{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:35:03Z","timestamp":1754156103856,"version":"3.41.2"},"reference-count":33,"publisher":"Emerald","issue":"ahead-of-print","license":[{"start":{"date-parts":[[2019,7,29]],"date-time":"2019-07-29T00:00:00Z","timestamp":1564358400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJWIS"],"published-print":{"date-parts":[[2019,7,29]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>Web services composition engineering (WSCE) is a big challenge because of the increasing complexity, openness and extensibility of services based on the information system (IS). In the absence of an adequate framework for IS engineering, the authors assume that the overall problem is consequently no longer easy to resolve. This paper aims to explore some of the issues underlying WSCE through a framework, which is built based on the state of the art. The proposed framework is structured around five views that mainly highlight aspects of personalization and security concerns. The main objectives of this framework are: to help understand and clarify the basics of the WSCE domain; to evaluate web services composition (WSC) methods; to analyze and compare existing personalization, secure methods and identify new research axes; and to identify the main criteria of the ongoing approach for the design of a secure IS based on personalized WSC.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>This work develops a framework that is used as an analytical study to compare the existing WSCE methods and come up with research issues. Then, the proposed framework is considered as an abstract model for the new WSCE approach.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>A set of criteria that the proposed framework should consider when developing a new approach to a secure IS based on personalized WSs composition.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title>\n<jats:p>The paper has theoretical implications as the personalization and security issues provide a research roadmap toward the realization of an approach for the design of a secure IS based on personalized WSs composition.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title>\n<jats:p>As proof, the authors are interested in a web services repository of a real mall. To do this, the authors deployed the application in a cloud environment and observed the results of personalization and security concepts in WSCE.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>None of the existing comparison frameworks has raised both personalization and security issues in WSs composition, while personalization and security must be present in the whole composition process.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ijwis-04-2018-0027","type":"journal-article","created":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T04:11:11Z","timestamp":1565064671000},"source":"Crossref","is-referenced-by-count":4,"title":["A comprehensive framework for evaluating web services composition methods"],"prefix":"10.1108","volume":"ahead-of-print","author":[{"given":"Sarra","family":"Abidi","sequence":"first","affiliation":[]},{"given":"Myriam","family":"Fakhri","sequence":"additional","affiliation":[]},{"given":"Mehrez","family":"Essafi","sequence":"additional","affiliation":[]},{"given":"Henda","family":"Ben Ghazela","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"article-title":"A personalized on-the-fly approach for secure semantic web services composition","volume-title":"14th ACS\/IEEE International Conference on Computer Systems and Applications AICCSA","year":"2017","key":"key2019080608110527200_ref001"},{"journal-title":"Knowledge Based and Intelligent Information and Engineering Systems","article-title":"Refined cloud services discovery based on user model including privacy-preserving access control","year":"2018","key":"key2019080608110527200_ref002"},{"issue":"7","key":"key2019080608110527200_ref003","article-title":"A phased two stages conceptual framework for web services composition","volume":"13","year":"2018","journal-title":"Journal of Engineering and Applied Sciences"},{"issue":"4","key":"key2019080608110527200_ref004","article-title":"A comparison framework for service-oriented software engineering approaches issues and solutions","volume":"9","year":"2013","journal-title":"International Journal of Web Information Systems"},{"article-title":"Generalized framework for secure web service composition","volume-title":"Fourth International Conference on Computational Intelligence and Communication Networks","year":"2012","key":"key2019080608110527200_ref005"},{"article-title":"On the verification of opacity in web services and their composition","volume-title":"IEEE Transactions On Services Computing","year":"2016","key":"key2019080608110527200_ref006"},{"key":"key2019080608110527200_ref007","first-page":"647","article-title":"A framework for secure service composition","volume-title":"International Conference on Information Privacy, Security, Risk and Trust (PASSAT)","year":"2013"},{"first-page":"121","article-title":"The aniketos service composition framework (analysing and ranking of secure services)","year":"2014","key":"key2019080608110527200_ref008"},{"issue":"2","key":"key2019080608110527200_ref009","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/s40012-013-0010-8","article-title":"A framework for development of secure software","volume":"1","year":"2013","journal-title":"CSI Transactions on Ict"},{"article-title":"A multi-perspective approach for web service composition","volume-title":"WAS2011","year":"2011","key":"key2019080608110527200_ref010"},{"issue":"1","key":"key2019080608110527200_ref011","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1504\/IJWGS.2005.007545","article-title":"A survey on web services composition","volume":"1","year":"2005","journal-title":"International\u201d. Journal Web and Grid Services"},{"issue":"3","key":"key2019080608110527200_ref012","doi-asserted-by":"crossref","first-page":"56","DOI":"10.4018\/ijsse.2014070104","article-title":"Meta-Modeling based secure software development processes","volume":"5","year":"2014","journal-title":"International Journal of Secure Software Engineering"},{"article-title":"User-centric web services composition approach based on swarm intelligence","volume-title":"IEEE 18th International Conference on High Performance Computing and Communications","year":"2016","key":"key2019080608110527200_ref013"},{"article-title":"Model-based verification of web service compositions","volume-title":"18th IEEE International Conference on automated software Engineering","year":"2003","key":"key2019080608110527200_ref014"},{"article-title":"A novel classification of web service composition and optimization approach using skyline algorithm integrated with agents","volume-title":"IEEE International Conference on Computational Intelligence and Computing Research","year":"2013","key":"key2019080608110527200_ref015"},{"article-title":"Towards a model of requirements Processes","volume-title":"Proc. of 14th Intl. Conf. on Information Systems","year":"1993","key":"key2019080608110527200_ref016"},{"issue":"1","key":"key2019080608110527200_ref017","article-title":"An environment for evolving information systems","volume":"10","year":"1992","journal-title":"ACM Transactions on Information Systems"},{"article-title":"Automated publish, discovery and composition of intentional web services adaptable to both quality and context","volume-title":"IEEE 18th International Conference on High Performance Computing and Communications","year":"2016","key":"key2019080608110527200_ref018"},{"article-title":"Security-aware selection of web services for reliable composition","volume-title":"11th European Computing Conference (EDCC)","year":"2015","key":"key2019080608110527200_ref019"},{"issue":"37","key":"key2019080608110527200_ref020","article-title":"Enhancing data privacy in web service composition","volume":"9","year":"2016","journal-title":"Indian Journal of Science and Technology"},{"volume-title":"Integrating Security and Software Engineering: Advances and Future VisionsIGI Global","year":"2006","key":"key2019080608110527200_ref022"},{"volume-title":"A Vision of Business Processes Based on the co-Engineering of Services Composition","year":"2015","author":"Myriam Fakhri","key":"key2019080608110527200_ref023"},{"issue":"4","key":"key2019080608110527200_ref024","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1504\/IJWET.2006.010423","article-title":"Service-oriented design and development methodology","volume":"2","year":"2006","journal-title":"International Journal of Web Engineering and Technology"},{"issue":"1","key":"key2019080608110527200_ref025","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MS.1987.229789","article-title":"Classifying software for reusability","volume":"4","year":"1987","journal-title":"IEEE Software"},{"issue":"1","key":"key2019080608110527200_ref026","article-title":"A proposal for a scenario classification framework","volume":"3","year":"1998","journal-title":"Requirements Engineering"},{"issue":"1","key":"key2019080608110527200_ref027","first-page":"125","article-title":"Guiding the construction of textual use case specifications","volume":"25","year":"1997","journal-title":"Data and Knowledge Engineering Journal"},{"key":"key2019080608110527200_ref028","unstructured":"Si-Said, C. (1999), \u201cProposal for the modeling and guidance of information systems analysis processes\u201d, PhD thesis, Paris 1University."},{"key":"key2019080608110527200_ref029","first-page":"45","article-title":"On the notion of variability in software product lines","volume-title":"Pages Proceedings of the 2nd working IEEE conference on software architecture (WICSA\u201901)","year":"2001"},{"article-title":"User\u2019s requirements driven services adaptation and evolution","volume-title":"Computer Software and Applications Conference Workshops (COMPSACW), IEEE 36th Annual","year":"2012","key":"key2019080608110527200_ref030"},{"issue":"2","key":"key2019080608110527200_ref031","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/S0306-4379(03)00051-6","article-title":"Service components for managing the life-cycle of service compositions","volume":"29","year":"2004","journal-title":"Information Systems"},{"volume-title":"A Predictive Method for Services Composition Based Intentions and Requirements in Heterogeneous Environments","year":"2014","author":"Youssef Ben Halima","key":"key2019080608110527200_ref032"},{"article-title":"Static\/semi-dynamic and dynamic composition of services\u201d in distributed","volume-title":"Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services","year":"2006","key":"key2019080608110527200_ref033"},{"key":"key2019080608110527200_ref034","unstructured":"https:\/\/docs.jujucharms.com\/2.3\/en\/about-juju"}],"container-title":["International Journal of Web Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/IJWIS-04-2018-0027","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/IJWIS-04-2018-0027","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:24:00Z","timestamp":1753395840000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ijwis\/article\/15\/3\/324-345\/374939"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,29]]},"references-count":33,"journal-issue":{"issue":"ahead-of-print","published-print":{"date-parts":[[2019,7,29]]}},"alternative-id":["10.1108\/IJWIS-04-2018-0027"],"URL":"https:\/\/doi.org\/10.1108\/ijwis-04-2018-0027","relation":{},"ISSN":["1744-0084","1744-0084"],"issn-type":[{"type":"print","value":"1744-0084"},{"type":"print","value":"1744-0084"}],"subject":[],"published":{"date-parts":[[2019,7,29]]}}}