|
Index[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] aborted transactions abstract definitions abstract processes BPEL 2nd ACIDs 2nd acknowledgement intervals WS-ReliableMessaging 2nd AckRequested element WS-ReliableMessaging 2nd acquisitions outsourcing business processes 2nd 3rd Action headers activation WS-Coordination activation service Durable Two-Phase Commit protocol 2nd activation services 2nd Business Agreement protocol with Participant Completion 2nd 3rd Business Agreement with Coordinator Completion protocol completion protocol 2nd 3rd implementation requirements 2nd protocols 2nd 3rd 4th 5th registration service Volatile Two-Phase Commit protocol 2nd WS-Atomic Transaction (WS-AT) WS-Business Activity 2nd 3rd 4th activations services travel agent scenario 2nd activities business process activity scopes adapters message-oriented middleware 2nd 3rd addressing Web services interaction characteristics 2nd 3rd 4th WS-Addressing architecture 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th example SOAP message 2nd 3rd administrators distrubte computing fallacy 2nd AII (Attribute Information Item) All operator WS-PolicyFramework 2nd API UDDI (Universal Description, Discovery, and Integration) subscriptions 2nd APIs (application programming interfaces) UDDI (Universal Description, Discovery, and Integration) 2nd 3rd client to node operations 2nd 3rd 4th node to client operations 2nd node to node operations node to taxonomy server operations 2nd Application Destination role WS-ReliableMessaging application programming interfaces. [See APIs] application service provider. [See ASP] Application Source role WS-ReliableMessaging application-based correlation applications message-oriented middleware adapters and channels 2nd 3rd interaction patterns 2nd architecture WS-Addressing change in endpoint parameters 2nd endpoint references 2nd 3rd 4th example SOAP message 2nd 3rd message information headers 2nd 3rd 4th 5th 6th 7th reply message 2nd 3rd request message 2nd SOAP message binding 2nd WSDL (Web Services Description Language) extensibility 2nd messaging and RPC integration 2nd multiple schema language 2nd operation execution order 2nd protocol and transport bindings 2nd semantic omission 2nd service separation 2nd architectures BPEL 2nd abstract processes 2nd composition model 2nd 3rd 4th 5th event handlers 2nd executable processes 2nd extensibility 2nd faults 2nd 3rd 4th 5th 6th 7th 8th process instance lifecycle 2nd 3rd 4th 5th recursive composition 2nd 3rd 4th 5th 6th 7th 8th 9th 10th business-to-business (B2B) car parts supply chain example 2nd 3rd service packs ordering example 2nd 3rd transactions activation service 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th Context 2nd protocol 2nd 3rd services 2nd 3rd WS-Atomic Transaction 2nd WS-Business Activity 2nd WS-Coordination 2nd UDDI APIs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th data model 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th V3 new features 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th WS-Policy 2nd 3rd 4th 5th 6th 7th 8th WSDL (Web Services Description Language) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th Web service scope 2nd 3rd WS-ReliableMessaging 2nd ASP 2nd (application service provider) assertion model security 2nd 3rd AT (Atomic Transaction) 2nd Atomic Transaction (AT) 2nd atomic transactions 2nd 3rd 4th atomicity transactions attachments SOAP messages 2nd 3rd 4th 5th 6th attacks security 2nd Attribute Information Item (AII) attributes XML authentication data-origin 2nd 3rd 4th UDDI (Universal Description, Discovery, and Integration) 2nd WS-Security authorization security model 2nd 3rd WS-Authorization 2nd |
|