IONA Technologies Position Paper Constraints and Capabilities for Web Services

Slides:



Advertisements
Similar presentations
Using Matrices in Real Life
Advertisements

Virtual Trunk Protocol
Advanced Piloting Cruise Plot.
Distributed Systems Architectures
Chapter 1 The Study of Body Function Image PowerPoint
Service Oriented Architecture Reference Model
Submissions November 2007 Stephen McCann, NSNSlide 1 IEEE 802 Emergency Services (ES) Call for Interest (CFI) Date: Stephen McCann
Aviation Security Training Module 4 Design and Conduct Exercise II 1.
1 Hyades Command Routing Message flow and data translation.
Jeff Mischkinsky Nickolas Kavantzas Goran Olsson Web Services Choreography.
WS-Policy F2F Austin, TX July 2006 Report on WS-Policy Interop Workshop of April 2006 (Round 3) Toufic Boubez Layer 7 Technologies.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
1 Introducing the Specifications of the Metro Ethernet Forum MEF 19 Abstract Test Suite for UNI Type 1 February 2008.
18 Copyright © 2005, Oracle. All rights reserved. Distributing Modular Applications: Introduction to Web Services.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
My Alphabet Book abcdefghijklm nopqrstuvwxyz.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Addition Facts
Year 6 mental test 5 second questions
|epcc| NeSC Workshop Open Issues in Grid Scheduling Ali Anjomshoaa EPCC, University of Edinburgh Tuesday, 21 October 2003 Overview of a Grid Scheduling.
Universitá degli Studi di LAquila Mälardalens Högskola, Västerås 10th September 2009 Integrating Wireless Systems into Process Industry and Business Management.
Chapter 1 Introduction Copyright © Operating Systems, by Dhananjay Dhamdhere Copyright © Introduction Abstract Views of an Operating System.
Communicating over the Network
Server Access The REST of the Story David Cleary
Week 2 The Object-Oriented Approach to Requirements
Configuration management
Software change management
Information Systems Today: Managing in the Digital World
1 The phone in the cloud Utilizing resources hosted anywhere Claes Nilsson.
ABC Technology Project
3 Logic The Study of What’s True or False or Somewhere in Between.
VOORBLAD.
Component-Based Software Engineering Main issues: assemble systems out of (reusable) components compatibility of components.
1 Breadth First Search s s Undiscovered Discovered Finished Queue: s Top of queue 2 1 Shortest path from s.
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Do you have the Maths Factor?. Maths Can you beat this term’s Maths Challenge?
31242/32549 Advanced Internet Programming Advanced Java Programming
© 2012 National Heart Foundation of Australia. Slide 2.
Lets play bingo!!. Calculate: MEAN Calculate: MEDIAN
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 27 Slide 1 Quality Management.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
Executional Architecture
Implementation Architecture
Global Analysis and Distributed Systems Software Architecture Lecture # 5-6.
WS-SecureConversation Xiuduan Fang. 2 Agenda Introduction Security Context Token Establishing Security Context Deriving Keys SecureCoversation in Action.
Chapter 5 Test Review Sections 5-1 through 5-4.
GG Consulting, LLC I-SUITE. Source: TEA SHARS Frequently asked questions 2.
Addition 1’s to 20.
Dr. Alexandra I. Cristea XHTML.
25 seconds left…...
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Januar MDMDFSSMDMDFSSS
Week 1.
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Intracellular Compartments and Transport
PSSA Preparation.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
Chapter 6 SNMPv2 6-1 Network Management: Principles and Practice
Chapter 13 The Data Warehouse
Chapter 13 Review Questions
Immunobiology: The Immune System in Health & Disease Sixth Edition
From Model-based to Model-driven Design of User Interfaces.
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
Presentation transcript:

IONA Technologies Position Paper Constraints and Capabilities for Web Services

2 Agenda 1.Motivation and History of Policy Usage 2.Most Important Characteristics 3.Use Case 4.Conclusion 5.Discussion

3 Motivation and History of Policy Usage

4 Why Policies? Essential for expressing Quality of Service Configuration determined by Policies Behavior and Capabilities defined by Policies Choices and nature of transport Types and characteristics of security, reliability

5 Policies have proven value Used in many computing infrastructures, most notably CORBA. –General model available since 1997 (CORBA v2.2) IONA a major contributor to standard, has years of experience designing, implementing and maintaining middleware using policies –Originally designed to provide separate configuration entities but now applied as above Standard for component or subsystem defines applicable policies and their interactions with other systems –Precedence, interleaving constraints, etc. –Provided flexible, robust system

6 Assumptions and Requirements Many different standards groups and bodies will use W3C Policy framework to define their Policies. Policies are & will be used in widely differing ecologies for different purposes, but must –interoperate –process efficiently in any environ –be easily maintained –be easily extended

7 Therefore… Conclusion? Policies are critical! Must be Simple, maintainable Easily and efficiently interpreted Highly extensible for use in widely varying contexts

8 Most Important Characteristics

9 Keep it simple!

10 Policy must be simple Many uses – a Policy expresses –desired or actual behavior –constraint –capability –aspect of configuration Plays critical role in framework and plug-in architectures Therefore must be as simple and lightweight as possible!

11 Policy must be a first order entity Directly addressable Directly manipulable … … … … Service Interface Interface Operation Message Reference Binding Binding Operation Binding Message / Fault Reference

12 Policy must be lightweight Identified by type name <Policy type=“Security” Usage defined by single ‘required’ attribute required=“true” > Policy is parameterized; value is immutable Existence of Policy indicates support Required=“false” indicates usage is optional

13 Lightweight policies (continued) Disassociate policies from their processing directives –Reusable policies may be processed very differently in different contexts or environments –Processing style should be based on needs of application –Including processing makes policy heavyweight –Removes need for extensive (but always incomplete) set of operators required for complex processing models

14 Just to emphasize the point… Identifier needed to find & manipulate a Policy Existance implies support Support combined with usage (optional/required) sufficient Parameterization provides extensibility No processing info in policy framework provides –Efficient communication of policies –Enhanced efficiency of processing based on environ, application requirements and style –Maintainability

15 Effective Policy Set Aggregation of Policies with overrides applied (lower overrides higher) 1. Service 2. Interface 3. Interface Operation 4. Message Reference 5. Binding 6. Binding Operation 7. Binding Message / Fault Reference

16 Effective Policy Set (continued) Gather all Policies in service’s definition Apply overrides, resulting in Effective Policy Set Existence of Policy implies support Required attribute defines usage Use to –Determine if Policy requirements for particular feature or operation are satisfied –Get particular Policy, its value and required attribute’s value

17 Use Case

18 Scenario Web service stipulates –Clients must support reliable messaging protocol –Client must support WS-Security using X.509 or user name security token –Service has P3P policy associated with operations

19 ReliableMessaging “ReliableMessaging” policy added to service definition –Type=“ReliableMessaging” –Required=“True” –Parameterized with list of supported protocols Policy or reference to it placed at Interface component level. Options, configurations, etc. for each protocol defined in separate policies

20 Pseudo Definition Yes Yes

21 Security “Security” policy added to service definition –Type=“Security” –Required=“True” –Parameterized with list of supported protocols Policy or reference to it placed at Interface component level. Reference to policy placed in binding for request messages

22 Pseudo Definition Yes …

23 Privacy “Privacy” policy added to service definition –Type=“Privacy” –Required=“False” –Parameterized with list of supported protocols Policy or reference to it placed at Interface component level.

24 Pseudo Definition Yes …

25 Processing – client sends request 1.Client retrieves server’s WSDL definition 2.Generates server’s Effective Policy Set (EPS) 3.Notices security required – matches with protocols it uses (from client’s EPS) 4.Notices ReliableMessaging required – matches with own protocols – chooses first match 5.Notices Privacy optional – sees that P3P used by server – if knows P3P, knows forthcoming interaction, else ignores.

26 Conclusion

27 Keep It Simple Use case shows that complicated indications of intention, requirement, support and use can be expressed in simple ways. More desirable than scheme involving complex processing models, order of precedence calculations, multiple selection criteria. Framework should be lightweight & flexible, allowing for efficient interoperability, maintainability, extensibility, & use in any environ.

28 Next Steps We recommend chartering a WG for Policy. –Purpose: define a policy framework, but not specific policies themselves. –WSDL extensions, Constraints and Capabilities, etc. are viable means of implementation, but policy framework is separate concern – needs own WG. –Liaise with other WGs and TCs to ensure adoption of the framework, and consistency of the policy work across Web services