Santosh Shrivastava

Learn More
Monitoring of contractual Service Level Agreements (SLAs) between providers of services over the Internet and consumers is concerned with the collection of statistical metrics about the performance of a service to evaluate whether a provider complies with the level of Quality of the Service (QoS) that the consumer expects. Such monitoring is frequently(More)
In this paper we discuss some of the problems of the current Web and show how the introduction of object-orientation provides flexible and extensible solutions. Web resources become encapsulated as objects, with well-defined interfaces through which all interactions occur. The interfaces and their implementations can be inherited by builders of objects, and(More)
The subject matter of this paper is concerned with the coordination of message-based interactions within the context of business-to-business integration (B2Bi) that autonomous organizations - business partners - need to do in order to automate their business functions such as travel booking, order fulfilment and so forth. B2Bi solutions offered by vendors(More)
The paper considers a third party contract monitoring service called Contract Compliance Checker (CCC). The CCC is provided with an executable specification of the contract in force, and is capable of observing and logging the relevant business-to-business (B2B) interaction events, in order to determine whether the actions of the business partners are(More)
This paper proposes an optimistic concurrency control scheme for use in transactional client-server database systems. To improve performance, objects are cached at the clients. The proposed scheme provides serializability for committed transactions. This is in contrast to many modern systems that only provide the snapshot isolation property which is weaker(More)
A pay–per–use cloud service should be made available to consumers with an unambiguous resource accounting model that precisely describes all the factors that are taken into account in calculating resource consumption charges. The paper proposes the notion of consumer–centric resource accounting model such that consumers can(More)
The correct implementation of security protocols is a challenging task. Like any software, to gain high confidence in a given implementation, ideally one requires both: (i) a formal specification that has been subjected to verification; and (ii) tool support to generate an implementation from the verified specification. The former area has attracted(More)
This report describes how trust and security issues can be addressed in composite services (CS). ADAPT deliverable report D9 (CS Middleware Architecture) gave the overall architecture of CSs within the context of virtual organisations [1]. Composition and enactment of CSs was described in ADAPT deliverable reports D6 (Service Specification Language) and D7(More)