2021
DOI: 10.21203/rs.3.rs-194135/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Autonomous Runtime Consumer Interface Generation and Deployment for Service Interoperability

Abstract: The new Industry 4.0 approach contributes to addressing evolving industrial requirements, which are continuously fueled by changing market demands. This situation leads to growing complexity and considerable increases in development and maintenance costs. A significant portion of engineering time is dedicated to the integration and interconnection of heterogeneous components. The solution for interoperability issues and the reduction in the associated engineering time are thus key tasks for increasing producti… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…In this architecture, applications or systems provide and consume services via interfaces and protocols. Some of the key properties of SOA are late binding, autonomy, and push-pull behavior [3]. One of the core elements of an SOA is a mechanism for service discovery.…”
Section: Solution Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…In this architecture, applications or systems provide and consume services via interfaces and protocols. Some of the key properties of SOA are late binding, autonomy, and push-pull behavior [3]. One of the core elements of an SOA is a mechanism for service discovery.…”
Section: Solution Architecturementioning
confidence: 99%
“…In the context of industrial data sharing and access control, Service-oriented architecture (SOA) can provide a flexible and scalable architecture that can adapt to the evolving needs of modern industrial systems [2] [3]. However, data source and user changes require administrative operations in the system to connect the new device or user identity with the access control policies to properly enforce access rights.…”
Section: Introductionmentioning
confidence: 99%