Copyright © 2002 W3C® (MIT, INRIA, Keio), All Rights Reserved. W3C liability, trademark, document use, and software licensing rules apply.
This document is a glossary of Web services terms intended to be used to describe the Web services architecture [WS Arch], and across the Web Services Activity.
It is expected, especially in the first drafts, that the definitions contained in this document may conflict with other definitions, and that the reader may not agree with some of them. The process used to develop this document is explained in 1 Introduction: Terminology Process.
Some definitions in this document are derived verbatim from external documents. In such cases, the source is indicated as a reference, listed in the 10 References section.
This section describes the status of this document at the time of its publication. Other documents may supersede this document. The latest status of this document series is maintained at the W3C.
This document is the result of merging selections from the UN/CEFACT eBusiness Glossary into the current (2/3/2003) version of the WS-Arch Glossary. The terms were selected, as much as possible, either because they are the same terms used in the WS-Arch glossary or they seem potentially relevant. A lot of terms have been left out. The intention was to leave out the terms that are specific to ebXML, UML and OOP -- all of which seem peripheral to WS-Arch. Done this third day of February by Roger Cutler.
This is the first public Working Draft of the Web Services Glossary for review by W3C members and other interested parties. It has been produced by the W3C Web Services Architecture Working Group, which is part of the W3C Web Services Activity. This document is a work in progress and is still incomplete in many respects. Although the Working Group agreed to request publication of this document, this document does not represent consensus within the Working Group.
A list of open issues against this document is maintained by the Working Group.
Comments on this document should be sent to www-wsa-comments@w3.org (public archive). It is inappropriate to send discussion emails to this address.
Discussion of this document takes place on the public www-ws-arch@w3.org mailing list (public archive) per the email communication rules in the Web Services Architecture Working Group charter.
The process used to develop this document is explained in 1 Introduction: Terminology Process.
Patent disclosures relevant to this document may be found on the Working Group's patent disclosure page.
This is a public W3C Working Draft for review by W3C members and other interested parties. It is a draft document and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use W3C Working Drafts as reference material or to cite them as other than "work in progress". A list of all W3C technical reports can be found at http://www.w3.org/TR/.
1 Introduction: Terminology Process
2 Architectural Terms
3 General Terms
4 Choreography Definitions
5 Roles
6 Service Properties
7 SOAP Specific Definitions
7.1 Protocol Concepts
7.2 Data Encapsulation Concepts
7.3 Message Sender and Receiver Concepts
8 Security and Privacy Related Terms
9 Management Terms
10 References
10.1 Normative References
10.2 Informative References
A Acknowledgements (Non-Normative)
Editorial note | |
This section is based on Dave Hollander's email about terminology process. |
Terminology, and naming things in general, is always difficult. The Web Services Architecture Working Group's goal is to develop the architecture of Web services. After the Working Group gets a better understanding of the framework and context for a term, the naming discussion ought to be more straight forward.
Therefore, rather than get into terminology debates now, the following process is being followed:
As shared insight is gained into the nature of the architecture, it will be necessary to add specific detail to concepts, much as "choreography" and "routing" is being discussed now:
Focus these discussions on adding understanding.
Agree to the descriptive paragraphs, that is good enough for creating Working Drafts. Editors will capture the agreed paragraph and include it in Working Drafts. (Later, the text may be moved later to the glossary.)
Terminology can be debated just before we approve any text. To challenge terminology, cite a Working Draft usage of a term and propose alternatives, in email. If dictated by the need for timely progress, text may be approved and an issue posted against it using the email for reference.
The chairs will not consider usage of a term in unapproved materials as significant in establishing consensus on preferred terminology--in other words, prior Working Group use will not be considered as setting precedence.
Everyone should keep a personal glossary, either on paper or on your favorite computer. In your personal glossary, keep track of interesting definitions; they will help the editors when time comes to add the term to the team glossary.
In general, try not to use contested terms. At worse, make the term stand our with quotes "artifact" or d-artifact if it refers to a definitive paragraph.
Specifically, try not to use the term "artifact", at least not too much. While artifact is used in some circles for our purpose, it obviously is not universally understood as intended. Meanwhile, if terms are used that seem wrong or ill defined, add them to your glossary for discussion later.
If anyone or sub-group would like to work on a naming strategy, great. This would allow the Working Group to agree on principles of naming before having lots of point debates.
architectural view |
|
A view of the system architecture from a given perspective. It focuses primarily on structure, modularity, essential components, and the main control flows. |
RUP |
architecture |
|
The organizational structure of a system. Architecture can be recursively decomposed into parts that interact through interfaces, relationships that connect parts, and constraints for assembling parts. Parts that interact through interfaces include classes, components and subsystems. |
RUP |
artifact |
|
A piece of information that (1) is produced, modified, or used by a process, (2) defines an area of responsibility, and (3) is subject to version control. An artifact can be a model, a model element, or a document. A document can enclose other documents. |
RUP |
The software architecture of a program or computing system is the structure or structures of the system, which comprise software components, the externally visible properties of those components, and the relationships among them. [Soft Arch Pract]
A software architecture is an abstraction of the run-time elements of a software system during some phase of its operation. A system may be composed of many levels of abstraction and many phases of operation, each with its own software architecture. [RoyFieldingThesis]
@@@
behaviour |
|
The observable effects of an operation or event, including its results. |
OMG |
business |
|
A series of processes, each having a clearly understood purpose, involving more than one organization, realized through the exchange of information and directed towards some mutually agreed upon goal, extending over a period of time. |
ISO/IEC 14662 |
business activity |
|
A business activity is used to represent the state of the business process of one of the partners. For instance the requester is either in the state of sending the request, in the state of waiting for the response, or in the state of receiving. |
BPSS 1.05 CPP 2.0 |
business area |
|
An area of knowledge or activity characterized by a family of related systems. An area of knowledge or activity characterized by a set of concepts and terminology understood by practitioners in that area. |
RUP |
business collaboration |
|
An activity conducted between two or more parties for the purpose of achieving a specified outcome. |
UEBA 0.59 |
Business Collaboration Framework |
BCF |
Business Collaboration Framework. A collection of specifications defining electronic business exchange for two or more business partners. (Established experts on process modeling and B2B e-commerce standards development and implementation.) |
Edifecs |
Business Collaboration Knowledge |
|
The knowledge involved in a collaboration. |
UEBA 0.59 |
Business Collaboration Model |
|
A Business Collaboration Model describes in detail how Trading Partners take on roles, relationships and responsibilities to facilitate interaction with other Trading Partners. |
CPPA 2.0 |
Business Collaboration Protocol |
BCP |
A business collaboration protocol choreographs one or more business transaction activities. |
UMM |
Business Collaboration Rules |
|
Rules of Collaboration between Trading Partners. |
CPPA 2.0 |
business commitments |
|
The making or accepting of a right, liability or responsibility by a Person that is capable of enforcement in the jurisdiction in which the commitment is made. |
ISO/IEC 15944-1 |
business context |
|
Defines a context in which a business has chosen to employ an information entity. The formal description of a specific business circumstance as identified by the values of a set of Context Categories, allowing different business circumstances to be uniquely distinguished. |
CCTS 1.90 |
business document |
|
The set of information components that are interchanged as part of a business activity. |
CCTS 1.90 |
Business Domain View |
BDV |
View aligned with UMM.
|
UMM |
business entity |
|
Something that is accessed, inspected, manipulated, produced, and worked on in the business. |
UMM |
business entity class |
|
Group of Items which are structured in the same way that serves the fundamental missions of the company, that has legal and/or business basis, which may participate in exchanges with partners, which will be implemented into objects (object technology) through a modeling process. For example order is a business entity class. |
UMM |
business expert |
|
A person who is knowledgeable about the business area being modeled. |
UMM |
business information |
|
Information that two or more Trading Partners agree to use in their exchange of information |
BPSS 1.05 |
Business Information Entity
|
BIE |
A piece of business data or a group of pieces of business data with a unique business semantic definition. A Business Information Entity can be a Basic Business Information Entity (BBIE), an Association Business Information Entity (ASBIE), or an Aggregate Business Information Entity (ABIE). |
CCTS 1.90 |
Business Information Entity Property |
|
A business characteristic belonging to the Object Class in its specific Business Context that is represented by an Aggregate Business Information Entity |
CCTS 1.90 |
business information group |
|
A set of basic and/or aggregate information entities that convey a single business function. |
CCTS 1.90 |
Business Information Model |
|
A model that references all meta-information associated with a specific Business Process. The Business Information Model references Business Entities, Business Information Entities, and Business Information Objects to accomplish that task. |
BPSS 1.05 |
Business Information Object |
BIO |
Business Documents are composed from re-useable Business Information Objects. At a lower level, Business Processes can be composed of re-useable Common Business Processes, and Business Information Objects can be composed of re-useable Core Components. (Common Business Processes and Business Information Objects should be stored in a UMM Business Library.) |
BPSS 1.05 |
business intent |
|
The underlying Business Intent of the Trading Partners |
BPSS 1.05 |
business libraries |
|
A collection of approved process models specific to a line of business (e.g., shipping, insurance). |
CCTS 1.90 |
business message |
|
Any message exchanged between Trading Partners. The Business Process Schema will govern the choreography of business messages and signals. |
|
Business Message Payload |
|
The Assembly Document describes how to construct a Business Message Payload during the Design Phase. (At the time a Trading Partner Agreement is finalized, the Business Message Payloads must also be agreed upon and not subject to change.) |
|
Business Modeling Artifact |
|
Modeling artifact from the Business Operational View. Business Modeling Artifacts SHALL be capable of being discovered and shared by other Actors within the infrastructure to facilitate reusability. |
|
Business Object |
|
An unambiguously identified, specified, referenceable, registerable and re-useable scenario or scenario component of a business transaction. The term business object is used in two distinct but related ways, with slightly different meanings for each usage: In a business model, business objects describe a business itself, and its business context. The business objects capture business concepts and express an abstract view of the business’s “real world”. The term “modeling business object” is used to designate this usage. In a design for a software system or in program code, business objects reflects how business concepts are represented in software. The abstraction here reflects the transformation of business ideas into a software realization. The term “systems business objects” is used to designate this usage. |
ISO/IEC 15944-2 |
Business Object Type |
BOT |
Modeling artifact from the Business Operational View |
BPSS 1.05 |
Business Operational View |
BOV |
A perspective of business transactions limited to those aspects regarding the making of business decisions and commitments among organizations, which are needed for the description of a business transaction. |
ISO/IEC 14662 |
Business Operations Map |
BOM |
The partitioning of business processes into business areas and business categories; first part of Requirements Workflow |
UMM |
business partner |
|
An entity that engages in business transactions with another business partner(s). |
BPSS 1.05 |
Business Process |
BP |
The means by which one or more activities are accomplished in operating business practices. The Business Process as described using the UN/CEFACT Catalogue of Common Business Processes. |
UMM; CCTS 1.90 |
Business Process Analysis Working Group |
BPAWG |
UN/CEFACT Business Process Analysis Working Group. Responsible for analysing and understanding the key elements of international transactions and working for the elimination of constraints. |
UN/CEFACT |
Business Process and Information Model |
|
Standard methodology and mechanism for modeling a Business Process and its’ associated information models. |
UMM |
Business Process Context |
|
The Business Process name(s) as described using the UN/CEFACT Catalogue of Common Business Processes as extended by the user. |
CCTS 1.90 |
business process interfact |
|
The definition of how to interact with one partner role in order to make partner perform a desired service. |
BPSS 1.05 |
Business Process Role Context |
|
The actors conducting a particular Business Process, as identified in the UN/CEFACT Catalogue of Common Business Processes. |
CCTS 1.90 |
Business Process Specification Schema |
BPSS |
Defines the necessary set of elements to specify run-time aspects and configuration parameters to drive the partners' systems used in the collaboration. The goal of the BP Specification Schema is to provide the bridge between the eBusiness process modeling and specification of eBusiness software components. |
BPSS 1.05; CPP 2.0 |
business profile |
|
Describes a company’s ebXML capabilities and constraints, as well as its supported business scenarios. |
|
Business Requirements View |
BRV |
The view of a business process model that captures the requirements of a business collaboration protocol; second part of Requirements Workflow. |
UMM |
business role |
|
The Role(s) of Business Partners used in a Business Collaboration and described in the Business Process Model. |
BPSS 1.05 |
business rule |
|
Rules, regulations and practices for business. |
UMM |
business semantic(s) |
|
A precise meaning of words from a business perspective. |
CCTS 1.90 |
business service |
|
A business service is a network component that responds to business transaction requests initiated by other services. |
|
Business Service Interface |
|
An ebXML collaboration that is conducted by two or more parties each using a human or automated business service that interprets the documents and document envelopes transmitted and decides how to (or whether to) respond. The Business Service Interface is an abstract architectural component that references the business and technical details of hox to invoke a business service, wheter using a manual or automated interface. |
BPSS 1.05; UEBA 0.59 |
Business Service View |
BSV |
The view of a business process model that specifies the electronic formation of business contracts using an electronic medium; Design Workflow |
UMM |
Business Term |
|
This is a synonym under which the Core Component or Business Information Entity is commonly known and used in the business. A Core Component or Business Information Entity may have several business terms or synonyms. |
CCTS 1.90 |
Business Transaction |
BT |
A business transaction is a set of business information and business signal exchanges amongst two business partners that must occur in an agreed format, sequence and time period. A business transaction is a logical unit of business conducted by two or more parties that generates a computable success or failure state. The community, the partners, and the process, are all in a definable, and self-reliant state prior to the business transaction, and in a new definable, and self-reliant state after the business transaction. In other words if you are still 'waiting' for your business partner's response or reaction, the business transaction has not completed. |
UMM; CPP 2.0 |
Business Transaction View |
BTV |
The view in a business process model that specifies the contract formation process for various types of business contracts; Analysis Workflow |
UMM |
component |
|
A physical, replaceable part of a system that packages implementation and conforms to and provides the realization of a set of interfaces. A component represents a physical piece of implementation of a system, including software code (source, binary or executable) or equivalents such as scripts or command files. |
RUP |
A component is a software object, meant to interact with other components, encapsulating certain functionality or a set of functionalities. A component has a clearly defined interface and conforms to a prescribed behavior common to all components within an architecture. [CCA T&D]
A component is an abstract unit of software instructions and internal state that provides a transformation of data via its interface. [RoyFieldingThesis]
concept |
|
An abstract idea; a general notion: ▪a plan of intention; a conception; ▪an idea or invention to help sell or publicize a commodity; ▪an idea or thought which corresponds to some distinct entity or class of entities, or to its essential features, or determines the application of a term (especially a predicate), and thus plays a part in the use of reason or language. |
New Oxford Dictionary |
conformance |
|
Fulfilment of a product, process or service of all requirements specified; adherence of an implementation to the requirements of one or more specific standards or technical specifications. |
|
constraint |
|
A semantic condition or restriction. Certain constraints are predefined in the OMG, others may be user defined. Constraints are one of three extensibility mechanisms in OMG. See tagged value, stereotype. |
RUP |
constraint language |
|
A formal expression of actions occurring in specific Contexts to assemble, structurally refine, and semantically qualify Core Components. The result of applying the Constraint Language to a set of Core Components in a specific Context is a set of Business Information Entities |
CCTS 1.90 |
deliverable |
|
An output from a process that has a value, material or otherwise, to a customer or other stakeholder. |
RUP |
data type |
|
A descriptor of a set of values that lack identity and whose operations do not have side effects. Datatypes include primitive pre-defined types and user-definable types. Pre-defined types include numbers, string and time. User-definable types include enumerations. Defines the set of valid values that can be used for a particular Basic Core Component Property or Basic Business Information Entity Property. It is defined by specifying restrictions on the Core Component Type that forms the basis of the Data Type. |
RUP CCTS 1.90 |
Configuration is the structure of architectural relationships among components, connectors, and data during a period of system run-time. [RoyFieldingThesis]
A connector is an abstract mechanism that mediates communication, coordination, or cooperation among components. [RoyFieldingThesis]
design |
|
The part of the software development process whose primary purpose is to decide how the system will be implemented. During design, strategic and tactical decisions are made to meet the required functional and quality requirements of a system. See analysis. |
RUP |
design pattern |
|
A specific solution to a particular problem in software design. Design patterns capture solutions that have developed and evolved over time, expressed in a succinct and easily applied form. |
RUP |
element |
|
An atomic constituent of a model. |
OMG |
Software architecture is defined by a configuration of architectural elements--components, connectors, and data--constrained in their relationships in order to achieve a desired set of architectural properties. [RoyFieldingThesis]
A reference architecture is the generalized architecture of several end systems that share one or more common domains. The reference architecture defines the infrastructure common to the end systems and the interfaces of components that will be included in the end systems. The reference architecture is then instantiated to create a software architecture of a specific system. The definition of the reference architecture facilitates deriving and extending new software architectures for classes of systems. A reference architecture, therefore, plays a dual role with regard to specific target software architectures. First, it generalizes and extracts common functions and configurations. Second, it provides a base for instantiating target systems that use that common base more reliably and cost effectively. [Ref Arch]
analysis |
|
The part of the software development process whose primary purpose is to formulate a model of the problem area. Analysis focuses on what to do, design focuses on how to do it. See design. |
RUP |
API |
API |
See Application Protocol Interface. |
Application Protocol Interface |
API |
|
|
attribute |
|
An attribute defined by a class represents a named property of the class or its objects. An attribute has a type that defines the type of its instances. A named value or relationship that exists for some or all instances of some entity and is directly associated with that instance. |
RUP; CCTS 1.90 |
A distinct characteristic of an object. An object's attributes are said to describe the object. Objects' attributes are often specified in terms of their physical traits, such as size, shape, weight, and color, etc., for real-world objects. Objects in cyberspace might have attributes describing size, type of encoding, network address, etc. Salient attributes of an object is decided by the beholder. [WSIA Glossary]
Property of an interaction which isn't synchronous.
An association between an Interface, a concrete protocol and a data format. A Binding specifies the protocol and data format to be used in transmitting messages defined by the associated Interface. [WSD Reqs]
cardinality |
|
An indication whether a characteristic is optional, mandatory and/or repetitive |
CCTS 1.90 |
A transport layer virtual circuit established between two programs for the purpose of communication. [RFC 2616]
A logical collection of messages exchanged between communicating parties.
See long-running interaction and long-running transaction.
The assocation of one message to another.
The exchange of the Web service description details necessary to interact with the service.
document |
|
A Document is any data that can be represented in a digital form. |
|
document exchange |
|
An exchange of documents between two parties. |
|
electronic commerce |
|
UN/CEFACT SIMAC |
Electronic Data Interchange |
EDI |
The automated exchange of any predefined and structured data for business among information systems of two or more organizations. |
ISO/IEC 14662 |
@@@ Currently synonym of port; confusion possible.
An association between a Binding and a network address, specified by a URI, that may be used to communicate with an instance of a Service. A Port indicates a specific location for accessing a Service using a specific protocol and data format. [WSD Reqs]
enumeration |
|
A list of named values used as the range of a particular attribute type. For example, RGBColor = {red, green, blue}. Boolean is a predefined enumeration with values from the set {false, true}. |
RUP |
Preferred: An abstract piece of functionality.
See also SOAP Feature
generalization |
|
A taxonomic relationship between a more general element and a more specific element. The more specific element is fully consistent with the more general element and contains additional information. An instance of the more specific element may be used where the more general element is allowed. See inheritance. |
RUP |
Geopolitical Context |
|
A specific instance of a context driver covering all aspects of geography and political influences on a business. |
CCTS 1.90 |
The unique identifier for a person, organization, resource, or service. [WSIA Glossary]
implementation |
|
An implementation is the realization of a specification. It can be a software product, system or program. |
NIST CCTS 1.90 |
inheritance |
|
The mechanism by which more specific elements incorporate structure and behavior of more general elements related by behavior. See generalization. |
RUP |
instance |
|
An individual entity satisfying the description of a class or type. |
RUP |
The act of doing an operation.
interface |
|
A collection of operations that are used to specify a service of a class or a component. A named set of operations that characterize the behavior of an element. |
RUP |
A logical grouping of operations. An Interface represents an abstract Service type, independent of transmission protocol and data format. [WSD Reqs]
@@@
A series of operations between a client and a Web service.
See conversation and long-running transaction.
Managed Object |
|
Metadata referred to in the Registry. Trading Partner Profiles and Trading Partner Agreements SHALL be capable of pointing at other artifacts via a reference to a Registry Managed Object. |
UEBA 0.59 |
A metric is an attribute of an architectural component that may be defined during the configuration of the architectural component, can be measured during the use of this architecture component, and whose value may be evaluated.
message |
|
A specification of the conveyance of information from one instance to another, with the expectation that activity will ensue. A message may specify the raising of a signal or the call of an operation. The movement of a document from one party to another. |
RUP CCTS 1.90
|
The basic unit of communication between a Web service and a Client: data to be communicated to or from a Web service as a single logical transmission. [WSD Reqs]
Message Envelope |
|
A communication independent envelope, specifically MIME multipart/related, which contains the two main parts of an ebXML compliant message (the Header and Payload containers). |
ebMS Spec |
Message Header |
|
A specification of the structure and composition of the information necessary for an ebXML Messaging Service to successfully generate or process and ebXML compliant message. |
ebMS Spec |
Messaging Capabilities |
|
The set of capabilities that support exchange of Documents between Parties. Examples are the communication protocol and its parameters, security definitions, and general properties of sending and receiving messages. |
|
messaging protocol |
|
See Messages and Protocol. |
|
Messaging Service |
|
A framework that enables interoperable, secure and reliable exchange of Messages between Trading Partners. |
ebMS Spec |
Messaging Service Layer |
|
The Messaging Service Layer is an architectural view of a messaging software stack component that provides a collection of methods or functionality to the stack and maps it to an underlying transport. |
ebMS Spec |
method |
|
(1) A regular and systematic way of accomplishing something; the detailed, logically ordered plans or procedures followed to accomplish a task or attain a goal. (2) OMG 1.1 The implementation of an operation, the algorithm or procedure that effects the results of an operation. The implementation of an operation. It specifies the algorithm or procedure associated with an operation. |
RUP |
methodology |
|
The science of method. A body of methods used in a particular branch of activity. |
COD |
model |
|
A semantically closed abstraction of a system. In the Unified Process, a complete description of a system from a particular perspective ('complete' meaning you don't need any additional information to understand the system from that perspective); a set of model elements. Two models cannot overlap. A semantically closed abstraction of a subject system. See system. Usage note In the context of the MOF specification, which describes a meta-metamodel, for brevity the meta-metamodel is frequently referred to as simply the model. |
RUP |
modeling tool |
|
Any device or implement used to carry out modeling whether manually or by a machine. |
COD |
Multipurpose Internet Mail Extensions |
MIME |
MIME is an extension of the original Internet e-mail protocol that lets people use the protocol to exchange different kinds of data files on the Internet: audio, video, images, application programs, and other kinds, as well as the ASCII text handled in the original protocol, the Simple Mail Transport Protocol (SMTP). In 1991, Nathan Borenstein of Bellcore proposed to the IETF that SMTP be extended so that Internet (but mainly Web) clients and servers could recognize and handle other kinds of data than ASCII text. As a result, new file types were added to "mail" as a supported Internet Protocol file type. |
http://searchwebservices.techtarget.com/sDefinition |
MIME |
MIME |
See Multipurpose Internet Mail Extensions. |
@@@
For now, see SOAP message exchange pattern (MEP).
naming |
|
To give a string used to identify a model element. |
RUP |
Naming Convention
|
|
The set of rules that together comprise how the dictionary entry name for Core Components and Business Information Entities are constructed. |
CCTS 1.90 |
operation |
|
A service that can be requested from an object to effect behavior. An operation has a signature, which may restrict the actual parameters that are possible. |
RUP |
operation signature |
|
See Operation and Signature. |
|
A set of messages related to a single Web service action. [WSD Reqs]
@@@ In progress
package |
|
A general-purpose mechanism for organizing elements into groups. Packages may be nested within other packages. |
RUP |
The ability:
of a sender of a message to be able to determine whether a given message has been received by its intended receiver and to take compensating action in the event a given message has been determined not to have been received.
of the intended receiver of the message to be assured that it receives and processes a given message once and only once.
of both sender and receiver of a message to carry out (1) and (2) with a high probability of success in the face of inevitable, yet often unpredictable, network, system, and software failures.
re-use |
|
Further use or repeated use of an artifact. |
RUP |
runtime |
|
The period of time during which a computer program executes. |
RUP |
scenario |
|
A formal specification of a class of business activities having the same business goal. |
ISO 9735 Part I |
schema |
|
Schema is "A diagrammatic representation; an outline or model." Something that formally describes the abstract structure of a set of data can therefore be called schema. |
W3C |
scope |
|
The extent to which it is possible to range; the opportunity for action etc. |
COD |
Component performing a task.
See Web Service.
agreement |
|
An arrangement between two partner types that specifies in advance the conditions under which they will trade (terms of shipment, terms of payment, collaboration protocols, etc.) An agreement does not imply specific economic commitments. |
BPSS 1.05 |
Contract between a service provider and a client regarding the attributes of a Web service and its usage.
A lasting interaction between system entities, often involving a user, typified by the maintenance of some state of the interaction for the duration of the interaction. [WSIA Glossary]
Such an interaction is not limited to a single connection between the system entities.
software solution |
|
The act or a means of solving a problem or difficulty using a software. |
COD |
specification |
|
A declarative description of what something is or does. Contrast implementation. |
RUP |
A set of attributes representing the properties of a component at some point in time.
Property of an interaction whose results are directly following the interaction.
system |
|
As an instance, an executable configuration of a software application or software application family; the execution is done on a hardware platform. As a class, a particular software application or software application family that can be configured and installed on a hardware platform. In a general sense, an arbitrary system instance. A collection of connected units that are organized to accomplish a specific purpose. A system can be described by one or more models, possibly from different viewpoints. Synonym physical system. 2. A top-level subsystem. |
RUP |
template |
|
A pre-defined structure for an artifact. Synonym parameterized element. |
RUP |
test |
|
A core process workflow in the software-engineering process whose purpose is to integrate and test the system. |
RUP |
traceability |
|
The ability to trace a project element to other related project elements, especially those related to requirements. |
RUP |
A period of time after which some condition becomes true if some event has not occurred. For example, a session that is terminated because its state has been inactive for a specified period of time is said to "time out". [WSIA Glossary]
Web service |
|
A set of standards for how systems connect to each other and communicate information. Using open standards such as XML, SOAP and UDDI. Commercial services that provide software/hardware/personnel to companies for data integration purposes. |
www.techdictionary.com |
A Web service is a software system identified by a URI [RFC 2396], whose public interfaces and bindings are defined and described using XML. Its definition can be discovered by other software systems. These systems may then interact with the Web service in a manner prescribed by its definition, using XML based messages conveyed by Internet protocols.
A collection of EndPoints. [WSD Reqs]
Editorial note: HH | |
This is a header to hold all the choreography definitions. Eventually, it will be moved elsewhere. This grouping is intended to provide an easy to view place for choreography. |
choreography |
|
A declaration of the activities within collaboration and the sequencing rules and dependencies between these activities. |
|
The specification of the ordering of messages from one node's perspective or a collection of nodes. May or may not include Turing complete logic in determination of the message exchange pattern.
@@@ Definition in progress: the above definition was the original proposal.
@@@
@@@
@@@
These are definitions that are designed to describe the ordering of business activities that send and/or receive messages. The definition of the flow between activities is not computationally complete (i.e., it cannot be executed). All of the messages are between independent business entities (participants). The participants may be across companies or within a company. There are two types of these processes: Interface Business Processes and Collaboration Business Processes.
This is an abstract business process that defines how outside participants can expect to interact with a service of a business entity. This service can be implemented as any type of application, including an executable business process. If the interface is for an executable business process, then all activities within the interface business process will also exist within the executable business process-that is, the interface business process will be a sub-set of the executable business process. Example of specifications to define these types of processes: WSCI and the abstract part of BPEL4WS
collaboration |
|
Describes a pattern of interaction among objects; it shows the objects participating in the interaction by their links to each other and the messages they send to each other. Two or more parties working together under a defined set of rules. |
RUP; CPP 2.0 |
collaboration diagram |
|
A collaboration diagram describes a pattern of interaction among objects; it shows the objects participating in the interaction by their links to each other and the messages they send to each other. Unlike a sequence diagram, a collaboration diagram shows the relationships among the instances. Sequence diagrams and collaboration diagrams express similar information, but show it in different ways. See sequence diagram. |
RUP |
Collaboration Protocol |
|
The protocol that defines for a Collaborative Process: 1. The sequence, dependencies and semantics of the Documents that are exchanged between Parties in order to carry out that Collaborative Process, and 2. The Messaging Capabilities used when sending documents between those Parties. Note that a Collaborative Process can have more than one Collaboration Protocol by which it can be implemented |
CPPA 2.0; CCTS 1.90 |
Collaboration Protocol Agreement |
CPA |
Information agreed between two (or more) Parties that identifies or describes the specific Collaboration Protocol that they have agreed to use. A CPA indicates what the involved Parties “will” do when carrying out a Collaborative Process. A CPA is representable by a Document |
CPPA 2.0; CCTS 1.90 |
Collaboration Protocol Profile |
CPP |
Information about a Party that can be used to describe one or more Collaborative Processes and associated Collaborative Protocols that the Party supports. A CPP indicates what a Party “can” do in order to carry out a Collaborative Process. A CPP is representable by a Document. While logically, a CPP is a single document, in practice, the CPP might be a set of linked documents that express various aspects of the capabilities. A CPP is not an agreement. It represents the capabilities of a Party. |
CPPA 2.0; CCTS 1.90 |
Collaborative Process |
|
A shared process by which two Parties work together in order to carry out a process. The Collaborative Process can be defined by an ebXML Collaboration Model. |
|
commitment |
|
An obligation to perform an economic event (that is, transfer ownership of a specified quantity of a specified economic resource type) at some future point in time. Order line items are examples of commitment. |
BPSS 1.05 |
Common Business Process |
|
A business process that is used with reasonable frequency in a business community. For electronic business-to-business commerce, we are interested in business processes that manifest themselves in an exchange (one way, two way, or n-way) of information in electronic format between parties. Typically, Common Business Processes are defined by standards bodies or business communities that are generally perceived as defining de facto standards for business processes within their domain of specialization. A business process that is not defined as common by a standards body or is only used by a small business community is not a Common Business Process. The phrase "exchange of information in electronic format" includes XML messaging, EDI messaging, file transfers, and other forms of electronic data exchange. This could include facsimile, email, and phone conversations. However, it is probably important that any business process that contains a facsimile or phone conversation component also include at least one electronic message, file transfer, or the like. |
BPSS 1.05 |
This is an abstract business process that defines how two or more interface business processes interact with each other. Even if these business processes were executable, there could be no central control mechanism that could run one of these processes. These processes are dependent on the implementations of the interface business processes to act in coordination. Example of specifications to define these types of processes: WSCI global model and BPSS
These are definitions that are designed to describe the ordering of business activities that send and/or receive messages. The definition of the flow between activities is computationally complete (i.e., it can be executed). The messages may be sent to/from: a) an independent business entity to itself and b) an independent business entity to another (participant). These could be called internal or workflow business processes. The business activities that interact with another participant will also appear in a derived abstract business process. In fact, the definition of an executable business process is a superset of the definition of an abstract business process. Example of specifications to define these types of processes: executable part of BPEL4WS and BPML
An actor is a legal entity — such as a person or a corporation — that may be the owner and ultimate providers of Web services and the owner of agents seeking to use Web | WSArch Draft | ||
actor |
|
Someone or something, outside the system or business that interacts with the system or business. |
RUP |
A system entity that is used by an end user to access a Web site. A browser provides a run-time environment for distributed application components on the client's device. [WSIA Glossary]
client |
|
Software that initiates a connection with a Server. |
|
A system entity making use of a Web service.
A natural person who makes use of resources for application purposes. [X.800]
A node that terminates a message on an inbound interface with the intent of presenting it through an outbound interface as a new message. Unlike a proxy, a gateway receives messages as if it were the final receiver for the message. Due to possible mismatches between the inbound and outbound interfaces, a message may be modified and may have some or all of its meaning lost during the conversion process. For example, an HTTP PUT has no equivalent in SMTP.
Note: a gateway may or may not be a SOAP node; however a gateway is never a SOAP intermediary, since gateways terminate messages and SOAP intermediaries relay them instead. Being a gateway is typically a permanent role, whilst being a SOAP intermediary is message specific.
Relationship with SOAP node and party?
@@@ Better term than party?
party |
|
A Party is an entity such as a company, department, organisation or individual that can generate, send, receive or relay Documents. |
|
Any system entity taking part into an interaction.
A computer process that relays a protocol between client and server computer systems, by appearing to the client to be the server and appearing to the server to be the client. [RFC 2828]
A business entity that sells access to or use of Web services. [WSIA Glossary]
receiver |
|
Recipient of a Message. |
|
register |
|
An official list in which items are recorded for reference (list of elementary data in which the meaning -i.e. semantics- of these data is defined). |
|
registry |
|
A mechanism where relevant repository items and metadata about them can be stored such that a pointer to their location, and all their metadata, can be retrieved as a result of a query. |
UEBA 0.59 |
Registry Authority |
RA |
A super user who maintains registry. (Registry Administrator) |
ISO11179 |
registry class |
|
The formal definition of all the information necessary to be recorded in the Registry about a Core Component, a Business Information Entity, a Data Type or a Business Context. |
CCTS 1.90 |
registry client |
|
An ebXML application that makes use of services offered by a Registry using the messaging services. |
UEBA 0.59 |
Registry Client Interface |
|
A set of Registry Services that provide access to Registry content to clients of the Registry is defined in the ebXML Registry Services Specification. |
UEBA 0.59 |
registry entry |
|
Metadata that catalogs registry item. |
|
registry infrastructure provider |
|
An entity which provides a registry/ repository to store profiles, CPPs etc. |
|
registry interface |
|
A set of Registry Services that provide access to Registry content to clients of the Registry is defined in the ebXML Registry Services Specification. |
UEBA 0.59 |
Registry Information Model |
RIM |
Specifies the information model for the ebXML Registry. |
ebRIM Spec |
Registry Object |
|
Object contained in the Registry and can be referenced from the Registry. |
RIM/ebRSS V2.3 |
Registry Service |
|
A way of providing access to Registry content to clients of the Registry. |
ebRSS V2.3 |
Registry Services Specification |
RSS |
Defines the interface to the ebXML Registry Services as well as interaction protocols, message definitions and XML schema. |
ebRSS V2.3 |
registry user |
|
Authorized user of a Registry. |
ebRIM Spec |
relationship |
|
A semantic connection among model elements. Examples of relationships include associations and generalizations. |
RUP |
repository |
|
Electronic store of structured information (such as EDIFACT messages, X12 messages, XML messages, Core Components, …). |
|
A system entity that provides Service and Service Provider information.
requester |
|
Initiator of a Business Transaction. |
|
responder |
|
A counterpart to the initiator in a Business Transaction. |
|
role |
|
The named specific behavior of an entity participating in a particular context. A role may be static (e.g., an association end) or dynamic (e.g., a collaboration role). |
OMG |
server |
|
Software that accepts a connection initiated by a Client. |
|
software developer |
|
A person responsible for developing software in accordance with project-adopted standards and procedures. This can include performing activities in any of the requirements, analysis & design, implementation, and test workflows. |
RUP |
stakeholder |
|
An individual who is materially affected by the outcome of the system. |
RUP |
The organizational entity that provides the service. [WSIA Glossary]
An active element of a computer/network system. For example, an automated process or set of processes, a subsystem, a person or group of persons that incorporates a distinct set of functionality. [RFC 2828]
trading partner |
|
Business partners engaged in eBusiness. |
|
Trading Partner Agreement |
TPA |
A mutually agreed upon technical business arrangement |
CPPA v 1.9 |
Trading Partner Profile |
TPP |
Technical configuration of the supported transport, security and encoding protocols. |
CPPA v 1.9 |
Uniform Resource Identifier |
URI |
The addressing technology from which URLs are created. Technically, URLs such as HTTP:// and FTP:// are specific subsets of URIs. |
|
See end user.
A system entity operated by a user, that is capable of accessing Web resources.
use case |
|
The specification of a sequence of actions, including variants, that a system (or other entity) can perform, interacting with actors of the system. See use-case instances. A use-case class contains all main, alternate flows of events related to producing the 'observable result of value'. Technically, a use-case is a class whose instances are scenarios. |
RUP |
use-case analysis |
|
The part of the software development process using use case methodology whose primary purpose is to formulate a model of the problem area. Analysis focuses on what to do, design focuses on how to do it. |
|
use-case diagram |
|
A diagram that shows the relationships among actors and use cases within a system. |
RUP |
use-case instance |
|
A sequence of actions performed by a system that yields an observable result of value to a particular actor. |
RUP |
use-case model |
|
A model that describes a system’s functional requirements in terms of use cases. |
|
use-case realization |
|
RUP |
|
use-case view |
|
RUP |
A collection of interlinked Web pages, including a host page, residing at the same network location. [Web Term]
Editorial note: HH | |
These should probably be migrated to the architecture document. |
Editorial note: HH | |
The SOAP definitions and the other definitions need to be made consistent. |
This section contains definitions of SOAP-specific terms that were taken from [SOAP12 Part1].
protocol |
|
A specification of a compatible set of messages used to communicate between capsules. The protocol defines a set of incoming and outgoing messages types (e.g. operations, signals), and optionally a set of sequence diagrams which define the required ordering of messages and a state machine which specifies the abstract behavior that the participants in a protocol must provide. |
RUP |
prototype |
|
A release that is not necessarily subject to change management and configuration control. |
RUP |
The formal set of conventions governing the format and processing rules of a SOAP message. These conventions include the interactions among SOAP nodes generating and accepting SOAP messages for the purpose of exchanging information along a SOAP message path.
The embodiment of the processing logic necessary to transmit, receive, process and/or relay a SOAP message, according to the set of conventions defined by this recommendation. A SOAP node is responsible for enforcing the rules that govern the exchange of SOAP messages. It accesses the services provided by the underlying protocols through one or more SOAP bindings.
A SOAP node's expected function in processing a message. A SOAP node can act in multiple roles.
The formal set of rules for carrying a SOAP message within or on top of another protocol (underlying protocol) for the purpose of exchange. Examples of SOAP bindings include carrying a SOAP message within an HTTP entity-body, or over a TCP stream.
An extension of the SOAP messaging framework typically associated with the exchange of messages between communicating SOAP nodes. Examples of features include "reliability", "security", "correlation", "routing", and the concept of message exchange patterns.
A template for the exchange of SOAP messages between SOAP nodes enabled by one or more underlying SOAP protocol bindings. A SOAP MEP is an example of a SOAP feature.
A software entity that produces, consumes or otherwise acts upon SOAP messages in a manner conforming to the SOAP processing model.
The basic unit of communication between SOAP nodes.
The outermost element information item of a SOAP message.
A collection of zero or more SOAP header blocks each of which might be targeted at any SOAP receiver within the SOAP message path.
An element information item used to delimit data that logically constitutes a single computational unit within the SOAP header. The type of a SOAP header block is identified by the fully qualified name of the header block element information item.
A collection of zero or more element information items targeted at an ultimate SOAP receiver in the SOAP message path.
A SOAP element information item which contains fault information generated by a SOAP node.
A SOAP node that transmits a SOAP message.
A SOAP node that accepts a SOAP message.
The set of SOAP nodes through which a single SOAP message passes. This includes the initial SOAP sender, zero or more SOAP intermediaries, and an ultimate SOAP receiver.
The SOAP sender that originates a SOAP message at the starting point of a SOAP message path.
A SOAP intermediary is both a SOAP receiver and a SOAP sender and is targetable from within a SOAP message. It processes the SOAP header blocks targeted at it and acts to forward a SOAP message towards an ultimate SOAP receiver.
The SOAP receiver that is a final destination of a SOAP message. It is responsible for processing the contents of the SOAP body and any SOAP header blocks targeted at it. In some circumstances, a SOAP message might not reach an ultimate SOAP receiver, for example because of a problem at a SOAP intermediary. An ultimate SOAP receiver cannot also be a SOAP intermediary for the same SOAP message.
To interact with a system entity in order to manipulate, use, gain knowledge of, and/or obtain a representation of some or all of a system entity's resources. [RFC 2828]
Protection of resources against unauthorized access; a process by which use of resources is regulated according to a security policy and is permitted by only authorized system entities according to that policy. [RFC 2828]
Any information used for access control purposes, including contextual information. [X.812]
Contextual information might include source IP address, encryption strength, the type of operation being requested, time of day, etc. Portions of access control information may be specific to the request itself, some may be associated with the connection via which the request is transmitted, and others (for example, time of day) may be "environmental". [RFC 2829]
A description of the type of authorized interactions a subject can have with a resource. Examples include read, write, execute, add, modify, and delete. [WSIA Glossary]
The set of attributes that together define a user's access to a given service. Each service may define a unique set of attributes to define an account. An account defines user or system access to a resource or service. [ProvServ Glossary]
The quality or state of being anonymous, which is the condition of having a name or identity that is unknown or concealed. [RFC 2828]
A service that reliably and securely records security-related events producing an audit trail enabling the reconstruction and examination of a sequence of events. Security events could include authentication events, policy enforcement decisions, and others. The resulting audit trail may be used to detect attacks, confirm compliance with policy, deter abuse, or other purposes.
To positively verify the identity of a user, device, or other entity in a computer system, often as a prerequisite to allowing access to resources in a system. [X.811]
authorization |
|
A right or a permission that is granted to a system entity to access a system resource. |
authorisation process |
|
A procedure for granting authorization. |
The process of determining, by evaluating applicable access control information, whether a subject is allowed to have the specified types of access to a particular resource. Usually, authorization is in the context of authentication. Once a subject is authenticated, it may be authorized to perform different types of access. [STG]
Assuring information will be kept secret, with access limited to appropriate persons. [NSA Glossary]
Data that is transferred to establish a claimed principal identity. [X.800]
digital signature |
|
A digital code that can be attached to an electronically transmitted message that uniquely identifies the sender |
|
encryption |
|
Cryptographic transformation of data (called "plaintext") into a form (called "ciphertext") that conceals the data's original meaning to prevent it from being known or used. If the transformation is reversible, the corresponding reversal process is called "decryption", which is a transformation that restores encrypted state.data to its original state. |
|
Assuring information will not be accidentally or maliciously altered or destroyed. [NSA Glossary]
The process whereby a user presents credentials to an authentication authority, establishes a simple session, and optionally establishes a rich session. [WSIA Glossary]
The process of presenting credentials to an authentication authority, establishing a simple session, and optionally establishing a rich session. [WSIA Glossary]
@@@ Is that correct? Shouldn't it be to terminate a session?
Method by which the sender of data is provided with proof of delivery and the recipient is assured of the sender's identity, so that neither can later deny having processed the data. [INFOSEC Glossary]
@@@ From reqs
A system entity whose identity can be authenticated. [X.811]
A set of rules and practices that specify or regulate how a system entity or organization collects, processes (uses) and discloses users' personal data as a result of the interaction with a service.
A plan and set of principles for an administrative domain and its security domains that describe the security services that a system is required to provide to meet the needs of its users, the system elements required to implement the services, and the performance levels required in the elements to deal with the threat environment. A complete security architecture for a system addresses administrative security, communication security, computer security, emanations security, personnel security, and physical security, and prescribes security policies for each. A complete security architecture needs to deal with both intentional, intelligent threats and accidental threats. A security architecture should explicitly evolve over time as an integral part of its administrative domain's evolution. [RFC 2828]
Secure MIME |
S/MIME, S-MIME |
A public-key encryption protocol for MIME (Multipurpose Internet Mail Extensions) attachments to electronic mail messages. |
www.techdictionary.com |
Secure Socket Layer |
SSL |
SSL is a protocol developed by Netscape to secure all internet communications. SSL intervene between TCP/IP and applications protocols (http, FTP, Telnet, etc.) to secure them. SSL is standardized by IETF under acronym TLS (Transport Layer Protocol), RFC 2246. It use RSA and MD5 algorithms. To encrypt data, it use RC2, RC4, DES or 3DES. SSL is compliant with X509 certificates. SSL is used with HTTP-S. |
ChamberSign (Fr) |
security model |
|
A schematic description of a set of entities and relationships by which a specified set of security services are provided by or within a system. |
IETF RFC 2828 |
security policy |
|
A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources. |
IETF RFC 2828 |
signature |
|
The name and parameters of a behavioral feature. A signature may include an optional returned parameter. |
RUP |
A schematic description of a set of entities and relationships by which a specified set of security services are provided by or within a system. [RFC 2828]
An environment or context that is defined by security models and a security architecture, including a set of resources and set of system entities that are authorized to access the resources. One or more security domains may reside in a single administrative domain. The traits defining a given security domain typically evolve over time. [RFC 2828]
A process (or a device incorporating such a process) that can be used in a system to implement a security service that is provided by or within the system.
A set of rules and practices that specify or regulate how a system or organization provides security services to protect resources. Security policies are components of security architectures. Significant portions of security policies are implemented via security services, using security policy expressions. [RFC 2828]
A mapping of principal identities and/or attributes thereof with allowable actions. Security policy expressions are often essentially access control lists. [STG]
A processing or communication service that is provided by a system to give a specific kind of protection to resources, where said resources may reside with said system or reside with other systems, for example, an authentication service or a PKI-based document attribution and authentication service. A security service is a superset of AAA services. Security services typically implement portions of security policies and are implemented via security mechanisms. [RFC 2828]
@@@ From reqs
The unique identity for a user with a system [WSIA Glossary]
Editorial note: HH | |
Need definitions for all of those. Sent a request to MTF. |
This document has been produced by the Web Services Architecture Working Group.
Members of the Working Group are (at the time of writing, and by alphabetical order): Daniel Austin (W. W. Grainger, Inc.), Mukund Balasubramanian (Infravio, Inc.), Mike Ballantyne (EDS), Abbie Barbir (Nortel Networks), David Booth (W3C), Allen Brown (Microsoft Corporation), Mike Brumbelow (Apple), Doug Bunting (Sun Microsystems, Inc.), Greg Carpenter (Nokia), Dipto Chakravarty (Artesia Technologies), Jun Chen (MartSoft Corp.), Alex Cheng (Ipedo), Tom Carroll (W. W. Grainger, Inc.), Michael Champion (Software AG), Martin Chapman (Oracle Corporation), Ugo Corda (SeeBeyond Technology Corporation), Roger Cutler (ChevronTexaco), Jonathan Dale (Fujitsu), Suresh Damodaran (Sterling Commerce(SBC)), Glen Daniels (Macromedia), James Davenport (MITRE Corporation), Alan Davies (SeeBeyond Technology Corporation), Paul Denning (MITRE Corporation), Ayse Dilber (AT&T), Zulah Eckert (Hewlett-Packard Company), Gerald Edgar (The Boeing Company), Colleen Evans (Progress Software Corp.), Chris Ferris (IBM), Daniela Florescu (XQRL Inc.), Shishir Garg (France Telecom), Yaron Goland (BEA Systems), Hugo Haas (W3C), Mark Hapner (Sun Microsystems, Inc.), Hao He (The Thomson Corporation), Dave Hollander (Contivo), Yin-Leng Husband (Hewlett-Packard Company), Nigel Hutchison (Software AG), Mario Jeckle (DaimlerChrysler Research and Technology), Mark Jones (AT&T), Tom Jordahl (Macromedia), Heather Kreger (IBM), Sandeep Kumar (Cisco Systems Inc), Hal Lockhart (OASIS), Michael Mahan (Nokia), Francis McCabe (Fujitsu), Michael Mealling (VeriSign, Inc.), Jens Meinkoehn (T-Nova Deutsche Telekom Innovationsgesellschaft), Jeff Mischkinsky (Oracle Corporation), Nilo Mitra (Ericsson), Himagiri Mukkamala (Sybase, Inc.), Eric Newcomer (IONA), Henrik Nielsen (Microsoft Corporation), Mark Nottingham (BEA Systems), David Orchard (BEA Systems), Srinivas Pandrangi (Ipedo), Fabio Riccardi (XQRL Inc.), Don Robertson (Documentum), Waqar Sadiq (EDS), Krishna Sankar (Cisco Systems Inc), Igor Sedukhin (Computer Associates), Jim Shur (Rogue Wave Software), Hans-Peter Steiert (DaimlerChrysler Research and Technology), Katia Sycara (Carnegie Mellon University), Patrick Thompson (Rogue Wave Software), Steve Vinoski (IONA), Scott Vorthmann (TIBCO Software, Inc.), Prasad Yendluri (webMethods, Inc.), Jin Yu (MartSoft Corp.), Sinisa Zimek (SAP).
Previous members of the Working Group were: Mark Baker (Idokorro Mobile, Inc. / Planetfred, Inc.), Tom Bradford (XQRL, Inc.), Sharad Garg (Intel), Joseph Hui (Exodus/Digital Island), Marcel Jemio (DISA), Timothy Jones (CrossWeave, Inc.), Jim Knutson (IBM), Bob Lojek (Intalio, Inc.), Anne Thomas Manes (Systinet), Joel Munter (Intel), David Noor (Rogue Wave Software), Kevin Perkins (Compaq), Darran Rolls (Waveset Technologies, Inc.).
The people who have contributed to discussions on the www-ws-arch public mailing list are also gratefully acknowledged.