首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
While XML web services become recognized as a solution to business-to-business transactions, there are many problems that should be solved. For example, it is not easy to manipulate business documents of existing standards such as RosettaNet and UN/EDIFACT EDI, traditionally regarded as an important resource for managing B2B relationships. As a starting point for the complete implementation of B2B web services, this paper deals with how to support B2B business documents in XML web services. In the first phase, basic requirements for driving XML web services by business documents are introduced. As a solution, this paper presents how to express B2B business documents in WSDL, a core standard for XML web services. This kind of approach facilitates the reuse of existing business documents and enhances interoperability between implemented web services. Furthermore, it suggests how to link with other conceptual modeling frameworks such as ebXML/UMM, built on a rich heritage of electronic business experience.  相似文献   

2.
本文探讨了如何实现主流交易中间件平台如CICS与新兴的基于webservice架构的交换平台之间的互操作,实现政府的信息共享和业务协同,对如何在不改变系统原有程序模式的情况下访问和调用WEB服务,实现异构平台之间的互操作的方法进行了研究并在实际项目中进行了实践验证。  相似文献   

3.
用BizTalk Server 2000构建B2B电子商务应用   总被引:1,自引:0,他引:1  
徐人凤  聂哲 《信息技术》2004,28(5):53-55
从技术层面来说,电子商务就是应用互联网传输和交换商务数据,并根据商务数据进行自动或人工处理。数据的标准化在数据传输和交换构成中起着至关重要的作用。本文介绍了如何采用Microsoft提出的XML定义语言,利用XML Schema技术,用BizTalk Server 2000服务器来实现具体的电子商务应用。  相似文献   

4.
随着全国检察信息专网建设的快速推进,各地检察机关相继引入了多种多样的网络应用软件,如何解决这些异种软件之间、上下级检察院之间的数据交换问题,实现网络在应用层上的互连互通,保证信息共享和业务协作的真正实现,已成为全国检察机关信息化建设的一个重要问题。为此提出了一种基于XML和WebService技术的解决方法。  相似文献   

5.
There is a demand for using messaging systems to transport data between wireless applications in mobile communications. As multimedia messaging service (MMS) is a promising messaging system to meet the demand, it is under enhancement in related standardization bodies to make it effective in transporting application data. The enhancement should be compatible with the existing MMS services for its smooth and safe deployment. This paper proposes a solution to make the enhancement backward compatible, so that a new MMS service of transporting application data has no impact on the existing MMS services. The solution also provides forward compatibility, so that an MMS service of transporting application data does not hinder the introduction of any application in the future, allowing instantaneous deployment of a wireless application. The standardization bodies did not define any format for data communication between a wireless application and MMS in a terminal. A common format in this regard would help mass availability of wireless applications for different purposes independent of manufacturing a mobile terminal. Based on an analysis described in this paper, eXtensible Markup Language (XML) is the suitable format for the purpose. This paper also presents examples of XML file to indicate what data should be communicated in this regard. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

6.
苏勇  王燕 《信息技术》2011,(5):91-94,100
目前,使用XQuery语言实现的Apriori算法基本都是对单个XML文档进行挖掘,而对于现实中的XML文档,有些情况下相关联的数据是存放在多个文档中的,文档之间没有必然的联系,这时就要将多个文档同时考虑进来进行挖掘。针对如何对多个XML文档进行挖掘的问题,对基于XQuery语言的Apriori算法进行改进,引入了collection函数,使之能够对多个XML文档组成集合的节点进行访问,从而实现对多个XML文档的关联规则挖掘,最后通过实验验证其可行性及有效性,使其效果达到和对单个文档挖掘的相同效果。  相似文献   

7.
8.
Rabhi  F.A. Benatallah  B. 《IEEE network》2002,16(1):15-19
This article studies current developments and trends in the area of capital market systems. In particular, it defines the trading lifecycle and the activities associated with it. The article then investigates opportunities for the integration of legacy systems and existing communication protocols through distributed integrated services that correspond to established business processes. These integrated services link to basic services such as an exchange, a settlement, or a registry service. Examples of such integrated services include pre-trade services (e.g., analytics) or post-trade services (e.g., surveillance). The article then presents the various levels of integration in capital market systems and discusses the standards in place. It establishes that most interactions occur at a low level of abstraction such as the network (e.g., TCP/IP), data format (e.g., FIX, XML), and middleware levels (e.g., CORBA). Finally, the article discusses a software development methodology based on the use of design patterns. These design patterns address the essential aspects of managing integrated services in a technology-independent fashion. These aspects are service wrapping, service composition, service contracting, service discovery, and service execution. The objective of the methodology is to facilitate the rapid development of new integrated services that correspond to emerging business opportunities  相似文献   

9.
At the beginning of the 21st century, the emergence of knowledge management is viewed as a natural evolution. Knowledge management is defined as the formal management of knowledge for facilitating creation, access, and reuse of knowledge, typically by using advanced technology. To be easily communicated and shared, tacit knowledge has to be explicated as explicit knowledge (e.g., in product specification or a scientific formula or production rules); and this explicit knowledge has to be shared as applicable data through the use of information technology. Product design is such a business process that a great part of the design knowledge is often a tacit type, being difficult to share, or available only in forms of natural language documents. However, the expertise recorded in these documents is an essential resource of successful competition in the market. This paper presents a knowledge explication and sharing approach; specifically focusing on the knowledge management of modular product design. The solution approach involves modeling modular products, formulating the explicit knowledge, discovering new design knowledge with data mining, and sharing the knowledge with web services technology. The proposed approach is to be applied to an actual case of motherboard design/assembly in one of the largest PC manufacturing enterprises.  相似文献   

10.
Recent legislation in the USA and across Europe, such as the Electronic Communications Act 2000 in the UK, and the ESIGN federal bill in the USA, has provided the missing legal aspect to electronic security that is driving the acceptance and utilisation of electronic documentation in high-value commercial and legal domains. Now legal and financial documents, such as contracts or financial records, no longer require handwritten signatures for non-repudiation, and can gain the advantages of electronic indexing, transmission and storage. The resulting growth in both the volume and value of critical electronic documents has caused a surge in digital archiving services, which offer secure storage to protect against media failure, theft and natural disasters, while providing and maintaining the security and integrity that can be built into the data. This paper describes how digital archiving uses PKI-based technologies, including timestamping, and XML structuring to provide controlled access, integrity and legally binding data. Finally, the paper summarises the work in which BT has been involved, from the ETERMS project with the International Chamber of Commerce, to building prototypes offering timestamping and document archiving, enhancing existing uses of digital certificates.  相似文献   

11.
面向服务的体系结构以及Web服务的出现,使集成遗留系统成为可能,文章将介绍如何综合利用Web服务和消息服务实现图纸二进制文件的实时跨平台分发.  相似文献   

12.
仵小暾  张武君  李晖 《电子科技》2006,(9):54-56,68
单点登录技术是一项非常重要的Web安全技术.由于Web服务技术的广泛使用,如何实现适用Web服务特点的单点登录也是一个热点问题,SAML是一项基于XML的交换安全性信息的框架,结合SAML的单点登录可以很好地解决这个问题.阐述了单点登录的基本模式以及SAML的工作原理,讨论了一个基于SAML的企业级Web服务系统模型.  相似文献   

13.
TD-LTE发展中的关键问题   总被引:2,自引:2,他引:2  
董伟杰  王超 《通信技术》2010,43(5):168-169,175
中国移动已经开始大规模商用TD-SCDMA网络,但是与最高速率可以达到54Mb/s和75Mb/s的WLAN和WiMax网络相比,TD-SCDMA的标准384Kb/s和最高只有2Mb/s的速率在数据需求高速增长的今天,显然并不具有吸引力。目前中国移动正在致力于把TD-SCDMA网络向LTE网络演进,而在演进过程中将会面临诸多问题和挑战。根据当前运营的Wifi、GSM以及TD-SCDMA等网络的特点,以及TD-LTE网络可能会面临的挑战,就演进过程中需要解决的网络融合、如何降低运营成本、终端需求、网络以及服务管理等多种关键问题进行了深入探讨,并给出了采用全IP网络、用基于SOAP协议加XML语言的方案来对网络和服务进行管理、多网共享基础资源结构等多个可能的解决方案,对于未来实际工作中解决类似问题提供了有价值的参考。  相似文献   

14.
乔庆学  侯韶华 《通信技术》2013,(7):53-55,59
在信息开放的网络环境中基于XML的光交叉连接节点Web Service的构思是一种有利于网络资源利用最大化和用户选择多样化的解决方案,完整的光交叉连接(OXC)Web Service方案能为光网络虚拟化和网格应用提供底层物理资源的发现。基于XML的描述是发布Web服务的初始步骤,通过描述可使信息和服务以更好的形式呈现在互联网上。这里通过分析光交叉连接的主要过程,对光交叉连接节点的几种功能性单板抽象虚拟化,并对抽象的数据元素和OXC光网络QoS进行基于XML的描述。  相似文献   

15.
Businesses have traditionally relied on perimeter firewalls to enforce their security policy. However, perimeter controls do not provide a comprehensive solution to secure a private network connected to the Internet. This paper describes how the dynamic business environment and techniques, such as protocol tunnelling, have leveraged the use of IP networks. The use of these protocols and techniques means that perimeter firewalls alone no longer provide sufficient security. IPsec network security is reviewed and it is shown how its security services can be used to provide greater protection for the network by securing connections end to end. The paper also describes tools for firewall and VPN policy management that address the problem of managing the overall security policy with network implementations comprising multiple vendors' products. Finally, the paper proposes a vision of how future secure virtual networks will be established over existing infrastructures.  相似文献   

16.
移动互联网研究综述   总被引:13,自引:2,他引:11  
20世纪90年代开始,学术界和产业界陆续开展有关移动互联网的研究与讨论,随着移动互联网的迅猛发展,对移动互联网的研究成为热点.本文从宏观环境、客户及业务、产业链及商业模式等方面综述了移动互联网业务与运营领域的研究现状,从终端基础设施、网络基础设施以及应用基础设施等方面讨论了移动互联网涉及的关键技术.  相似文献   

17.
XML and Security   总被引:5,自引:0,他引:5  
The XML Signature Working Group — a joint technical committee of the Internet Engineering Task Force (IETF) and the World Wide Web Consortium (W3C) — aims at enabling digital signing of documents using XML syntax. This capability is critical for a variety of electronic commerce applications, including payment tools. Signatures can provide integrity, message authentication and/or authentication services for data of any type, whether located within the XML that includes the signature or located elsewhere. XML signatures are generated by a hash function from the collection of references to the objects being signed; its syntax associates the content of resources with a key via a strong one-way transformation. This paper will provide further information on this and the proposed XML encryption standard.  相似文献   

18.
随着各种已有Web服务数量的日趋增加,如何快速发现可用的Web服务变得愈加重要。而随着语义Web服务的不断发展.Web服务发现也从原来的单纯采用关键字或简单分类逐渐转变为更多地使用语义信息。发现的关键在于匹配,而目前一些较成熟的技术,如OWL—S,采用了本体技术对Web服务进行描述.因此,文章提出了一个基于图相似性的本体匹配算法.通过构建Web服务本体并转化成标记图进行匹配.实现语义Web服务描述的匹配,从而准确快速地发现满足特定需求的Web服务。  相似文献   

19.
In recent years, numerous studies have identified and explored issues related to web‐service‐oriented business process specifications, such as business process execution language (BPEL). In particular, business rules are an important cross‐cutting concern that should be distinguished from business process instances. In this paper, we present a rule‐based aspect oriented programming (AOP) framework where business rule aspects contained in business processes can be effectively separated and executed. This is achieved by using a mechanism of the business rule itself at the business rule engine instead of using existing programming language‐based AOP technologies. Through some illustrative examples, this work also introduces a method by which business rule aspects, separated through an external rule engine, can be represented and evaluated. We also demonstrate how they can be dynamically woven and executed by providing an implementation example which uses two open‐source‐based products, the Mandarax rules engine and Bexee BPEL engine.  相似文献   

20.
Key Derivation is an important part of numerous security standards, the importance of using it was discussed throughout the literature and industry standards. On the other hand, web service security is an area that has not seen substantial research and application for Key Derivation techniques. After studying the Key Derivation techniques which are applied in Web Service Security, we find the applied algorithms and current implementations to be very limited in regard to performance and their work-flow. These limitations introduce performance bottlenecks that can limit their applicability to low power machines and mobile systems or lead to designers compromising on security to meet the quality of service desired. Moreover, this issue becomes more relevant when applied to a high performance and demanding systems such as real-time business process monitoring and messaging systems. This paper explores how Key Derivation is implemented in web services and WS-Security engines, their limitations, the performance overhead it produces and proposes an enhanced Key Derivation work-flow that takes into consideration both security and performance and allows for fine tuning them. The performance of the proposal is tested using a series of benchmarks and the security properties are verified using a well-known validation tool.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号