Preface |
|
xix | |
Background |
|
xix | |
Organization of This Book |
|
xx | |
Data, Information, and Knowledge |
|
xxii | |
Final Thoughts |
|
xxii | |
Acknowledgments |
|
xxv | |
|
|
1 | (14) |
|
|
1 | (1) |
|
1.2 Services and Security Technologies |
|
|
2 | (4) |
|
1.2.1 Services Technologies |
|
|
2 | (1) |
|
1.2.2 Specialized Web Services |
|
|
3 | (1) |
|
|
4 | (1) |
|
1.2.4 Security Technologies |
|
|
4 | (2) |
|
|
6 | (2) |
|
|
8 | (1) |
|
1.5 Secure Semantic Services |
|
|
8 | (1) |
|
1.6 Specialized Secure Services |
|
|
9 | (1) |
|
1.7 Organization of This Book |
|
|
10 | (1) |
|
|
11 | (4) |
|
PART I SERVICES AND SECURITY TECHNOLOGIES |
|
|
|
|
15 | (2) |
|
2 Service-Oriented Computing |
|
|
17 | (8) |
|
|
17 | (1) |
|
|
18 | (2) |
|
2.3 Service-Oriented Computing |
|
|
20 | (1) |
|
|
21 | (1) |
|
2.5 Service-Oriented Analysis and Design |
|
|
21 | (1) |
|
|
22 | (1) |
|
2.7 Semantic Web and Services |
|
|
23 | (1) |
|
2.8 Summary and Directions |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
25 | (12) |
|
|
25 | (1) |
|
3.2 Standards Organizations |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
28 | (2) |
|
|
28 | (1) |
|
3.4.2 Web Services Architecture |
|
|
28 | (2) |
|
3.4.3 Composition of Web Services |
|
|
30 | (1) |
|
3.5 Web Services Protocol Stack |
|
|
30 | (3) |
|
|
33 | (1) |
|
|
33 | (1) |
|
3.8 Summary and Directions |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
35 | (2) |
|
4 Service-Oriented Analysis and Design |
|
|
37 | (8) |
|
|
37 | (1) |
|
4.2 Service-Oriented Life Cycle |
|
|
38 | (1) |
|
4.3 Service-Oriented Analysis and Design |
|
|
38 | (2) |
|
|
40 | (1) |
|
|
41 | (2) |
|
4.6 Summary and Directions |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
44 | (1) |
|
5 Specialized Web Services |
|
|
45 | (38) |
|
|
45 | (1) |
|
5.2 Web Services for Data Management |
|
|
46 | (4) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
5.2.1.3 Data Distribution |
|
|
47 | (1) |
|
5.2.1.4 Web Data Management |
|
|
48 | (1) |
|
5.2.2 Web Services for Data Management |
|
|
49 | (1) |
|
5.3 Web Services for Complex Data Management |
|
|
50 | (3) |
|
|
50 | (1) |
|
5.3.1.1 Multimedia Data Systems |
|
|
50 | (2) |
|
5.3.1.2 Geospatial Data Management |
|
|
52 | (1) |
|
5.3.2 Web Services for Complex Data Management |
|
|
52 | (1) |
|
5.4 Web Services for Information Management |
|
|
53 | (9) |
|
5.4.1 Data Mining and Warehousing |
|
|
54 | (1) |
|
5.4.2 Information Retrieval |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
5.4.3.2 Question-Answering Systems |
|
|
60 | (1) |
|
5.4.4 Web Services for Information Management |
|
|
60 | (2) |
|
5.5 Web Services for Knowledge Management |
|
|
62 | (2) |
|
5.5.1 Strategies, Processes, and Models |
|
|
62 | (1) |
|
5.5.2 Web Services for Knowledge Management |
|
|
63 | (1) |
|
5.6 Web Services for Activity Management |
|
|
64 | (10) |
|
5.6.1 E-Business and E-Commerce |
|
|
64 | (1) |
|
5.6.2 Collaboration and Workflow |
|
|
65 | (2) |
|
5.6.3 Information Integration |
|
|
67 | (1) |
|
5.6.4 Information Sharing |
|
|
68 | (1) |
|
|
68 | (1) |
|
5.6.6 Supply Chain Management |
|
|
69 | (2) |
|
5.6.7 Web Services for Activity Management |
|
|
71 | (1) |
|
|
71 | (1) |
|
5.6.7.2 Collaboration and Workflow |
|
|
72 | (1) |
|
5.6.7.3 Information Integration |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
74 | (3) |
|
|
74 | (1) |
|
5.7.2 Healthcare and Life Sciences |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
77 | (1) |
|
5.8 Emerging Web Services |
|
|
77 | (4) |
|
|
77 | (1) |
|
5.8.1.1 Data as a Service |
|
|
77 | (2) |
|
5.8.1.2 Software as a Service |
|
|
79 | (1) |
|
5.8.1.3 Other X as a Service |
|
|
79 | (1) |
|
5.8.2 Amazon Web Services |
|
|
80 | (1) |
|
5.8.3 Web Services for Grids and Clouds |
|
|
80 | (1) |
|
5.9 Summary and Directions |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
81 | (2) |
|
|
83 | (16) |
|
|
83 | (1) |
|
6.2 Layered Technology Stack |
|
|
84 | (1) |
|
|
85 | (4) |
|
6.3.1 XML Statement and Elements |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
88 | (1) |
|
6.3.6 XML Federations/Distribution |
|
|
88 | (1) |
|
6.3.7 XML-QL, XQuery, XPath, and XSLT |
|
|
88 | (1) |
|
|
89 | (3) |
|
|
89 | (1) |
|
6.4.2 RDF Container Model |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
91 | (1) |
|
6.4.5 RDF Axiomatic Semantics |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
93 | (3) |
|
|
93 | (2) |
|
|
95 | (1) |
|
6.7 Semantic Web Services |
|
|
96 | (1) |
|
6.8 Summary and Directions |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
99 | (30) |
|
|
99 | (1) |
|
|
99 | (10) |
|
|
99 | (1) |
|
7.2.2 Access Control and Other Security Concepts |
|
|
100 | (1) |
|
7.2.3 Types of Secure Systems |
|
|
101 | (1) |
|
7.2.4 Secure Operating Systems |
|
|
102 | (1) |
|
7.2.5 Secure Database Systems |
|
|
103 | (1) |
|
|
104 | (2) |
|
|
106 | (1) |
|
|
106 | (1) |
|
7.2.9 Steps to Building Secure Systems |
|
|
107 | (2) |
|
|
109 | (3) |
|
|
109 | (1) |
|
|
110 | (1) |
|
7.3.3 Digital Rights Management |
|
|
110 | (1) |
|
|
111 | (1) |
|
7.3.5 Integrity, Data Quality, and High Assurance |
|
|
111 | (1) |
|
|
112 | (13) |
|
|
112 | (1) |
|
7.4.2 Threats to Web Security |
|
|
113 | (1) |
|
|
113 | (1) |
|
7.4.2.2 General Cyber Threats |
|
|
113 | (2) |
|
7.4.2.3 Threats to Web Databases |
|
|
115 | (2) |
|
7.4.3 Web Security Solutions |
|
|
117 | (1) |
|
|
117 | (1) |
|
7.4.3.2 Solutions for General Threats |
|
|
117 | (3) |
|
|
120 | (1) |
|
7.4.3.4 Biometrics, Forensics, and Other Solutions |
|
|
120 | (1) |
|
7.4.3.5 Solutions for Threats to Web Databases |
|
|
121 | (4) |
|
7.5 Summary and Directions |
|
|
125 | (1) |
|
|
125 | (1) |
|
|
125 | (2) |
|
|
127 | (2) |
|
PART II SECURE SERVICES TECHNOLOGIES |
|
|
|
|
129 | (2) |
|
8 Secure Service-Oriented Computing |
|
|
131 | (10) |
|
|
131 | (1) |
|
|
132 | (1) |
|
8.3 Secure Service-Oriented Computing |
|
|
133 | (1) |
|
8.4 Secure SOA and Web Services |
|
|
134 | (2) |
|
8.5 Secure Service-Oriented Analysis and Design |
|
|
136 | (1) |
|
8.6 Federated Identity Management |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
138 | (1) |
|
8.9 Summary and Directions |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
139 | (2) |
|
9 Secure SOA and Web Services |
|
|
141 | (8) |
|
|
141 | (1) |
|
|
142 | (2) |
|
|
144 | (3) |
|
9.4 Summary and Directions |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
148 | (1) |
|
10 Secure Service-Oriented Analysis and Design |
|
|
149 | (8) |
|
|
149 | (1) |
|
10.2 Secure Object-Oriented Analysis and Design |
|
|
149 | (1) |
|
10.3 Secure Service-Oriented Life Cycle |
|
|
150 | (1) |
|
10.4 Secure Service-Oriented Analysis and Design |
|
|
151 | (1) |
|
10.5 Secure Service Modeling |
|
|
152 | (1) |
|
10.6 Secure SOAD Approaches |
|
|
153 | (1) |
|
10.7 Summary and Directions |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
155 | (2) |
|
11 Access Control for Web Services |
|
|
157 | (8) |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
159 | (2) |
|
11.4 Attribute-Based Access Control |
|
|
161 | (1) |
|
|
162 | (1) |
|
11.6 Summary and Directions |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
163 | (2) |
|
12 Digital Identity Management |
|
|
165 | (8) |
|
|
165 | (1) |
|
12.2 Single Sign-On and Federated Identity Management |
|
|
166 | (1) |
|
12.3 Identity Metasystem and Information Card |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
170 | (2) |
|
12.7 Summary and Directions |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
172 | (1) |
|
13 Security Models for Web Services |
|
|
173 | (8) |
|
|
173 | (1) |
|
|
174 | (1) |
|
13.3 Information Flow Model |
|
|
175 | (1) |
|
13.4 Multilevel Secure Web Services |
|
|
176 | (1) |
|
13.5 Summary and Directions |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (2) |
|
PART III DEPENDABLE WEB SERVICES |
|
|
|
|
181 | (2) |
|
14 Trust Management and Web Services |
|
|
183 | (10) |
|
|
183 | (1) |
|
|
184 | (4) |
|
14.2.1 Trust Management and Negotiation |
|
|
184 | (2) |
|
14.2.2 Trust And Risk Management |
|
|
186 | (1) |
|
14.2.3 Reputation-Based Systems |
|
|
187 | (1) |
|
14.3 Trust and Web Services |
|
|
188 | (3) |
|
14.3.1 Trust Management as a Web Service |
|
|
188 | (2) |
|
14.3.2 Trust Management for Web Services |
|
|
190 | (1) |
|
14.4 Summary and Directions |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
192 | (1) |
|
15 Privacy and Web Services |
|
|
193 | (10) |
|
|
193 | (1) |
|
|
194 | (4) |
|
|
194 | (1) |
|
15.2.2 Privacy Problem through Inference |
|
|
195 | (2) |
|
15.2.3 Platform for Privacy Preferences |
|
|
197 | (1) |
|
15.2.4 Privacy-Preserving Semantic Web Mining |
|
|
197 | (1) |
|
15.3 Privacy Management and Web Services |
|
|
198 | (3) |
|
15.3.1 Web Services for Privacy Management |
|
|
198 | (1) |
|
15.3.2 Privacy for Web Services and Semantic Web |
|
|
199 | (2) |
|
15.4 Summary and Directions |
|
|
201 | (1) |
|
|
201 | (1) |
|
|
201 | (2) |
|
16 Integrity Management, Data Provenance, and Web Services |
|
|
203 | (10) |
|
|
203 | (1) |
|
16.2 Integrity, Data Quality, and Provenance |
|
|
204 | (3) |
|
16.2.1 Aspects of Integrity |
|
|
204 | (1) |
|
16.2.2 Inferencing, Data Quality, and Data Provenance |
|
|
205 | (2) |
|
16.3 Integrity Management and Web Services |
|
|
207 | (3) |
|
16.3.1 Web Services for Integrity Management |
|
|
207 | (2) |
|
16.3.2 Integrity for Web Services and Semantic Web |
|
|
209 | (1) |
|
16.4 Summary and Directions |
|
|
210 | (1) |
|
|
211 | (1) |
|
|
211 | (1) |
|
|
212 | (1) |
|
PART IV SECURE SEMANTIC WEB SERVICES |
|
|
|
|
213 | (2) |
|
17 Secure Semantic Web and Web Services |
|
|
215 | (12) |
|
|
215 | (1) |
|
17.2 Security for the Semantic Web |
|
|
216 | (4) |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
218 | (1) |
|
17.2.4 Security and Ontologies |
|
|
219 | (1) |
|
17.2.5 Secure Query and Rules Processing for the Semantic Web |
|
|
219 | (1) |
|
17.3 Privacy and Trust for the Semantic Web |
|
|
220 | (3) |
|
|
220 | (1) |
|
17.3.2 Data Mining, National Security, Privacy, and the Semantic Web |
|
|
220 | (1) |
|
17.3.3 Solutions to the Privacy Problem |
|
|
221 | (1) |
|
17.3.4 Trust for the Semantic Web |
|
|
222 | (1) |
|
17.4 Secure Semantic Web and Web Services |
|
|
223 | (1) |
|
17.5 Summary and Directions |
|
|
224 | (1) |
|
|
225 | (1) |
|
|
225 | (2) |
|
18 Security, XML, and Web Services |
|
|
227 | (16) |
|
|
227 | (1) |
|
18.2 Example XML Document |
|
|
228 | (4) |
|
18.3 XML Security Standards |
|
|
232 | (1) |
|
18.4 Issues in XML Security |
|
|
233 | (2) |
|
18.5 Policy Specification in XML |
|
|
235 | (2) |
|
|
235 | (1) |
|
|
236 | (1) |
|
18.6 Access Control for XML Documents |
|
|
237 | (1) |
|
18.7 Secure Publication of XML Documents |
|
|
238 | (1) |
|
18.8 Secure XML Databases |
|
|
239 | (1) |
|
18.9 XML, Security, and Web Services |
|
|
240 | (1) |
|
18.10 Summary and Directions |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
242 | (1) |
|
19 Security, RDF, and Web Services |
|
|
243 | (12) |
|
|
243 | (1) |
|
19.2 Example of an RDF Document |
|
|
244 | (1) |
|
19.3 Issues in RDF Security |
|
|
245 | (2) |
|
|
245 | (2) |
|
|
247 | (1) |
|
19.4 Policy Specification in RDF |
|
|
247 | (2) |
|
|
249 | (1) |
|
19.6 Secure RDF Databases |
|
|
250 | (1) |
|
19.7 Security, RDF, and Web Services |
|
|
251 | (1) |
|
19.8 Summary and Directions |
|
|
252 | (1) |
|
|
253 | (1) |
|
|
253 | (2) |
|
20 Security, Ontologies, and Web Services |
|
|
255 | (10) |
|
|
255 | (1) |
|
|
256 | (2) |
|
|
258 | (1) |
|
20.4 Policy Specification in OWL |
|
|
259 | (1) |
|
|
260 | (1) |
|
20.6 Secure OWL Databases |
|
|
261 | (1) |
|
20.7 Ontology for Policy and Data Integration |
|
|
261 | (1) |
|
20.8 Security, Ontologies, and Web Services |
|
|
261 | (1) |
|
20.9 Summary and Directions |
|
|
262 | (1) |
|
|
263 | (1) |
|
|
263 | (2) |
|
21 Security, Rules, and Web Services |
|
|
265 | (10) |
|
|
265 | (1) |
|
21.2 Nonmonotonic-Typed Multilevel Logic for Secure Data and Knowledge Management |
|
|
266 | (1) |
|
|
266 | (3) |
|
21.4 Policy Specification Using Rules |
|
|
269 | (1) |
|
21.5 Inference Problem and Policy Reasoning |
|
|
270 | (2) |
|
21.6 Security, Rules, and Web Services |
|
|
272 | (1) |
|
21.7 Summary and Directions |
|
|
273 | (1) |
|
|
273 | (1) |
|
|
273 | (1) |
|
|
274 | (1) |
|
PART V EMERGING SECURE WEB SERVICES |
|
|
|
|
275 | (2) |
|
22 Web Services for Secure Data, Information, and Knowledge Management |
|
|
277 | (6) |
|
|
277 | (1) |
|
22.2 Web Services for Secure Data Management |
|
|
278 | (1) |
|
22.3 Secure Information Management |
|
|
279 | (1) |
|
22.4 Secure Knowledge Management |
|
|
280 | (1) |
|
22.5 Summary and Directions |
|
|
280 | (1) |
|
|
281 | (1) |
|
|
281 | (2) |
|
23 Secure Geospatial, Multimedia, and Sensor Web Services |
|
|
283 | (18) |
|
|
283 | (1) |
|
23.2 Secure Geospatial Semantic Web |
|
|
284 | (9) |
|
23.2.1 Geospatial Semantic Web Concepts |
|
|
284 | (2) |
|
23.2.2 Secure Geospatial Data Management |
|
|
286 | (2) |
|
23.2.3 Secure Geospatial Semantic Web |
|
|
288 | (2) |
|
23.2.4 Secure Interoperability with GRDF |
|
|
290 | (1) |
|
|
291 | (2) |
|
23.3 Secure Multimedia Data Management |
|
|
293 | (1) |
|
23.4 Secure Sensor Web Services |
|
|
294 | (3) |
|
|
294 | (2) |
|
23.4.2 Pervasive Computing and Web Services |
|
|
296 | (1) |
|
23.5 Summary and Directions |
|
|
297 | (1) |
|
|
298 | (1) |
|
|
298 | (3) |
|
24 Web Services for Secure Activity Management |
|
|
301 | (16) |
|
|
301 | (1) |
|
|
302 | (2) |
|
24.3 Secure Workflow and Collaboration |
|
|
304 | (2) |
|
24.4 Secure Information Interoperability |
|
|
306 | (3) |
|
24.5 Secure Information Sharing |
|
|
309 | (4) |
|
24.6 Secure Social Networking |
|
|
313 | (1) |
|
|
313 | (1) |
|
24.8 Summary and Directions |
|
|
314 | (1) |
|
|
315 | (1) |
|
|
315 | (2) |
|
25 Secure Specialized Web Services |
|
|
317 | (6) |
|
|
317 | (1) |
|
25.2 Secure Domain Web Services |
|
|
318 | (1) |
|
25.3 Security for X as a Service |
|
|
319 | (1) |
|
25.4 Security for Amazon Web Services |
|
|
319 | (1) |
|
25.5 Secure Web Services for Cloud and Grid |
|
|
320 | (1) |
|
25.6 Summary and Directions |
|
|
321 | (1) |
|
|
322 | (1) |
|
|
322 | (1) |
|
26 Summary and Directions |
|
|
323 | (10) |
|
|
323 | (1) |
|
26.2 Summary of This Book |
|
|
323 | (4) |
|
26.3 Directions for Secure Semantic Service-Oriented Information Systems |
|
|
327 | (2) |
|
26.4 Where Do We Go from Here? |
|
|
329 | (2) |
|
|
331 | (2) |
|
APPENDIX A DATA MANAGEMENT SYSTEMS: DEVELOPMENTS AND TRENDS |
|
|
333 | (16) |
|
|
333 | (1) |
|
A.2 Developments in Database Systems |
|
|
334 | (4) |
|
A.3 Status, Vision, and Issues |
|
|
338 | (1) |
|
A.4 Data Management Systems Framework |
|
|
339 | (3) |
|
A.5 Building Information Systems from the Framework |
|
|
342 | (3) |
|
A.6 Relationships among the Texts |
|
|
345 | (1) |
|
A.7 Summary and Directions |
|
|
345 | (2) |
|
|
347 | (2) |
|
APPENDIX B DATABASE MANAGEMENT |
|
|
349 | (34) |
|
|
349 | (1) |
|
B.2 Relational and Entity-Relationship Data Models |
|
|
350 | (2) |
|
|
350 | (1) |
|
B.2.2 Relational Data Model |
|
|
350 | (1) |
|
B.2.3 Entity-Relationship Data Model |
|
|
351 | (1) |
|
|
352 | (1) |
|
|
353 | (1) |
|
B.5 Database Administration |
|
|
354 | (1) |
|
B.6 Database Management System Functions |
|
|
355 | (7) |
|
|
355 | (1) |
|
|
356 | (1) |
|
B.6.3 Transaction Management |
|
|
356 | (2) |
|
|
358 | (1) |
|
B.6.5 Metadata Management |
|
|
358 | (2) |
|
|
360 | (1) |
|
|
360 | (1) |
|
|
361 | (1) |
|
B.7 Distributed Databases |
|
|
362 | (1) |
|
B.8 Heterogeneous Database Integration |
|
|
363 | (1) |
|
|
364 | (2) |
|
B.10 Client-Server Databases |
|
|
366 | (2) |
|
B.11 Migrating Legacy Databases and Applications |
|
|
368 | (1) |
|
|
368 | (2) |
|
|
370 | (1) |
|
|
371 | (1) |
|
|
372 | (5) |
|
|
372 | (1) |
|
|
373 | (3) |
|
B.15.3 Other Object Technologies |
|
|
376 | (1) |
|
B.16 Other Database Systems |
|
|
377 | (1) |
|
B.17 Summary and Directions |
|
|
378 | (1) |
|
|
379 | (4) |
|
APPENDIX C DISCRETIONARY AND MULTILEVEL SECURITY FOR OBJECT DATABASE SYSTEMS |
|
|
383 | (26) |
|
|
383 | (1) |
|
C.2 Discretionary Security |
|
|
384 | (7) |
|
|
384 | (1) |
|
|
385 | (1) |
|
|
385 | (3) |
|
|
388 | (1) |
|
|
388 | (1) |
|
|
388 | (1) |
|
|
389 | (1) |
|
|
390 | (1) |
|
|
390 | (1) |
|
|
391 | (7) |
|
|
391 | (1) |
|
|
391 | (2) |
|
C.3.3 System Design Issues |
|
|
393 | (1) |
|
|
394 | (1) |
|
|
394 | (1) |
|
|
394 | (1) |
|
|
395 | (1) |
|
|
395 | (1) |
|
C.3.4.5 Millen-Lunt Model |
|
|
396 | (1) |
|
C.3.4.6 Jajodia-Kogan Model |
|
|
396 | (1) |
|
C.3.4.7 Morgenstern's Model |
|
|
397 | (1) |
|
|
397 | (1) |
|
C.4 Security for Object Request Brokers |
|
|
398 | (3) |
|
|
398 | (1) |
|
C.4.2 OMG Security Services |
|
|
398 | (2) |
|
C.4.3 Secure Components and Frameworks |
|
|
400 | (1) |
|
C.5 Object Modeling for Secure Applications |
|
|
401 | (4) |
|
|
401 | (1) |
|
|
402 | (2) |
|
|
404 | (1) |
|
C.6 Summary and Directions |
|
|
405 | (1) |
|
|
406 | (3) |
|
APPENDIX D DEVELOPMENTS WITH STANDARDS, PRODUCTS, AND TOOLS |
|
|
409 | (10) |
|
|
409 | (1) |
|
D.2 Oasis Service Standards |
|
|
410 | (1) |
|
D.3 Web Services Products |
|
|
411 | (1) |
|
D.3.1 Enterprise Service Bus-Related Products |
|
|
411 | (1) |
|
D.3.2 Web Services Suites |
|
|
412 | (1) |
|
D.4 Semantic Web Standards |
|
|
412 | (3) |
|
|
413 | (2) |
|
D.5 Semantic Web Products |
|
|
415 | (1) |
|
D.6 Summary and Directions |
|
|
416 | (1) |
|
|
417 | (2) |
Index |
|
419 | |