WO2004038621A1 - Method and system for ranking services in a web services architecture - Google Patents
Method and system for ranking services in a web services architecture Download PDFInfo
- Publication number
- WO2004038621A1 WO2004038621A1 PCT/GB2003/001790 GB0301790W WO2004038621A1 WO 2004038621 A1 WO2004038621 A1 WO 2004038621A1 GB 0301790 W GB0301790 W GB 0301790W WO 2004038621 A1 WO2004038621 A1 WO 2004038621A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- service
- services
- level
- directory
- requestor
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 230000008569 process Effects 0.000 claims description 6
- 238000004590 computer program Methods 0.000 claims description 2
- 230000006870 function Effects 0.000 description 10
- 230000027455 binding Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 8
- 239000008186 active pharmaceutical agent Substances 0.000 description 7
- 230000007246 mechanism Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 230000003993 interaction Effects 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000001914 filtration Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 241000270295 Serpentes Species 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000009870 specific binding Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
Definitions
- This invention relates to a method and system for ranking services in a web services architecture.
- the invention relates to a web services architecture with an hierarchy of service providers in which the ranking is specified by the top level invoker.
- Web services are described in the document "Web Services Conceptual Architecture (WSCA 1.0)" by IBM Software Group, May 2001. Web services provides a program-to-program communications model built on existing and emerging standards such as HTTP (hypertext transfer protocol) , Extensible Markup Language (XML) , Simple Object Access Protocol (SOAP) , Web Services Description Language (WSDL) and Universal Description, Discovery and Integration (UDDI) .
- HTTP hypertext transfer protocol
- XML Extensible Markup Language
- SOAP Simple Object Access Protocol
- WSDL Web Services Description Language
- UDDI Universal Description, Discovery and Integration
- a web service is described through an interface that describes a collection of functions that are network-accessible through standardised XML messaging.
- a web service is described using a standard, formal XML notation, called a service description.
- the service description covers all the details necessary to interact with the service, including message formats, transport protocols and location.
- the interface hides the implementation details of the service allowing it to be used independently of the hardware or software platform on which it is implemented and also independently of the programming language in which it is written. It is also independent of the hardware and software environment of the caller. This allows web services-based applications to be loosely coupled, component-oriented, cross-technology implementations that can be published, located, and invoked across a network.
- Web services are implemented in a network.
- the network could be a publicly-accessible network such as the Internet, an Intranet or any other form of network.
- Internet-available web services use commonly deployed network protocols.
- Such protocols may be HTTP or other Internet protocols such as SMTP or FTP.
- Other networks e.g. Intranets
- can use reliable messaging call infrastructures such as MQSeries, COBRA, etc.
- the described method and system relate to an extension of the UDDI/WSDL protocol and XML/SOAP syntax to provide functions that are not currently available within the web services architecture.
- UDDI in web services is to provide open access to functions based on a directory or registry lookup. These services are described by the WSDL part and invoked by the XML/SOAP function. The binding of the invoker to the service is dynamic and not fixed. It is open in that the directory is freely available and there are no constraints applied to how the lookup or selection occurs. UDDI admirably meets this objective. However, where it fails is in concepts like quality of service.
- the described method and system provide means whereby quality of service issues and other selection influencing factors can be introduced into the UDDI/WSDL arena.
- UDDI UltraText Transfer Protocol
- a directory or registry is used to assemble software in a componentised fashion.
- the idea of UDDI is that a WSDL-formatted request is sent to a directory or registry server to select a service.
- This service selection can be specified on certain generally applicable criteria such as the company that is providing it and the function it does.
- This selection information is very generic; it is the same for all users and there is nothing specific to the originator of the request for the service that is mentioned.
- the described method and system provide means whereby specific-to-originator criteria can be bought to bear on the lookup.
- the selection of the service is influenced by an originator or requestor of the service selection.
- a user's software is going to buy a book.
- the user looks up in a directory under the category of 'Book Sellers' and gets back a list of companies offering that service.
- the user has negotiated preferential rates with, say two, suppliers, and so wants to send the purchase request to either of these two in the first instance, and someone else as a third choice.
- the user can do this by filtering the returned list of companies from the search because the search returned information to the user directly and the user is in control of what happens next.
- the user may be building a library of StarTrek books.
- the user uses a 'Build a library' selection and gets back a list of suitable sellers.
- the user places his Get-me-a-library-for-StarTrek request to this supplier who will do the job.
- the user is now no longer in the position to use his favourite list of Book Sellers as the book-buying function is now being handled by someone else. In effect, they use their preferred suppliers instead of the users.
- One result of the described invention provides a way of getting books (or other items) purchased with the user's preferred sellers and not the intermediaries.
- the described method and system relates to how WSDL/UDDI requests are biased according to the preference of the originator. What conditions influence a user's preferences are not discussed and are up to the user. Examples of conditions which may influence a user's preference include the standards of cost, efficiency, speed and reliability.
- a method for ranking services in a web services architecture having a hierarchy of services with a root originating service requestor, a service of a first level in the hierarchy calling a service of a lower level, the method comprising: the originating service requestor indicating a preference regarding one or more services and a ranking machine having a choice algorithm based on the preference; the originating service requestor invoking services of one or more levels of hierarchy; at each level of the hierarchy, a service using a directory to find a set of possible lower-level services; and the ranking machine applying the choice algorithm to the set of possible lower-level services.
- the lower-level services may be service requestors or service providers.
- the set of possible lower-level services may be referred to the ranking machine from the directory and a preferred sequence may be returned by the ranking machine to the directory.
- the step of referring to the ranking machine may not be visible to the service using the directory.
- the set of possible lower-level services may be sent by the service using the directory to the ranking machine and a preferred sequence may be returned by the ranking machine to the service.
- a single result or a sequence of results may be returned to the service using the directory.
- lower-level invocations of services in the hierarchy are not visible to higher-level services.
- the preference of the originating service requestor may rank services in an order in which the originating service requestor wishes to use the services, may exclude services from being used, and/or may provide other selection influencing criteria.
- the preference of the originating service requestor may be based on quality of service criteria including, for example, cost, efficiency, speed and reliability.
- the preference may override a selection by the service using the directory. If the preferred service is not available, a subsequent service may be obtained by reference to the originating service requestor's preference.
- the service using the directory may make the selection.
- a web services architecture comprising: a root originating service requestor; a hierarchy of services in which a service of a first level calls a service of a lower level; a directory for finding services in the hierarchy; a ranking machine with means for applying a choice algorithm for services based on the originating service requestor's preference regarding one or more services; wherein, at each level of the hierarchy, the directory provides a set of possible services and the ranking machine applies the choice algorithm to provide a sequence of preferred services.
- the lower-level services may be service requestors or service providers .
- the ranking machine is preferably connected to the directory by a port and the set of possible services is referred to the ranking machine by the directory and the sequence of preferred services is returned to the directory by the ranking machine.
- a service of a first level may find a service of a lower level by means of a UDDI directory.
- the ranker machine may have a port on the UDDI directory and may process flows turning TModel bags into a selected set of TModels.
- Each UDDI operation may be referred to the ranking machine and may be returned as a sequence conforming with the service requestor's preference.
- Underlying UDDI application code may carry out the referral and may append the location of the ranker machine to subsequent XML flow.
- a computer program product stored on a computer readable storage medium for a web services architecture having a hierarchy of services with a root originating service requestor, a service of a first level calling a service of a lower level, comprising computer readable program code means for performing the steps of: the originating service requestor indicating a preference regarding one or more services and a ranking machine having a choice algorithm based on the preference; the originating service requestor invoking services of one or more levels of hierarchy; at each level of the hierarchy, a service using a directory to find a set of possible lower-level services; and the ranking machine applying the choice algorithm to the set of possible lower-level services.
- Figure 1 is a schematic diagram of a web services model
- Figure 2 is a schematic diagram of a web services stack
- Figure 3 is a block diagram of a UDDI data structure
- Figure 4A is a schematic block diagram of a web services hierarchy in accordance with the present invention.
- Figure 4B is a schematic block diagram of a web services architecture in accordance with the present invention.
- Figure 5A is a flow line diagram of a selection of a service as known from the prior art
- Figure 5B is a flow line diagram of a first embodiment of a selection of a service in accordance with the present invention.
- Figure 5C is a flow line diagram of a second embodiment of a selection of a service in accordance with the present invention.
- web services is used. This should not be construed as meaning that a web service must be invoked through the web (i.e. from a browser) .
- a web service may be implemented in any form of network including the Internet, intranets, LANs, WANs, etc.
- a web service provides a program-to-program communication model and is described through an interface that describes the functions of the web service.
- Figure 1 shows a web services model 100 which shows the three roles of service provider 101, service registry 102 and service requestor 103.
- the interactions involve publish 104, find 105 and couple 106 operations.
- the couple operation 106 is an access flow between the entities in a loosely coupled environment. Together these roles and operations act upon the web services artefacts which are the web services software module 107 and its description 108.
- a service provider 101 hosts a network-accessible software module 107 which is an implementation of a web service.
- the service provider 101 defines a service description 108 for the web service 107 and publishes it to a service registry 102.
- the service requestor 103 can also get the service description 108, or part of it, directly from the service provider 101 as a pull operation rather than a push operation.
- the service requestor 103 uses a find operation 105 to retrieve the service description 108 from the service registry 102 and uses the service description 108 to couple 106 with the service provider 101 and invoke or interact with the web service implementation 107.
- Service provider 101 and service requestor 103 are roles and a service can exhibit characteristics of both.
- the service provider 101 is the platform that hosts access to at least the front end of the service.
- a service requestor 103 is the application that is looking for and invoking or initiating an interaction with a service.
- the service requestor role can be played by a browser driven by a person or a program without a user interface, for example another web service.
- a service registry 102 is a searchable registry of service descriptions 108 where service providers 101 publish their service descriptions 108. Service requestors 103 find services and obtain coupling information from the service description 108 to establish communication and execution for services.
- a service description 108 needs to be published 104 so that the service requestor 103 can find it.
- the service requestor 103 retrieves a service description 108 directly or queries the service registry 102 for the type of service required using a service discovery process.
- the service requestor 103 invokes or initiates an interaction with the service at runtime using the coupling details in the service description 108 to contact and invoke the service.
- the service description 108 contains the details of the interface to implement the service. This includes its data types, operations, coupling information and network location. It could also include categorisation to facilitate discovery and utilisation by service requestors 103.
- the foundation of the web services stack 200 is the network level
- the next level is an XML-based messaging level 202 which represents the user of XML as the basis for the messaging protocol .
- SOAP may be used as an enhancement to the XML messaging protocol .
- the next level is the service description level 203 which is a collection of description documents.
- the description is grouped into three types of things, namely location, activity and interface.
- WSDL is the standard for XML-based service description.
- WSDL defines the interface and mechanics of service interaction.
- the WSDL document can be complemented by other service description documents to describe higher level aspects of the web service, for example, business context is described using UDDI data structures in addition to the WSDL documents.
- the first three levels of the network level 201, the XML-based messaging level 202 and the service description level 203 are required to provide or use any web service.
- the next two levels of the stack 200 shown in Figure 2 are the service publication and service discovery levels 204, 205 which can be implemented with a number of solutions. Any action that makes a WSDL document available to a service requestor is a service publication.
- a public UDDI registry holds copies of the service publications.
- a web service cannot be discovered if it has not been published and therefore the service discovery level 205 depends on the service publication level 204.
- the variety of discovery mechanism parallels the publication mechanisms. Any mechanism that allows the service requestor to gain access to the service description and make it available to the application at runtime qualifies as a service discovery.
- the top-most level 206 of Figure 2 is the service flow level 206 which describes how service-to-service communications, collaborations, and flows are performed.
- a complete web services description builds on the basic WSDL description of the service.
- a complete web services description addresses the following: the business that hosting the service; the kind of business it is; the products that are associated with the service; the categories the business or web service is associated with; the aspects that would influence a requestor to choose to invoke a service; the keywords that can be provided so that it is easier to find the service; etc.
- UDDI provides a mechanism for holding descriptions of web services. Although UDDI is often thought of as a directory mechanism, it also defines a data structure standard for representing service description information in XML. Figure 3 shows a UDDI entry 300 with four fundamental data structures.
- a UDDI entry starts with a business entity 301.
- a business entity 301 models information about a business.
- the business entity 301 contains a collection of business services 302, one for each web service the business wishes to publish.
- Each business service 302 contains technical and descriptive information about a business entity's web service.
- a business service 302 contains a collection of binding templates 303.
- a binding template 303 describes the access information, for example the endpoint address, and describes how the business service 302 uses various technical specifications.
- a technical specification is modelled as a tModel 304.
- a tModel 304 can model many different concepts such as: a type of service, a platform technology such as HTTPs or a taxonomy.
- a business entity 301, a business service 302 and a binding template 303 are implemented using a tModel of a defined type.
- the collection of binding templates 303 associated with a business service 302 represents a fingerprint of the technologies used by the business service 302.
- a tModel 304 defines the calling interface and the results. It is rendered in XML at a high level and via an API at the lower level which is not seen by the user.
- a tModel 304 has a unique identifier referred to as the key.
- UDDI supports the use of a given tModel 304 in more than one place via specification of the same key and then guarantees that the behaviour in the two places, as far as the externals are concerned, is exactly the same with no additional platform-specific return codes.
- the described method and system include a reference on all UDDI operations to the originator of the request. Once a directory or registry has processed the request, the results are then referred to this reference for filtering.
- a root node of the tree hierarchy 400 is a service requestor 401 which wishes to invoke a web service.
- the tree hierarchy 400 has a number of service levels 402, 403 which represent intermediate services which may be invoked (directly or indirectly) by the service requestor 401 in order to find the end web service that the service requestor 401 wishes to invoke.
- the end web services 404 are the leaf nodes on the tree hierarchy 400.
- Level 402 may be a selection of a service by the service requestor 401 and levels 403 and 404 may be a selection of hidden sub-services which are not visible to the service requestor 401.
- a directory 411 is provided which is used to find a group or bag of possible results in the form of services or service providers.
- a ranker machine 405 which stores details of the service requestor's 401 preferences for service selection. This is provided in the form of a choice algorithm between options presented at any relevant time to the ranker machine 405.
- the service requestor 401 informs the ranker machine 405 of its preferences for any service provider and a choice algorithm is saved that ranks preferences for service providers.
- the ranker machine 405 listens on a port 412 on the directory 411.
- the directory 411 carries out a look up and produces a bag of results
- the ranker machine 405 is listening on the port 412 and the bag of results is sent 407 to the ranker machine 405.
- the ranker machine 405 applies its choice algorithm to the bag of results and returns 409 a sequence of results in the preferred order of the service requestor 401 to the directory 411.
- the directory 411 answers the look up with the sequence of results provided by the ranker machine 405.
- All intermediate service providers 402, 403 that look up services in the directory have the look up referred to the ranker machine 405 which filters results of searches in accordance with preferences indicated for the service requestor 401. If there is a preference stored in the ranker machine 405, the ranker machine 405 makes the selection based on the preference and the intermediate service provider 402, 403 will follow the preference when invoking a service provider of a next level.
- a service requestor 401 wishes to use the service of an intermediate service provider of the first level 402 which involves using a lower level service. However, the fact that any lower level service is used is not revealed to the service requestor 401.
- the service requestor 401 carries out a search using the directory 411 for service providers of the first level 402 and obtains a sequenceof possible service providers 402.
- the sequence of possible service providers 402 has been filtered by the ranker machine 405 to remove obvious non-contenders or to force a specific selection (i.e. if only one result is in the bag) . If there is more than one result in the bag, the service requestor 401 chooses one of the service providers 406 of the first level 402.
- Each look up response provided by the directory 411 produces a bag of potential candidates which is filtered by the ranker machine 405.
- Software in the directory 411 does the referring to the ranker machine 405.
- the entity which requested a look up in the directory 411 is returned a list of results as if the ranker machine 405 was not there.
- the entity which requested the look up has free choice of the results returned to it by the directory 411, but the results returned have already been restricted by the ranker machine 405.
- the service requestor 401 only communicates with the service provider 406 of the first level 402. However, in order to do its work, the service provider 406 uses service provider 408 of the second level 403 which in turn uses the end service 410.
- the service requestor 401 does not know about service providers 408 of the second level or the end service 410.
- the service provider 406 of the first level does not know about the end service 410 used by the service provider 408 of the second level .
- the service provider 406 of the first level 402 carries out a look up of the directory 411 to find a service provider 408 of the second level 403.
- the service provider 408 of the second level 403 carries out a look up of the directory 411 to find an end service 410.
- the bag of results found by the directory 411 is ranked by the ranker machine 405 in accordance with the originating service requestor's 401 preferences.
- the preferences used by the ranker machine 405 in its choice algorithm are global and level independent in the hierarchy.
- the directory returns the results of a look up request to the requestor which may be the originating service requestor or an intermediate service provider and the requestor sends the bag of results to the ranker machine for ranking.
- the ranking machine returns a sequence of results to the requestor.
- the service requestor's preferences may relate to quality of service issues such as cost, efficiency, speed and reliability or may relate to any other selection influencing preference.
- the preference can rank services in an order the service requestor would like to use the services or may specifically exclude a service from use, or may provide any other preferential indication.
- Control of the sub-service selection is taken away from the supplier or at least influenced by the original service requestor.
- Figure 5A shows how a prior art UDDI Lookup request would work.
- the UDDI directory returns a bag as its result, indicated here as a ⁇ set ⁇ .
- the user 501 wants to build a library, so he asks the UDDI directory 502 to find him a service provider 503 which does this.
- the user 501 sends a request 511 to the directory 502 for a UDDI Lookup to find Library Builders. In this case there is only one service provider 503 of this category and so the directory 502 returns 512 the result of the set of ⁇ LibraryBuilderl ⁇ .
- the user 501 then sends a request 513 of "Build a Library” to the server LibraryBuilderl 504.
- LibraryBuilderl 504 looks up 514, 515 in the UDDI directory 502 a list of book suppliers 505.
- the directory 502 returns 516 the set of ⁇ Sellerl, UserPreferredSeller2 ⁇ .
- the LibraryBuilderl 504 picks 517 the first supplier which is Sellerl 506 or what he thinks is the most suitable supplier to use to buy the book from. This results in the book being purchased 518 from a place advantageous to the LibraryBuilderl but not the preferred seller of the user which in this case is UserPreferredSeller2 507.
- FIG. 5B shows the same UDDI Lookup as Figure 5A but in accordance with a first embodiment of the present invention.
- the described method and system requires that each UDDI request should be referred to a place which can rank the returned bag in an order according to the preferences of the user. It is not relevant as to what criteria are used in this ranking, only that it happens.
- the ⁇ bag ⁇ is returned as a ⁇ sequence>, with the preferred items at the front of the list.
- the sequence may contain all the members of the bag, a subset or even something completely different. It is the underlying UDDI lookup code (in other words the underlying UDDI APIs) which do this referral. Extra code steps are not required by the caller.
- Figure 5B has the additional component of the ranker 508 which holds a choice algorithm reflecting the preferences indicated by the user 501 for the book suppliers 509.
- the user requests 521 the UDDI directory 502 to find a Library Builder.
- the directory 502 finds the set ⁇ LibraryBuilderl ⁇ . However, this is not exposed to the user 501, as the underlying layers of service providers know that a local request without a referral still has to be ranked and this is done via configuration options and so not visible to the user. Thus, the return flow from the UDDI directory 502 is then referred 522 to the local ranker 508 for analysis. As there is only one choice, which is acceptable ⁇ LibraryBuilderl>, the results are unchanged and so sent 523 initially back to the UDDI directory 502 which sends 524 the results back to the user 501.
- the user 501 picks the first (and only in this example) supplier 504 and invokes the Build Library operation on it 525.
- the underlying layers know that this is a XML/SOAP request for a service and so append the location of the required ranker 508 to the XML flow.
- This directory Lookup 527 returns the held set of Book Sellers ⁇ Sellerl, UserPreferredSeller2 ⁇ .
- the underlying layers then refer 528 this set to the ranker 508 as before.
- the ranker 508 wants to force use of the user's preferential Book Supplier 509, and so alters the UDDI result to the sequence ⁇ UserPreferredSeller2> before sending 529 the result back to the UDDI directory 502 which sends 530 the result back to the Library Builder 504 as the result of its lookup 527. Consequently, the book is now ordered 321, 322 from UserPreferredSeller2 507 rather than Sellerl 506.
- FIG. 5C shows the same UDDI Lookup as Figures 5A and 5B but in accordance with a second embodiment of the present invention.
- the described method and system requires that each UDDI request should be referred to a place which can rank the returned bag in an order according to the preferences of the user. It is not relevant as to what criteria are used in this ranking, only that it happens.
- the ⁇ bag ⁇ is returned as a ⁇ sequence>, with the preferred items at the front of the list.
- the requestor of a look up to the UDDI directory 502 receives the ⁇ bag ⁇ of results and refers the bag to the ranker 508 for ranking and the requestor then receives the ⁇ sequence> from the ranker 508 in accordance with the user's 501 preferences.
- a ranker machine is listening on a UDDI/Ranker port and processes the aforementioned flows turning a tModel bag into a selected bag of tModels.
- the flow is inserted or processed by the WSDL supplier or at any rate the function lurks in either the UDDI server (as the A address :port gets passed on the lookup request) or in the caller's DLL used for UDDI processing. In either case, the UDDI lookup process does the filtering without the intervention of the caller.
- Binding Template a specific tModel must be used (or else lots of different XML invocations are coded) called the Binding Template.
- the problem arises if the supplier which uses the specific tModel is undesirable (too slow, too expensive, not working etc.) and the code cannot be altered to use another supplier with a different interface.
- another supplier must be selected with exactly the same interface: in other words one which uses the same Binding tModel. This is easily done via UDDI lookup.
- UDDI supports Public (i.e. generally available) Directories and Private (i.e. specific to the caller) Directories. This is fine if the whole of the requested service lies within the scope of the Private Directory (within the same organisation and so using the same - or replicated - UDDI server) so preference issues can be addressed by what actually goes in this Private Directory. However, this approach fails if a request is executed outside the scope of the Private Directory. The described method and system overcome this problem.
- UDDI supports a tModel for PublisherAssertion. This aims to link suppliers into some sort of larger entity. This is not an overlap with the described method and system as PublisherAssertion is Public, Static and there is no guarantee that it will be taken notice of.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Finance (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Economics (AREA)
- Marketing (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Game Theory and Decision Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Tourism & Hospitality (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Primary Health Care (AREA)
- Information Transfer Between Computers (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Communication Control (AREA)
- Machine Translation (AREA)
Abstract
Description
Claims
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2003227887A AU2003227887A1 (en) | 2002-10-24 | 2003-04-28 | Method and system for ranking services in a web services architecture |
US10/531,246 US8560332B2 (en) | 2002-10-24 | 2003-04-28 | Method and system for ranking services in a web services architecture |
JP2004546132A JP4223004B2 (en) | 2002-10-24 | 2003-04-28 | Method and system for ranking services in a web service architecture |
DE60306186T DE60306186T2 (en) | 2002-10-24 | 2003-04-28 | METHOD AND SYSTEM FOR ARRANGING SERVICES IN A WEB SERVICE ARCHITECTURE |
EP03725347A EP1556807B1 (en) | 2002-10-24 | 2003-04-28 | Method and system for ranking services in a web services architecture |
US13/975,298 US20130346581A1 (en) | 2002-10-24 | 2013-08-24 | Method and system for ranking services in a web services architecture |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0224805.2 | 2002-10-24 | ||
GBGB0224805.2A GB0224805D0 (en) | 2002-10-24 | 2002-10-24 | Method and system for ranking services in a web services architecture |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/975,298 Division US20130346581A1 (en) | 2002-10-24 | 2013-08-24 | Method and system for ranking services in a web services architecture |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2004038621A1 true WO2004038621A1 (en) | 2004-05-06 |
Family
ID=9946538
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB2003/001790 WO2004038621A1 (en) | 2002-10-24 | 2003-04-28 | Method and system for ranking services in a web services architecture |
Country Status (10)
Country | Link |
---|---|
US (2) | US8560332B2 (en) |
EP (1) | EP1556807B1 (en) |
JP (1) | JP4223004B2 (en) |
KR (1) | KR100745480B1 (en) |
CN (1) | CN100568227C (en) |
AT (1) | ATE330296T1 (en) |
AU (1) | AU2003227887A1 (en) |
DE (1) | DE60306186T2 (en) |
GB (1) | GB0224805D0 (en) |
WO (1) | WO2004038621A1 (en) |
Families Citing this family (63)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7308475B1 (en) | 2003-05-06 | 2007-12-11 | F5 Networks, Inc. | Method and system for accessing network services |
US20050027886A1 (en) * | 2003-07-03 | 2005-02-03 | Intermec Ip Corp. | Method and system for transforming non-web service enabled providers of functional services |
US7831693B2 (en) * | 2003-08-18 | 2010-11-09 | Oracle America, Inc. | Structured methodology and design patterns for web services |
US8346929B1 (en) | 2003-08-18 | 2013-01-01 | Oracle America, Inc. | System and method for generating secure Web service architectures using a Web Services security assessment methodology |
US8069435B1 (en) | 2003-08-18 | 2011-11-29 | Oracle America, Inc. | System and method for integration of web services |
US7698398B1 (en) | 2003-08-18 | 2010-04-13 | Sun Microsystems, Inc. | System and method for generating Web Service architectures using a Web Services structured methodology |
US20050235274A1 (en) * | 2003-08-27 | 2005-10-20 | Ascential Software Corporation | Real time data integration for inventory management |
US20050228808A1 (en) * | 2003-08-27 | 2005-10-13 | Ascential Software Corporation | Real time data integration services for health care information data integration |
US20050234969A1 (en) * | 2003-08-27 | 2005-10-20 | Ascential Software Corporation | Services oriented architecture for handling metadata in a data integration platform |
US7814142B2 (en) * | 2003-08-27 | 2010-10-12 | International Business Machines Corporation | User interface service for a services oriented architecture in a data integration platform |
WO2005022417A2 (en) * | 2003-08-27 | 2005-03-10 | Ascential Software Corporation | Methods and systems for real time integration services |
US20050262193A1 (en) * | 2003-08-27 | 2005-11-24 | Ascential Software Corporation | Logging service for a services oriented architecture in a data integration platform |
US7814470B2 (en) * | 2003-08-27 | 2010-10-12 | International Business Machines Corporation | Multiple service bindings for a real time data integration service |
US20050240354A1 (en) * | 2003-08-27 | 2005-10-27 | Ascential Software Corporation | Service oriented architecture for an extract function in a data integration platform |
US20060069717A1 (en) * | 2003-08-27 | 2006-03-30 | Ascential Software Corporation | Security service for a services oriented architecture in a data integration platform |
US20050232046A1 (en) * | 2003-08-27 | 2005-10-20 | Ascential Software Corporation | Location-based real time data integration services |
US8041760B2 (en) * | 2003-08-27 | 2011-10-18 | International Business Machines Corporation | Service oriented architecture for a loading function in a data integration platform |
US8060553B2 (en) | 2003-08-27 | 2011-11-15 | International Business Machines Corporation | Service oriented architecture for a transformation function in a data integration platform |
US20090300161A1 (en) * | 2003-11-20 | 2009-12-03 | F5 Networks, Inc. | Method and system for using feedback in accessing network services |
US20050160153A1 (en) * | 2004-01-21 | 2005-07-21 | International Business Machines Corp. | Publishing multipart WSDL files to URL |
US20050243604A1 (en) * | 2004-03-16 | 2005-11-03 | Ascential Software Corporation | Migrating integration processes among data integration platforms |
US7761406B2 (en) * | 2004-03-16 | 2010-07-20 | International Business Machines Corporation | Regenerating data integration functions for transfer from a data integration platform |
JP2006072785A (en) * | 2004-09-03 | 2006-03-16 | Hitachi Electronics Service Co Ltd | Request message control method for using of service, and service provision system |
US8375122B2 (en) * | 2005-12-15 | 2013-02-12 | International Business Machines Corporation | Web service information management in service-oriented architecture applications |
US8949457B1 (en) * | 2007-03-08 | 2015-02-03 | Aurea Software, Inc. | Local transparent extensibility and routing slip extensibility for business process execution language |
US8121117B1 (en) | 2007-10-01 | 2012-02-21 | F5 Networks, Inc. | Application layer network traffic prioritization |
US10721269B1 (en) | 2009-11-06 | 2020-07-21 | F5 Networks, Inc. | Methods and system for returning requests with javascript for clients before passing a request to a server |
US8806056B1 (en) | 2009-11-20 | 2014-08-12 | F5 Networks, Inc. | Method for optimizing remote file saves in a failsafe way |
US9503375B1 (en) | 2010-06-30 | 2016-11-22 | F5 Networks, Inc. | Methods for managing traffic in a multi-service environment and devices thereof |
US9420049B1 (en) | 2010-06-30 | 2016-08-16 | F5 Networks, Inc. | Client side human user indicator |
US8347100B1 (en) | 2010-07-14 | 2013-01-01 | F5 Networks, Inc. | Methods for DNSSEC proxying and deployment amelioration and systems thereof |
US8990369B2 (en) * | 2010-10-22 | 2015-03-24 | At&T Intellectual Property I, L.P. | Collaborative QoS for service oriented architectures |
US8879431B2 (en) | 2011-05-16 | 2014-11-04 | F5 Networks, Inc. | Method for load balancing of requests' processing of diameter servers |
US8396836B1 (en) | 2011-06-30 | 2013-03-12 | F5 Networks, Inc. | System for mitigating file virtualization storage import latency |
US8463850B1 (en) | 2011-10-26 | 2013-06-11 | F5 Networks, Inc. | System and method of algorithmically generating a server side transaction identifier |
US10230566B1 (en) | 2012-02-17 | 2019-03-12 | F5 Networks, Inc. | Methods for dynamically constructing a service principal name and devices thereof |
US9020912B1 (en) | 2012-02-20 | 2015-04-28 | F5 Networks, Inc. | Methods for accessing data in a compressed file system and devices thereof |
US9244843B1 (en) | 2012-02-20 | 2016-01-26 | F5 Networks, Inc. | Methods for improving flow cache bandwidth utilization and devices thereof |
EP2853074B1 (en) | 2012-04-27 | 2021-03-24 | F5 Networks, Inc | Methods for optimizing service of content requests and devices thereof |
US10033837B1 (en) | 2012-09-29 | 2018-07-24 | F5 Networks, Inc. | System and method for utilizing a data reducing module for dictionary compression of encoded data |
US9578090B1 (en) | 2012-11-07 | 2017-02-21 | F5 Networks, Inc. | Methods for provisioning application delivery service and devices thereof |
US10375155B1 (en) | 2013-02-19 | 2019-08-06 | F5 Networks, Inc. | System and method for achieving hardware acceleration for asymmetric flow connections |
US9497614B1 (en) | 2013-02-28 | 2016-11-15 | F5 Networks, Inc. | National traffic steering device for a better control of a specific wireless/LTE network |
US11610166B2 (en) | 2013-10-29 | 2023-03-21 | Micro Focus Llc | Hierarchical service trees |
US10187317B1 (en) | 2013-11-15 | 2019-01-22 | F5 Networks, Inc. | Methods for traffic rate control and devices thereof |
US11838851B1 (en) | 2014-07-15 | 2023-12-05 | F5, Inc. | Methods for managing L7 traffic classification and devices thereof |
US10182013B1 (en) | 2014-12-01 | 2019-01-15 | F5 Networks, Inc. | Methods for managing progressive image delivery and devices thereof |
US11895138B1 (en) | 2015-02-02 | 2024-02-06 | F5, Inc. | Methods for improving web scanner accuracy and devices thereof |
US10834065B1 (en) | 2015-03-31 | 2020-11-10 | F5 Networks, Inc. | Methods for SSL protected NTLM re-authentication and devices thereof |
US11350254B1 (en) | 2015-05-05 | 2022-05-31 | F5, Inc. | Methods for enforcing compliance policies and devices thereof |
US10505818B1 (en) | 2015-05-05 | 2019-12-10 | F5 Networks. Inc. | Methods for analyzing and load balancing based on server health and devices thereof |
US11757946B1 (en) | 2015-12-22 | 2023-09-12 | F5, Inc. | Methods for analyzing network traffic and enforcing network policies and devices thereof |
US10404698B1 (en) | 2016-01-15 | 2019-09-03 | F5 Networks, Inc. | Methods for adaptive organization of web application access points in webtops and devices thereof |
US10797888B1 (en) | 2016-01-20 | 2020-10-06 | F5 Networks, Inc. | Methods for secured SCEP enrollment for client devices and devices thereof |
US11178150B1 (en) | 2016-01-20 | 2021-11-16 | F5 Networks, Inc. | Methods for enforcing access control list based on managed application and devices thereof |
US10412198B1 (en) | 2016-10-27 | 2019-09-10 | F5 Networks, Inc. | Methods for improved transmission control protocol (TCP) performance visibility and devices thereof |
US11063758B1 (en) | 2016-11-01 | 2021-07-13 | F5 Networks, Inc. | Methods for facilitating cipher selection and devices thereof |
US10505792B1 (en) | 2016-11-02 | 2019-12-10 | F5 Networks, Inc. | Methods for facilitating network traffic analytics and devices thereof |
US10812266B1 (en) | 2017-03-17 | 2020-10-20 | F5 Networks, Inc. | Methods for managing security tokens based on security violations and devices thereof |
US11343237B1 (en) | 2017-05-12 | 2022-05-24 | F5, Inc. | Methods for managing a federated identity environment using security and access control data and devices thereof |
US11122042B1 (en) | 2017-05-12 | 2021-09-14 | F5 Networks, Inc. | Methods for dynamically managing user access control and devices thereof |
US11223689B1 (en) | 2018-01-05 | 2022-01-11 | F5 Networks, Inc. | Methods for multipath transmission control protocol (MPTCP) based session migration and devices thereof |
US12003422B1 (en) | 2018-09-28 | 2024-06-04 | F5, Inc. | Methods for switching network packets based on packet data and devices |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1999017194A1 (en) * | 1997-10-01 | 1999-04-08 | British Telecommunications Public Limited Company | Resource management system |
GB2349715A (en) * | 1999-05-05 | 2000-11-08 | Mitel Corp | Quotation mechanism for service environments |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000250992A (en) | 1999-03-02 | 2000-09-14 | Ntt Data Corp | Service proposition system, filtering device and settlement processor |
JP2001034493A (en) | 1999-07-21 | 2001-02-09 | Fuji Xerox Co Ltd | Work process managing device |
JP2001188835A (en) | 1999-12-28 | 2001-07-10 | Hitachi Ltd | Service providing system |
US7249100B2 (en) * | 2001-05-15 | 2007-07-24 | Nokia Corporation | Service discovery access to user location |
EP1421518A1 (en) * | 2001-08-08 | 2004-05-26 | Quiver, Inc. | Document categorization engine |
US6976027B2 (en) * | 2002-08-21 | 2005-12-13 | International Business Machines Corporation | Implementing geographical taxonomy within network-accessible service registries using spatial extensions |
US8495211B2 (en) * | 2002-09-26 | 2013-07-23 | Hewlett-Packard Development Company, L.P. | Network service system and mechanism for searching service registries |
-
2002
- 2002-10-24 GB GBGB0224805.2A patent/GB0224805D0/en not_active Ceased
-
2003
- 2003-04-28 EP EP03725347A patent/EP1556807B1/en not_active Expired - Lifetime
- 2003-04-28 AT AT03725347T patent/ATE330296T1/en not_active IP Right Cessation
- 2003-04-28 US US10/531,246 patent/US8560332B2/en active Active
- 2003-04-28 JP JP2004546132A patent/JP4223004B2/en not_active Expired - Lifetime
- 2003-04-28 DE DE60306186T patent/DE60306186T2/en not_active Expired - Lifetime
- 2003-04-28 KR KR1020057006121A patent/KR100745480B1/en not_active IP Right Cessation
- 2003-04-28 CN CNB03824604XA patent/CN100568227C/en not_active Expired - Lifetime
- 2003-04-28 AU AU2003227887A patent/AU2003227887A1/en not_active Abandoned
- 2003-04-28 WO PCT/GB2003/001790 patent/WO2004038621A1/en active IP Right Grant
-
2013
- 2013-08-24 US US13/975,298 patent/US20130346581A1/en not_active Abandoned
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1999017194A1 (en) * | 1997-10-01 | 1999-04-08 | British Telecommunications Public Limited Company | Resource management system |
GB2349715A (en) * | 1999-05-05 | 2000-11-08 | Mitel Corp | Quotation mechanism for service environments |
Non-Patent Citations (1)
Title |
---|
DALY D., KAR G., SANDERS W.H.: "Modeling of Service-Level Agreements for Composed Services", PROC. (LECTURE NOTES IN COMP. SCI. VOL 2506), vol. 2506, 21 October 2002 (2002-10-21), pages 4- - 15, XP001165741 * |
Also Published As
Publication number | Publication date |
---|---|
DE60306186T2 (en) | 2007-04-19 |
EP1556807B1 (en) | 2006-06-14 |
CN1689019A (en) | 2005-10-26 |
KR20050048679A (en) | 2005-05-24 |
CN100568227C (en) | 2009-12-09 |
JP2006504172A (en) | 2006-02-02 |
ATE330296T1 (en) | 2006-07-15 |
US20060112367A1 (en) | 2006-05-25 |
DE60306186D1 (en) | 2006-07-27 |
KR100745480B1 (en) | 2007-08-02 |
GB0224805D0 (en) | 2002-12-04 |
EP1556807A1 (en) | 2005-07-27 |
US20130346581A1 (en) | 2013-12-26 |
US8560332B2 (en) | 2013-10-15 |
JP4223004B2 (en) | 2009-02-12 |
AU2003227887A1 (en) | 2004-05-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1556807B1 (en) | Method and system for ranking services in a web services architecture | |
KR101066659B1 (en) | Exposing process flows and choreography controlers as web services | |
US7903656B2 (en) | Method and system for message routing based on privacy policies | |
JP4594621B2 (en) | Supplying aggregate services in a distributed computing environment | |
US6915519B2 (en) | Pluggable JMS providers in a J2EE server | |
US20070011126A1 (en) | Service-oriented architecture | |
US20050086297A1 (en) | Managing virtual business instances within a computer network | |
US7702687B2 (en) | Method and system of typing resources in a distributed system | |
KR20080108485A (en) | Managing rich presence collections | |
US7496624B2 (en) | Client registration for purposes of maintaining detailed client information at a web services registry | |
JP4667748B2 (en) | Method and apparatus for controlling a multi-node process | |
US20080147835A1 (en) | Partially decentralized composition of web services | |
Jagatheesan et al. | Sangam: universal interop protocols for e-service brokering communities using private UDDI nodes | |
Karunamurthy et al. | A novel business model for web service composition | |
US20100250293A1 (en) | Soa policy versioning | |
AU2012216248B2 (en) | Exposing Process Flows and Choreography Controllers as Web Services | |
Tsoumakas et al. | Web services for adaptive planning | |
Datir et al. | Selecting Web Service by using Broker: A Review Study | |
Schema | Metadata and Discovery | |
Quah et al. | Linking Businesses for Competitive Advantage; A Mobile Agent-Based Approach | |
Quah et al. | Linking Businesses for Competitive Advantage: A Mobile Agent-Based | |
Hacid | Web Services |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 1020057006121 Country of ref document: KR |
|
ENP | Entry into the national phase |
Ref document number: 2006112367 Country of ref document: US Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10531246 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2004546132 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2003824604X Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2003725347 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1020057006121 Country of ref document: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 2003725347 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 10531246 Country of ref document: US |
|
WWG | Wipo information: grant in national office |
Ref document number: 2003725347 Country of ref document: EP |