Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

Interoperability with component standards and web services

BMBF-Project SicAri: Deliverable MW1; Projekt-Laufzeit: 01.10.2003 - 30.09.2007
: Oetting, J.; Peters, J.
: SicAri Consortium; AG; Fraunhofer-Institut für Graphische Datenverarbeitung -IGD-, Darmstadt; Bundesministerium für Bildung und Forschung -BMBF-

Volltext urn:nbn:de:0011-n-452397 (179 KByte PDF)
MD5 Fingerprint: 504632ecf93d9026c5cebc2e4a115de4
Erstellt am: 08.08.2006

Element named row_ProjectData has starweb_type Output Field Repeater but ID not found in STAR Web Designer.
Darmstadt, 2004, 34 S.
Reportnr.: 04i025-FIGD
Bericht, Elektronische Publikation
Fraunhofer IGD ()
mobile agent; web services; interoperability

The report gives a short overview about both web service and mobile agent technology, subsequently a generic integration approach of these technologies is discussed, and two concrete example scenarios are described. Related work is reviewed with respect to agent interoperability, web service enhancements, and the integration of static as well as mobile agents and web services. The proposed architectural model is covered and the integration details as well as security concerns are presented. Concluding, the described approach in discussed in comparison with existing contributions in the field.

Contents S.2
1 Introduction S.3-8
- 1.1 Web Service Technology S.3-4
- 1.2 Mobile Agent Technology S.4
- 1.3 Integration S.4-8
- 1.3.1 Assumptions, Requirements, and Definitions S.5-7
- 1.3.2 Example Scenarios S.7-8
2 Related Work S.9-12
- 2.1 (Mobile) Agent Interoperability S.10
- 2.2 Web Service Enhancements S.10
- 2.3 Web Services and Static Agents S.11-12
- 2.4 Web Services and Mobile Agents S.12
3 Architectural Model S.13-15
- 3.1 Assumptions S.14-15
- 3.2 Architecture S.15
- 4.1 SeMoA S.16
4 System Integration S.16-20
- 4.2 AXIS S.19-20
- 4.3 Integration of SeMoA and AXIS S.20
5 Security Aspects S.21-25
- 5.1 SeMoA Security Mechanisms S.22-24
- 5.2 Security of Web Services S.24-25
- 5.3 Security Architecture S.26
6 Discussion and Future Work S.26-34