D2.9 – Report on the Welive Open Service Layer V1

D2.9 – Report on the Welive Open Service Layer V1

A neW concept of pubLic administration based on citizen co-created mobile urban services Grant Agreement: 645845 D2.9 – REPORT ON THE WELIVE OPEN SERVICE LAYER V1 DOC. REFERENCE: WeLive-WP2-D29-REP-160419-v10 RESPONSIBLE: FBK AUTHOR(S): ENG, TECNALIA, UDEUSTO, FBK, CNS, INF, DNET DATE OF ISSUE: 19/04/16 STATUS: FINAL DISSEMINATION LEVEL: CONFIDENTIAL VERSION DATE DESCRIPTION v0.1 06/11/2015 Definition of the Table of Contents and distribution of tasks 17/01/2016 Description of specifications of the Visual Composer, query mapper and v0.3 controller v0.7 21/01/2016 Description of Social Wrapper and Web Scraper v0.8 27/01/2016 Description of specification of WeLive Player Description of Logging BB 16/03/2016 Description of specification of AAC, WeLive player test, ethical issues and v0.9 version ready to be externally reviewed v0.10 31/03/2016 Reviewers´ comments processed v1.0 19/04/2016 Visual Composer tests completed and final version ready for submission D2.9 – Report on the WeLive Open Service Layer v1 page 1 INDEX 1. EXECUTIVE SUMMARY ............................................................................................................................................ 8 2. INTRODUCTION ....................................................................................................................................................... 9 3. OVERVIEW OF WELIVE OPEN SERVICE LAYER AND HIGH LEVEL ARCHITECTURE .................................................... 10 3.1. REQUIREMENTS ............................................................................................................................................. 10 3.2. ARCHITECTURE .............................................................................................................................................. 11 3.3. DEPLOYMENT ................................................................................................................................................ 13 4. OPEN SERVICE LAYER SPECIFICATIONS .................................................................................................................. 14 4.1. BB METAMODEL ............................................................................................................................................ 14 4.2. CORE PROFILE ................................................................................................................................................ 15 4.2.1. BUILDING BLOCKS ................................................................................................................................. 15 4.2.1.1. Artifact class ..................................................................................................................................................... 15 4.2.1.2. Building Block class ........................................................................................................................................... 16 4.2.1.3. Dataset class .................................................................................................................................................... 17 4.2.1.4. PublicServiceApplication class ........................................................................................................................... 17 4.2.2. BUILDING BLOCK ENTITIES ..................................................................................................................... 17 4.2.3. LEGAL CONDITIONS ............................................................................................................................... 18 4.2.4. INTERACTION PROFILE ........................................................................................................................... 18 4.2.4.1. Interaction Point class ...................................................................................................................................... 19 4.2.4.2. TechnicalConstraint class .................................................................................................................................. 20 4.3. SECURITY PROFILE ......................................................................................................................................... 20 4.3.1. COMMUNICATION MEASURES ............................................................................................................... 21 4.3.1.1. ProtocolConstraint class ................................................................................................................................... 21 4.3.1.2. OriginConstraint class ....................................................................................................................................... 22 4.3.2. AUTHENTICATION MEASURES ............................................................................................................... 22 4.3.2.1. IdentityProvider class ....................................................................................................................................... 23 4.3.3. AUTHORIZATION MEASURES ................................................................................................................. 23 4.3.3.1. Permission class ............................................................................................................................................... 24 5. CONTROLLER SPECIFICATIONS ............................................................................................................................... 25 5.1. REST API ........................................................................................................................................................ 25 5.2. CONTROLLER UI ............................................................................................................................................. 28 5.2.1. FUNCTIONAL ASPECTS OF THE CONTROLLER .......................................................................................... 28 5.2.2. DETAILED REQUIREMENTS AND USE CASE MODEL ................................................................................. 30 5.2.2.1. DETAILED REQUIREMENTS ................................................................................................................................ 30 5.2.2.2. USE CASE MODELS ............................................................................................................................................ 42 5.2.3. DYNAMIC MODEL AND INTEROPERABILITY DEMANDS ........................................................................... 44 5.2.3.1. FLOW CHART .................................................................................................................................................... 44 5.2.3.2. INTEROPERABILITY WITH OTHER WELIVE COMPONENTS ................................................................................... 45 5.2.4. TECHNOLOGY CHOICE REASONING AND USAGE DESCRIPTION FOR IMPLEMENTATION ........................... 47 5.2.5. ARCHITECTURE AND DEPLOYMENT DIAGRAM OF THE CONTROLLER ...................................................... 48 5.2.6. DOCUMENTATION AND USER MANUAL ................................................................................................. 49 5.2.6.1. Access .............................................................................................................................................................. 49 5.2.6.2. Language selection ........................................................................................................................................... 49 5.2.6.3. City selection .................................................................................................................................................... 49 5.2.6.4. Registering ....................................................................................................................................................... 50 5.2.6.5. Log in ............................................................................................................................................................... 50 5.2.6.6. WeLive tool selection ....................................................................................................................................... 51 5.2.6.7. Log out ............................................................................................................................................................. 52 5.2.6.8. WeLive support ................................................................................................................................................ 52 D2.9 – Report on the WeLive Open Service Layer v1 page 2 5.2.7. DATA PROTECTION RELATED REQUIREMENTS ........................................................................................ 52 5.2.8. FUNCTIONAL TESTS RESULTS OF THE CONTROLLER ................................................................................ 56 6. VISUAL COMPOSER SPECIFICATIONS ..................................................................................................................... 57 6.1. FUNCTIONAL ASPECTS OF THE VISUAL COMPOSER ......................................................................................... 57 6.2. DETAILED REQUIREMENTS AND USE CASE MODEL .......................................................................................... 58 6.2.1. DETAILED REQUIREMENTS....................................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    200 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us