SlideShare uma empresa Scribd logo
1 de 24
Baixar para ler offline
2007

                               Next Generation
                               Web Services Practices




            Core mechanisms for
           Web Services extensions


                                 Miguel Pardal
                           miguel.pardal@dei.ist.utl.pt


Lisbon,                   Seoul, October 30th, 2007
Portugal
Outline

• Service-oriented Enterprise Applications
• Web Service Extensions
     – Core mechanisms
• Conclusions




2007-10-30     Core mechanisms for Web Services extensions   2
Outline

• Service-oriented Enterprise Applications
• Web Service Extensions
     – Core mechanisms
• Conclusions




2007-10-30     Core mechanisms for Web Services extensions   3
“The whole world is made of
change”                 ~ Luís Vaz de Camões
                                                                         16th Century
                                                                     Portuguese Poet

                                                Cobol

                                                   Fortran

                                                     C
                                                                         DCE
                                                     Java
                                                                          CORBA
                                                           Dot Net
                                                                            DCOM

                                                                           Web
                                                                         Services
2007-10-30   Core mechanisms for Web Services extensions                           4
Service-oriented approach to
Enterprise Applications

• Customers’ needs change
     – Enterprises must adapt
     – And so do their applications


• Services
     – Focus on flexibility, reuse and interoperability
     – Web Services (WS) technology
     – Service-Oriented Architecture (SOA)

2007-10-30         Core mechanisms for Web Services extensions   5
Web Services in action
                                                                     #1 Publish
    Client                                                                              Service
                                 #2 Discover
                                                                                          Data
                                                                                          XML Schema
              WS
                                                 #3 Generate
             stubs                                                                        Functions
                                                                                          WSDL


                                               #4 Configure                               Policy
                                                                                          WS-Policy
                        WS
                     libraries



                                                #5 Invoke
                                                                                 #6 Execute




2007-10-30                         Core mechanisms for Web Services extensions                         6
Web Services libraries
                                   #4 Configure                        Policy
                                                                       WS-Policy
                WS
             libraries




• WS-Policy specifies additional requirements
    – Like security, distributed transactions, reliable
      messaging, etc.
    – But libraries are necessary to actually
      implement the requirements

2007-10-30               Core mechanisms for Web Services extensions               7
Requirements
• Functional
     – What the service does
             • Input, output, faults
• Non-functional
     – What properties hold when the service executes
     – Depend on circumstances and must be balanced
             • E.g. Security
                 – Low value messages can use a weaker but faster cipher
                   algorithm; high value messages use stronger security
                 – Intranet requests use local security credentials; Internet
                   requests use cross-domain credentials

2007-10-30                 Core mechanisms for Web Services extensions          8
Outline

• Service-oriented Enterprise Applications
• Web Service Extensions
     – Core mechanisms
• Conclusions




2007-10-30     Core mechanisms for Web Services extensions   9
WS standards for every requirement
          “Are we there yet?”

                                                            Short answer:
                                                            No, but we’re moving
                                                            forward

                                                            Long answer:

                                                            Visit WS-Map ☺
                                                            (or another overview site…)




     http://web.ist.utl.pt/miguel.pardal/ws-map

2007-10-30         Core mechanisms for Web Services extensions                            10
Why go beyond the standards?

• “One size does not fit all”

• Vendor WS implementations
     – From Microsoft, IBM, Sun, Oracle, …
     – Good library implementations of complex WS standards
     – Solve 90% of the problem but are difficult to customize to
       specific needs


• WS Extensions
     – Simpler library development
     – Appeal to a much broader developer community
     – Handle the remaining 10%...
2007-10-30            Core mechanisms for Web Services extensions   11
Analogy:
   Mozilla Firefox extensions




• Firefox implements 90% of requirements
     – Extensions add value to users, meeting specific needs
       and improving the browsing experience
2007-10-30         Core mechanisms for Web Services extensions   12
Example extension:
 Security report
• Some applications prefer not to know about security,
  they just want it
     – But others need to know, for instance, to store audit information
       in a database


• Security report extension
     – A report is produced during WS-Security processing
             • All actions and all parameters described
             • In a simple, easy-to-use object model
     – Leverage WS-Security standard implementation
     – Enables context sharing through meaningful abstractions,
       delegating security decisions in a simple and effective way


2007-10-30                 Core mechanisms for Web Services extensions   13
Problem statement

• What are the core mechanisms required
  for developing Web Services extensions ?
     – Like “security report”




2007-10-30        Core mechanisms for Web Services extensions   14
Proposed core mechanisms

                                                                     •   Policy
                                                                     •   Configuration
                                                                     •   Contexts
                                                                         management
                                                                     •   Message flow
                                                                         interception
                                                                     •   Operation
                                                                         implementation
                                                                         interception
  Packages and dependencies


2007-10-30             Core mechanisms for Web Services extensions                        15
Policy




• Requirements declaration
     – e.g. Declare that a WS can be invoked with transport
       security or with message security
• Policy negotiation between client and server




2007-10-30         Core mechanisms for Web Services extensions   16
Configuration




• Parameters
     – Which extensions to engage?
     – What are the parameter values?
             • e.g. Which digital certificate to use?




2007-10-30                 Core mechanisms for Web Services extensions   17
Contexts
                                            management




• Scoped state variables
     –   Application
     –   Session
     –   Operation
     –   Thread
• Enable data sharing between extensions and
  service implementation
2007-10-30             Core mechanisms for Web Services extensions   18
Message flow
                                                interception




• Message handling at service endpoint
     – Incoming or outgoing
     – Read/write header and body of SOAP messages
             • e.g. Do digital signature of body and place it in header




2007-10-30                Core mechanisms for Web Services extensions     19
Operation
                                        implementation
                                        interception


• Execute additional code before or after the
  service implementation
     – e.g. Implement authorization and access logging
• Object factories can return different
  implementations according to the desired
  behavior


2007-10-30         Core mechanisms for Web Services extensions   20
Proof-of-concept
• All mechanisms implemented on Java Web Services
     – Apache Commons Policy 1.0
             • Policy
     – JAX-WS Handlers
             • Message interception
     – Custom coding
             • Configuration, Contexts and Operation Execution


• Field-tested on a prototype and several course projects:
     – Security and distributed transactions extensions
     – Multiple development teams
     – Significant improvements in ease of development and learning


2007-10-30                 Core mechanisms for Web Services extensions   21
Outline

• Service-oriented Enterprise Applications
• Web Service Extensions
     – Core mechanisms
• Conclusions




2007-10-30     Core mechanisms for Web Services extensions   22
Conclusions
• Web Services development
     – Functional requirements are satisfied with components
     – Non-functional requirements are satisfied with aspects that
       can differ according to invocation circumstances

• Web Services extensions
     – Simplify custom library development
     – Broaden developer community

• Future work:
     – Enterprise application framework
             • Local and remote services
             • Integrated extensions engine
     – Platform-independent extensions: Java and Dot Net

2007-10-30                Core mechanisms for Web Services extensions   23
Looking ahead…


 With extensions, more developers can try new ideas.
 This encourages competition and best-of-breed selections,
 that can further advance the state-of-the-art of
 Web Services technology


                       Obrigado
  Thank you
                                                                         Questions
                                                                         &
                                                                         Answers
     miguel.pardal@dei.ist.utl.pt


2007-10-30                 Core mechanisms for Web Services extensions          24

Mais conteúdo relacionado

Mais procurados

Mobile Networks - Evolving to all-IP Backbone
Mobile Networks - Evolving to all-IP BackboneMobile Networks - Evolving to all-IP Backbone
Mobile Networks - Evolving to all-IP BackboneHarry Mylonas
 
Broadview Networks Site Seller R2011
Broadview Networks Site Seller R2011Broadview Networks Site Seller R2011
Broadview Networks Site Seller R2011dshetterly
 
Smallworld_Network_Inventory_Brochure_-_print-HR_with_bleed_for_printers_0
Smallworld_Network_Inventory_Brochure_-_print-HR_with_bleed_for_printers_0Smallworld_Network_Inventory_Brochure_-_print-HR_with_bleed_for_printers_0
Smallworld_Network_Inventory_Brochure_-_print-HR_with_bleed_for_printers_0Mitchell Menezes
 
Bw Overview 0607
Bw Overview 0607Bw Overview 0607
Bw Overview 0607fantastic1
 
offload
 offload offload
offloadxingbei
 
ABSS Comprehensive
ABSS ComprehensiveABSS Comprehensive
ABSS ComprehensiveChris Keaton
 
Welcome to Level(3)
Welcome to Level(3)Welcome to Level(3)
Welcome to Level(3)djpuccio
 
NSN / Samsung Brusknet PR
NSN / Samsung Brusknet PRNSN / Samsung Brusknet PR
NSN / Samsung Brusknet PRnaeemmirza
 
Cisco Carrier Packet Transport System: Foundation for Next-Generation Transport
Cisco Carrier Packet Transport System: Foundation for Next-Generation Transport Cisco Carrier Packet Transport System: Foundation for Next-Generation Transport
Cisco Carrier Packet Transport System: Foundation for Next-Generation Transport Cisco Canada
 
CORE2AFRICA 4page Brochure
CORE2AFRICA 4page BrochureCORE2AFRICA 4page Brochure
CORE2AFRICA 4page BrochureNigel Van Tura
 
Ethernet Demarcation Devices for managing end to end Ethernet service delivery
Ethernet Demarcation Devices for managing end to end Ethernet service deliveryEthernet Demarcation Devices for managing end to end Ethernet service delivery
Ethernet Demarcation Devices for managing end to end Ethernet service deliveryMetrodata Limited
 
Delivering the 'optimal mobile backhaul' experience
Delivering the 'optimal mobile backhaul' experienceDelivering the 'optimal mobile backhaul' experience
Delivering the 'optimal mobile backhaul' experienceAricent
 
Flair Data Systems - Overview
Flair Data Systems - OverviewFlair Data Systems - Overview
Flair Data Systems - OverviewDoug Ziegler
 
A Business Guide to MPLS IP VPN Migration: Five Critical Factors
A Business Guide  to MPLS IP VPN Migration: Five Critical FactorsA Business Guide  to MPLS IP VPN Migration: Five Critical Factors
A Business Guide to MPLS IP VPN Migration: Five Critical FactorsXO Communications
 

Mais procurados (20)

Mobile Networks - Evolving to all-IP Backbone
Mobile Networks - Evolving to all-IP BackboneMobile Networks - Evolving to all-IP Backbone
Mobile Networks - Evolving to all-IP Backbone
 
Ch08
Ch08Ch08
Ch08
 
Broadview Networks Site Seller R2011
Broadview Networks Site Seller R2011Broadview Networks Site Seller R2011
Broadview Networks Site Seller R2011
 
Smallworld_Network_Inventory_Brochure_-_print-HR_with_bleed_for_printers_0
Smallworld_Network_Inventory_Brochure_-_print-HR_with_bleed_for_printers_0Smallworld_Network_Inventory_Brochure_-_print-HR_with_bleed_for_printers_0
Smallworld_Network_Inventory_Brochure_-_print-HR_with_bleed_for_printers_0
 
Bw Overview 0607
Bw Overview 0607Bw Overview 0607
Bw Overview 0607
 
offload
 offload offload
offload
 
ABSS Comprehensive
ABSS ComprehensiveABSS Comprehensive
ABSS Comprehensive
 
Welcome to Level(3)
Welcome to Level(3)Welcome to Level(3)
Welcome to Level(3)
 
Gtt Overview
Gtt OverviewGtt Overview
Gtt Overview
 
NSN / Samsung Brusknet PR
NSN / Samsung Brusknet PRNSN / Samsung Brusknet PR
NSN / Samsung Brusknet PR
 
Cisco Carrier Packet Transport System: Foundation for Next-Generation Transport
Cisco Carrier Packet Transport System: Foundation for Next-Generation Transport Cisco Carrier Packet Transport System: Foundation for Next-Generation Transport
Cisco Carrier Packet Transport System: Foundation for Next-Generation Transport
 
Cdn prospects 2011
Cdn prospects 2011Cdn prospects 2011
Cdn prospects 2011
 
Total Network Solutions
Total Network SolutionsTotal Network Solutions
Total Network Solutions
 
1vc.tv approach for securuty vertical
1vc.tv approach for securuty vertical1vc.tv approach for securuty vertical
1vc.tv approach for securuty vertical
 
CORE2AFRICA 4page Brochure
CORE2AFRICA 4page BrochureCORE2AFRICA 4page Brochure
CORE2AFRICA 4page Brochure
 
Ethernet Demarcation Devices for managing end to end Ethernet service delivery
Ethernet Demarcation Devices for managing end to end Ethernet service deliveryEthernet Demarcation Devices for managing end to end Ethernet service delivery
Ethernet Demarcation Devices for managing end to end Ethernet service delivery
 
Delivering the 'optimal mobile backhaul' experience
Delivering the 'optimal mobile backhaul' experienceDelivering the 'optimal mobile backhaul' experience
Delivering the 'optimal mobile backhaul' experience
 
Flair Data Systems - Overview
Flair Data Systems - OverviewFlair Data Systems - Overview
Flair Data Systems - Overview
 
A Business Guide to MPLS IP VPN Migration: Five Critical Factors
A Business Guide  to MPLS IP VPN Migration: Five Critical FactorsA Business Guide  to MPLS IP VPN Migration: Five Critical Factors
A Business Guide to MPLS IP VPN Migration: Five Critical Factors
 
ABSS Essentials
ABSS EssentialsABSS Essentials
ABSS Essentials
 

Semelhante a Core mechanisms for Web Services extensions

Considerations for Deploying Virtual Network Functions and Services
Considerations for Deploying Virtual Network Functions and ServicesConsiderations for Deploying Virtual Network Functions and Services
Considerations for Deploying Virtual Network Functions and ServicesOpen Networking Summit
 
IBM Software Defined Networking = Brave New World of IT
IBM Software Defined Networking = Brave New World of  ITIBM Software Defined Networking = Brave New World of  IT
IBM Software Defined Networking = Brave New World of ITSteve Cole
 
170215 msa intro
170215 msa intro170215 msa intro
170215 msa introSonic leigh
 
Paa sing a java ee 6 application kshitiz saxena
Paa sing a java ee 6 application   kshitiz saxenaPaa sing a java ee 6 application   kshitiz saxena
Paa sing a java ee 6 application kshitiz saxenaIndicThreads
 
Microservices for Enterprises
Microservices for Enterprises Microservices for Enterprises
Microservices for Enterprises Kasun Indrasiri
 
Creating a Centralized Consumer Profile Management Service with WebSphere Dat...
Creating a Centralized Consumer Profile Management Service with WebSphere Dat...Creating a Centralized Consumer Profile Management Service with WebSphere Dat...
Creating a Centralized Consumer Profile Management Service with WebSphere Dat...Prolifics
 
Reducing Cost with DNA Automation
Reducing Cost with DNA AutomationReducing Cost with DNA Automation
Reducing Cost with DNA AutomationCisco Canada
 
[WSO2Con EU 2017] Microservices for Enterprises
[WSO2Con EU 2017] Microservices for Enterprises[WSO2Con EU 2017] Microservices for Enterprises
[WSO2Con EU 2017] Microservices for EnterprisesWSO2
 
Microservices in Practice
Microservices in PracticeMicroservices in Practice
Microservices in PracticeKasun Indrasiri
 
Do You Need A Service Mesh?
Do You Need A Service Mesh?Do You Need A Service Mesh?
Do You Need A Service Mesh?NGINX, Inc.
 
Semantic web service
Semantic web serviceSemantic web service
Semantic web servicejean Agnimel
 
Software System Scalability: Concepts and Techniques (keynote talk at ISEC 2009)
Software System Scalability: Concepts and Techniques (keynote talk at ISEC 2009)Software System Scalability: Concepts and Techniques (keynote talk at ISEC 2009)
Software System Scalability: Concepts and Techniques (keynote talk at ISEC 2009)David Rosenblum
 
Eci Service Architecture Evolution 1
Eci Service Architecture Evolution 1Eci Service Architecture Evolution 1
Eci Service Architecture Evolution 1David Sprott
 
Marco 2014 iib90_overview_port
Marco 2014 iib90_overview_portMarco 2014 iib90_overview_port
Marco 2014 iib90_overview_portJuan Garay
 
How to get cloud architecture and design right the first time 2012
How to get cloud architecture and design right the first time 2012How to get cloud architecture and design right the first time 2012
How to get cloud architecture and design right the first time 2012David Linthicum
 
Do I Need A Service Mesh.pptx
Do I Need A Service Mesh.pptxDo I Need A Service Mesh.pptx
Do I Need A Service Mesh.pptxPINGXIONG3
 
The Evolution of Architecture
The Evolution of ArchitectureThe Evolution of Architecture
The Evolution of ArchitectureNVISIA
 

Semelhante a Core mechanisms for Web Services extensions (20)

Micro service architecture
Micro service architecture  Micro service architecture
Micro service architecture
 
Considerations for Deploying Virtual Network Functions and Services
Considerations for Deploying Virtual Network Functions and ServicesConsiderations for Deploying Virtual Network Functions and Services
Considerations for Deploying Virtual Network Functions and Services
 
IBM Software Defined Networking = Brave New World of IT
IBM Software Defined Networking = Brave New World of  ITIBM Software Defined Networking = Brave New World of  IT
IBM Software Defined Networking = Brave New World of IT
 
TFI2014 Session I - State of SDN - Scott Sneddon
TFI2014 Session I - State of SDN - Scott SneddonTFI2014 Session I - State of SDN - Scott Sneddon
TFI2014 Session I - State of SDN - Scott Sneddon
 
170215 msa intro
170215 msa intro170215 msa intro
170215 msa intro
 
Paa sing a java ee 6 application kshitiz saxena
Paa sing a java ee 6 application   kshitiz saxenaPaa sing a java ee 6 application   kshitiz saxena
Paa sing a java ee 6 application kshitiz saxena
 
Microservices for Enterprises
Microservices for Enterprises Microservices for Enterprises
Microservices for Enterprises
 
Creating a Centralized Consumer Profile Management Service with WebSphere Dat...
Creating a Centralized Consumer Profile Management Service with WebSphere Dat...Creating a Centralized Consumer Profile Management Service with WebSphere Dat...
Creating a Centralized Consumer Profile Management Service with WebSphere Dat...
 
Reducing Cost with DNA Automation
Reducing Cost with DNA AutomationReducing Cost with DNA Automation
Reducing Cost with DNA Automation
 
[WSO2Con EU 2017] Microservices for Enterprises
[WSO2Con EU 2017] Microservices for Enterprises[WSO2Con EU 2017] Microservices for Enterprises
[WSO2Con EU 2017] Microservices for Enterprises
 
Microservices in Practice
Microservices in PracticeMicroservices in Practice
Microservices in Practice
 
Do You Need A Service Mesh?
Do You Need A Service Mesh?Do You Need A Service Mesh?
Do You Need A Service Mesh?
 
Semantic web service
Semantic web serviceSemantic web service
Semantic web service
 
Software System Scalability: Concepts and Techniques (keynote talk at ISEC 2009)
Software System Scalability: Concepts and Techniques (keynote talk at ISEC 2009)Software System Scalability: Concepts and Techniques (keynote talk at ISEC 2009)
Software System Scalability: Concepts and Techniques (keynote talk at ISEC 2009)
 
Eci Service Architecture Evolution 1
Eci Service Architecture Evolution 1Eci Service Architecture Evolution 1
Eci Service Architecture Evolution 1
 
Marco 2014 iib90_overview_port
Marco 2014 iib90_overview_portMarco 2014 iib90_overview_port
Marco 2014 iib90_overview_port
 
Stephen Wallo
Stephen WalloStephen Wallo
Stephen Wallo
 
How to get cloud architecture and design right the first time 2012
How to get cloud architecture and design right the first time 2012How to get cloud architecture and design right the first time 2012
How to get cloud architecture and design right the first time 2012
 
Do I Need A Service Mesh.pptx
Do I Need A Service Mesh.pptxDo I Need A Service Mesh.pptx
Do I Need A Service Mesh.pptx
 
The Evolution of Architecture
The Evolution of ArchitectureThe Evolution of Architecture
The Evolution of Architecture
 

Mais de Miguel Pardal

Master Beginners Workshop - Feb 2023
Master Beginners Workshop - Feb 2023Master Beginners Workshop - Feb 2023
Master Beginners Workshop - Feb 2023Miguel Pardal
 
Master Beginners Workshop - September 2019
Master Beginners Workshop - September 2019Master Beginners Workshop - September 2019
Master Beginners Workshop - September 2019Miguel Pardal
 
SafeCloud Secure Communication solutions (WP1 overview)
SafeCloud Secure Communication solutions (WP1 overview)SafeCloud Secure Communication solutions (WP1 overview)
SafeCloud Secure Communication solutions (WP1 overview)Miguel Pardal
 
Master Beginners' Workshop September 2018
Master Beginners' Workshop September 2018Master Beginners' Workshop September 2018
Master Beginners' Workshop September 2018Miguel Pardal
 
IoT Middleware for Precision Agriculture: workforce monitoring in olive fields
IoT Middleware for Precision Agriculture: workforce monitoring in olive fieldsIoT Middleware for Precision Agriculture: workforce monitoring in olive fields
IoT Middleware for Precision Agriculture: workforce monitoring in olive fieldsMiguel Pardal
 
Rastreabilidade na Internet das (muitas) Coisas
Rastreabilidade na Internet das (muitas) CoisasRastreabilidade na Internet das (muitas) Coisas
Rastreabilidade na Internet das (muitas) CoisasMiguel Pardal
 
Vulnerability-tolerant Transport Layer Security
Vulnerability-tolerant Transport Layer SecurityVulnerability-tolerant Transport Layer Security
Vulnerability-tolerant Transport Layer SecurityMiguel Pardal
 
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...Miguel Pardal
 
Precision Agriculture with Sensors and Technologies from the Internet of Things
Precision Agriculture with Sensors and Technologies from the Internet of ThingsPrecision Agriculture with Sensors and Technologies from the Internet of Things
Precision Agriculture with Sensors and Technologies from the Internet of ThingsMiguel Pardal
 
Smart Places INForum16 presentation
Smart Places INForum16 presentationSmart Places INForum16 presentation
Smart Places INForum16 presentationMiguel Pardal
 
Eclipse workshop presentation (March 2016)
Eclipse workshop presentation (March 2016)Eclipse workshop presentation (March 2016)
Eclipse workshop presentation (March 2016)Miguel Pardal
 
LaTeX workshop (NEB)
LaTeX workshop (NEB)LaTeX workshop (NEB)
LaTeX workshop (NEB)Miguel Pardal
 
Thesis for beginners 2015-10
Thesis for beginners 2015-10Thesis for beginners 2015-10
Thesis for beginners 2015-10Miguel Pardal
 
LaTeX workshop (JEQ)
LaTeX workshop (JEQ)LaTeX workshop (JEQ)
LaTeX workshop (JEQ)Miguel Pardal
 
Thesis for beginners
Thesis for beginnersThesis for beginners
Thesis for beginnersMiguel Pardal
 
Scalable and secure RFID data discovery
Scalable and secure RFID data discoveryScalable and secure RFID data discovery
Scalable and secure RFID data discoveryMiguel Pardal
 
Breve introdução à investigação
Breve introdução à investigaçãoBreve introdução à investigação
Breve introdução à investigaçãoMiguel Pardal
 
Eclipse workshop presentation
Eclipse workshop presentationEclipse workshop presentation
Eclipse workshop presentationMiguel Pardal
 
BEST Lisboa 2013 - The Internet of Things class
BEST Lisboa 2013 - The Internet of Things classBEST Lisboa 2013 - The Internet of Things class
BEST Lisboa 2013 - The Internet of Things classMiguel Pardal
 

Mais de Miguel Pardal (20)

Master Beginners Workshop - Feb 2023
Master Beginners Workshop - Feb 2023Master Beginners Workshop - Feb 2023
Master Beginners Workshop - Feb 2023
 
Master Beginners Workshop - September 2019
Master Beginners Workshop - September 2019Master Beginners Workshop - September 2019
Master Beginners Workshop - September 2019
 
SafeCloud Secure Communication solutions (WP1 overview)
SafeCloud Secure Communication solutions (WP1 overview)SafeCloud Secure Communication solutions (WP1 overview)
SafeCloud Secure Communication solutions (WP1 overview)
 
Master Beginners' Workshop September 2018
Master Beginners' Workshop September 2018Master Beginners' Workshop September 2018
Master Beginners' Workshop September 2018
 
IoT Middleware for Precision Agriculture: workforce monitoring in olive fields
IoT Middleware for Precision Agriculture: workforce monitoring in olive fieldsIoT Middleware for Precision Agriculture: workforce monitoring in olive fields
IoT Middleware for Precision Agriculture: workforce monitoring in olive fields
 
Rastreabilidade na Internet das (muitas) Coisas
Rastreabilidade na Internet das (muitas) CoisasRastreabilidade na Internet das (muitas) Coisas
Rastreabilidade na Internet das (muitas) Coisas
 
Vulnerability-tolerant Transport Layer Security
Vulnerability-tolerant Transport Layer SecurityVulnerability-tolerant Transport Layer Security
Vulnerability-tolerant Transport Layer Security
 
Master Beginners
Master BeginnersMaster Beginners
Master Beginners
 
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
 
Precision Agriculture with Sensors and Technologies from the Internet of Things
Precision Agriculture with Sensors and Technologies from the Internet of ThingsPrecision Agriculture with Sensors and Technologies from the Internet of Things
Precision Agriculture with Sensors and Technologies from the Internet of Things
 
Smart Places INForum16 presentation
Smart Places INForum16 presentationSmart Places INForum16 presentation
Smart Places INForum16 presentation
 
Eclipse workshop presentation (March 2016)
Eclipse workshop presentation (March 2016)Eclipse workshop presentation (March 2016)
Eclipse workshop presentation (March 2016)
 
LaTeX workshop (NEB)
LaTeX workshop (NEB)LaTeX workshop (NEB)
LaTeX workshop (NEB)
 
Thesis for beginners 2015-10
Thesis for beginners 2015-10Thesis for beginners 2015-10
Thesis for beginners 2015-10
 
LaTeX workshop (JEQ)
LaTeX workshop (JEQ)LaTeX workshop (JEQ)
LaTeX workshop (JEQ)
 
Thesis for beginners
Thesis for beginnersThesis for beginners
Thesis for beginners
 
Scalable and secure RFID data discovery
Scalable and secure RFID data discoveryScalable and secure RFID data discovery
Scalable and secure RFID data discovery
 
Breve introdução à investigação
Breve introdução à investigaçãoBreve introdução à investigação
Breve introdução à investigação
 
Eclipse workshop presentation
Eclipse workshop presentationEclipse workshop presentation
Eclipse workshop presentation
 
BEST Lisboa 2013 - The Internet of Things class
BEST Lisboa 2013 - The Internet of Things classBEST Lisboa 2013 - The Internet of Things class
BEST Lisboa 2013 - The Internet of Things class
 

Último

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Fact vs. Fiction: Autodetecting Hallucinations in LLMs
Fact vs. Fiction: Autodetecting Hallucinations in LLMsFact vs. Fiction: Autodetecting Hallucinations in LLMs
Fact vs. Fiction: Autodetecting Hallucinations in LLMsZilliz
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Último (20)

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Fact vs. Fiction: Autodetecting Hallucinations in LLMs
Fact vs. Fiction: Autodetecting Hallucinations in LLMsFact vs. Fiction: Autodetecting Hallucinations in LLMs
Fact vs. Fiction: Autodetecting Hallucinations in LLMs
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Core mechanisms for Web Services extensions

  • 1. 2007 Next Generation Web Services Practices Core mechanisms for Web Services extensions Miguel Pardal miguel.pardal@dei.ist.utl.pt Lisbon, Seoul, October 30th, 2007 Portugal
  • 2. Outline • Service-oriented Enterprise Applications • Web Service Extensions – Core mechanisms • Conclusions 2007-10-30 Core mechanisms for Web Services extensions 2
  • 3. Outline • Service-oriented Enterprise Applications • Web Service Extensions – Core mechanisms • Conclusions 2007-10-30 Core mechanisms for Web Services extensions 3
  • 4. “The whole world is made of change” ~ Luís Vaz de Camões 16th Century Portuguese Poet Cobol Fortran C DCE Java CORBA Dot Net DCOM Web Services 2007-10-30 Core mechanisms for Web Services extensions 4
  • 5. Service-oriented approach to Enterprise Applications • Customers’ needs change – Enterprises must adapt – And so do their applications • Services – Focus on flexibility, reuse and interoperability – Web Services (WS) technology – Service-Oriented Architecture (SOA) 2007-10-30 Core mechanisms for Web Services extensions 5
  • 6. Web Services in action #1 Publish Client Service #2 Discover Data XML Schema WS #3 Generate stubs Functions WSDL #4 Configure Policy WS-Policy WS libraries #5 Invoke #6 Execute 2007-10-30 Core mechanisms for Web Services extensions 6
  • 7. Web Services libraries #4 Configure Policy WS-Policy WS libraries • WS-Policy specifies additional requirements – Like security, distributed transactions, reliable messaging, etc. – But libraries are necessary to actually implement the requirements 2007-10-30 Core mechanisms for Web Services extensions 7
  • 8. Requirements • Functional – What the service does • Input, output, faults • Non-functional – What properties hold when the service executes – Depend on circumstances and must be balanced • E.g. Security – Low value messages can use a weaker but faster cipher algorithm; high value messages use stronger security – Intranet requests use local security credentials; Internet requests use cross-domain credentials 2007-10-30 Core mechanisms for Web Services extensions 8
  • 9. Outline • Service-oriented Enterprise Applications • Web Service Extensions – Core mechanisms • Conclusions 2007-10-30 Core mechanisms for Web Services extensions 9
  • 10. WS standards for every requirement “Are we there yet?” Short answer: No, but we’re moving forward Long answer: Visit WS-Map ☺ (or another overview site…) http://web.ist.utl.pt/miguel.pardal/ws-map 2007-10-30 Core mechanisms for Web Services extensions 10
  • 11. Why go beyond the standards? • “One size does not fit all” • Vendor WS implementations – From Microsoft, IBM, Sun, Oracle, … – Good library implementations of complex WS standards – Solve 90% of the problem but are difficult to customize to specific needs • WS Extensions – Simpler library development – Appeal to a much broader developer community – Handle the remaining 10%... 2007-10-30 Core mechanisms for Web Services extensions 11
  • 12. Analogy: Mozilla Firefox extensions • Firefox implements 90% of requirements – Extensions add value to users, meeting specific needs and improving the browsing experience 2007-10-30 Core mechanisms for Web Services extensions 12
  • 13. Example extension: Security report • Some applications prefer not to know about security, they just want it – But others need to know, for instance, to store audit information in a database • Security report extension – A report is produced during WS-Security processing • All actions and all parameters described • In a simple, easy-to-use object model – Leverage WS-Security standard implementation – Enables context sharing through meaningful abstractions, delegating security decisions in a simple and effective way 2007-10-30 Core mechanisms for Web Services extensions 13
  • 14. Problem statement • What are the core mechanisms required for developing Web Services extensions ? – Like “security report” 2007-10-30 Core mechanisms for Web Services extensions 14
  • 15. Proposed core mechanisms • Policy • Configuration • Contexts management • Message flow interception • Operation implementation interception Packages and dependencies 2007-10-30 Core mechanisms for Web Services extensions 15
  • 16. Policy • Requirements declaration – e.g. Declare that a WS can be invoked with transport security or with message security • Policy negotiation between client and server 2007-10-30 Core mechanisms for Web Services extensions 16
  • 17. Configuration • Parameters – Which extensions to engage? – What are the parameter values? • e.g. Which digital certificate to use? 2007-10-30 Core mechanisms for Web Services extensions 17
  • 18. Contexts management • Scoped state variables – Application – Session – Operation – Thread • Enable data sharing between extensions and service implementation 2007-10-30 Core mechanisms for Web Services extensions 18
  • 19. Message flow interception • Message handling at service endpoint – Incoming or outgoing – Read/write header and body of SOAP messages • e.g. Do digital signature of body and place it in header 2007-10-30 Core mechanisms for Web Services extensions 19
  • 20. Operation implementation interception • Execute additional code before or after the service implementation – e.g. Implement authorization and access logging • Object factories can return different implementations according to the desired behavior 2007-10-30 Core mechanisms for Web Services extensions 20
  • 21. Proof-of-concept • All mechanisms implemented on Java Web Services – Apache Commons Policy 1.0 • Policy – JAX-WS Handlers • Message interception – Custom coding • Configuration, Contexts and Operation Execution • Field-tested on a prototype and several course projects: – Security and distributed transactions extensions – Multiple development teams – Significant improvements in ease of development and learning 2007-10-30 Core mechanisms for Web Services extensions 21
  • 22. Outline • Service-oriented Enterprise Applications • Web Service Extensions – Core mechanisms • Conclusions 2007-10-30 Core mechanisms for Web Services extensions 22
  • 23. Conclusions • Web Services development – Functional requirements are satisfied with components – Non-functional requirements are satisfied with aspects that can differ according to invocation circumstances • Web Services extensions – Simplify custom library development – Broaden developer community • Future work: – Enterprise application framework • Local and remote services • Integrated extensions engine – Platform-independent extensions: Java and Dot Net 2007-10-30 Core mechanisms for Web Services extensions 23
  • 24. Looking ahead… With extensions, more developers can try new ideas. This encourages competition and best-of-breed selections, that can further advance the state-of-the-art of Web Services technology Obrigado Thank you Questions & Answers miguel.pardal@dei.ist.utl.pt 2007-10-30 Core mechanisms for Web Services extensions 24