Lecture Notes in Computer Science- P94

Lecture Notes in Computer Science- P94:This year, we received about 170 submissions to ICWL 2008. There were a total of 52 full papers, representing an acceptance rate of about 30%, plus one invited paper accepted for inclusion in this LNCS proceedings. The authors of these accepted papers | 454 W. Tan et al. The emphasis of the module implementation is the UDDI Specification 18 . The service discovery module queries the UDDI access points also called UDDI SRC provided by such as Microsoft IBM etc. to get the documents based on ontology through which DEA requests the relevant services. The module enquiries the UDDI SRC through the communication by SOAP and receives also the SOAP message XML-Based. The principle of UDDI is shown in Fig. 6. Fig. 7 shows the effective classes of the Learning Activation by Rational Rose from the design of timing plan diagram. Meanwhile the relationship of those classes is shown clearly in the figure. The EISP will access this Web service ontology document by the analysis of the URL and then sent a require message based on the SOAP format to the server to get the resource. Communications Module Based on SOAP and ONTOLOGY This module automatically analyses the ontology document that comes from the service discovery module gets the service provider information and then automatically generates client agent. Users communicate with the service provider using the client agent. The advantages of the model are expansibility and flexibility 18 19 . Those various services located in different servers can be integrated in a unified client agent. Especially for those which need to use several different systems in the services work together to complete the task the module can be very conformable to resolve the problem. Meanwhile an information encryption and decryption module is embedded into the communications module to enhance communications security. In the Fig. 8 the server initiates the encryption expansion to encrypt the SOAP message sent by. And the circumstances of activating client decryption expansion SOAP messages received are effective. x l veriiotf encodinf utf 8 a soap Envelope xalns soap http7 sch s xulsoap orj soap envelope x lns xsi http. rr .w3. org 2001 XMLSche a-instance Effective x lns xsd http7 m 3 orç ZOOl

Không thể tạo bản xem trước, hãy bấm tải xuống
TÀI LIỆU MỚI ĐĂNG
106    118    3    29-06-2024
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.