You are on page 1of 10

A Seminar Report on

SOA-based Business Processes"


Submitted by

ABC (Roll No:11 ) in partial fulfillment of the requirements of TE (Computer Engg.) Semester-II For Academic Year 2012-2013

Under the guidance of Prof. K.S.Kumavat


DEPARTMENT OF COMPUTER ENGINEERING

Brahma Valley College of Engineering & Research Institute


Trimbak Road, Nashik-422213 (College Code: 062)

Certificate
This is to certify that following student of TE (Computer Engg), Department of Computer Engineering ABC (Roll No:11 ) has completed the necessary seminar work and prepared the preliminary Seminar Report on

SOA-based Business Processes"


in satisfactory manner towards partial fulfillment of requirement of TE (Computer Engg), Semester-II in academic year 2012-2013

(Prof. K. S. Kumavat) Seminar Guide

(Prof. H. D. Sonawane) H.O.D

(Prof. C. K. Patil) Principal

Acknowledgement

I wish to express my sincere gratitude to Prof. C. K. Patil, principal and Prof. H. D. Sonawane, H.O.D of Computer Department for providing me an opportunity for presenting seminar on SOA-based Business Processes. I sincerely thank to my seminar guide Prof. K. S. Kumavat for guidance and encouragement for completing the seminar work. I also wish to express my gratitude to the officials and other staff members who rendered their help during the period of my seminar. Last but not least I wish to avail myself of this opportunity, express a sense of gratitude and love to my friends and my parents for their manual support, strength, help and for everything.

ABC

Abstract

Contents
1 Introduction 1

1.1 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.2 Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

2 Literature Survey

2.1 . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . .. . . .. . . . .. . . . . . . .. . . . 9 2.2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11

3 Problem Definition 4 System Requirement Analyses

13 14

4.1 System Analysis and System Flow . . . . . . . . . . . . . . . . . . . . . .16 4.2 System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 4.2.1. . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . .. . . . . . . . . .. . . . . . . . 20 4.3 Details of Algorithmic Strategy . . . . . . . . . . . . . . . . . . . . . . . . 21 4.4 Advantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22 4.5 Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 4.6 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24 4.7 Future Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25

5 Conclusion Bibliography

26 27

List of Figures
1.1 aajdsdfjgsdfdjfdkfjdfkjkjfkdgjility Life Cycle . . . . . . . . . . . . . . . . . . . . . . . . 2.1 fgjkjhjkghjkghjgkhjgkWeb Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 ghgkhjgkhjgkhjkghjgkhjgkhjgkh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.3 ghgfhkgjhkgjhjhkgkghjgkhjgkhjlassification . . . . . . . . . . . . . . . . . . . . . . . 2.4 ngjnjghkjhgkjhkjkhjhgkjlh ses with percentage of entries . . . . . . . . . . . . 2.5 Top hjghjkhjkhjkhjklasses with percentage of NVD entries . . . . . . . . . . .

5 6 7

10 11 12

Chapter 1 Introduction

Chapter 2

Chapter 3

Bibliography
[1] Vulnerability Analysis in SOA-based Business Processes Lutz Lowis and Rafael Accorsi, Member IEEE

E-mail: owis,accorsig@iig.uni-freiburg.de .

[2] ATLIST Method: Exploits Vulnerability in SOAV. M. Vasava, Prof. S. P. Abhang (CSE (Soft Engg.), MIT Aurangabad (MS), India)(CSE, MIT Aurangabad (MS), India) IOSR

Journal of Computer Engineering (IOSRJCE)ISSN: 2278-

0661 Volume 1, Issue 4,(May-June 2012), PP 48-53


[3] Finding Security Vulnerabilities in Java Applications with Static AnalysisV. Benjamin Livshits and Monica S. Lam Computer Science Department Stanford University

www.iosrjournals.org
[4] A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE

Trans. on Dependable and

Secure Computing, vol. 1, no. 1, pp.a. 11-33,Jan.-March 2004.


[5] Symantec, Symantec global internet security threat report 2008, ,April 2009 . [6] NIST, National vulnerability database (NVD),

http://nvd.nist.gov/ , 2009.
[7] Open Security Foundation (OSF), Open Source Vulnerability Database (OSVDB),

http://osvdb.org, 2009.
[8] Department of Defense (DoD), Procedures for performing a failure mode, effects and criticality analysis, MIL-STD-1629A, November 1980