Constraints and Capabilities Workshop Oracle Position Ashok Malhotra Greg Pavlik.

Slides:



Advertisements
Similar presentations
Web Services Architecture An interoperability architecture for the World Wide Service Network.
Advertisements

WS-Addressing F2F Meeting Nov 05 WSDL extensions for Async support.
Observations on WS-Policy Ashok Malhotra Oracle Corporation.
® IBM Software Group © IBM Corporation WS-Policy Attachment- spec overview Maryann Hondo IBM.
WS – Security Policy Prabath Siriwardena Director, Security Architecture.
UDDI v3.0 (Universal Description, Discovery and Integration)
General introduction to Web services and an implementation example
Microsoft ® System Center Configuration Manager 2007 R3 and Forefront ® Endpoint Protection Infrastructure Planning and Design Published: October 2008.
Architecture Representation
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
SOA and Web Services. SOA Architecture Explaination Transport protocols - communicate between a service and a requester. Messaging layer - enables the.
Presentation 7 part 2: SOAP & WSDL. Ingeniørhøjskolen i Århus Slide 2 Outline Building blocks in Web Services SOA SOAP WSDL (UDDI)
Latest techniques and Applications in Interprocess Communication and Coordination Xiaoou Zhang.
Software Requirements
Chapter 10 Classes Continued
Web Service Architecture Part I- Overview and Models (based on W3C Working Group Note Frank.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Verify the quality and.
Generation of WEB SERVICES Using PROGRAM SLICING RAVINDRA KUMAR SUDIP AKURA AMIT KUMAR BALKARAN SINGH SIDHU
Module 13: WCF Receive Adapters. Overview Lesson 1: Introduction to WCF Receive Adapters Lesson 2: Configuring a WCF Receive Adapter Lesson 3: Using the.
Service Broker Lesson 11. Skills Matrix Service Broker Service Broker, provides a solution to common problems with message delivery and consistency that.
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
Requirements/Systems analyst
INTRODUCING SCA Byungwook Cho Nov.2007.
Web Services Glossary Summary of Holger Lausen
Software Requirements Presented By Dr. Shazzad Hosain.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 ITU-T Security Standardization on Mobile Web Services Lee, Jae Seung Special Fellow,
Lecture 15 Introduction to Web Services Web Service Applications.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
1 WS-Privacy Paul Bui Ryan Dickey. 2 Agenda  WS-Privacy  Introduction to P3P  How P3P Works  P3P Details  A P3P Scenario  Conclusion  References.
AMPol-Q: Adaptive Middleware Policy to support QoS Raja Afandi, Jianqing Zhang, Carl A. Gunter Computer Science Department, University of Illinois Urbana-Champaign.
© 2002 IBM Corporation IBM Software Group IBM | 2004 © 2004 IBM Corporation BI-ICS Business Integration - Information Conformance Statements And the evolution.
1 CS 430 Database Theory Winter 2005 Lecture 17: Objects, XML, and DBMSs.
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
1 XML Based Networking Method for Connecting Distributed Anthropometric Databases 24 October 2006 Huaining Cheng Dr. Kathleen M. Robinette Human Effectiveness.
CS 4310: Software Engineering Lecture 4 System Modeling The Analysis Stage.
METADATA WORKSHOP Conclusions Keith Jeffery Peter Wittenburg.
SOFTWARE DESIGN AND ARCHITECTURE LECTURE 05. Review Software design methods Design Paradigms Typical Design Trade-offs.
1 Web Service Description Language (WSDL) 大葉大學資工系.
1 Introduction to Web Services Quality Model And Collaboration Issues for EERP Sojung Kim WSQM TC National Information society Agency.
1 15 quality goals for requirements  Justified  Correct  Complete  Consistent  Unambiguous  Feasible  Abstract  Traceable  Delimited  Interfaced.
SCA Bindings Simon Holdsworth Piotr Przybylski. Agenda n SCA Bindings Overview l Bindings TC Charter n Bindings l Web Services Binding l JMS Binding l.
Copyright © 2013 Curt Hill SOAP Protocol for exchanging data and Enabling Web Services.
Service Service metadata what Service is who responsible for service constraints service creation service maintenance service deployment rules rules processing.
Capturing the requirements  Requirement: a feature of the system or a description of something the system is capable of doing in order to fulfill the.
Introduction to Semantic Web Service Architecture ► The vision of the Semantic Web ► Ontologies as the basic building block ► Semantic Web Service Architecture.
Software Requirements: A More Rigorous Look 1. Features and Use Cases at a High Level of Abstraction  Helps to better understand the main characteristics.
Secure Systems Research Group - FAU 1 A Trust Model for Web Services Ph.D Dissertation Progess Report Candidate: Nelly A. Delessy, Advisor: Dr E.B. Fernandez.
Kemal Baykal Rasim Ismayilov
1 Web Services Policy Management Greg Pavlik Web Services Architect Oracle Corporation May 11, 2005.
Service Component Architecture Policy TC Issue 33 Capabilities.
© Drexel University Software Engineering Research Group (SERG) 1 The OASIS SOA Reference Model Brian Mitchell.
Requirements engineering The process of establishing the services that the customer requires from a system and the constraints under which it operates.
1 WS-Policy. 2 What’s the Problem? To use a web service a client needs more information than is provided in WSDL file. Examples: –Does service support.
© 2004 IBM Corporation WS-ResourceFramework Service Groups Tom Maguire.
Service Component Architecture (SCA) Policy FrameWork V1.0 Ashok Malhotra – Oracle Anish Karmarkar – Oracle David Booz - IBM …
 Copyright 2005 Digital Enterprise Research Institute. All rights reserved. SOA-RM Overview and relation with SEE Adrian Mocan
DEVELOPING WEB SERVICES WITH JAVA DESIGN WEB SERVICE ENDPOINT.
Service Description: Addressing & Policy COMP6017 Topics on Web Services Dr Nicholas Gibbins –
Web Services Dr.Kwanchai Eurviriyanukul The contents of this slide set are obtained from various sources including W3School, WIKIPEDIA.
Jackson, Web Technologies: A Computer Science Perspective, © 2007 Prentice-Hall, Inc. All rights reserved Chapter 9 Web Services: JAX-RPC,
Florida Atlantic University Department of Electrical and Computer Engineering &Computer Science ( ECECS ) &Computer Science ( ECECS ) Security Systems.
Software Engineering Lecture 4 System Modeling The Analysis Stage.
Designing software applications
Sabri Kızanlık Ural Emekçi
Web Service Metadata Exchange
W3C Workshop WS-Policy in the Web Service Architecture
Techniques to Invoke Web Services from SAS
Presentation transcript:

Constraints and Capabilities Workshop Oracle Position Ashok Malhotra Greg Pavlik

Background  Position based on lessons learned: – Product implementation experiences. – Work on WSDL 2.0 Features and Properties, WS- Reliability as well as WS-Policy.  While we agree that a declarative, assertion- based design is desirable, we think F&P and WS-Policy have shortcomings. WS-Policy allows composition of assertions from different domains. F&P needs compositors.

Summary  A policy is a collection of domain expressions.  Domain functionality cannot be combined.  Two distinct varieties of domains that must be treated differently: – Domains that influence message content. – Domains that convey information about the service.

Domains  A domain is an orthogonal axis of functionality.  A policy is a collection of independent domain expressions.  Functionality for a domain is expressed using domain-specific formalisms and syntax.

Domain Dichotomy  Two kinds of domains…  Some domains influence message content (headers and bodies). – e.g. Security, Reliability  Other domains convey information about the service and may be in various ways e.g. used to decide whether to use the service. – Privacy (P3P) – Auditing/Logging

Domains that Influence Message Content  For example: security, reliability, transactions.  Functionality expressed as assertions connected by operators (compositors) such as all, choice, exactlyOne.  Client and server must agree on/select message policy.  Domain functionality may be ‘required’ or ‘supported’.

Domains that Influence Message Content (continued)  Client is configured or generated to conform to selected policy alternative.  Messages need to indicate which policy alternative is followed.  Server verifies that policy is adhered to.

Informational Domains  Informational assertions do not affect message content. They convey information about the service that may be used in several ways.  Informational domains are not ‘required’ or ‘supported’.  In some cases the client may insist that some advertised policy be enforced and may verify this.

Informational Domains  Several service characteristics may influence whether a client will use a policy or not: e.g. legal contract, privacy policy.  Decision could be made by man (lawyer reads legal contract) or machine (EPAL, WSPL).  Such characteristics could be used as part of the service discovery process.

Policy Attachment and Access  The policy may be associated with a service in several different ways: attached to WSDL, UDDI, RDDL, WSIL, etc.  Several policies may apply to a service.  Policies may be managed as documents in a document library with change control etc.  Need a standard mechanism to: – Access the entire policy for a service endpoint. – Access the policy details for a particular domain.  This mechanism would return a policy that may be composed of policy fragments from several related sources.

Policy Attachment and Access  Policies will evolve and may change during a conversation.  Messages should identify the policy they adhere to and if the policy changes during the conversation a fault should be signaled.

Recapitulation  A policy is a collection of domain expressions.  A domain’s functionality is described (and combined) using a domain-specific formalism.  Functionality for different domains cannot be combined.  Domains that influence message content and domains that provide information about the service are fundamentally different and must be treated differently.