A


Index


[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

aborted transactions
abstract definitions
abstract processes
     BPEL 2nd
ACIDs 2nd
acknowledgement intervals
     WS-ReliableMessaging 2nd
AckRequested element
     WS-ReliableMessaging 2nd
acquisitions
     outsourcing business processes 2nd 3rd
Action headers
activation
     WS-Coordination
activation service
     Durable Two-Phase Commit protocol 2nd
activation services 2nd
     Business Agreement protocol with Participant Completion 2nd 3rd
     Business Agreement with Coordinator Completion protocol
     completion protocol 2nd 3rd
     implementation requirements 2nd
     protocols 2nd 3rd 4th 5th
     registration service
     Volatile Two-Phase Commit protocol 2nd
     WS-Atomic Transaction (WS-AT)
     WS-Business Activity 2nd 3rd 4th
activations services
     travel agent scenario 2nd
activities
     business process
activity scopes
adapters
     message-oriented middleware 2nd 3rd
addressing
     Web services interaction characteristics 2nd 3rd 4th
    WS-Addressing
         architecture 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th
         example SOAP message 2nd 3rd
administrators
     distrubte computing fallacy 2nd
AII
     (Attribute Information Item)
All operator
     WS-PolicyFramework 2nd
API
    UDDI (Universal Description, Discovery, and Integration)
         subscriptions 2nd
APIs
     (application programming interfaces)
     UDDI (Universal Description, Discovery, and Integration) 2nd 3rd
         client to node operations 2nd 3rd 4th
         node to client operations 2nd
         node to node operations
         node to taxonomy server operations 2nd
Application Destination role
     WS-ReliableMessaging
application programming interfaces. [See APIs]
application service provider. [See ASP]
Application Source role
     WS-ReliableMessaging
application-based correlation
applications
     message-oriented middleware
         adapters and channels 2nd 3rd
         interaction patterns 2nd
architecture
    WS-Addressing
         change in endpoint parameters 2nd
         endpoint references 2nd 3rd 4th
         example SOAP message 2nd 3rd
         message information headers 2nd 3rd 4th 5th 6th 7th
         reply message 2nd 3rd
         request message 2nd
         SOAP message binding 2nd
    WSDL (Web Services Description Language)
         extensibility 2nd
         messaging and RPC integration 2nd
         multiple schema language 2nd
         operation execution order 2nd
         protocol and transport bindings 2nd
         semantic omission 2nd
         service separation 2nd
architectures
     BPEL 2nd
         abstract processes 2nd
         composition model 2nd 3rd 4th 5th
         event handlers 2nd
         executable processes 2nd
         extensibility 2nd
         faults 2nd 3rd 4th 5th 6th 7th 8th
         process instance lifecycle 2nd 3rd 4th 5th
         recursive composition 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
    business-to-business (B2B)
         car parts supply chain example 2nd 3rd
     service packs ordering example 2nd 3rd
    transactions
         activation service 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th
         Context 2nd
         protocol 2nd 3rd
         services 2nd 3rd
         WS-Atomic Transaction 2nd
         WS-Business Activity 2nd
         WS-Coordination 2nd
    UDDI
         APIs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
         data model 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
         V3 new features 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
         WS-Policy 2nd 3rd 4th 5th 6th 7th 8th
         WSDL (Web Services Description Language) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
     Web service scope 2nd 3rd
     WS-ReliableMessaging 2nd
ASP 2nd
     (application service provider)
assertion model
     security 2nd 3rd
AT (Atomic Transaction) 2nd
Atomic Transaction (AT) 2nd
atomic transactions 2nd 3rd 4th
atomicity
     transactions
attachments
     SOAP messages 2nd 3rd 4th 5th 6th
attacks
     security 2nd
Attribute Information Item
     (AII)
attributes
     XML
authentication
     data-origin 2nd 3rd 4th
     UDDI (Universal Description, Discovery, and Integration) 2nd
     WS-Security
authorization
     security model 2nd 3rd
     WS-Authorization 2nd



Web Services Platform Architecture(c) SOAP, WSDL, WS-Policy, WS-Addressing, WS-BP[.  .. ] More
Web Services Platform Architecture(c) SOAP, WSDL, WS-Policy, WS-Addressing, WS-BP[. .. ] More
ISBN: N/A
EAN: N/A
Year: 2005
Pages: 176

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net