A Preliminary Study on Portable Interceptor Mechanism to SOAP

Web Services have become increasingly popular in distributed applications, and the SOAP technology is currently the most widely used Web Service. Recently, middleware researchers have applied the interception approach to problems in various domains. Instead of providing a portable interceptor like that used in the CORBA protocol, SOAP 1.2 provides an intermediary mechanism, which has to solve the backward compatible issue to be used as an interceptor. In this paper, we evaluate the interception requirements for CA, CF, FT, and LB. Our findings suggest that the run-time administration features of the current CORBA Portable Interceptor are not appropriate for some application domains. This motivates us to develop a new Portable Interceptor Mechanism (PIM) for SOAP so that the protocol meets the interception requirements of all Web Services. The proposed PIM includes portable interceptor management in the SOAP engine and portable interceptor interface definitions.

[1]  Miklos A. Vasarhelyi,et al.  Continuous Online Auditing: A Program of Research , 1999, J. Inf. Syst..

[2]  Rick Elam,et al.  Continuous Auditing: Building Automated Auditing Capability , 2002 .

[3]  M. Vasarhelyi THE CONTINUOUS AUDIT OF ONLINE SYSTEMS , 1991 .

[4]  Robert R. Tucker Principles of Auditing and Other Assurance Services , 2004 .

[5]  Peter Sommer,et al.  Intrusion detection systems as evidence , 1999, Comput. Networks.

[6]  Douglas C. Schmidt,et al.  The Design of an Adaptive Middleware Load Balancing and Monitoring Service , 2003 .

[7]  Stephen A. Jarvis,et al.  Grid load balancing using intelligent agents , 2005, Future Gener. Comput. Syst..

[8]  Roy Friedman,et al.  FTS: a high-performance CORBA fault-tolerance service , 2002, Proceedings of the Seventh IEEE International Workshop on Object-Oriented Real-Time Dependable Systems. (WORDS 2002).

[9]  Hong Va Leong,et al.  Improving the scalability of the CORBA event service with a multi‐agent load balancing algorithm , 2002, Softw. Pract. Exp..

[10]  Robert Rowlingson,et al.  A Ten Step Process for Forensic Readiness , 2004, Int. J. Digit. EVid..

[11]  Zhiqiang Ma,et al.  A fault tolerant web services architecture based reflection , 2008, 2008 Chinese Control and Decision Conference.

[12]  Deron Liang,et al.  Fault tolerant Web service , 2003, Tenth Asia-Pacific Software Engineering Conference, 2003..

[13]  Aniruddha S. Gokhale,et al.  DOORS: towards high-performance fault tolerant CORBA , 2000, Proceedings DOA'00. International Symposium on Distributed Objects and Applications.

[14]  Jon B. Woodroof,et al.  Continuous audit: Model development and implementation within a debt covenant compliance domain , 2001, Int. J. Account. Inf. Syst..

[15]  Deron Liang,et al.  A redundant nested invocation suppression mechanism for active replication fault-tolerant Web service , 2004, IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004.