scispace - formally typeset
Search or ask a question

Showing papers on "Software as a service published in 2002"


Proceedings ArticleDOI
03 Jun 2002
TL;DR: The paper explores an algebraic framework to split the query to minimize the computation at the client site, and explores techniques to execute SQL queries over encrypted data.
Abstract: Rapid advances in networking and Internet technologies have fueled the emergence of the "software as a service" model for enterprise computing. Successful examples of commercially viable software services include rent-a-spreadsheet, electronic mail services, general storage services, disaster protection services. "Database as a Service" model provides users power to create, store, modify, and retrieve data from anywhere in the world, as long as they have access to the Internet. It introduces several challenges, an important issue being data privacy. It is in this context that we specifically address the issue of data privacy.There are two main privacy issues. First, the owner of the data needs to be assured that the data stored on the service-provider site is protected against data thefts from outsiders. Second, data needs to be protected even from the service providers, if the providers themselves cannot be trusted. In this paper, we focus on the second challenge. Specifically, we explore techniques to execute SQL queries over encrypted data. Our strategy is to process as much of the query as possible at the service providers' site, without having to decrypt the data. Decryption and the remainder of the query processing are performed at the client site. The paper explores an algebraic framework to split the query to minimize the computation at the client site. Results of experiments validating our approach are also presented.

1,351 citations


Proceedings ArticleDOI
07 Aug 2002
TL;DR: A novel paradigm for data management in which a third party service provider hosts "database as a service", providing its customers with seamless mechanisms to create, store, and access their databases at the host site is explored.
Abstract: We explore a novel paradigm for data management in which a third party service provider hosts "database as a service", providing its customers with seamless mechanisms to create, store, and access their databases at the host site. Such a model alleviates the need for organizations to purchase expensive hardware and software, deal with software upgrades, and hire professionals for administrative and maintenance tasks which are taken over by the service provider. We have developed and deployed a database service on the Internet, called NetDB2, which is in constant use. In a sense, a data management model supported by NetDB2 provides an effective mechanism for organizations to purchase data management as a service, thereby freeing them to concentrate on their core businesses. Among the primary challenges introduced by "database as a service" are the additional overhead of remote access to data, an infrastructure to guarantee data privacy, and user interface design for such a service. These issues are investigated. We identify data privacy as a particularly vital problem and propose alternative solutions based on data encryption. The paper is meant as a challenge for the database community to explore a rich set of research issues that arise in developing such a service.

707 citations


Journal ArticleDOI
TL;DR: Some of the technological challenges of building today's complex Web software applications, their unique quality requirements, and how to achieve them are discussed.
Abstract: Web applications have very high requirements for numerous quality attributes. This article discusses some of the technological challenges of building today's complex Web software applications, their unique quality requirements, and how to achieve them.

347 citations


01 Jan 2002
TL;DR: It is hypothesized that open source software development can be modeled as self-organizing, collaboration, social networks, and evidence is found to support this hypothesis, primarily in the presence of power-law relationships on project sizes, developers per project, project membership, and cluster sizes.
Abstract: The OSS movement is a phenomenon that challenges many traditional theories in economics, software engineering, business strategy, and IT management. Thousands of software programmers are spending tremendous amounts of time and effort writing and debugging software, most often with no direct monetary compensation. The programs, some of which are extremely large and complex, are written without the benefit of traditional project management, change tracking, or error checking techniques. Since the programmers are working outside of a traditional organizational reward structure, accountability is an issue as well. A significant portion of internet e-commerce runs on OSS, and thus many firms have little choice but to trust mission-critical e-commerce systems to run on such software, requiring IT management to deal with new types of socio-technical problems. A better understanding of how the OSS community functions may help IT planners make more informed decisions and develop more effective strategies for using OSS software. We hypothesize that open source software development can be modeled as self-organizing, collaboration, social networks. We analyze structural data on over 39,000 open source projects hosted at SourceForge.net involving over 33,000 developers. We define two software developers to be connected — part of a collaboration social network — if they are members of the same project, or are connected by a chain of connected developers. Project sizes, developer project participation, and clusters of connected developers are analyzed. We find evidence to support our hypothesis, primarily in the presence of power-law relationships on project sizes (number of developers per project), project membership (number of projects joined by a developer), and cluster sizes. Potential implications for IT researchers, IT managers, and governmental policy makers are discussed.

258 citations


Patent
04 Oct 2002
TL;DR: In this paper, the authors present a method and system for installing software implementations such as applications and COM classes as they are needed from an external source, such as a centralized network store.
Abstract: A method and system for installing software implementations such as applications and COM classes as they are needed from an external source, such as a centralized network store. When a software implementation is needed, the system and method first look to the local system (e.g., registry) for that software implementation, and if found, returns the information such as a local path needed to use the software implementation. If the implementation is not found locally, the present invention dynamically looks to a centralized class store of a network, to locate the needed implementation. When located, the implementation is downloaded and locally installed in a manner that is essentially transparent to the user. Software implementations such as application products may be divided into features and components to improve on-demand installation thereof.

216 citations


Shin Nakajima1
01 Jan 2002
TL;DR: It is shown that faulty flow descriptions can be identified with the proposed modelchecking technique, and the method is also very helpful in studying an alternative semantics of the WSFL in regard to the handling of dataflows.
Abstract: Model-checking is a promising technique for the verification and validation of software systems. Web service, an emerging technology in the Internet, is an autonomous server that may offer an individual service. It sometimes requires to combine more than one to meet our requirements. WSFL(Web Services Flow Language) is proposed as a language to provide means to describe Web service aggregation. We are interested in how much the software modelchecking technique can be used as a basis for raising reliability of Web service, Web service flow descriptions in particular. Our experience shows that faulty flow descriptions can be identified with the proposed method. The method is also very helpful in studying an alternative semantics of the WSFL in regard to the handling of dataflows.

116 citations


Patent
04 Oct 2002
TL;DR: In this article, a system and method update client computers of various end users with software updates for software products installed on the client computers, the software products manufactured by diverse, unrelated software vendors.
Abstract: A system and method update client computers of various end users with software updates for software products installed on the client computers, the software products manufacturered by diverse, unrelated software vendors. The system includes a service provider computer system, a number of client computers and software vendor computer systems communicating on a common network. The service provider computer system stores in an update database information about the software updates of the diverse software vendors, identifying the software products for which software updates are available, their location on the network at the various software vendor computer systems, information for identifying in the client computers the software products stored thereon, and information for determining for such products, which have software updates available. Users of the client computers connect to the service provider computer and obtain a current version of portions of the database. The client computer determines that software products stored thereon, and using this information, determines from the database, which products have updates available, based on product name and release information for the installed products. The user selects updates for installation. The selected updates are downloaded from the software vendor computer systems and installed on the client computer. Payment for the software update and the service is mediated by the service provider computer. Authentication of the user ensures only registered users obtain software updates. Authentication of the software updates ensures that the software updates are virus free and uncorrupted. Changes to the client computer during installation are monitored and archived, allowing the updates to be subsequently removed by the user.

96 citations


Book ChapterDOI
15 Apr 2002
TL;DR: A number of the characteristics of the open-source movement are looked at, a categorization ofopen-source dimensions is offered, and an analysis of the opportunities available to commercial software vendors when applying the lessons from the open -source movement is provided.
Abstract: One of the most intriguing ways that commercial developers of software can become more efficient is to reuse not only software but also best practices from the open-source movement The open-source movement encompasses a wide collection of ideas, knowledge, techniques, and solutions Commercial software vendors have an opportunity to both learn from the open-source community, as well as leverage that knowledge for the benefit of its commercial clients This paper looks at a number of the characteristics of the open-source movement, offers a categorization of open-source dimensions, and provides an analysis of the opportunities available to commercial software vendors when applying the lessons from the open-source movement

73 citations


Journal ArticleDOI
TL;DR: Key issues in localization (termed localization) are examined, the costs and specific aspects of software that must be localized are considered, and an approach for analyzing and documenting software localization is presented.
Abstract: For use by a global audience, Web sites must be adapted to many local requirements. This article examines key issues in such adaptation (termed localization), considers the costs and specific aspects of software that must be localized, and presents an approach for analyzing and documenting software localization. The article is based on a review of relevant literature, meetings with localization industry representatives, and an ongoing participant observation in a global telehealth company. Examples from the company illustrate the localization issues and their possible outcomes or solutions.

51 citations


01 Jan 2002
TL;DR: A comparative analysis of the architectural modeling capabilities of established notations widely used by object-oriented, information engineering and structured methods, applied to typical problems found in utilities' ESSI are presented.
Abstract: The escalating development of Information Technology enables utilities to reorganize or migrate from their existing disparate software systems towards an integrated Enterprise Software System Infrastructure (ESSI) that embraces the total organization. Integration of software systems is expected to increase competitiveness and to cut costs. However, since utilities' present ESSI is heterogeneous as to type and technical platform, overlapping with regard to both data and functionality, and relying on ad-hoc low-level middleware, integration and management of ESSIs often turn out to be hazardous.This paper presents a comparative analysis of the architectural modeling capabilities of established notations widely used by object-oriented, information engineering and structured methods, applied to typical problems found in utilities' ESSI. Architectural descriptions may be used to visualize technical risks and opportunities in a utility's current and future ESSI, as well as to improve communication between different groups within the utility, e.g. management and technical staff, and between the utility and its vendors of software systems.

49 citations


Journal ArticleDOI
TL;DR: In part two of this paper, the origins and evolution of Software as a Service (SaaS) and its value proposition to Corporate IT, Service Providers, Independent Software Vendors and End Users are described.
Abstract: In part I of this paper, we described the origins and evolution of Software as a Service (SaaS) and its value proposition to Corporate IT, Service Providers, Independent Software Vendors and End Users. SaaS is a model in which software applications are deployed, managed, updated and supported on demand---like a utility---and are served to users centrally using servers that are internal or external to the enterprise. Applications are no longer installed locally on a user's desktop PC; instead, upgrades, licensing and version control, metering, support and provisioning are all managed at the server level. In part we examine the lessons learned in researching, building and running an SaaS service.

Patent
17 Apr 2002
TL;DR: In this paper, a system and method update client computers of various end users with software updates for software products installed on the client computers, the software products manufactured by diverse, unrelated software vendors.
Abstract: A system and method update client computers of various end users with software updates for software products installed on the client computers, the software products manufacturered by diverse, unrelated software vendors. The system includes a service provider computer system, a number of client computers and software vendor computer systems communicating on a common network. The service provider computer system stores in an update database information about the software updates of the diverse software vendors, identifying the software products for which software updates are available, their location on the network at the various software vendor computer systems, information for identifying in the client computers the software products stored thereon, and information for determining for such products, which have software updates available. Users of the client computers connect to the service provider computer and obtain a current version of portions of the database. The client computer determines that software products stored thereon, and using this information, determines from the database, which products have updates available, based on product name and release information for the installed products. The user selects updates for installation. The selected updates are downloaded from the software vendor computer systems and installed on the client computer. Payment for the software update and the service is mediated by the service provider computer. Authentication of the user ensures only registered users obtain software updates. Authentication of the software updates ensures that the software updates are virus free and uncorrupted. Changes to the client computer during installation are monitored and archived, allowing the updates to be subsequently removed by the user.

01 Jan 2002
TL;DR: The software product industry in Finland has continued to grow: in 2005 software product revenue grew by 9.2% (21% in 2004) reaching 1.3 (1.19) billion euros as mentioned in this paper.
Abstract: The software product industry in Finland has continued to grow: in 2005 software product revenue grew by 9.2% (21% in 2004) reaching 1.3 (1.19) billion euros. Especially the international revenue increased by 24.2% (7%) amounting to 504 (406) million euros, see the figure below. Growth was evident especially in the larger companies, which usually have international operations. In addition, the profitability of the industry improved during 2005: profitability increased from previous year’s 2.2% to 2.8%. Unfortunately, employment stayed on the last year’s level: the amount of employees in the Finnish software product business was 12 340 (12 400) software professionals. Moreover, the average revenue per employee was low, only 109 000 euros (111 000). However, the future expectations of the companies are optimistic, e.g. the companies are investing more into the development of new products 41% (33%), young firms’ R&D investments have risen for the third consecutive year, and companies are planning to recruit more personnel in 2006. Furthermore, the companies have started to pay more attention to the scalability of their business models and are investing in the future as productization has gained more importance and offering software as a service has gained more popularity: 54% of the respondents offered Software as a Service compared to the last year’s 37%. 0 200 400 600 80

Patent
17 Apr 2002
TL;DR: In this paper, a system and method update client computers of various end users with software updates for software products installed on the client computers, the software products manufactured by diverse, unrelated software vendors.
Abstract: A system and method update client computers of various end users with software updates for software products installed on the client computers, the software products manufacturered by diverse, unrelated software vendors. The system includes a service provider computer system, a number of client computers and software vendor computer systems communicating on a common network. The service provider computer system stores in an update database information about the software updates of the diverse software vendors, identifying the software products for which software updates are available, their location on the network at the various software vendor computer systems, information for identifying in the client computers the software products stored thereon, and information for determining for such products, which have software updates available. Users of the client computers connect to the service provider computer and obtain a current version of portions of the database. The client computer determines that software products stored thereon, and using this information, determines from the database, which products have updates available, based on product name and release information for the installed products. The user selects updates for installation. The selected updates are downloaded from the software vendor computer systems and installed on the client computer. Payment for the software update and the service is mediated by the service provider computer. Authentication of the user ensures only registered users obtain software updates. Authentication of the software updates ensures that the software updates are virus free and uncorrupted. Changes to the client computer during installation are monitored and archived, allowing the updates to be subsequently removed by the user.

Patent
13 Dec 2002
TL;DR: In this paper, a software development methodology for deploying network management and service provisioning solutions is provided, which results in software application code that is easy to understand, debug, extend, test, and deploy while still being efficient when used in real time.
Abstract: A new architecture for deploying network management and service provisioning solutions is provided. The new architecture includes the provision of a framework implementing a software development methodology for coding complex software applications relating to network management and service provisioning. The software development methodology results in software application code that is easy to: understand, debug, extend, test, and deploy while still being efficient when used in real time. The methodology includes the coding, compiling and linking of a single managed object class. The managed object class is used to model and represent different data network entities in accordance with attributes held therein. The methodology further makes use of a network management and service provisioning specific grammar used by a parser associated with the framework to read a body of attribute files associated with the data network entities. Data network management and service provisioning solutions are enabled via network management and service provisioning enabling technologies. The interpretation of the contents of the attribute files is performed by hierarchical lexical analyzer which when encountering an enabling technology specific directive, the directive is interpreted by a corresponding enabling technology specific lexical analyzer stub. The advantages provided by the software development methodology are derived from application code that is easy to: understand, debug, extend, test, and deploy while still being efficient when used in real time.

Proceedings ArticleDOI
26 Aug 2002
TL;DR: This paper is concerned with the implications of negotiating software services under the software as a service model.
Abstract: Software as a service (SAAS) is a long-term research project aimed at developing technologies and methods for the rapid production and evolution of software systems by providing software as a service rather than as a product. Recently, there has been a growing interest in bringing intelligent solutions to Internet based computing. Automated negotiation has been at the center of such interest. This paper is concerned with the implications of negotiating software services under the software as a service model.

Proceedings ArticleDOI
26 Aug 2002
TL;DR: Palantir supports close collaboration among developers by visualizing concurrent changes and showing, in real time, the severity and impact of those changes on the developer's workspace.
Abstract: Distributed software development suffers from limited collaboration capabilities, as developers are unable to easily coordinate their efforts across physical boundaries. Different fields, such as CSCW and groupware, have attempted to bridge this gap, but few of the approaches developed so far have been incorporated in current software development environments. Configuration management (CM) systems are vital to any software development process, support distributed development, and are in widespread use. Unfortunately, they have only limited support for distributed collaboration. We describe Palantir, a system that is aimed at bringing collaborative capabilities to distributed development. Palantir builds upon existing CM systems to introduce project awareness to the developer workspace. In particular, Palantir supports close collaboration among developers by visualizing concurrent changes and showing, in real time, the severity and impact of those changes on the developer's workspace.

Book
01 Sep 2002
TL;DR: Business Innovation and Disruptive Technology: Harnessing the Power of Breakthrough Technology for Competitive Advantage shows you how to profit from the next technological revolution.
Abstract: Business Innovation and Disruptive Technology: Harnessing the Power of Breakthrough Technology for Competitive Advantage shows you how to profit from the next technological revolution. Nicholas D. Evans explains how to discover powerfully disruptive technologies more quickly, evaluate them more accurately, and implement them more profitably. He presents business-focused introductions to rapidly maturing technologies such as Web services, real-time computing, and P2P, then previews crucial trends like "software as a service," as well as next-generation technologies such as grid computing, electronic tagging, and location-based services.

Proceedings ArticleDOI
07 Jan 2002
TL;DR: A service architecture is described, in which components may be bound instantly, just at the time they are needed and then the binding may be disengaged, which allows highly flexible software services to be evolved in "Internet time".
Abstract: The need to change software easily to meet evolving business requirements is urgent, and a radical shift is required in the development of software, with a more demand-centric view leading to software which will be delivered as a service, within the framework of an open marketplace. We describe a service architecture and its rationale, in which components may be bound instantly, just at the time they are needed and then the binding may be disengaged. This allows highly flexible software services to be evolved in "Internet time". The paper focuses on early results: some of the aims have been demonstrated and amplified through two experimental implementations, enabling us to assess the strengths and weakness of the approach. It is concluded that some of the key underpinning concepts discovery and late binding - are viable and demonstrate the basic feasibility of the architecture.


Journal ArticleDOI
TL;DR: In this article, the authors describe the origins of Software as a Service (SaaS) and its value proposition to Corporate IT, Service Providers, Independent Software Vendors, and End User.
Abstract: This is a two-part paper. In part I, we describe the origins of Software as a Service (SaaS) and its value proposition to Corporate IT, Service Providers, Independent Software Vendors, and End User...

Proceedings ArticleDOI
08 Dec 2002
TL;DR: The paper focuses on the vital role of industry standards in the definition and implementation of Web services and relates this to the opportunities and challenges for similar standards and benefits for interoperability in simulation software.
Abstract: The concept of Web services represent the next generation of architectures for interoperability between software applications based on software industry standards. Presented in the paper is an overview of Web services, a discussion of the use of Web services in the context of simulation and a demonstration of the use of Web services for simulation as implemented in the Microsoft .Net software development and execution framework. The paper focuses on the vital role of industry standards in the definition and implementation of Web services and relates this to the opportunities and challenges for similar standards and benefits for interoperability in simulation software.

Journal ArticleDOI
Gary McGraw1
TL;DR: Software is the biggest problem in computer security today; most organizations invest in security by buying and maintaining a firewall, but they go on to let anybody access multiple Internet-enabled applications through that firewall.
Abstract: Software is the biggest problem in computer security today. Most organizations invest in security by buying and maintaining a firewall, but they go on to let anybody access multiple Internet-enabled applications through that firewall. These applications are often remotely exploitable, rendering the firewall impotent (not to mention the fact that the firewall is often a piece of fallible software itself). Real attackers exploit software.

Journal ArticleDOI
07 Aug 2002
TL;DR: This work explores OSS from the perspective of the cyber criminal and discusses what the community of software developers and users alike can do to increase their trust in both open source software and closed source software.
Abstract: Software plays an ever increasing role in the critical infrastructures that run our cities, manage our economies, and defend our nations. In 1999, the Presidents Information Technology Advisory Committee (PITAC) reported to the United States President the need for software components that are reliable, tested, modelled and secure supporting the development of predictably reliable and secure systems that underscore our critical infrastructures. Open source software (OSS) constitutes a viable source for software components. Some believe that OSS is more reliable and more secure than closed source software (CSS)-due to a phenomenon dubbed 'many eyeballs'-but is this truly the case? Or does OSS give the cyber criminal an edge that he would likewise not have? We explore OSS from the perspective of the cyber criminal and discuss what the community of software developers and users alike can do to increase their trust in both open source software and closed source software.

Journal ArticleDOI
TL;DR: This article presents basic information on the Balanced Scorecard performance management methodology as well as critical success factors and common pitfalls.
Abstract: You can't make money selling software. At least, that's what many firms that view software as an ancillary component to their business think. This article presents basic information on the Balanced Scorecard performance management methodology as well as critical success factors and common pitfalls. A BSC matrix and a supporting strategy map for a small software development organization are also presented.

Patent
30 Jul 2002
TL;DR: In this paper, a software management system and the like capable of reducing burdens of a manager while securing the convenience of a user, and preventing the unauthorized use of a software is proposed.
Abstract: PROBLEM TO BE SOLVED: To provide a software management system and the like capable of reducing burdens of a manager while securing the convenience of a user, and preventing the unauthorized use of a software. SOLUTION: When the client detects the start of the software, the client requests the permission of the start to a software management server. The software management server refers to a license database, and replies start codes ([permitted], [not permitted], [unregistered], and the like). The client starts the software in the case of the [permitted] start code, stops the start of the software in the case of the [not permitted] start code, and requests registration to the software management server in the case of the [unregistered] start code, so as to register the software with the license database. COPYRIGHT: (C)2004,JPO

Proceedings ArticleDOI
07 Aug 2002
TL;DR: The paper describes in detail the interaction required between logical network elements within the PLMN in order to perform the software upgrade on a set of targeted terminals.
Abstract: The paper proposes a viable technique for performing software upgrades of reconfigurable user terminals across the entire public land mobile network (PLMN) of an IMT-2000/UMTS network. The proposed solution utilizes over-the-air software downloads in conjunction with IP multicast as the enabling technology. The paper describes in detail the interaction required between logical network elements within the PLMN in order to perform the software upgrade on a set of targeted terminals. The limitations of the proposed technique are outlined and the paper addresses possible schemes for facilitating the presented solution and improving its scalability to large networks.

Proceedings ArticleDOI
26 Aug 2002
TL;DR: It is argued that using a web service model supports reusability of not only the software but also the operational environment where the software runs, considered particularly critical in providing security and trust operations.
Abstract: It is well understood that using a software component methodology can simplify the development and maintenance of systems. Web services allow this vision to be extended allowing components to be made available on the Internet. This paper proposes the use of trust services as third party Web services that allow trust operations to be extracted from solutions and packaged as components. This has obvious advantages in simplifying the task of engendering trust in solutions-both during their creation and in simplifying the maintenance. The paper further argues that using a web service model supports reusability of not only the software but also the operational environment where the software runs. This operational environment is considered particularly critical in providing security and trust operations.

Proceedings ArticleDOI
24 Mar 2002
TL;DR: This tutorial provides an overview of VR application development using Open Source software tools and shows how leveraging existing and emerging Open Source projects can lower development times and costs while simultaneously increasing portability and stability.
Abstract: This tutorial provides an overview of VR application development using Open Source software tools. We focus on the VR Juggler suite of tools (see http://www.vrjuggler.org) and various Open Source projects that can work with it. We will demonstrate how Open Source software ensures extensibility and eases integration between software tools. We will also show how leveraging existing and emerging Open Source projects can lower development times and costs while simultaneously increasing portability and stability. In particular, we will discuss several kinds of Open Source VR software: • Development frameworks for immersive VR applications (VR Juggler) • Scene graphs for managing application data. (OpenSG or OpenSceneGraph). • Clustering software for powering low-cost VR systems (NetJuggler). • Collaboration software for writing interactive, networked applications (primarily discussing software currently under development by the VR Juggler team). • Various other tools needed to write compelling applications, such as audio libraries, scripting capabilities, and navigation systems, and how they can be used by VR Jugglerbased applications.

Proceedings Article
D.A. Penny1
01 Jan 2002
TL;DR: The author discusses the release planning methodology used to balance customer and market responsiveness with on-time delivery in algorithmics Incorporated.
Abstract: Algorithmics Incorporated is a software vendor company that produces enterprise risk management software for global financial institutions. From 1994-1999 the author held various executive positions at the company, including VP Software Development, CTO, and VP Product Marketing. He discusses the release planning methodology used to balance customer and market responsiveness with on-time delivery.