust interaction outcome evaluation and other trust based classification of peer’s behavior into trusted,, inconsistent, un trusted, malicious, betraying, redemptive are discussed.

International Journal on Web Service Computing (IJWSC), 2014
Providing web services from smart phones is current recent research topic, this happened because ... more Providing web services from smart phones is current recent research topic, this happened because of smart phones are used almost every area, where today’s user uses for mobile banking, emailing, searching location and data. Smart phones are advanced in terms of processing power, memory with an embedded camera, sensors and same time parallel advancement in wireless network and software web technologies. Due to these advancement enables the mobile smart phones work as a web service provider instead of web service consumer. The idea of hosting web services on mobile host is not new, last one decade researchers working on mobile web service provisioning. This paper extends the our previous research work in the cellular domain to the current generation platform technologies and standards such as Android OS and REST. This paper deals with mobile host scalability and experimental result analysis for how many concurrent users access mobile host.

International Journal on Web Service Computing (IJWSC), 2014
A Web service composition is an interconnected set of multiple specialized Web service operations... more A Web service composition is an interconnected set of multiple specialized Web service operations, which complement each other to offer an improved tool capable of solving more complex problems. Manual design and implementation of Web service compositions are among the most difficult and error prone tasks. To face this complexity and to reduce errors at design time, the developer can alternatively search and reuse existing compositions that have solved similar problems. Thus the problem of designing and implementing Web service compositions can be reduced to the problem of finding and selecting the composition closest to an initial specification. To achieve this goal, there is the need to define and use similarity measures to determine how close is a given composition with respect to any given specification. Comparison of Web service compositions can be done using two possible sources: composition designs (models), and execution logs of compositions. In particular, in this paper a set of similarity measures are described for Web service composition models. The main objective is to measure and assess the degree of closeness between two given compositions of Web services regardless of their modelling language.

International Journal on Web Service Computing (IJWSC), 2013
The Competition between different Web Service Providers to enhance their services and to increase... more The Competition between different Web Service Providers to enhance their services and to increase the users' usage of their provided services raises the idea of our research. Our research is focusing on increasing the number of services that User or Developer will use. We proposed a web service’s recommendation model by applying the data mining techniques like Apriori algorithm to suggest another web service beside the one he got from the discovery process based on the user’s History.
For implementing our model, we used a curated source for web services and users, which also contains a complete information about users and their web services usage. We found a BioCatalogue: our proposed model was tested on a Curated Web Service Registry (BioCatalogue).and 70 % of users chose services from services that recommended by our model besides the discovered ones by BioCatalogue.
International Journal on Web Service Computing (IJWSC), 2013
In today’s environment most of the commercial web based project developed in the industry as well... more In today’s environment most of the commercial web based project developed in the industry as well enumerous number of funded project/and studies taken as part of research oriented initiatives in the academia suffer from major technical issues as to how design, develop and deploy the Web Services that can run in variety of heterogeneous environments. In this paper we address the issues of interoperability between Web Services, the metrics which can be used to measure the interoperability and simulate the Online shopping application by developing the Credit Card Verification Software using Luhn’s Mod 10 algorithm having Java Client written in NetBeans and the BankWebService in C# .NET.

International Journal on Web Service Computing (IJWSC), 2013
One of the main requirements in service based applications is runtime adaptation to changes that ... more One of the main requirements in service based applications is runtime adaptation to changes that occur in business, user, environment, and computational contexts. Changes in contexts lead to QOS degrade. Continues adaptation mechanism and strategies are required to stay service based applications(SBA) in safe state. In this paper a framework for runtime adaptation in service based application isintroduced. It checks user requirements change continuously and dynamically adopts architecture model. Also it checks providers QOS attributes continuously and if adaptation requirement is triggered, runs service selection adaptation strategy to satisfy user preferences. Thusit is a context aware and automatically adaptable framework for SBA applications. Wehave implemented a fuzzy based system for web service selection unit. Due to ambiguity of context’s data and cross-cutting effects of quality of services, using fuzzy would result an optimised decision. Finally we illustrated that using of it has a good performance for web service based applications.
International Journal on Web Service Computing (IJWSC), 2013
Web Service is a reusable component which has set of related functionalities that service request... more Web Service is a reusable component which has set of related functionalities that service requesters can programmatically access from the service provider and manipulate through the Web. One of the main security issue is to secure web services from the malicious requesters. Since trust plays an important role in many kinds of human communication, it allows people to work under insecurity and with the risk of negative cost, many researchers have proposed different trust based web services access control model to prevent malicious requesters. In this literature review, various existing trust based web services access control model have been studied also investigated how the concept of a trust level is used in the access control policy of a service provider to allow service requester to access the web services.
Uploads
Papers by International Journal on Web Service Computing (IJWSC)
From these perspectives, this International Journal on Web Service Computing (IJWSC) is a quarterly open access peer-reviewed journal aims to act as a research platform to share and explore the main issues in Web Service Computing by publishing the current trends & technologies and research methods in the associated fields and thereby to promote the related research community.
From these perspectives, this International Journal on Web Service Computing (IJWSC) is a quarterly open access peer-reviewed journal aims to act as a research platform to share and explore the main issues in Web Service Computing by publishing the current trends & technologies and research methods in the associated fields and thereby to promote the related research community.
In this paper we have proposed a bio-inspired selection algorithm based on dominant role and proposed a discovery infrastructure. We have also used the client behavior to improve the failure of the composition of the service.
During the process of applying the defined dynamic policy, is checked whether the service provider can accept the new policy or not. Therefore, the compatibility between existing policies and new defined policies are checked, and because the available algorithms for sharing between the two policies, resulted in duplication and contradictory assertion, in this paper for providing a compromise between the provided policy and the new policy, the fuzzy inference method mamdany is used . and by comparing the security level of proposed policy with the specified functionality, the negotiating procedure is done . The difference between the work done in this paper and previous works is in fuzzy calculation and conclusion for negotiations. the advantages of thi work is that policies are defined dynamically and applied to bpel , also can be changed independently of bpel file.
For implementing our model, we used a curated source for web services and users, which also contains a complete information about users and their web services usage. We found a BioCatalogue: our proposed model was tested on a Curated Web Service Registry (BioCatalogue).and 70 % of users chose services from services that recommended by our model besides the discovered ones by BioCatalogue.
From these perspectives, this International Journal on Web Service Computing (IJWSC) is a quarterly open access peer-reviewed journal aims to act as a research platform to share and explore the main issues in Web Service Computing by publishing the current trends & technologies and research methods in the associated fields and thereby to promote the related research community.
From these perspectives, this International Journal on Web Service Computing (IJWSC) is a quarterly open access peer-reviewed journal aims to act as a research platform to share and explore the main issues in Web Service Computing by publishing the current trends & technologies and research methods in the associated fields and thereby to promote the related research community.
In this paper we have proposed a bio-inspired selection algorithm based on dominant role and proposed a discovery infrastructure. We have also used the client behavior to improve the failure of the composition of the service.
During the process of applying the defined dynamic policy, is checked whether the service provider can accept the new policy or not. Therefore, the compatibility between existing policies and new defined policies are checked, and because the available algorithms for sharing between the two policies, resulted in duplication and contradictory assertion, in this paper for providing a compromise between the provided policy and the new policy, the fuzzy inference method mamdany is used . and by comparing the security level of proposed policy with the specified functionality, the negotiating procedure is done . The difference between the work done in this paper and previous works is in fuzzy calculation and conclusion for negotiations. the advantages of thi work is that policies are defined dynamically and applied to bpel , also can be changed independently of bpel file.
For implementing our model, we used a curated source for web services and users, which also contains a complete information about users and their web services usage. We found a BioCatalogue: our proposed model was tested on a Curated Web Service Registry (BioCatalogue).and 70 % of users chose services from services that recommended by our model besides the discovered ones by BioCatalogue.