SlideShare a Scribd company logo
1 of 15
Download to read offline
UDDI Programmatic Interface
             Web Service Security
    Future Trends in Web Services




Advanced Issues & Future Trends in WS

                  Ioannis G. Baltopoulos

                Department of Computer Science
                   Imperial College London


   Inverted CERN School of Computing, 2005
              Geneva, Switzerland




           Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                      Web Service Security
             Future Trends in Web Services




    UDDI Programmatic Interface
1
     UDDI4J Introduction
     Locating Information

    Web Service Security
2
     Security Basics
     WS-Security Roadmap

    Future Trends in Web Services
3
      Current Work
      Web Services over the Grid
      Research Topics



                    Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                                             UDDI4J Introduction
                      Web Service Security
                                             Locating Information
             Future Trends in Web Services


UDDI4J Overview



     The programmatic interface to a registry is through a set of
     SOAP messages defined in the UDDI specification.
     The IBM UDDI4J is an open source Java implementation of
     the UDDI protocol; high level API layered on top of SOAP
     that enables programmatic access to registries.
     It can be used to
         search for information on a registry,
         publish new information to a registry and
         delete information from a registry.




                    Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                                                UDDI4J Introduction
                         Web Service Security
                                                Locating Information
                Future Trends in Web Services


UDDI4J Basics
Package Breakdown



   Structured into a number of packages under org.uddi4j:
   Packages and contents
    Name                 Contents
                         contains the client class UDDIProxy
    org.uddi4j.client
                         represents UDDI data objects
    org.uddi4j.datatype
                         contains messages sent to the server
    org.uddi4j.request
                         response messages from a UDDI
    org.uddi4j.response
                         server
    org.uddi4j.transport support for pluggable transports
                         utility classes for various tasks
    org.uddi4j.util



                       Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                                              UDDI4J Introduction
                       Web Service Security
                                              Locating Information
              Future Trends in Web Services


Accessing the Registry
  The most important class in the UDDI4J package is the
  org.uddi4j.client.UDDIProxy. Contains methods to:
      connect to a registry,
      query the registry,
      and process the result.
  Creating a Registy Proxy
  private UDDIProxy proxy;
  private void setupProxy(){
       proxy = new UDDIProxy();
       try {
            proxy.setInquiryURL(inquiryURL);
       } catch (MalformedURLException e) {
          // Couldn’t create the proxy..
       }
  }
                     Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                                               UDDI4J Introduction
                        Web Service Security
                                               Locating Information
               Future Trends in Web Services


Locating a technical model
The find tModel() method

   The UDDIProxy class defines a find tModel() method for
   locating technical models by
       name
       categories
       identifiers
       any combination of the above

   Using the find tModel() method
   public TModelList find tModel(
        String name, CategoryBag c, IdentifierBag I,
        FindQualifiers f, int maxRows)
   // Example invocation on a UDDIProxy
   proxy.find tModel(name, null, null, null, 5);

                      Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                                               UDDI4J Introduction
                        Web Service Security
                                               Locating Information
               Future Trends in Web Services


Locating a BusinessService
The find service() method

   The UDDIProxy class defines a find service() method for
   locating technical models by
       Unique ID (UUID)
       name of the service
       category information of the service
       tModel information of the service
       any combination of the above

   Using the find service() method
   public ServiceList find service(
        String businessKey, Vector names, CategoryBag c,
        TModelBag t, FindQualifiers f , int maxRows)


                      Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                                               UDDI4J Introduction
                        Web Service Security
                                               Locating Information
               Future Trends in Web Services


Locating a BusinessEntity
The find business() method

   The UDDIProxy class defines a find business() method for
   locating technical models by
        name of the business
        discoveryURL
        identifier of the business
        category of the business
        tModel information of the service
        any combination of the above
   Using the find business() method
   public BusinessList find business(
        Vector names, DiscoveryURLs d, IdentifierBag i,
        CategoryBag c, TModelBag t, FindQualifiers f,
        int maxRows)
                      Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                                             Security Basics
                      Web Service Security
                                             WS-Security Roadmap
             Future Trends in Web Services


Security Requirements

     Confidentiality
     Ensures that only authorised parties access the information.
     Authentication
     Ensures the originator of a message can provide appropriate
     proof of identity.
     Integrity
     Ensures that a message isn’t modified accidentally or
     intentionally in transit.
     Nonrepudiation
     Guarantees that neither sender or receiver of a message can
     deny its transmission.
     Authorization
     Ensures that entities with given identity are given access to
     resources.
                    Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                                                 Security Basics
                          Web Service Security
                                                 WS-Security Roadmap
                 Future Trends in Web Services


WS-Security
The Web Services Security Roadmap




        The Web services security roadmap laid out by IBM and
        Microsoft is composed of a whole suite of specifications
        covering various facets of security (messaging, policies, trust,
        privacy, etc.).
        The specifications build upon one another and are all built on
        top of a single specification, WS-Security, that defines a
        message security model.
        Currently the model for securing Web services consists of 7
        specifications.




                        Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                                          Security Basics
                   Web Service Security
                                          WS-Security Roadmap
          Future Trends in Web Services


WS-Security Roadmap




                 Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                                                   Current Work
                           Web Service Security
                                                   Research Topics
                  Future Trends in Web Services


WS-ReliableMessaging
Motivating the Solution


   Some problems
   The current implementation of Web Services lacks guarantees of
         Message Ordering
         Once and only once delivery
         Network/Machine availability

   The solution!
   A standard (therefore interoperable way) that would take care of
   all the above problems at the middleware layer.
   IBM, Microsoft, TIBCO and BEA are working together to develop
   a SOAP extension model to help solve these types of problems,
   and the result is WS-ReliableMessaging.

                          Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                                                Current Work
                         Web Service Security
                                                Research Topics
                Future Trends in Web Services


WS-RM Processing Model
       A client application sends a new message to the SOAP client.
   1

       The SOAP client, using WS-RM code, associates a unique
   2

       identifier for this message and saves it in a persistent store.
       The WS-RM client tries to send the message to the target
   3

       server. If it fails it retries until it times-out.
       Upon receiving the message, the WS-RM server code
   4

       acknowledges receipt by sending an acknowledgment header.
       After receiving the acknowledgment, the WS-RM client
   5

       removes the message and the state information from the
       persistent store.
       The SOAP server locates and invokes the desired Web Service.
   6

       Once the service is invoked, the message can be sagely
   7

       removed from the WS-RM sever-side runtime persistent store.
       After the Expiration time has passed, the WS-RM server
   8

       runtime can remove the state information about the particular
       message sequence. Baltopoulos
                       Ioannis G.          Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                                                   Current Work
                            Web Service Security
                                                   Research Topics
                   Future Trends in Web Services


WS-Coordination
Introducing transactions to Web Services



   Definition
   A transaction is the scope under which a unit of work is defined.
   The size or breadth of the amount of work will vary between
   applications.

         Intuitively, the above definitions means considering several
         successive calls as a single atomic one.
         This is particularly useful for Banking applications or Business
         systems where several subsystems need to be updated and
         either all or none of the updates succeed.



                          Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                                               Current Work
                        Web Service Security
                                               Research Topics
               Future Trends in Web Services


Concluding Remarks


  In this lecture we saw
      A programmatic interface to the UDDI Registry using IBM’s
      open source UDDI4J
      The Web Services Security Roadmap (WS-Security)
      Current work in transactions and reliable messaging
      Finally, future uses on the Grid

                                     Thank you!




                      Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS

More Related Content

Similar to UDDI4J Introduction Web Service Security Future Trends

web-services-on-mobile-platform
web-services-on-mobile-platformweb-services-on-mobile-platform
web-services-on-mobile-platformSanjaySanjay970196
 
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)ijwscjournal
 
WebServices Fundamentals
WebServices FundamentalsWebServices Fundamentals
WebServices Fundamentalsmdfkhan625
 
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...pijans
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)ijcga
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)ijcga
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)ijcga
 
11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...ijcsity
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderijaprr_editor
 
Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...IJNSA Journal
 
Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...Anastasija Nikiforova
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...ijdms
 
Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...IJNSA Journal
 
15th International Conference on Network Security & Applications (CNSA 2022)
15th International Conference on Network Security & Applications (CNSA 2022)15th International Conference on Network Security & Applications (CNSA 2022)
15th International Conference on Network Security & Applications (CNSA 2022)ijcisjournal
 
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) USKim Holm
 
FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)
FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)
FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)IJDKP
 

Similar to UDDI4J Introduction Web Service Security Future Trends (20)

web-services-on-mobile-platform
web-services-on-mobile-platformweb-services-on-mobile-platform
web-services-on-mobile-platform
 
1. web services
1. web services1. web services
1. web services
 
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
 
WebServices Fundamentals
WebServices FundamentalsWebServices Fundamentals
WebServices Fundamentals
 
Web Services ppt
Web Services pptWeb Services ppt
Web Services ppt
 
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
 
11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...
 
Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...
 
Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...
 
15th International Conference on Network Security & Applications (CNSA 2022)
15th International Conference on Network Security & Applications (CNSA 2022)15th International Conference on Network Security & Applications (CNSA 2022)
15th International Conference on Network Security & Applications (CNSA 2022)
 
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
 
FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)
FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)
FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)
 

More from Ioannis Baltopoulos

Consuming, providing and publishing Web Services
Consuming, providing and publishing Web ServicesConsuming, providing and publishing Web Services
Consuming, providing and publishing Web ServicesIoannis Baltopoulos
 
The 7 Sins of Software Engineers in HEP
The 7 Sins of Software Engineers in HEPThe 7 Sins of Software Engineers in HEP
The 7 Sins of Software Engineers in HEPIoannis Baltopoulos
 
Secure Compilation of a Multi-Tier Web Language (TLDI)
Secure Compilation of a Multi-Tier Web Language (TLDI)Secure Compilation of a Multi-Tier Web Language (TLDI)
Secure Compilation of a Multi-Tier Web Language (TLDI)Ioannis Baltopoulos
 
Secure Compilation of a Multi-Tier Web Language (Semantics Lunch)
Secure Compilation of a Multi-Tier Web Language (Semantics Lunch)Secure Compilation of a Multi-Tier Web Language (Semantics Lunch)
Secure Compilation of a Multi-Tier Web Language (Semantics Lunch)Ioannis Baltopoulos
 

More from Ioannis Baltopoulos (6)

Consuming, providing and publishing Web Services
Consuming, providing and publishing Web ServicesConsuming, providing and publishing Web Services
Consuming, providing and publishing Web Services
 
Introduction to Web Services
Introduction to Web ServicesIntroduction to Web Services
Introduction to Web Services
 
The 7 Sins of Software Engineers in HEP
The 7 Sins of Software Engineers in HEPThe 7 Sins of Software Engineers in HEP
The 7 Sins of Software Engineers in HEP
 
Secure Compilation of a Multi-Tier Web Language (TLDI)
Secure Compilation of a Multi-Tier Web Language (TLDI)Secure Compilation of a Multi-Tier Web Language (TLDI)
Secure Compilation of a Multi-Tier Web Language (TLDI)
 
Secure Compilation of a Multi-Tier Web Language (Semantics Lunch)
Secure Compilation of a Multi-Tier Web Language (Semantics Lunch)Secure Compilation of a Multi-Tier Web Language (Semantics Lunch)
Secure Compilation of a Multi-Tier Web Language (Semantics Lunch)
 
Audio Walks
Audio WalksAudio Walks
Audio Walks
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

UDDI4J Introduction Web Service Security Future Trends

  • 1. UDDI Programmatic Interface Web Service Security Future Trends in Web Services Advanced Issues & Future Trends in WS Ioannis G. Baltopoulos Department of Computer Science Imperial College London Inverted CERN School of Computing, 2005 Geneva, Switzerland Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS
  • 2. UDDI Programmatic Interface Web Service Security Future Trends in Web Services UDDI Programmatic Interface 1 UDDI4J Introduction Locating Information Web Service Security 2 Security Basics WS-Security Roadmap Future Trends in Web Services 3 Current Work Web Services over the Grid Research Topics Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS
  • 3. UDDI Programmatic Interface UDDI4J Introduction Web Service Security Locating Information Future Trends in Web Services UDDI4J Overview The programmatic interface to a registry is through a set of SOAP messages defined in the UDDI specification. The IBM UDDI4J is an open source Java implementation of the UDDI protocol; high level API layered on top of SOAP that enables programmatic access to registries. It can be used to search for information on a registry, publish new information to a registry and delete information from a registry. Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS
  • 4. UDDI Programmatic Interface UDDI4J Introduction Web Service Security Locating Information Future Trends in Web Services UDDI4J Basics Package Breakdown Structured into a number of packages under org.uddi4j: Packages and contents Name Contents contains the client class UDDIProxy org.uddi4j.client represents UDDI data objects org.uddi4j.datatype contains messages sent to the server org.uddi4j.request response messages from a UDDI org.uddi4j.response server org.uddi4j.transport support for pluggable transports utility classes for various tasks org.uddi4j.util Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS
  • 5. UDDI Programmatic Interface UDDI4J Introduction Web Service Security Locating Information Future Trends in Web Services Accessing the Registry The most important class in the UDDI4J package is the org.uddi4j.client.UDDIProxy. Contains methods to: connect to a registry, query the registry, and process the result. Creating a Registy Proxy private UDDIProxy proxy; private void setupProxy(){ proxy = new UDDIProxy(); try { proxy.setInquiryURL(inquiryURL); } catch (MalformedURLException e) { // Couldn’t create the proxy.. } } Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS
  • 6. UDDI Programmatic Interface UDDI4J Introduction Web Service Security Locating Information Future Trends in Web Services Locating a technical model The find tModel() method The UDDIProxy class defines a find tModel() method for locating technical models by name categories identifiers any combination of the above Using the find tModel() method public TModelList find tModel( String name, CategoryBag c, IdentifierBag I, FindQualifiers f, int maxRows) // Example invocation on a UDDIProxy proxy.find tModel(name, null, null, null, 5); Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS
  • 7. UDDI Programmatic Interface UDDI4J Introduction Web Service Security Locating Information Future Trends in Web Services Locating a BusinessService The find service() method The UDDIProxy class defines a find service() method for locating technical models by Unique ID (UUID) name of the service category information of the service tModel information of the service any combination of the above Using the find service() method public ServiceList find service( String businessKey, Vector names, CategoryBag c, TModelBag t, FindQualifiers f , int maxRows) Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS
  • 8. UDDI Programmatic Interface UDDI4J Introduction Web Service Security Locating Information Future Trends in Web Services Locating a BusinessEntity The find business() method The UDDIProxy class defines a find business() method for locating technical models by name of the business discoveryURL identifier of the business category of the business tModel information of the service any combination of the above Using the find business() method public BusinessList find business( Vector names, DiscoveryURLs d, IdentifierBag i, CategoryBag c, TModelBag t, FindQualifiers f, int maxRows) Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS
  • 9. UDDI Programmatic Interface Security Basics Web Service Security WS-Security Roadmap Future Trends in Web Services Security Requirements Confidentiality Ensures that only authorised parties access the information. Authentication Ensures the originator of a message can provide appropriate proof of identity. Integrity Ensures that a message isn’t modified accidentally or intentionally in transit. Nonrepudiation Guarantees that neither sender or receiver of a message can deny its transmission. Authorization Ensures that entities with given identity are given access to resources. Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS
  • 10. UDDI Programmatic Interface Security Basics Web Service Security WS-Security Roadmap Future Trends in Web Services WS-Security The Web Services Security Roadmap The Web services security roadmap laid out by IBM and Microsoft is composed of a whole suite of specifications covering various facets of security (messaging, policies, trust, privacy, etc.). The specifications build upon one another and are all built on top of a single specification, WS-Security, that defines a message security model. Currently the model for securing Web services consists of 7 specifications. Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS
  • 11. UDDI Programmatic Interface Security Basics Web Service Security WS-Security Roadmap Future Trends in Web Services WS-Security Roadmap Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS
  • 12. UDDI Programmatic Interface Current Work Web Service Security Research Topics Future Trends in Web Services WS-ReliableMessaging Motivating the Solution Some problems The current implementation of Web Services lacks guarantees of Message Ordering Once and only once delivery Network/Machine availability The solution! A standard (therefore interoperable way) that would take care of all the above problems at the middleware layer. IBM, Microsoft, TIBCO and BEA are working together to develop a SOAP extension model to help solve these types of problems, and the result is WS-ReliableMessaging. Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS
  • 13. UDDI Programmatic Interface Current Work Web Service Security Research Topics Future Trends in Web Services WS-RM Processing Model A client application sends a new message to the SOAP client. 1 The SOAP client, using WS-RM code, associates a unique 2 identifier for this message and saves it in a persistent store. The WS-RM client tries to send the message to the target 3 server. If it fails it retries until it times-out. Upon receiving the message, the WS-RM server code 4 acknowledges receipt by sending an acknowledgment header. After receiving the acknowledgment, the WS-RM client 5 removes the message and the state information from the persistent store. The SOAP server locates and invokes the desired Web Service. 6 Once the service is invoked, the message can be sagely 7 removed from the WS-RM sever-side runtime persistent store. After the Expiration time has passed, the WS-RM server 8 runtime can remove the state information about the particular message sequence. Baltopoulos Ioannis G. Advanced Issues & Future Trends in WS
  • 14. UDDI Programmatic Interface Current Work Web Service Security Research Topics Future Trends in Web Services WS-Coordination Introducing transactions to Web Services Definition A transaction is the scope under which a unit of work is defined. The size or breadth of the amount of work will vary between applications. Intuitively, the above definitions means considering several successive calls as a single atomic one. This is particularly useful for Banking applications or Business systems where several subsystems need to be updated and either all or none of the updates succeed. Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS
  • 15. UDDI Programmatic Interface Current Work Web Service Security Research Topics Future Trends in Web Services Concluding Remarks In this lecture we saw A programmatic interface to the UDDI Registry using IBM’s open source UDDI4J The Web Services Security Roadmap (WS-Security) Current work in transactions and reliable messaging Finally, future uses on the Grid Thank you! Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS