SlideShare a Scribd company logo
1 of 15
Download to read offline
UDDI Programmatic Interface
             Web Service Security
    Future Trends in Web Services




Advanced Issues & Future Trends in WS

                  Ioannis G. Baltopoulos

                Department of Computer Science
                   Imperial College London


   Inverted CERN School of Computing, 2005
              Geneva, Switzerland




           Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                      Web Service Security
             Future Trends in Web Services




    UDDI Programmatic Interface
1
     UDDI4J Introduction
     Locating Information

    Web Service Security
2
     Security Basics
     WS-Security Roadmap

    Future Trends in Web Services
3
      Current Work
      Web Services over the Grid
      Research Topics



                    Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                                             UDDI4J Introduction
                      Web Service Security
                                             Locating Information
             Future Trends in Web Services


UDDI4J Overview



     The programmatic interface to a registry is through a set of
     SOAP messages defined in the UDDI specification.
     The IBM UDDI4J is an open source Java implementation of
     the UDDI protocol; high level API layered on top of SOAP
     that enables programmatic access to registries.
     It can be used to
         search for information on a registry,
         publish new information to a registry and
         delete information from a registry.




                    Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                                                UDDI4J Introduction
                         Web Service Security
                                                Locating Information
                Future Trends in Web Services


UDDI4J Basics
Package Breakdown



   Structured into a number of packages under org.uddi4j:
   Packages and contents
    Name                 Contents
                         contains the client class UDDIProxy
    org.uddi4j.client
                         represents UDDI data objects
    org.uddi4j.datatype
                         contains messages sent to the server
    org.uddi4j.request
                         response messages from a UDDI
    org.uddi4j.response
                         server
    org.uddi4j.transport support for pluggable transports
                         utility classes for various tasks
    org.uddi4j.util



                       Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                                              UDDI4J Introduction
                       Web Service Security
                                              Locating Information
              Future Trends in Web Services


Accessing the Registry
  The most important class in the UDDI4J package is the
  org.uddi4j.client.UDDIProxy. Contains methods to:
      connect to a registry,
      query the registry,
      and process the result.
  Creating a Registy Proxy
  private UDDIProxy proxy;
  private void setupProxy(){
       proxy = new UDDIProxy();
       try {
            proxy.setInquiryURL(inquiryURL);
       } catch (MalformedURLException e) {
          // Couldn’t create the proxy..
       }
  }
                     Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                                               UDDI4J Introduction
                        Web Service Security
                                               Locating Information
               Future Trends in Web Services


Locating a technical model
The find tModel() method

   The UDDIProxy class defines a find tModel() method for
   locating technical models by
       name
       categories
       identifiers
       any combination of the above

   Using the find tModel() method
   public TModelList find tModel(
        String name, CategoryBag c, IdentifierBag I,
        FindQualifiers f, int maxRows)
   // Example invocation on a UDDIProxy
   proxy.find tModel(name, null, null, null, 5);

                      Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                                               UDDI4J Introduction
                        Web Service Security
                                               Locating Information
               Future Trends in Web Services


Locating a BusinessService
The find service() method

   The UDDIProxy class defines a find service() method for
   locating technical models by
       Unique ID (UUID)
       name of the service
       category information of the service
       tModel information of the service
       any combination of the above

   Using the find service() method
   public ServiceList find service(
        String businessKey, Vector names, CategoryBag c,
        TModelBag t, FindQualifiers f , int maxRows)


                      Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                                               UDDI4J Introduction
                        Web Service Security
                                               Locating Information
               Future Trends in Web Services


Locating a BusinessEntity
The find business() method

   The UDDIProxy class defines a find business() method for
   locating technical models by
        name of the business
        discoveryURL
        identifier of the business
        category of the business
        tModel information of the service
        any combination of the above
   Using the find business() method
   public BusinessList find business(
        Vector names, DiscoveryURLs d, IdentifierBag i,
        CategoryBag c, TModelBag t, FindQualifiers f,
        int maxRows)
                      Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                                             Security Basics
                      Web Service Security
                                             WS-Security Roadmap
             Future Trends in Web Services


Security Requirements

     Confidentiality
     Ensures that only authorised parties access the information.
     Authentication
     Ensures the originator of a message can provide appropriate
     proof of identity.
     Integrity
     Ensures that a message isn’t modified accidentally or
     intentionally in transit.
     Nonrepudiation
     Guarantees that neither sender or receiver of a message can
     deny its transmission.
     Authorization
     Ensures that entities with given identity are given access to
     resources.
                    Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                                                 Security Basics
                          Web Service Security
                                                 WS-Security Roadmap
                 Future Trends in Web Services


WS-Security
The Web Services Security Roadmap




        The Web services security roadmap laid out by IBM and
        Microsoft is composed of a whole suite of specifications
        covering various facets of security (messaging, policies, trust,
        privacy, etc.).
        The specifications build upon one another and are all built on
        top of a single specification, WS-Security, that defines a
        message security model.
        Currently the model for securing Web services consists of 7
        specifications.




                        Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                                          Security Basics
                   Web Service Security
                                          WS-Security Roadmap
          Future Trends in Web Services


WS-Security Roadmap




                 Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                                                   Current Work
                           Web Service Security
                                                   Research Topics
                  Future Trends in Web Services


WS-ReliableMessaging
Motivating the Solution


   Some problems
   The current implementation of Web Services lacks guarantees of
         Message Ordering
         Once and only once delivery
         Network/Machine availability

   The solution!
   A standard (therefore interoperable way) that would take care of
   all the above problems at the middleware layer.
   IBM, Microsoft, TIBCO and BEA are working together to develop
   a SOAP extension model to help solve these types of problems,
   and the result is WS-ReliableMessaging.

                          Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                                                Current Work
                         Web Service Security
                                                Research Topics
                Future Trends in Web Services


WS-RM Processing Model
       A client application sends a new message to the SOAP client.
   1

       The SOAP client, using WS-RM code, associates a unique
   2

       identifier for this message and saves it in a persistent store.
       The WS-RM client tries to send the message to the target
   3

       server. If it fails it retries until it times-out.
       Upon receiving the message, the WS-RM server code
   4

       acknowledges receipt by sending an acknowledgment header.
       After receiving the acknowledgment, the WS-RM client
   5

       removes the message and the state information from the
       persistent store.
       The SOAP server locates and invokes the desired Web Service.
   6

       Once the service is invoked, the message can be sagely
   7

       removed from the WS-RM sever-side runtime persistent store.
       After the Expiration time has passed, the WS-RM server
   8

       runtime can remove the state information about the particular
       message sequence. Baltopoulos
                       Ioannis G.          Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                                                   Current Work
                            Web Service Security
                                                   Research Topics
                   Future Trends in Web Services


WS-Coordination
Introducing transactions to Web Services



   Definition
   A transaction is the scope under which a unit of work is defined.
   The size or breadth of the amount of work will vary between
   applications.

         Intuitively, the above definitions means considering several
         successive calls as a single atomic one.
         This is particularly useful for Banking applications or Business
         systems where several subsystems need to be updated and
         either all or none of the updates succeed.



                          Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS
UDDI Programmatic Interface
                                               Current Work
                        Web Service Security
                                               Research Topics
               Future Trends in Web Services


Concluding Remarks


  In this lecture we saw
      A programmatic interface to the UDDI Registry using IBM’s
      open source UDDI4J
      The Web Services Security Roadmap (WS-Security)
      Current work in transactions and reliable messaging
      Finally, future uses on the Grid

                                     Thank you!




                      Ioannis G. Baltopoulos   Advanced Issues & Future Trends in WS

More Related Content

Similar to UDDI4J Introduction Web Service Security Future Trends

web-services-on-mobile-platform
web-services-on-mobile-platformweb-services-on-mobile-platform
web-services-on-mobile-platformSanjaySanjay970196
 
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)ijwscjournal
 
WebServices Fundamentals
WebServices FundamentalsWebServices Fundamentals
WebServices Fundamentalsmdfkhan625
 
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...pijans
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)ijcga
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)ijcga
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)ijcga
 
11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...ijcsity
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderijaprr_editor
 
Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...IJNSA Journal
 
Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...Anastasija Nikiforova
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...ijdms
 
Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...IJNSA Journal
 
15th International Conference on Network Security & Applications (CNSA 2022)
15th International Conference on Network Security & Applications (CNSA 2022)15th International Conference on Network Security & Applications (CNSA 2022)
15th International Conference on Network Security & Applications (CNSA 2022)ijcisjournal
 
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) USKim Holm
 
FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)
FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)
FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)IJDKP
 

Similar to UDDI4J Introduction Web Service Security Future Trends (20)

web-services-on-mobile-platform
web-services-on-mobile-platformweb-services-on-mobile-platform
web-services-on-mobile-platform
 
1. web services
1. web services1. web services
1. web services
 
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
 
WebServices Fundamentals
WebServices FundamentalsWebServices Fundamentals
WebServices Fundamentals
 
Web Services ppt
Web Services pptWeb Services ppt
Web Services ppt
 
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
 
11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...
 
Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...
 
Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...
 
15th International Conference on Network Security & Applications (CNSA 2022)
15th International Conference on Network Security & Applications (CNSA 2022)15th International Conference on Network Security & Applications (CNSA 2022)
15th International Conference on Network Security & Applications (CNSA 2022)
 
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
 
FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)
FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)
FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)
 

More from Ioannis Baltopoulos

Consuming, providing and publishing Web Services
Consuming, providing and publishing Web ServicesConsuming, providing and publishing Web Services
Consuming, providing and publishing Web ServicesIoannis Baltopoulos
 
The 7 Sins of Software Engineers in HEP
The 7 Sins of Software Engineers in HEPThe 7 Sins of Software Engineers in HEP
The 7 Sins of Software Engineers in HEPIoannis Baltopoulos
 
Secure Compilation of a Multi-Tier Web Language (TLDI)
Secure Compilation of a Multi-Tier Web Language (TLDI)Secure Compilation of a Multi-Tier Web Language (TLDI)
Secure Compilation of a Multi-Tier Web Language (TLDI)Ioannis Baltopoulos
 
Secure Compilation of a Multi-Tier Web Language (Semantics Lunch)
Secure Compilation of a Multi-Tier Web Language (Semantics Lunch)Secure Compilation of a Multi-Tier Web Language (Semantics Lunch)
Secure Compilation of a Multi-Tier Web Language (Semantics Lunch)Ioannis Baltopoulos
 

More from Ioannis Baltopoulos (6)

Consuming, providing and publishing Web Services
Consuming, providing and publishing Web ServicesConsuming, providing and publishing Web Services
Consuming, providing and publishing Web Services
 
Introduction to Web Services
Introduction to Web ServicesIntroduction to Web Services
Introduction to Web Services
 
The 7 Sins of Software Engineers in HEP
The 7 Sins of Software Engineers in HEPThe 7 Sins of Software Engineers in HEP
The 7 Sins of Software Engineers in HEP
 
Secure Compilation of a Multi-Tier Web Language (TLDI)
Secure Compilation of a Multi-Tier Web Language (TLDI)Secure Compilation of a Multi-Tier Web Language (TLDI)
Secure Compilation of a Multi-Tier Web Language (TLDI)
 
Secure Compilation of a Multi-Tier Web Language (Semantics Lunch)
Secure Compilation of a Multi-Tier Web Language (Semantics Lunch)Secure Compilation of a Multi-Tier Web Language (Semantics Lunch)
Secure Compilation of a Multi-Tier Web Language (Semantics Lunch)
 
Audio Walks
Audio WalksAudio Walks
Audio Walks
 

Recently uploaded

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Recently uploaded (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

UDDI4J Introduction Web Service Security Future Trends

  • 1. UDDI Programmatic Interface Web Service Security Future Trends in Web Services Advanced Issues & Future Trends in WS Ioannis G. Baltopoulos Department of Computer Science Imperial College London Inverted CERN School of Computing, 2005 Geneva, Switzerland Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS
  • 2. UDDI Programmatic Interface Web Service Security Future Trends in Web Services UDDI Programmatic Interface 1 UDDI4J Introduction Locating Information Web Service Security 2 Security Basics WS-Security Roadmap Future Trends in Web Services 3 Current Work Web Services over the Grid Research Topics Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS
  • 3. UDDI Programmatic Interface UDDI4J Introduction Web Service Security Locating Information Future Trends in Web Services UDDI4J Overview The programmatic interface to a registry is through a set of SOAP messages defined in the UDDI specification. The IBM UDDI4J is an open source Java implementation of the UDDI protocol; high level API layered on top of SOAP that enables programmatic access to registries. It can be used to search for information on a registry, publish new information to a registry and delete information from a registry. Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS
  • 4. UDDI Programmatic Interface UDDI4J Introduction Web Service Security Locating Information Future Trends in Web Services UDDI4J Basics Package Breakdown Structured into a number of packages under org.uddi4j: Packages and contents Name Contents contains the client class UDDIProxy org.uddi4j.client represents UDDI data objects org.uddi4j.datatype contains messages sent to the server org.uddi4j.request response messages from a UDDI org.uddi4j.response server org.uddi4j.transport support for pluggable transports utility classes for various tasks org.uddi4j.util Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS
  • 5. UDDI Programmatic Interface UDDI4J Introduction Web Service Security Locating Information Future Trends in Web Services Accessing the Registry The most important class in the UDDI4J package is the org.uddi4j.client.UDDIProxy. Contains methods to: connect to a registry, query the registry, and process the result. Creating a Registy Proxy private UDDIProxy proxy; private void setupProxy(){ proxy = new UDDIProxy(); try { proxy.setInquiryURL(inquiryURL); } catch (MalformedURLException e) { // Couldn’t create the proxy.. } } Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS
  • 6. UDDI Programmatic Interface UDDI4J Introduction Web Service Security Locating Information Future Trends in Web Services Locating a technical model The find tModel() method The UDDIProxy class defines a find tModel() method for locating technical models by name categories identifiers any combination of the above Using the find tModel() method public TModelList find tModel( String name, CategoryBag c, IdentifierBag I, FindQualifiers f, int maxRows) // Example invocation on a UDDIProxy proxy.find tModel(name, null, null, null, 5); Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS
  • 7. UDDI Programmatic Interface UDDI4J Introduction Web Service Security Locating Information Future Trends in Web Services Locating a BusinessService The find service() method The UDDIProxy class defines a find service() method for locating technical models by Unique ID (UUID) name of the service category information of the service tModel information of the service any combination of the above Using the find service() method public ServiceList find service( String businessKey, Vector names, CategoryBag c, TModelBag t, FindQualifiers f , int maxRows) Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS
  • 8. UDDI Programmatic Interface UDDI4J Introduction Web Service Security Locating Information Future Trends in Web Services Locating a BusinessEntity The find business() method The UDDIProxy class defines a find business() method for locating technical models by name of the business discoveryURL identifier of the business category of the business tModel information of the service any combination of the above Using the find business() method public BusinessList find business( Vector names, DiscoveryURLs d, IdentifierBag i, CategoryBag c, TModelBag t, FindQualifiers f, int maxRows) Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS
  • 9. UDDI Programmatic Interface Security Basics Web Service Security WS-Security Roadmap Future Trends in Web Services Security Requirements Confidentiality Ensures that only authorised parties access the information. Authentication Ensures the originator of a message can provide appropriate proof of identity. Integrity Ensures that a message isn’t modified accidentally or intentionally in transit. Nonrepudiation Guarantees that neither sender or receiver of a message can deny its transmission. Authorization Ensures that entities with given identity are given access to resources. Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS
  • 10. UDDI Programmatic Interface Security Basics Web Service Security WS-Security Roadmap Future Trends in Web Services WS-Security The Web Services Security Roadmap The Web services security roadmap laid out by IBM and Microsoft is composed of a whole suite of specifications covering various facets of security (messaging, policies, trust, privacy, etc.). The specifications build upon one another and are all built on top of a single specification, WS-Security, that defines a message security model. Currently the model for securing Web services consists of 7 specifications. Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS
  • 11. UDDI Programmatic Interface Security Basics Web Service Security WS-Security Roadmap Future Trends in Web Services WS-Security Roadmap Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS
  • 12. UDDI Programmatic Interface Current Work Web Service Security Research Topics Future Trends in Web Services WS-ReliableMessaging Motivating the Solution Some problems The current implementation of Web Services lacks guarantees of Message Ordering Once and only once delivery Network/Machine availability The solution! A standard (therefore interoperable way) that would take care of all the above problems at the middleware layer. IBM, Microsoft, TIBCO and BEA are working together to develop a SOAP extension model to help solve these types of problems, and the result is WS-ReliableMessaging. Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS
  • 13. UDDI Programmatic Interface Current Work Web Service Security Research Topics Future Trends in Web Services WS-RM Processing Model A client application sends a new message to the SOAP client. 1 The SOAP client, using WS-RM code, associates a unique 2 identifier for this message and saves it in a persistent store. The WS-RM client tries to send the message to the target 3 server. If it fails it retries until it times-out. Upon receiving the message, the WS-RM server code 4 acknowledges receipt by sending an acknowledgment header. After receiving the acknowledgment, the WS-RM client 5 removes the message and the state information from the persistent store. The SOAP server locates and invokes the desired Web Service. 6 Once the service is invoked, the message can be sagely 7 removed from the WS-RM sever-side runtime persistent store. After the Expiration time has passed, the WS-RM server 8 runtime can remove the state information about the particular message sequence. Baltopoulos Ioannis G. Advanced Issues & Future Trends in WS
  • 14. UDDI Programmatic Interface Current Work Web Service Security Research Topics Future Trends in Web Services WS-Coordination Introducing transactions to Web Services Definition A transaction is the scope under which a unit of work is defined. The size or breadth of the amount of work will vary between applications. Intuitively, the above definitions means considering several successive calls as a single atomic one. This is particularly useful for Banking applications or Business systems where several subsystems need to be updated and either all or none of the updates succeed. Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS
  • 15. UDDI Programmatic Interface Current Work Web Service Security Research Topics Future Trends in Web Services Concluding Remarks In this lecture we saw A programmatic interface to the UDDI Registry using IBM’s open source UDDI4J The Web Services Security Roadmap (WS-Security) Current work in transactions and reliable messaging Finally, future uses on the Grid Thank you! Ioannis G. Baltopoulos Advanced Issues & Future Trends in WS