Preview

Web Service Offerings Language

Powerful Essays
Open Document
Open Document
3679 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Web Service Offerings Language
WSOL – A Language for the Formal Specification of Various
Constraints and Classes of Service for Web Services
Vladimir Tosic, Bernard Pagurek, Kruti Patel
Research Report OCIECE-02-06
November 2002

WSOL – A Language for the Formal Specification of
Various Constraints and Classes of Service for Web
Services
Vladimir Tosic, Bernard Pagurek, Kruti Patel
Department of Systems and Computer Engineering, Carleton University
1125 Colonel By Drive
Ottawa, ON, K1V 6L8, CANADA
+1 (613) 520-2600, x3548

{vladimir, bernie, kpatel}@sce.carleton.ca
ABSTRACT
We are developing a language, Web Service Offerings Language
(WSOL), for the formal specification of various constraints, management statements, and classes of service for Web Services.
WSOL is an XML (Extensible Markup Language) notation compatible with WSDL (Web Services Description Language).
A service offering in WSOL is a formal description of one class of service of a Web Service. It contains formal representation of various constraints: functional (pre-, post-, and futureconditions), Quality of Service (QoS, a.k.a. non-functional, extrafunctional), and access rights. It also contains management statements, such as statements about prices, monetary penalties, and management responsibilities. One Web Service can be associated with multiple service offerings. For easier specification of similar service offerings, WSOL enables specification of constraint groups (CGs) and constraint group templates (CGTs). We have also developed a format for representation of dynamic relationships between service offerings. WSOL service offerings are simple contracts and SLAs (Service
Level Agreements) between Web Services. Describing a Web
Service in WSOL, in addition to WSDL, enables monitoring, metering, and management of Web Services. The Web Service, its consumer, or one or more designated third parties (usually
SOAP message intermediaries) can meter QoS metrics and evaluate constraints in WSOL

You May Also Find These Documents Helpful

  • Good Essays

    Problems Week 5 manj 340

    • 421 Words
    • 2 Pages

    Establish the preliminary performance targets / level of service that will be required from the selected vendors;…

    • 421 Words
    • 2 Pages
    Good Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Any restriction that defines a project’s limitation in project management is a constraint. Three project constraints- scope, cost and schedule are also known as the triple constraints or the project management triangle. Each of these constraints relates to each other and cannot be altered without affecting at least one of the others.…

    • 251 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    8. Access control: Focuses on business requirement for access control, user access management, user responsibilities, network access control, operating system access control, application and information access control, and mobile computing and teleworking…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Module 2

    • 5116 Words
    • 21 Pages

    Web services are client and server applications that communicate over the World Wide Web’s (WWW) by using Hyper Text Transfer Protocol (HTTP). Web services provide a standard means of interoperating between software applications running on a variety of platforms and frameworks. It has two participants:…

    • 5116 Words
    • 21 Pages
    Satisfactory Essays
  • Better Essays

    The constraints which ultimately compromise the project’s performance are the quality the driver constraints. These are constraints that do not fail without dragging the project down to failure along with it. This is also the least flexible of all the constraints. The other constraint is the middle constraint which are constraints that are not as rigid as the driver constraints neither they are very flexible. The last one is the weak constraint which is the most flexible constraints. These constraints are very important but still possess the greatest flexibility.…

    • 1283 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Est1 Task 1

    • 623 Words
    • 3 Pages

    The security rule has meaningful standards that are grouped into five categories; administrative safeguard, physical safeguard, technical standards, organizational standards, and policies, procedures, and documentation requirements. Administrative safeguards have several standards that help implement the security rule. The security operation purpose require organizations to evaluate their risks to security and implement policies and procedures that prohibit, detect, and acceptable security violations and to define appropriate approval for security violations. Another, workforce security has three implementation qualifications that are mandatory by the organizations. The organization has to contain policies and procedures to ensure that each members of the particular…

    • 623 Words
    • 3 Pages
    Good Essays
  • Good Essays

    McBride Financial Services in its effort to control data access must emphasize on the need for all networking administrators to carefully restrict employee’s data access privilege, based on the role each employee is assigned within the organization. It is essential for the company to outline in its Business Requirement Document (BRD) the need for each employee to be assigned specific separating duties, and that a Networking Requirements Document (NRD) is used to capture and define the names, department, privileges and roles to be assigned to each employee (user).…

    • 1172 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    There are 9 constraints- one for each plant supply and one for each waste disposal site’s demand.…

    • 2044 Words
    • 9 Pages
    Satisfactory Essays
  • Good Essays

    This objective function is subject to some constraints. These constraints can be classified in to three categories.…

    • 1401 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    1. 8.1.3 (Hiring Requirements and Conditions) which ensures that future employees accept the terms and conditions on Information security and comply with code of conduct for employees.…

    • 511 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    What are the four types of resource constraints? Please list them and provide an example of each. Page 255…

    • 656 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Sql Cheat Sheet

    • 594 Words
    • 3 Pages

    * CHECK Constraint: The CHECK constraint ensures that all values in a column satisfy certain conditions.…

    • 594 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    bibbbu

    • 378 Words
    • 2 Pages

    The Theory of Constraints (TOC) is a set of principles that focuses on increasing total process throughput by maximizing the utilization of all bottleneck work activities and workstations.…

    • 378 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Abstract—Software testers are confronted with great challenges in testing Web Services (WS) especially when integrating to services owned by other vendors. They must deal with the diversity of implementation techniques used by the other services and to meet a wide range of test requirements. However, they are in lack of software artifacts, the means of control over test executions and observation on the internal behavior of the other services. An automated testing technique must be developed to be capable of testing on-the-fly nonintrusively and nondisruptively. Addressing these problems, this paper proposes a framework of collaborative testing in which test tasks are completed through the collaboration of various test services that are registered, discovered, and invoked at runtime using the ontology of software testing STOWS. The composition of test services is realized by using test brokers, which are also test services but specialized in the coordination of other test services. The ontology can be extended and updated through an ontology management service so that it can support a wide open range of test activities, methods, techniques, and types of software artifacts. The paper presents a prototype implementation of the framework in semantic WS and demonstrates the feasibility of the framework by running examples of building a testing tool as a test service, developing a service for test executions of a WS, and composing existing test services for more complicated testing tasks. Experimental evaluation of the framework has also demonstrated its scalability. Index Terms—Software engineering, software testing, distributed/internet based software engineering tools and techniques, testing tools, ontology, web services, semantic web services, service composition.…

    • 13378 Words
    • 54 Pages
    Good Essays

Related Topics