• No results found

6 Slutsatser och vidare forskning

Litteratur grundad i akademisk forskning kring specifika implementationer och programva- ror inom det granskade området tycks bristande, och leder till att konkreta slutsatser kring fråga 1 i studiens frågeställning är svåra att nå. Detta då en utförlig lista över samtliga möjliga tekniker inte går att sammanställa utifrån den tillgängliga akademiska litteraturen. I de fall där mängden relevant akademisk litteratur ansågs tillräcklig kan dock ett antal rekommenderade tekniker utläsas vilka utgjordes av OAuth 2.0 för autentisering, JSON som serialiseringsformat samt REST som kommunikationsarkitektur. Detta besvarar till viss grad fråga 2 i frågeställningen, men slutsatser kring rekommenderade programvaror går inte att fastslå utifrån resultatet av litteraturstudien. Förslag på vidare forskning utgörs därmed av komparativa studier mellan specifika programvaror och ramverk vilka används för konstruktion av webbtjänster och dataagreggeringssystem.

De rekommenderade teknikerna tycks korrelera väl med de val som gjorts av företaget i studien. Dock saknas belägg för att påvisa en genuin korrelation mellan industrin och akademin, och på så vis utesluta ett sammanträffande.

De tekniker som utgör svar på fråga 2 bidrar även till att besvara fråga 3 i frågeställ- ningen, då tredjeparts-aktörer kan implementera dessa för att underlätta användande vid utveckling av nya tjänster.

Referenser

[1] ProgrammableWeb. (2015). Programmableweb - apis, mashups and the web as plat- form. [Accessed May 18 2015], URL: http://www.programmableweb.com/.

[2] M. Nauman, S. Khan, A. T. Othman, S. ulniza Musa och N. U. Rehman, ”Poauth: privacy-aware open authorization for native apps on smartphone platforms”, i Pro- ceedings of the 6th International Conference on Ubiquitous Information Manage- ment and Communication, ser. ICUIMC ’12, Kuala Lumpur, Malaysia: ACM, 2012, 60:1–60:8, isbn: 978-1-4503-1172-4. doi: 10.1145/2184751.2184825. URL: http: //doi.acm.org/10.1145/2184751.2184825.

[3] M. Shehab, S. Marouf och C. Hudel, ”Roauth: recommendation based open autho- rization”, i Proceedings of the Seventh Symposium on Usable Privacy and Security, ser. SOUPS ’11, Pittsburgh, Pennsylvania: ACM, 2011, 11:1–11:12, isbn: 978-1-4503- 0911-0. doi: 10.1145/2078827.2078842. URL: http://doi.acm.org/10.1145/ 2078827.2078842.

[4] A. Vapen, N. Carlsson, A. Mahanti och N. Shahmehri, ”Information sharing and user privacy in the third-party identity management landscape”, i Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, ser. CODASPY ’15, San Antonio, Texas, USA: ACM, 2015, s. 151–153, isbn: 978-1-4503-3191-3. doi: 10. 1145/2699026.2699131. URL: http://doi.acm.org/10.1145/2699026.2699131. [5] Z. Niu, C. Yang och Y. Zhang, ”A design of cross-terminal web system based on

json and rest”, i Software Engineering and Service Science (ICSESS), 2014 5th IEEE International Conference on, juni 2014, s. 904–907. doi: 10.1109/ICSESS.2014. 6933711.

[6] S. Schreier, ”Modeling restful applications”, i Proceedings of the Second International Workshop on RESTful Design, ser. WS-REST ’11, Hyderabad, India: ACM, 2011, s. 15–21, isbn: 978-1-4503-0623-2. doi: 10.1145/1967428.1967434. URL: http: //doi.acm.org/10.1145/1967428.1967434.

[7] B. P. Upadhyaya, ”Rest client pattern”, i Industrial Electronics (ISIE), 2014 IEEE 23rd International Symposium on, juni 2014, s. 231–235. doi: 10.1109/ISIE.2014. 6864616.

[8] R. Ramasahayam och R. Deters, ”Is the cloud the answer to scalability of ecologies? using gae to enable horizontal scalability”, i Digital Ecosystems and Technologies Conference (DEST), 2011 Proceedings of the 5th IEEE International Conference on, maj 2011, s. 317–323. doi: 10.1109/DEST.2011.5936602.

[9] L. Hongjun, ”Restful web service frameworks in java”, i Signal Processing, Commu- nications and Computing (ICSPCC), 2011 IEEE International Conference on, sept. 2011, s. 1–4. doi: 10.1109/ICSPCC.2011.6061739.

[10] P. Fremantle, B. Aziz, J. Kopecký och P. Scott, ”Federated identity and access ma- nagement for the internet of things”, i Secure Internet of Things (SIoT), 2014 Inter- national Workshop on, sept. 2014, s. 10–17. doi: 10.1109/SIoT.2014.8.

[11] A. B. Bondi, ”Characteristics of scalability and their impact on performance”, i Proceedings of the 2Nd International Workshop on Software and Performance, ser. WOSP ’00, Ottawa, Ontario, Canada: ACM, 2000, s. 195–203, isbn: 1-58113-195-X. doi: 10 . 1145 / 350391 . 350432. URL: http : / / doi . acm . org / 10 . 1145 / 350391 . 350432.

[12] K. Liu och K. Xu, ”Oauth based authentication and authorization in open telco api”, i Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, vol. 1, mars 2012, s. 176–179. doi: 10.1109/ICCSEE.2012.275. [13] F. Yang och S. Manoharan, ”A security analysis of the oauth protocol”, i Com-

munications, Computers and Signal Processing (PACRIM), 2013 IEEE Pacific Rim Conference on, aug. 2013, s. 271–276. doi: 10.1109/PACRIM.2013.6625487.

[14] T. Reimer, P. Abraham och Q. Tan, ”Federated identity access broker pattern for cloud computing”, i Network-Based Information Systems (NBiS), 2013 16th Interna- tional Conference on, sept. 2013, s. 134–140. doi: 10.1109/NBiS.2013.23.

[15] E. Chen, Y. Pei, S. Chen, Y. Tian, R. Kotcher och P. Tague, ”Oauth demystified for mobile application developers”, i Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, ser. CCS ’14, Scottsdale, Arizona, USA: ACM, 2014, s. 892–903, isbn: 978-1-4503-2957-6. doi: 10.1145/2660267.2660323. URL: http://doi.acm.org/10.1145/2660267.2660323.

[16] F. D. Backere, B. Hanssens, R. Heynssens, R. Houthooft, A. Zuliani, S. Verstichel, B. Dhoedt och F. D. Turck, ”Design of a security mechanism for restful web service communication through mobile clients”, i Network Operations and Management Sym- posium (NOMS), 2014 IEEE, maj 2014, s. 1–6. doi: 10.1109/NOMS.2014.6838308. [17] A. Vapen, N. Carlsson, A. Mahanti och N. Shahmehri, ”Information sharing and user privacy in the third-party identity management landscape”, i Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, ser. CODASPY ’15, San Antonio, Texas, USA: ACM, 2015, s. 151–153, isbn: 978-1-4503-3191-3. doi: 10. 1145/2699026.2699131. URL: http://doi.acm.org/10.1145/2699026.2699131. [18] A. Sumaray och S. K. Makki, ”A comparison of data serialization formats for optimal

efficiency on a mobile platform”, i Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ser. ICUIMC ’12, Kuala Lumpur, Malaysia: ACM, 2012, 48:1–48:6, isbn: 978-1-4503-1172-4. doi: 10.1145/ 2184751.2184810. URL: http://doi.acm.org/10.1145/2184751.2184810.

[19] R. T. Fielding och R. N. Taylor, ”Principled design of the modern web architecture”, i Proceedings of the 22Nd International Conference on Software Engineering, ser. ICSE ’00, Limerick, Ireland: ACM, 2000, s. 407–416, isbn: 1-58113-206-9. doi: 10. 1145/337180.337228. URL: http://doi.acm.org/10.1145/337180.337228. [20] B. Charles, ”Google app engine gets ready for business”, English, Informationweek

- Online, juni 2012. URL: http://search.proquest.com/docview/1022551001? accountid=12249.

[21] B. Lin, Y. Chen, X. Chen och Y. Yu, ”Comparison between json and xml in applica- tions based on ajax”, i Computer Science Service System (CSSS), 2012 International Conference on, aug. 2012, s. 1174–1177. doi: 10.1109/CSSS.2012.297.

[22] P. Wang, X. Wu och H. Yang, ”Analysis of the efficiency of data transmission format based on ajax applications”, i Information Technology, Computer Engineering and Management Sciences (ICM), 2011 International Conference on, vol. 4, sept. 2011, s. 265–268. doi: 10.1109/ICM.2011.199.

[23] N. Nurseitov, M. Paulson, R. Reynolds och C. Izurieta, ”Comparison of JSON and XML Data Interchange Formats: A Case Study”, i CAINE, D. Che och D. Che, utg., ISCA, 2009, s. 157–162, isbn: 978-1-880843-73-4. URL: http://dblp.uni- trier.de/rec/bibtex/conf/caine/NurseitovPRI09.

[24] T. Aihkisalo och T. Paaso, ”Latencies of service invocation and processing of the rest and soap web service interfaces”, i Services (SERVICES), 2012 IEEE Eighth World Congress on, juni 2012, s. 100–107. doi: 10.1109/SERVICES.2012.55.

[25] K. Hameseder, S. Fowler och A. Peterson, ”Performance analysis of ubiquitous web systems for smartphones”, i Performance Evaluation of Computer Telecommunication Systems (SPECTS), 2011 International Symposium on, juni 2011, s. 84–89.

[26] K. Maeda, ”Performance evaluation of object serialization libraries in xml, json and binary formats”, i Digital Information and Communication Technology and it’s Ap- plications (DICTAP), 2012 Second International Conference on, maj 2012, s. 177– 182. doi: 10.1109/DICTAP.2012.6215346.

[27] T. Aihkisalo och T. Paaso, ”A performance comparison of web service object marshal- ling and unmarshalling solutions”, i Services (SERVICES), 2011 IEEE World Con- gress on, juli 2011, s. 122–129. doi: 10.1109/SERVICES.2011.61.

[28] IDG. (2015). Språkwebb. [Accessed Mars 24 2015], URL: http://cstjanster.idg. se/sprakwebben/ord.asp?ord=platform-as-a-service.

[29] H. Marc och S. Paul. (2009). Jax-rs: javaTM api for restful web services. [Accessed

Mars 17 2015], URL: https : / / jsr311 . java . net / nonav / releases / 1 . 1 / spec / spec.html.

[30] P.-G. Santiago och P. Marek. (2013). Jax-rs: javaTM api for restful web services. [Accessed Mars 17 2015], URL: http : / / download . oracle . com / otn - pub / jcp / jaxrs-2_0-fr-eval-spec/jsr339-jaxrs-2.0-final-spec.pdf.

[31] Oracle Corporation. (2015). Jersey - restful web services in java. [Accessed Mars 17 2015], URL: https://jersey.java.net/.

[32] Google Inc. (2015). What is google app engine? [Accessed Mars 17 2015], URL: https://cloud.google.com/appengine/docs/whatisgoogleappengine.

[33] W. Stallings och L. Brown, Computer Security: Principles and Practice, 2st. Pearson Education, 2011, isbn: 0132775069, 9780132775069.

[34] D. Hardt, Ed., ”The oauth 2.0 authorization framework”, RFC 6749, okt. 2012, s. 1– 76. URL: http://tools.ietf.org/pdf/rfc6749.

[35] M. Levin. (2009). Guja. [Accessed Mars 18 2015], URL: https : / / github . com / Wadpam/guja.

[36] E. T. Bray, ”The javascript object notation (json) data interchange format”, RFC 7159, mars 2014, s. 1–12. URL: http://tools.ietf.org/html/rfc7159.

[37] JSON.org. (2015). Json. [Accessed Mars 18 2015], URL: http://json.org.

[38] M. Fowler. (2015). Pojo. [Accessed Mars 18 2015], URL: http://www.martinfowler. com/bliki/POJO.html.

[39] T. Saloranta. (2015). Jackson project home @github. [Accessed Mars 18 2015], URL: https://github.com/FasterXML/jackson.

[40] Sony Corporation. (2015). Lifelog – innovativ androidTM-app för hälsoarmband från sony - sony smartphones (sverige). [Accessed April 20 2015], URL: http : / / www . sonymobile.com/se/apps-services/lifelog/.

[41] ——, (2015). Get started | sony developer world. [Accessed April 20 2015], URL: https://developer.sony.com/develop/services/lifelog-api/get-started/. [42] J. Webber, S. Parastatidis och I. Robinson, REST in Practice: Hypermedia and

Systems Architecture, 1st. O’Reilly Media, Inc., 2010, isbn: 0596805829, 9780596805821. [43] Fitnesskeeper, Inc. (2014). Healthgraph. [Accessed April 20 2015], URL: http :/ /

runkeeper.com/developer/healthgraph/overview.

[44] Twitter Inc. (2015). 3-legged authorization. [Accessed April 2 2015], URL: https: //dev.twitter.com/oauth/3-legged.

[45] Google. (2015). Protocol buffers - google developers. [Accessed April 6 2015], URL: https://developers.google.com/protocol-buffers/.

[46] Apache Software Foundation. (2014). Apache thrift - concepts. [Accessed April 6 2015], URL: https://thrift.apache.org/docs/concepts.

[47] W3C. (2008). Extensible markup language (xml) 1.0 (fifth edition). [Accessed March 20 2015], URL: http://www.w3.org/TR/REC-xml/.

[48] N. Josuttis, Soa in Practice: The Art of Distributed System Design. O’Reilly Media, Inc., 2007, isbn: 0596529554.

[49] FitnessKeeper, Inc. (2015). Users. [Accessed April 9 2015], URL: http://runkeeper. com/developer/healthgraph/users.

Related documents