Browse > Article

Improved Web Service Publishing Method  

Choi, Yue-Soon (백석대학 컴퓨터학부)
Shin, Hyun-Cheol (백석대학 컴퓨터학부)
Park, Jong-Goo (원광대학교 전기전자정보공학부)
Abstract
In present web service structure, the service begins when supplier register the information of its service to UDDI(Universal Description Discovery and Integration). When user searches service directory in UDDI, the position of service is transmitted to it. And then, user requests WSDL(Web Service Description Language) to the supplier. When WSDL is delivered to user, user requests the service according to WSDL. This thesis simplifies this web service process. This makes WSDL owned by supplier stored to WSDLBASE when supplier register its service. Also this makes it possible that user search the service and receives WSDL.
Keywords
UDDI; WSDL;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Champion, Ch. Ferris, E. Newcomer and D. Orchard, Web Services Architecture, http://www.w3.org/TR/ws-arch/
2 Y.-S. Tan, B. Topol, V. Vellanki and J. Xing, Implementing service Grids with the service domain toolkit, IBM Corporation, 2002
3 A. Kropp, Ch, Leue and R. Thompson (editors), Web Service for Remote Portlets, Working draft 0.85 (OASIS, 26 November 2002), http:// www.oasisopen.org/conunittees/wsrp
4 F. Leymann, D. Roller and M.-T. Schmidt, Web services and business process management, IBM Systems Journal 41(2)(2002)
5 B. Daum and U. Merten, System architecture with XML, Morgan Kaufmann Publishers, San Francisco, CA, 2003
6 Jiang-jie Zhang, Tian Chao, Henry Chang, Jen-Yao Chung, XML-Based Advanced UDDI Search mechanism for B2B Integration, Electronic Commerce Research, 3, 2003. Kluwer Academic Publishers
7 St.Laurent, Johnston, Programming Web Services with XML-RPC, O'REILLY, 2001
8 F. Leymann, and D. Roller, Business processes in a Web services world, IBM Corporation 2002
9 Ch. Kaler (ed), Web Services Security, http://www-106.ibm.com/developerworks/ web-services/ library/ ws-secure
10 IBM and Microsoft, Security in a Web Services World: A Proposed Architecture and Roadmap, IBM Corporation and Microsoft Corporation (2002), msdn.microsoft.co m/ws-security
11 S. Burbeck, The Tao of e-business services, IBM Corporation, 2000, http://www-4.ibm .com/software/developer/library/ws-tao/ in dex.html
12 D. Konig, M. Kloppmann, F Leymann, G. Pfau and D. Roller, Web service invocation framework: A step towards virtualizing components, Proc. XMIDX'2003 (Berlin, Germany, February 17-18, 2003)