Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Weerawarana S., Curbera F., Leymann F. — Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More
Weerawarana S., Curbera F., Leymann F. — Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More

Авторы: Weerawarana S., Curbera F., Leymann F.

Аннотация:

The Insider's Guide to Building Breakthrough Services with Today's New Web Services PlatformUsing today's new Web services platform, you can build services that are secure, reliable, efficient at handling transactions, and well suited to your evolving service-oriented architecture. What's more, you can do all that without compromising the simplicity or interoperability that made Web services so attractive. Now, for the first time, the experts who helped define and architect this platform show you exactly how to make the most of it.Unlike other books, Web Services Platform Architecture covers the entire platform. The authors illuminate every specification that's ready for practical use, covering messaging, metadata, security, discovery, quality of service, business-process modeling, and more. Drawing on realistic examples and case studies, they present a powerfully coherent view of how all these specifications fit togetherand how to combine them to solve real-world problems. Service orientation: Clarifying the business and technical value propositions Web services messaging framework: Using SOAP and WS-Addressing to deliver Web services messages WSDL: Documenting messages and supporting diverse message interactions WS-Policy: Building services that specify their requirements and capabilities, and how to interface with them UDDI: Aggregating metadata and making it easily available WS-MetadataExchange: Bootstrapping efficient, customized communication between Web services WS-Reliable Messaging: Ensuring message delivery across unreliable networks Transactions: Defining reliable interactions with WS-Coordination, WS-AtomicTransaction, and WS-BusinessActivity Security: Understanding the roles of WS-Security, WS-Trust, WS-SecureConversation, and WS-Federation BPEL: Modeling and executing business processes as service compositionsWeb Services Platform Architecture gives you an insider's view of the platform that will change the way you deliver applications. Whether you're an architect, developer, technical manager, or consultant, you'll find it indispensable.Sanjiva Weerawarana, research staff member for the component systems group at IBM Research, helps define and coordinate IBM's Web services technical strategy and activities. A member of the Apache Software Foundation, he contributed to many specifications including the SOAP 1.1 and WSDL 1.1 specifications and built their first implementations. Francisco Curbera, IBM research staff member and component systems group manager, coauthored BPEL4WS, WS-Addressing, and other specifications. He represents IBM on the BPEL and Web Services Addressing working groups. Frank Leymann directs the Institute of Architecture of Application Systems at the University of Stuttgart. As an IBM distinguished engineer, he helped architect IBM's middleware stack and define IBM's On Demand Computing strategy. IBM Fellow Tony Storey has helped lead the development of many of IBM's middleware, Web services, and grid computing products. IBM Fellow Donald F. Ferguson is chief architect and technical lead for IBM Software Group, and chairs IBM's SWG Architecture Board.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 456

Добавлена в каталог: 31.03.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
(AII)      
(application programming interfaces)      
(application service provider)      
(Attribute Information Item)      
(Business Process Execution Language for Web services)      2nd
(Business Process Execution Language)      
(Character Information Item)      
(CII)      
(Common Object Request Broker Architecture)      
(Component Object Model)      
(Document Object Model)      
(Document Type Definitions)      
(DTDs)      
(EAI)      
(EII)      
(Element Information Item)      
(Enterprise Application Integration)      
(eXtensible Markup Language)      
(Hypertext Transfer Protocol)      
(HyperText Transport Protocol)      
(message exchange patterns)      
(Multipurpose Internet Mail Exchange)      
(NASSL)      
(Post Schema Validation Infoset)      
(PSVI)      
(remote procedure call)      2nd
(RPC)      2nd
(SDL)      
(Secure HTTP)      
(Simple Mail Transfer Prototol)      
(Simple Object Access Protocol)      
(SOA)      
(Streaming API for XML)      
(Transmission Control Protocol)      
(Tree Regular Expressions for XML)      
(TREX)      
(Uniform Resource Locators)      
(Universal Description, Discovery, and Integration)      
(W3C)      
(Web Services Description Language)      
(World Wide Web Consortium)      
(WS-BPEL)      2nd
(XML Path Language)      2nd
aborted transactions      
abstract definitions      
abstract processes      
acids      2nd
acknowledgement interval      2nd
acknowledgement intervals      
AckRequested element      
acquisitions      
Action headers      
Action URI      2nd
Activation      
activation service      
activation services      2nd
activations services      
Activities      
activity scopes      
adapters      
adapters and channels      2nd 3rd
Addressing      
administrators      
AII      
ALL      2nd
all operator      
API      
Apis      
applicability of SOA      2nd 3rd
applicability with Web service      2nd 3rd
application calls Web service      
Application Destination role      
application programming interfaces      [See APIs]
application service provider      [See ASP]
Application Source role      
application-based correlation      
applications      
Architecture      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th
architecture model      2nd 3rd 4th
architecture scope      2nd 3rd
Architectures      
ASP      2nd
assertion model      
AT (Atomic Transaction)      2nd
Atomic Transaction (AT)      2nd
Atomic transactions      2nd 3rd 4th
atomicity      
Attachments      
Attacks      
Attribute Information Item      
Attributes      
augmentation to exisiting security      2nd 3rd
augmentation to existing security      2nd 3rd
Authentication      
Authorization      
authorization model      2nd 3rd
B2B (business-to-business)      
BA (Business Activity)      
basic model      2nd 3rd 4th 5th 6th
Basic Profile      2nd
Basic Security Profile (BSP)      2nd 3rd
basic syntax      2nd
basics      2nd 3rd
Batch processing      2nd
batch processing systems      2nd
Best practices      2nd
bind, publish, find functions      2nd 3rd 4th 5th
Binding      
binding element      2nd
binding element mapping      2nd
binding partner links      2nd
bindings      
bindingTemplate      
bodies      
body      
bodys      
Bootstrapping      
BPEL      2nd
BPEL process instances      2nd
BPEL processing model      2nd
BPEL processing models      2nd
BSP (Basic Security Profile)      2nd 3rd
Business      2nd 3rd 4th 5th 6th
Business Activity (BA)      
Business Agreement protocol with Participant Completion      2nd 3rd
business agreement protocols      2nd
Business Agreement with Coordinator Completion protocol      
Business interactions      
business interface      
Business process      
Business Process Execution Language      [See BPEL]
Business Process Execution Language for Web Services      
Business processes      2nd
Business transactions      2nd 3rd 4th 5th 6th
Business-to-business (B2B)      
business-to-business (B2B) example      
businessEntity      
businessService      
car parts supply chain      
car parts supply chain example      2nd 3rd
categoriation      
Categorization      
categorization enhancements      2nd
categoryBag element      
change in endpoint parameters      2nd
change in parameters      2nd
Channels      
Character Information Item      
Characteristics      2nd
choreography technology      
CII      
Classes      
Classic      2nd 3rd 4th 5th
classic transactions      2nd 3rd 4th 5th
client to node operations      2nd 3rd 4th
collaborations      
Com      
Comments      
commit operation      
Commit or Rollback message      2nd
committed transactions      
Common Object Request Broker Architecture      [See CORBA]
compensations      2nd
competing specifications      2nd 3rd
Completed message      
Completion protocol      2nd 3rd
completion protocols      2nd 3rd
completion-processing patterns      2nd 3rd 4th 5th
component models      
Component Object Model      [See COM]
components      
composable services      
composeability      
composition model      2nd 3rd 4th 5th
concrete descriptions      
Confidentiality      
Consistency      
containers      
context      2nd
contracting      2nd
control flow      2nd 3rd
control interface      
conversational approach      2nd
Coordination      2nd 3rd
coordination protocol      
CoordinationContext      
coordinators      
CORBA      
core platform evolution      2nd 3rd 4th 5th 6th
correlation mechanism      2nd 3rd
costs      
Create, Retrieve, Update, and Delete (CRUD)      
CreateCoordinationContext      2nd
CreateCoordinationContextResponse      
CreateSequence message      2nd
CreateSequenceResponse message      2nd
CRUD (Create, Retrieve, Update, and Delete)      
Cryptography      
DAIS (Database Access and Integration Services)      
Data integrity      
Data model      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
data models      
data-origin      2nd 3rd 4th
data-origin authentication      
Database Access and Integration Services (DAIS)      
DataEncodingUnknown fault code      
dead path elimination      
default protocol binding      2nd
definition-specific requests      
definitions element      
deliveries      
delivery semantics      2nd
Deployment      2nd
description      
descriptors      
Design      
design and development      2nd
designing reliable systems      
Deutsch, L. Peter      
Development      2nd
dialect-specific requests      
dialects      
digital signature support      2nd
Digital signatures      
discoverable services      
discovering      2nd
discovering services      2nd
distribute computing fallacies      2nd
distribute computing fallacy      2nd
distributed system technology      
distrubte computing fallacy      2nd
document elements      
document literal      
Document Object Model      [See DOM]
Document Type Definitions      
Documents      
DOM      
DOM (Document Object Model)      
DTDs      
dual operations      
durability      
Durable Two-Phase Commit protocol      2nd
EAI      
ebXML      
effective policies      
Eight Fallacies of Distribute Computing (quotes)      
EII      
Element Information Item      
Elements      
embedded metadata      
Encryption      
end-to-end security      
end-to-end security context      2nd 3rd
endpoint reference (EPR)      
endpoint references      2nd 3rd 4th
Endpoints      
Enterprise application integration      
Enterprise Edition (J2EE)      
Enterprises      
Envelope      
Envelopes      
EPR (endpoint reference)      
equenceAcknowledgement message      
event handlers      2nd
ExactlyOne      2nd
ExactlyOne operator      
example exchange      2nd 3rd
example message      2nd 3rd
example scenarios      
example SOAP message      2nd 3rd
Executable processes      2nd
export links      
export-links      
extended transactions      
extensibility      2nd
extensibility of dialects      2nd 3rd 4th
Extensible Markup Language      [See XML]
failure recoveries      2nd
failure recovery      2nd
fault      
fault handling and compensation      2nd 3rd
Faults      2nd 3rd 4th 5th 6th 7th 8th
FaultTo headers      
features and properties      2nd
federated identities      
finding      
findQualifiers element      
Framework      2nd 3rd
frameworks      
Functions      2nd
future      2nd
future direction      2nd
future directions      2nd 3rd
future perspectives      
future versions      
future-proofing      
generic metadata requests      
get      2nd
Get operation      
GetMetadata operation      
1 2 3
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте