Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Weerawarana S., Curbera F., Leymann F. — Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More
Weerawarana S., Curbera F., Leymann F. — Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More

Авторы: Weerawarana S., Curbera F., Leymann F.

Аннотация:

The Insider's Guide to Building Breakthrough Services with Today's New Web Services PlatformUsing today's new Web services platform, you can build services that are secure, reliable, efficient at handling transactions, and well suited to your evolving service-oriented architecture. What's more, you can do all that without compromising the simplicity or interoperability that made Web services so attractive. Now, for the first time, the experts who helped define and architect this platform show you exactly how to make the most of it.Unlike other books, Web Services Platform Architecture covers the entire platform. The authors illuminate every specification that's ready for practical use, covering messaging, metadata, security, discovery, quality of service, business-process modeling, and more. Drawing on realistic examples and case studies, they present a powerfully coherent view of how all these specifications fit togetherand how to combine them to solve real-world problems. Service orientation: Clarifying the business and technical value propositions Web services messaging framework: Using SOAP and WS-Addressing to deliver Web services messages WSDL: Documenting messages and supporting diverse message interactions WS-Policy: Building services that specify their requirements and capabilities, and how to interface with them UDDI: Aggregating metadata and making it easily available WS-MetadataExchange: Bootstrapping efficient, customized communication between Web services WS-Reliable Messaging: Ensuring message delivery across unreliable networks Transactions: Defining reliable interactions with WS-Coordination, WS-AtomicTransaction, and WS-BusinessActivity Security: Understanding the roles of WS-Security, WS-Trust, WS-SecureConversation, and WS-Federation BPEL: Modeling and executing business processes as service compositionsWeb Services Platform Architecture gives you an insider's view of the platform that will change the way you deliver applications. Whether you're an architect, developer, technical manager, or consultant, you'll find it indispensable.Sanjiva Weerawarana, research staff member for the component systems group at IBM Research, helps define and coordinate IBM's Web services technical strategy and activities. A member of the Apache Software Foundation, he contributed to many specifications including the SOAP 1.1 and WSDL 1.1 specifications and built their first implementations. Francisco Curbera, IBM research staff member and component systems group manager, coauthored BPEL4WS, WS-Addressing, and other specifications. He represents IBM on the BPEL and Web Services Addressing working groups. Frank Leymann directs the Institute of Architecture of Application Systems at the University of Stuttgart. As an IBM distinguished engineer, he helped architect IBM's middleware stack and define IBM's On Demand Computing strategy. IBM Fellow Tony Storey has helped lead the development of many of IBM's middleware, Web services, and grid computing products. IBM Fellow Donald F. Ferguson is chief architect and technical lead for IBM Software Group, and chairs IBM's SWG Architecture Board.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 456

Добавлена в каталог: 31.03.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
GetMetadata requests      2nd 3rd
GetMetadata responses      2nd 3rd
GGF (Global Grid Forum)      
Global Grid Forum (GGF)      
global models      
Graphical User Interface      
Handler      2nd
handlers      2nd 3rd 4th 5th
header blocks      
Headers      
history      2nd
history of WS-Security      2nd
HTTP      
HTTP & MIME      2nd
HTTPS      
HyperText Transfer Protocol      [See HTTP]
Hypertext Transport Protocol      [See HTTP]
IBM WebSphereMQ      2nd
Identifiers      2nd
implementation requirements      2nd
implied resource patterns      
in-band method      
inactivity timeout      
inbound operations      
information headers      
information systems      
infoset      2nd 3rd
inheritance      
Integrity      
Inter Enterprise UDDI      
Inter-Enterprise      
interaction description      2nd
interaction patterns      2nd
interface extensions      2nd
Interface structure      2nd
intermediaries      
intermediary model      2nd
Interoperability      
interoperable messaging      2nd 3rd 4th
Intersection      
Intra Enterprise UDDI      
Intra-Enterprise      
intra-enterprise integration      
invocation pattern      
Isolation      
issuance bindings      
Java 2 platform      
Java Community Process (JCP)      
Java Message Service (JMS)      
JCP (Java Community Process)      
JMS (Java Message Service)      
Kerberos      
Kerberos tickets      
keyedReferences      
keyName      
keyValue      
language structure      2nd 3rd
latency      
latency fallacy      2nd
Liberty Alliance      
lifecycle      2nd 3rd 4th
lifecycles      
limitations      2nd
links      
literal text      
Location      
locators      
long-running conversational      2nd
long-running conversational MEPs      2nd
long-running transaction      2nd
Long-running transactions      2nd
Loose coupling      
MAC (message authentication code)      2nd 3rd 4th
Mapping      
matchmaking      2nd
MEP (message exchange patterns)      
MEPs      
MEPs (message exchange patterns)      2nd 3rd 4th 5th 6th 7th
mergers      
Message authentication code (MAC)      2nd 3rd 4th
message element      
message element elimination      2nd
message exchange      2nd 3rd 4th
message exchange patterns      2nd
message exchange patterns (MEP)      
message exchanges patterns      [See MEPs]
message information headers      2nd 3rd 4th 5th 6th 7th
message transport      2nd
message-oriented      
Message-Oriented Middleware      2nd 3rd
MessageId headers      
Messages      
messaging and RPC integration      2nd
metadat      
Metadata      2nd 3rd 4th
metadata dialects      2nd
MetadataReference element      
Middleware      
middleware-based correlation      
MIME      2nd
Multiple domains      2nd
multiple schema language      2nd
Multipurpose Internet Mail Exchange      [See MIME]
mustUnderstand attribute      
MustUnderstand fault code      
Namespaces      
Namspaces      2nd
NASSL (Network Application Service Specification Language)      
Navigation      2nd 3rd 4th
need for      2nd 3rd
nested elements      
Network Application Service Specification Language      
network is reliable      2nd
networks      
Next role      
node to client operations      2nd
node to node operations      
node to taxonomy server operations      2nd
nodes      
non-repudiation      2nd 3rd 4th
OASIS      
object systems      2nd
Objects      
objects systems      
one administrator      2nd
operation execution order      2nd
Operators      2nd 3rd 4th 5th 6th 7th
optional attribute      2nd 3rd
optional attributes      
ordering constraints      2nd
ordering example      
orgin authentication      
original senders      
out-of-band method      
outbound operations      
Outsourcing      
outsourcing business processes      2nd 3rd
outsourcing to partners      2nd 3rd
OWL (Web Ontology Language)      
packaging      2nd
packaging software      2nd
partner interactions      2nd
partner links      2nd
partners      
Paths      
payloads      
PKI (Public Key Infrastructure)      
platform interoperability      2nd
platform summary      2nd
plug-links      
PMO (proof of message origin)      2nd
PMR (proof of message receipt)      2nd 3rd
policies      
policy container      
policy definitions      2nd
PolicyReference element      
PolicyURIs attribute      
Polymorphism      
port element      2nd
port element mapping      2nd
port types      
portlets      
portType element      2nd
portType element mapping      2nd
Post Schema Validation Infoset      
privacy assertions      
privacy policies      
process concerns      2nd 3rd
process instance lifecycle      2nd 3rd 4th 5th
Process model      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th
process views      2nd
processing model      2nd 3rd 4th 5th
processing models      
processing roles      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
Profiles      
proof of message origin (PMO)      2nd
proof of message receipt (PMR)      2nd 3rd
Properties      2nd
Protocol      2nd 3rd
protocol and transport bindings      2nd
Protocols      2nd 3rd 4th 5th
provider abstraction      2nd
PSVI      
pub-sub (publish-subscribe)      
Public key infrastructure (PKI)      
public processes      
Public UDDI      
Public-key      2nd
Public-key cryptography      2nd
publish-subscribe (pub-sub)      
publisher-assigned keys      
publisherAssertion      2nd
publishing      
pull model      
push model      
QNames      
Quality      2nd
queries using policy expressions      2nd
RDF (Resource Description Framework)      
Receiver      
Receiver fault code      
Receivers      
recursive composition      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
Reference      
referenceable entities      
references and locations      2nd
referencing remote policy expressions directly      2nd
referencing remote policy expressions indirectly      2nd
register      
Registration      2nd
registration service      
registries      
Registry      2nd
REL (Rights Expression Language)      
RelatesTo headers      
Relax      
RelaxNG      2nd
relay attribute      2nd 3rd
reliability fallacy      2nd
Reliable Messaging      
Remote Procedure Call      
Remote Procedure Call (RPC)      
renewal bindings      
reply message      2nd 3rd
reply messages      
ReplyTo headers      
Representational State Transfer (REST)      
Representations      2nd
request message      2nd
request messages      
request operations      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
request/response      2nd 3rd 4th
request/response MEPs      2nd 3rd 4th
requesters      
Requests      2nd 3rd
RequestSecurityToken (RST) messages      
RequestSecurityTokenResponse messages      
Resource description framework (RDF)      
Resource sharing      2nd
Responses      2nd 3rd
REST (Representational State Transfer)      
retransmission interval      2nd
retransmission intervals      
Rights Expression Language (REL)      
risks      2nd
RM Destination      
RM Destination role      
RM Source      
Roles      
roles for processing      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
rollback operation      
RPC      
RPC (Remote Procedure Call)      
RST (RequestSecurityToken) messages      
runtime      2nd
SAML (Security Assertion Markup Language)      
sample applications      
SAX      
SAX (Streaming API for XML)      
Schema      
Schema Centric XML Canonicalization      
Schemahema      
Scopes      2nd 3rd 4th 5th
SDL (Service Description Language)      
Secure HTTP      [See HTTPS]
Security      2nd 3rd
Security Assertion Markup Language (SAML)      
security example      2nd
Security Header      
security model      2nd 3rd
Security Token Service (STS)      
semantic omission      2nd
semantic searching      2nd
Semantic Web technology      2nd
sender      
Sender fault code      
senders      
sequence element      
sequence lifestyle      2nd 3rd 4th
SequenceAcknowledgement      
SequenceAcknowledgement element      
SequenceAcknowledgement message      2nd 3rd
SequenceFault element      
Sequences      
Service      
service bus      
service choreography      
Service composition      2nd
Service description      2nd
Service Description Language      
service descriptions      
service element      2nd
service element mapping      2nd
service packs      
service packs ordering example      2nd 3rd
Service quality      2nd 3rd
service separation      2nd
Service-oriented architecture      2nd 3rd 4th 5th
Services      2nd 3rd
services definition semantics      2nd
1 2 3
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте