Sample Extended Abstract

ISKI WATER MANAGEMENT ONLINE INFORMATION SHARING (WS
TECHNOLOGY)
Turgut ÖZCAN 1
İSKİ General Directorate, Department of Data Processing
[email protected]
1
ABSTRACT
The study includes basic information on the scope of infrastructure of data flow, type of the technology adopted and
security with the aim of regaining the time lost in official correspondences and document works as well as of fast
access to services that are commonly provided, with the vision of establishing an interpretable e-state structure that
is efficient in information sharing between İSKİ and other institutions.
Keywords: Information Sharing, Web Service, XML, Jax-WS
1. INTRODUCTION
Interoperability is also defined as “the ability of a system or process to use the information and/or
functions of another system or process within common standards” [1]. When this process is examined in
all its aspects, the quality and quantity of the technology to be used for such a sharing at technical level is
important. Business processes of institutions are observed under the light of software engineering, need
analysis and modeling at organizational level. Thus the information shared is used efficiently and a
common pool is maintained for institutional structuring.
It is provided, the deterrence and prevention of crime between İSKİ and the corporations that demanded
information sharing with the process management of working together and sharing information, the
sharing of enquiry with the security units, document tracking among the corporations, revealing the
participants’ water using attitudes and doing the billing process online fast and secure within a common
center.
2. TECHNOLOGY MANAGEMENT
Web service Technologies are used in efficient information sharing between institutions. WS Technology
is a system integration method that provides adaptation and interaction over net between XML messaging
based server- client. It is the most commonly preferred method used for realizing communication systems
today. The method does not require software or platform adaptability between institutions that shall
exchange information.
Information services include XML data standart, basic protocols of SOAP and WSDL. SOAP: The rule of
simple object access communication has been formed on XML base. It is described on this base, how a
request will be done and how it will be responded to that request among each other.
Figure 1. An example of XML message
WSDL: Web Services Description Language, an XML web service which functions can be achieved,
which is to call these functions must be entered in the parameters for defining what it is and the type of
data to be returned to service standard. All of this made the basis of standards and information sharing
ISKI service software is made according to the needs of institutions, created software, JAX-WS (Java
Apifor XML Web Services) standard middle-tier application server architecture (for example, Oracle
BEA Weblogic Server) to run on the Java language, an editor coded.
WSDL: Web Services Definiton Language, is a standart
3. SECURITY INFRASTRUCTURE
Web services offered on the internal network, NAT (Network Address Translation) [2] made
known to turn into a single common IP address. The purpose of this TCP / IP network to another
network with a computer while the routing device with an IP address space by remapping the
header of the IP packet network address change. In this way, the software runs on the internal
network and the outside world of the application server accesses the database entry cannot be
permitted in the outside, and is attached to a sort of firewall.
Figure 2. Security Infrastructure
As can be seen in Figure 2, all incoming connections from the external network through firewalls through
a set of rules on the basis of the network is controlled from the all outbound packet traffic. Internet traffic
is kept under control by the various filtering features. Filtering structure, the reporting institution created
with secure IP addresses IP filtering, port filtering only within certain rules, such as web filtering and
content filtering methods are used.
In our example, the IP address of the Load Balancer encapsulated' freed from harmful content through a
guided from within and WAF. At this stage, the data packet filtering is guided over CITRIX. All of this is
completely secure communications, encryption only İSKİ preshared key between the Internet cloud with
in isolation of the IPSEC connection is performed by the institution. Also during the coding phase rule is
defined for each method. Are provided so that the user code and the unique key.
Finally, the sharing of information within the scope of the institution that provides access to all the
queries, accessed by IP, the query is used in the methods and data are recorded and, as a retrospective
querying and reporting, as well as external to the system error (false and repeated use of services) or
malicious access to the immediate kept in the log table in order to detect and intervene.
4. INSTITUTIONS THAT JOIN DATA SHARING
28 different web methods have been submitted to five different institutions at the middle layer
architecture by using the Customer Information System infrastructure. Information sharing is conducted
for monthly invoicing of 1.502 primary and secondary education institutions together with 2.973 IMM
organizations as well as 4.664.405 active subscribers to be examined by Ministry of Justice and the Law
Enforcement Agency.
SPA (Special Provincial Administration), IMM (Istanbul Metropolitan Municipality), and the Ministry of
Finance during the day in the field Accrued billings for past-due invoices, and the organization of the
collection is made up to that point all the transactions within the questioned item are paid. Although the
concept of accrual payments paid to the customer installed, status information, the debit / credit in the
form of an overview and current are displayed. The services offered at the General Directorate of Security
and the Ministry of Justice of the purpose of subscriber billing of water, rather than knowledge, conveyed
into the (National Address Database) and / or the challenging of drink İSKİ Address system. Sometimes
by questioning the customer's name, surname, sometimes the mother-father's name, telephone or address
information may be general.
Figure 3. Information Sharing with Institutions
5. CONCLUSION and EVALUATION
The following are among those achieved through information sharing via the common pool made by
using web technologies:
 Monitoring of financial planning, monthly, periodical and 12-month invoices and payment
channels
 Specific intelligence gathering through address, phone, ID no or name of parents.
 Rapid responses to official documents coming from labor courts
 Unifying and managing payments of schools, courses and other educational institutions
Water management planning was conducted via efficient use of subscriber system web technologies to
enable sharing of required amount of the information pool formed between requesting institutions.
RESOURCES
1. Kay Principles of an Interoperability Architecture (2004) http://europa.eu.int/idabc/en/document/3591/5671
2. P. Srisuresh and M. Holdrege (1999). IP network address translator (NAT) terminology and considerations,
RFC 2663.
3. ISKI Subscriber Information System