Академический Документы
Профессиональный Документы
Культура Документы
RESEARCH ARTICLE
OPEN ACCESS
ABSTRACT
In general a business level service can be imp lemented by mu ltip le objects/components, or by a non -OO approach. SOA can b e
achieved with many types of middleware. The midd leware works in terms of services. Quality of Serv ice based on Security ,
Transactions, Routing, Logging, Failover, Protocols and of course Message formats. Th is may help to keep the business and
implementation levels separate for the designers and imp lementers. To get an enterprise-wide SOA, we need to have
middleware interoperability. The interoperability takes care of the ability of software and hardware on different machines fro m
different vendors to share data. But middleware doesnt interoperate; even the service interfaces are different. A service has
an interface, and this is the key to hiding details such as the operating system, programming language, network addresses,
etc.But this interface doesnt hide/abstract the middleware itself. In this paper, I examine how the security applies to the Service
Oriented Architecture (SOA) through the interoperability .
Keywords:- Web Services, SOA, Interoperability, SOAP, WSDL, WSARCH.
I. INTRODUCTION
A service is a Software co mponent that is well-defined,
well-structured, self-contained, and does not depend on the
context or state of other services. Nowadays, service-oriented
architecture (SOA) is used as an efficient solution to integrate
the distributed applications in an enterprise model. In a SOA based environment, Security is one of the major concerns
when developing enterprise business applications .
ISSN: 2347-8578
www.ijcstjournal.org
Page 140
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 6, Nov-Dec 2015
III.
ISSN: 2347-8578
www.ijcstjournal.org
Page 141
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 6, Nov-Dec 2015
binding. WSDL allo ws unperceptive clients to automatically
understand how to interact with a web service[5]. A Web
services developer usually uses a software tool to generate the
WSDL file fro m the source code of a Web services program
i)
Discover the right partner to conduct business with
one out of the millions that exist on the Internet today.
ii)
Create an industry-accepted standardized approach to
reach partners and customers with informat ion on th eir
services.
iii)
convey the preferred method for integration between
disparate systems.
iv)
Characterize how business transactions are used in
commerce, once a preferred partner is finalized.
ISSN: 2347-8578
www.ijcstjournal.org
Page 142
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 6, Nov-Dec 2015
that incorporates quality of service [15]. The architecture
provides the monitoring of service providers and the data
obtained are used to locate the most appropriated service. A
prototype for the WSARCH allows performance evaluation
4.
REFERENCES
[1]
[2]
[3]
[4]
[5]
New
to
SOA
and
Web
http://www.ib m.co m/developerworks/
webservices/newto/service.html
[6]
[7]
[8]
V. CONCLUSIONS
In this paper, a brief description of conceptual security for
enterprise service oriented architecture is provided. Web
ISSN: 2347-8578
www.ijcstjournal.org
Serv ice,
Page 143
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 6, Nov-Dec 2015
[9]
[10]
[11]
[12]
[13]
[14]
[15]
ISSN: 2347-8578
www.ijcstjournal.org
Page 144