Code source A.2 Extrait de la publication d’un service web de WSPastryNodeFac-tory.java
1 // c r e a t e new Java2WSDL p r o c e s s o r
Java2WSDL java2WSDL = Java2WSDLFactory . newJava2WSDL ( ) ; // c u s t o m i z e t h e c r e a t e d p r o c e s s o r − add i n h e r i t e d t y p e s S e t e x t r a T y p e s = new HashSet ( ) ;
5 e x t r a T y p e s . add ( r i c e . p a s t r y .WS. m e s s a g i n g . L e a f S e t M e s s a g e .c l a s s) ; e x t r a T y p e s . add ( r i c e . p a s t r y .WS. m e s s a g i n g . NodeHandleMessage .c l a s s) ; e x t r a T y p e s . add ( r i c e . p a s t r y .WS. m e s s a g i n g . RouteSetMessage .c l a s s) ; e x t r a T y p e s . add ( r i c e . p a s t r y .WS. m e s s a g i n g . S i m i l a r S e t M e s s a g e .c l a s s) ;
. . . 10
java2WSDL . s e t E x t r a T y p e s ( e x t r a T y p e s ) ;
// g e n e r a t e w s d l d e f i n i t i o n
D e f i n i t i o n w s d l = java2WSDL . g e n e r a t e D e f i n i t i o n ( WSRemoteNodeI .c l a s s) ; 15 S e r v i c e I n s t a n c e s e r v i c e I n s t a n c e = S e r v i c e I n s t a n c e . c r e a t e ( pn ) ;
Wasp . s t a r t S e r v e r (” h t t p : / / ” + a d d r e s s . getHostName ( ) + ” : ” + a d d r e s s . g e t P o r t ( ) ) ;
S e r v i c e E n d p o i n t Endpoint = S e r v i c e E n d p o i n t . c r e a t e (” / P a s t r y S e r v i c e ”, s e r v i c e I n s t a n c e ) ;
Endpoint . setWSDL ( w s d l ) ; R e g i s t r y . p u b l i s h ( Endpoint ) ;
[1] A. Crochet-Damais. Web Services : retour sur XKMS avec webMethods . JDNet, 2001. http://www.journaldunet.com/solutions/0104/010423 webmethods.shtml.
[2] G. Alonso, F. Casati, H. Kuno, and V. Machiraju. Web Services : Concepts, Archi-tecture and Applications. Springer, 2004.
[3] Apache. Apache Axis. http://ws.apache.org/axis/.
[4] T. Berners-Lee, R. Fielding, and L. Masinter. RFC3986 : Uniform Resource Identifier (URI) : Generic Syntax, 2005. http://gbiv.com/protocols/uri/rfc/rfc3986.html.
[5] B. Cain, S. Deering, I. Kouvelas, B. Fenner, and A. Thyagarajan. RFC3376 : Internet Group Management Protocol, Version 3, 2002. http://www.faqs.org/rfcs/rfc3376.html.
[6] M. Castro, P. Druschel, A. Kermarrec, and A. Rowstron. SCRIBE : A large-scale and decentralized application-level multicast infrastructure. Selected Areas in Communi-cations, 20(8) :1489–1499, 2002. http://research.microsoft.com/∼antr/PAST/jsac.pdf.
[7] E. Cerami. Web Services Essentials. O’Reilly, 2002.
[8] G. Coulouris, J. Dollimore, and T. Kindberg. Distributed systems : concepts and design. Addison-Wesley Longman Publishing Co. Inc., fourth edition, 2005.
[9] R. Cover. Web Services Security Specification (WS-Security, WS-Security 2004), 2006.
http://xml.coverpages.org/ws-security.html.
[10] F. Deli`ege. Web services for the management of persistent online game factions.
Master’s thesis, ULB, 2005.
[11] D. Eastlake and P. Jones. RFC3174 : US Secure Hash Algorithm 1 (SHA1), 2001.
http://www.ietf.org/rfc/rfc3174.txt.
[12] T. Erl. Service-Oriented Architecture : A Field Guide to Integrating XML and Web Services. Prentice Hall PTR, 2004.
[13] Evans Data Corporation. Finding Growth in SOA and Web Services Implementation, 2006. http://www.evansdata.com/n2/pr/releases/Web%20Services%207 18 06.shtml.
[14] N.A.B. Gray. Comparison of Web Services, Java-RMI, and CORBA service implemen-tations. In Fifth Australasian Workshop on Software and System Architectures (AS-WEC 2004), pages 52–63, 2004. http://mercury.it.swin.edu.au/ctg/AWSA04/Papers/
gray.pdf.
[15] IBM and Microsoft. Security in a Web Services World : A Proposed Architecture and Roadmap. 2002. http://msdn2.microsoft.com/en-us/library/ms977312.aspx.
[16] ITU-T. ITU-T Recommendation X.509, 2005. http://www.itu.int/rec/T-REC-X.509/
en.
[17] H. Kadima and V. Montfort. Les Web services : techniques, d´emarches et outils XML, WSDL, SOAP, UDDI, Rosetta, UML. Dunod, 2003.
[18] D. Karger, E. Lehman, T. Leighton, R. Panigrahy, M. Levine, and D. Lewin.
Consistent hashing and random trees : distributed caching protocols for relieving hot spots on the World Wide Web. In ACM Symposium on Theory of Computing, pages 654–663, 1997.
[19] K. Katrinis and M. May. Application-Layer Multicast. In Peer-to-Peer Systems and Applications, volume 3485, pages 157–170, 2005.
[20] J. Kohl and C. Neuman. RFC1510 : The Kerberos Network Authentication Service (V5), 1993. http://www.ietf.org/rfc/rfc1510.txt.
[21] E. Keong Lua, J. Crowcroft, M. Pias, R. Sharma, and S. Lim. A Survey and Compari-son of Peer-to-Peer Overlay Network Schemes. Communications Surveys & Tutorials, pages 72–93, 2004. http://www.cl.cam.ac.uk/teaching/2005/AdvSysTop/survey.pdf.
[22] L. Maesano, C. Bernard, and X. Le Galles. Services Web avec J2EE et .NET : concep-tion et impl´ementation. Eyrolles, 2003.
[23] A. Mantrach. Les services Web avec SOAP, WSDL et UDDI. Master’s thesis, ULB, 2003.
[24] B. Nielsen. Introduction to distributed systems - peer-to-peer systems, 2006. http:
//www.cs.aau.dk/∼bnielsen/DS-E07/material/p2p.pdf.
[25] OASIS. Web Services Business Process Execution Language Version 2.0. http://docs.
oasis-open.org/wsbpel/2.0/wsbpel-v2.0.html.
[26] OASIS. UDDI, 2006. http://www.uddi.org.
[27] OASIS. Web Services Security : SOAP Message Security 1.1 (WS-Security 2004), 2006. http://www.oasis-open.org/specs/index.php#wssv1.1.
[28] OpenNap. OpenNap : Open Source Napster Server, 2001. http://opennap.sourceforge.
net/.
[29] P. Papanastassiou. Comparaison entre les solutions de d´eveloppement de Web Services Microsoft (environnement.net) et Sun (environnement ONE-Java). Master’s thesis, ULB, 2003.
[30] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Schenker. A scalable content-addressable network. In Proceedings of the 2001 conference on Applications, techno-logies, architectures, and protocols for computer communications (SIGCOMM ’01), number 4, pages 161–172, 2001. http://berkeley.intel-research.net/sylvia/cans.pdf. [31] S. Ratnasamy, M. Handley, R. Karp, and S. Shenker. Application-Level
Multi-cast Using Content-Addressable Networks. In Proceedings of the Third International COST264 Workshop on Networked Group Communication (NGC ’01), pages 14–29, 2001. http://berkeley.intel-research.net/sylvia/can-mcast.pdf.
[32] Rice University. FreePastry. http://www.freepastry.org/FreePastry/README-1.3.1.
html.
[33] J. Rosenberg and D. Remy.Securing Web Services with WS-Security. Sams Publishing, 2004.
[34] A. Rowstron and P. Druschel. Pastry : Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg (Middleware ’01), pages 329–
350, 2001. http://www.research.microsoft.com/∼antr/PAST/pastry.pdf.
[35] O. D. Sahin, C. Evren Gerede, D. Agrawal, A. El Abbadi, O. H. Ibarra, and J. Su.
SPiDeR : P2P-Based Web Service Discovery. InProceedings of the Third International Conference Service-Oriented Computing (ICSOC 2005), pages 157–169, 2005. http:
//www.cs.ucsb.edu/∼odsahin/papers/icsoc2005.pdf.
[36] Y. Sam and O. Boucelma. Personnalisation de Services Web : Approche Fond´ee sur la Composition. In Troisi`eme conf´erence en Recherche d’Information et Applications (CORIA 2006), pages 237–248, 2006. http://www.irit.fr/ARIA/2006/237.pdf.
[37] M. Schlosser, M. Sintek, S. Decker, and W. Nejdl. A Scalable and Ontology-Based P2P
national Conference, pages 104–111, 2002. http://www.kbs.uni-hannover.de/Arbeiten/
Publikationen/2002/P2P2002.pdf.
[38] C. Schmidt and M. Parashar. A peer-to-peer approach to web service discovery. World Wide Web, 7(2) :211–229, 2004. http://www.caip.rutgers.edu/∼cristins/webserv.pdf. [39] B. Schneier. The Blowfish Encryption Algorithm. http://www.schneier.com/blowfish.
html.
[40] R. Steinmetz and K. Wehrle, editors. Peer-to-Peer Systems and Applications, volume 3485 of LNCS. Springer, 2005. http://www.peer-to-peer.info/.
[41] I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan. Chord : a sca-lable peer-to-peer lookup protocol for internet applications. In Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for compu-ter communications (SIGCOMM ’01), pages 149–160, 2001. http://pdos.csail.mit.edu/
papers/chord:sigcomm01/chord sigcomm.pdf.
[42] Systinet. Systinet Server For Java. http://www.systinet.com/products/ssj/overview.
[43] A. Tanenbaum. R´eseaux. Pearson Education, fourth edition, 2003.
[44] D. Tidwell, J. Snell, and P. Kulchenko. Programming Web Services with SOAP.
O’Reilly, 2001.
[45] A. Tsalgatidou and T. Pilioura. An Overview of Standards and Related Technology in Web Services. Distributed and Parallel Databases, 12(2-3) :135–162, 2002. http:
//www.springerlink.com/content/l2746455w4674t04.
[46] Verisign. XML Trust Services - XKMS. http://www.verisign.com/developer/xml/xkms.
html.
[47] K. Verma, K. Sivashanmugam, A. Sheth, A. Patil, S. Oundhakar, and J. Mil-ler. METEOR-S WSDI : A Scalable P2P Infrastructure of Registries for Seman-tic Publication and Discovery of Web Services. Information Technology and Ma-nagement, 6(1) :17–39, 2005. http://knoesis.wright.edu/library/download/VSSPOM 05-MWSDI-JITM.pdf.
[48] W3C. Web Services Description Language (WSDL) 1.1, 2001. http://www.w3.org/
TR/wsdl.
[49] W3C. XML Key Management Specification (XKMS), 2001. http://www.w3.org/TR/
xkms/.
[50] W3C. XML Encryption Syntax and Processing, 2002. http://www.w3.org/TR/
xmlenc-core/.
[51] W3C. XML-Signature Syntax and Processing, 2002. http://www.w3.org/TR/
xmldsig-core/.
[52] W3C. SOAP Version 1.2, 2003. http://www.w3.org/TR/soap12-part0/.
[53] W3C. Web Services Architecture, 2004. http://www.w3.org/TR/2004/
NOTE-ws-arch-20040211/.
[54] W3C. Web Services Architecture Requirements, 2004. http://www.w3.org/TR/
wsa-reqs/#id2604831.
[55] W3C. Extensible Markup Language (XML) 1.0, 2006. http://www.w3.org/TR/2006/
REC-xml-20060816/.
[56] B. Zhao, J. Kubiatowicz, and A. Joseph. Tapestry : An Infrastructure for Fault-tolerant Wide-area Location and Routing. Technical report, UC Berkeley, 2001. http:
//bnrg.cs.berkeley.edu/∼adj/publications/paper-files/CSD-01-1141.pdf.