Visual Programming of Location-Based Services

In this paper we discuss a visual programming environment for design and rapid prototyping of web-based applications, securely connected to remote Location-Based Services. The visual programming approach of this research is based on computation as data transformation within a dataflow, and on visual composition of web services. The VisPro environment uses a very simple approach to service composition: (a) the developer takes a set of web widgets from a library, (b) builds interactively a user interface by drag and drop, (c) builds the application logic of the web service by drawing the connections between boxes (standing for suitable data transformations) and widgets (standing for user interaction). The development session produces, in presentation mode, a web page where the user may trigger, and interact with, the novel data mining and related computation. A successful GUI (and logic) is abstracted as a new service, characterized by a new widget, and stored in the widget library.

[1]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[2]  Francisco Curbera,et al.  Bite: Workflow Composition for the Web , 2007, ICSOC.

[3]  William Stallings,et al.  Network Security Essentials: Applications and Standards , 1999 .

[4]  Kefei Chen,et al.  Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings , 2006, ASIACRYPT.

[5]  Fu Lee Wang,et al.  Web Information Systems and Mining , 2010, Lecture Notes in Computer Science.

[6]  Christophe De Cannière,et al.  Finding SHA-1 Characteristics: General Results and Applications , 2006, ASIACRYPT.

[7]  William Stallings,et al.  Network Security Essentials , 1999 .

[8]  Tim Dierks,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .

[9]  Zhongfu Wu,et al.  EPN-Based Web Service Composition Approach , 2009, WISM.

[10]  Vincent Rijmen,et al.  Analysis of simplified variants of SHA-256 , 2005, WEWoRC.

[11]  Donald E. Eastlake,et al.  US Secure Hash Algorithms (SHA and HMAC-SHA) , 2006, RFC.

[12]  Bruce Schneier,et al.  Analysis of the SSL 3.0 protocol , 1996 .

[13]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.

[14]  Priya Narasimhan,et al.  Service-Oriented Computing - ICSOC 2007, Fifth International Conference, Vienna, Austria, September 17-20, 2007, Proceedings , 2007, ICSOC.

[15]  Koustuv Dasgupta,et al.  A service creation environment based on end to end composition of Web services , 2005, WWW '05.

[16]  Franco Milicchio,et al.  A Visual Approach To Geometric Programming , 2005 .

[17]  Donald E. Eastlake,et al.  US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.