Real-life SOA Experiences and an Approach Towards Semantic SOA
Real-life SOA Experiences and an Approach Towards Semantic SOA
Real-life SOA Experiences and an Approach Towards Semantic SOA
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
purpose. OWL-S is suite of ontologies based on the W3C st<strong><strong>an</strong>d</strong>ard OWL [13] <strong><strong>an</strong>d</strong> consists of<br />
Profile, Process Model <strong><strong>an</strong>d</strong> Grounding ontologies. Some work is done in order to map BPEL to<br />
OWL-S sem<strong>an</strong>tic Web services [14, 33]. Several research papers have investigated different<br />
approaches for discovering <strong><strong>an</strong>d</strong> locating the sem<strong>an</strong>tically matching Web services [15, 16, 17].<br />
This paper is org<strong>an</strong>ized as follows; the overall strategy project at MCG <strong><strong>an</strong>d</strong> some of its<br />
results are described in section 2. Sem<strong>an</strong>tic enh<strong>an</strong>cements in the <strong>SOA</strong> are discussed in section<br />
3. Section 4 describes the 4-tier architecture for Web services integration in sem<strong>an</strong>tic service<br />
oriented paradigm. Related work is discussed in section 5 <strong><strong>an</strong>d</strong> section 6 concludes <strong><strong>an</strong>d</strong> describes<br />
future directions for our work.<br />
2 <strong>SOA</strong> activity at Mercedes Car Group (MCG)<br />
The MCG M<strong>an</strong>agement decided to explore the vision of <strong>SOA</strong> <strong><strong>an</strong>d</strong> created a strategic project at<br />
MCG. We are going to name the work packages (WP), list the topics <strong><strong>an</strong>d</strong> describe some already<br />
available results of the project. We are also going to explore the need of sem<strong>an</strong>tics in order to<br />
reuse services. This overall strategy project is coordinating every <strong>SOA</strong> activity at the MCG. It<br />
coordinates but also supplements each single project (e.g. with a security concept in order to<br />
implement a common secure machine-to-machine communication). The project is cut into five<br />
working packages. The deliverable of WP1 is a well defined Reference Architecture; the<br />
deliverable of WP2 is a Development L<strong><strong>an</strong>d</strong>scape for projects; WP3 deliverables the hosting of<br />
<strong>SOA</strong>-projects; WP4 delivers the m<strong>an</strong>aging of Org<strong>an</strong>ization, Govern<strong>an</strong>ce <strong><strong>an</strong>d</strong> Guid<strong>an</strong>ce; <strong><strong>an</strong>d</strong><br />
WP5 delivers the modeling of business processes <strong><strong>an</strong>d</strong> adapting the Service-Oriented Modeling<br />
<strong><strong>an</strong>d</strong> Architecture (SOMA) [3]. A final result of the project is the positioning the strategic<br />
products in our enterprise. We have identified the following topics (r<strong><strong>an</strong>d</strong>om order) to verify the<br />
vision of <strong>SOA</strong>:<br />
• Modeling processes in EPCs<br />
• Tool based tr<strong>an</strong>sformation from EPC to BPEL<br />
• Deploying the process in the process engine<br />
• Orchestrate services (exemplary)<br />
• Communication of the services over a unified infrastructure<br />
• Web services<br />
• Implementing (at least) one registry<br />
• Closer look at the top down approach<br />
• Security<br />
• Service Life Cycle M<strong>an</strong>agement<br />
• Operational aspects like availability of each IT system <strong><strong>an</strong>d</strong> monitoring the infrastructure<br />
• Explore the Enterprise Service Bus (ESB) [4]<br />
We are going to describe requirements of the topic Security in this paragraph <strong><strong>an</strong>d</strong> already<br />
available results of the topics Web services <strong><strong>an</strong>d</strong> Enterprise Service Bus in the following<br />
paragraphs. There is a deeper look at security in sense of h<strong><strong>an</strong>d</strong>ling our four different parts of<br />
data classification specified in our policies: public, internal, confidential <strong><strong>an</strong>d</strong> secret. We expect<br />
experiences in supplier based security <strong><strong>an</strong>d</strong> Web services security in order to solve unlimited<br />
communication between different classified services. We focus on Host to Java communication<br />
<strong><strong>an</strong>d</strong> services that are hosted by a Host-System. Security aspects like authentication,