Forewords |
|
xxi | |
|
|
|
Preface |
|
xxv | |
Acknowledgments |
|
xxvii | |
About the Authors |
|
xxix | |
developerWorks and SOA |
|
xxxi | |
|
|
1 | (10) |
|
|
3 | (1) |
|
|
4 | (3) |
|
|
4 | (1) |
|
|
5 | (2) |
|
A Preview of the Service-Oriented Architecture Compass |
|
|
7 | (2) |
|
|
9 | (1) |
|
|
9 | (2) |
|
Explaining the Business Value of SOA |
|
|
11 | (24) |
|
|
12 | (4) |
|
Enterprise Reconstruction |
|
|
13 | (1) |
|
|
14 | (1) |
|
The Impact of the Enterprise Reconstruction and Industry Deconstruction Trends |
|
|
15 | (1) |
|
The Trend Toward Business Components and Services |
|
|
16 | (1) |
|
Common Questions About SOA |
|
|
16 | (5) |
|
|
16 | (1) |
|
Why Do Companies Need SOA? |
|
|
17 | (1) |
|
What Benefits Will Businesses Receive if They Implement SOA? |
|
|
17 | (1) |
|
What Opportunities Will Companies Miss if They Don't Implement SOA? |
|
|
18 | (1) |
|
What Is Different with SOA Compared to Previous Approaches? |
|
|
18 | (1) |
|
Rethinking Components for Business and Applications |
|
|
19 | (1) |
|
When Not to Implement an SOA |
|
|
20 | (1) |
|
|
21 | (10) |
|
Explaining SOA to Business People |
|
|
21 | (1) |
|
A Checklist for Business Change Agility |
|
|
22 | (9) |
|
The Nine Business Rules of Thumb for SOAs |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
32 | (3) |
|
|
35 | (28) |
|
Refining SOA Characteristics |
|
|
37 | (4) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
41 | (1) |
|
Applying the SOA Characteristics |
|
|
41 | (1) |
|
|
41 | (2) |
|
Resource Virtualization Services |
|
|
42 | (1) |
|
Service-Level Automation and Orchestration |
|
|
42 | (1) |
|
Utility Business Services |
|
|
43 | (1) |
|
The Enterprise Service Bus (ESB) |
|
|
43 | (4) |
|
|
45 | (1) |
|
Quality-of-Service-Based Routing |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
SOA Enterprise Software Models |
|
|
47 | (10) |
|
|
47 | (1) |
|
Platform-Independent Realization |
|
|
48 | (1) |
|
Platform-Specific Realization |
|
|
49 | (1) |
|
|
50 | (1) |
|
Services Integration on the WebSphere Application Server |
|
|
50 | (3) |
|
The Information Management Domain |
|
|
53 | (4) |
|
The IBM On Demand Operating Environment |
|
|
57 | (3) |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
61 | (2) |
|
SOA Project Planning Aspects |
|
|
63 | (22) |
|
Organizing Your SOA Project Office |
|
|
63 | (2) |
|
|
65 | (3) |
|
The Need for SOA Governance |
|
|
68 | (7) |
|
SOA Governance Motivation and Objectives |
|
|
68 | (1) |
|
|
69 | (1) |
|
Strategic Direction and SOA Governance Principles |
|
|
69 | (1) |
|
|
70 | (1) |
|
Managing the Risk of an SOA Roadmap |
|
|
70 | (2) |
|
|
72 | (1) |
|
Launching the Governance Model |
|
|
73 | (1) |
|
Hints and Tips for Success |
|
|
74 | (1) |
|
|
75 | (1) |
|
Reducing Impact by Modularization |
|
|
75 | (1) |
|
Achieving Middleware Independence with Explicit Process State |
|
|
75 | (1) |
|
Business Exceptions Monitoring and Handling |
|
|
75 | (1) |
|
|
76 | (6) |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
Examining and Adapting Roles |
|
|
77 | (1) |
|
|
78 | (1) |
|
|
79 | (2) |
|
Integrating Existing and New Roles |
|
|
81 | (1) |
|
|
82 | (2) |
|
|
84 | (1) |
|
|
84 | (1) |
|
Aspects of Analysis and Design |
|
|
85 | (18) |
|
Service-Oriented Analysis and Design |
|
|
85 | (10) |
|
|
86 | (1) |
|
|
86 | (3) |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
92 | (2) |
|
|
94 | (1) |
|
|
94 | (1) |
|
Service-Oriented Analysis and Design---Activities |
|
|
95 | (4) |
|
|
95 | (2) |
|
Categorization of Services |
|
|
97 | (1) |
|
Specification of Services |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
100 | (3) |
|
Enterprise Solution Assets |
|
|
103 | (20) |
|
|
104 | (2) |
|
Selecting the Architectural Methodology |
|
|
104 | (1) |
|
Formalizing Architectural Decisions |
|
|
104 | (1) |
|
Identifying Architectural Best Practices |
|
|
105 | (1) |
|
Performing the Product and Package Mappings |
|
|
105 | (1) |
|
Enterprise Solution Assets Explained |
|
|
106 | (1) |
|
A Catalog of Enterprise Solution Assets |
|
|
106 | (1) |
|
How Does an ESA Solve Enterprise Problems? |
|
|
107 | (1) |
|
Selecting an Enterprise Solution Asset |
|
|
108 | (1) |
|
Using an Enterprise Solution Asset |
|
|
108 | (1) |
|
Multitiered Disconnected Operation |
|
|
108 | (7) |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
110 | (4) |
|
|
114 | (1) |
|
Request Response Template |
|
|
115 | (5) |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
117 | (2) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
120 | (3) |
|
Determining Non-Functional Requirements |
|
|
123 | (12) |
|
|
123 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
Industry Business Standards |
|
|
124 | (1) |
|
|
124 | (3) |
|
Operating Environment Constraints |
|
|
126 | (1) |
|
Technical Model Constraints |
|
|
127 | (1) |
|
|
127 | (1) |
|
|
127 | (1) |
|
|
127 | (4) |
|
|
127 | (3) |
|
|
130 | (1) |
|
Transactional Integrity NFRs |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
131 | (2) |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
133 | (2) |
|
Securing the SOA Environment |
|
|
135 | (28) |
|
Architectural Considerations for an SOA Security Model |
|
|
135 | (2) |
|
Concepts and Elements of Security |
|
|
137 | (7) |
|
|
137 | (1) |
|
|
137 | (1) |
|
Identity and Authentication |
|
|
138 | (1) |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
139 | (2) |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
144 | (1) |
|
Implementation Requirements for SOA Security |
|
|
144 | (3) |
|
Managing Security Policies |
|
|
144 | (1) |
|
Defining Transport Security Policies |
|
|
144 | (1) |
|
Defining Message Layer Security Policies |
|
|
145 | (1) |
|
Defining Data Protection Policies |
|
|
146 | (1) |
|
Defining Security Token Policies |
|
|
146 | (1) |
|
Defining Cryptographic Key Policies |
|
|
147 | (1) |
|
Coordinating Policies Between Business Partners |
|
|
147 | (1) |
|
Standards and Mechanisms for SOA Security |
|
|
147 | (6) |
|
The Basic Security Standard: WS-Security |
|
|
148 | (2) |
|
|
150 | (1) |
|
Federated Security: WS-Federation |
|
|
150 | (1) |
|
Session Management: WS-SecureConversation |
|
|
151 | (1) |
|
Authorization and Policies: WS-Policy |
|
|
152 | (1) |
|
Implementing Security in SOA Systems |
|
|
153 | (3) |
|
Implementing Basic Security Services |
|
|
153 | (1) |
|
Implementing Point-of-Contact Services |
|
|
154 | (1) |
|
Implementing Message Layer Security Services |
|
|
155 | (1) |
|
Implementing Trust Services |
|
|
155 | (1) |
|
Implementing a Federation |
|
|
155 | (1) |
|
Non-Functional Requirements Related to Security |
|
|
156 | (2) |
|
The Performance Impact of Security |
|
|
156 | (1) |
|
|
157 | (1) |
|
Technology and Product Mappings |
|
|
158 | (1) |
|
Transport Layer Point of Contact |
|
|
158 | (1) |
|
Web Services Layer Point of Contact |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
160 | (3) |
|
Managing the SOA Environment |
|
|
163 | (18) |
|
Distributed Service Management and Monitoring Concepts |
|
|
163 | (4) |
|
|
164 | (1) |
|
Levels of SOA-Driven Management |
|
|
164 | (3) |
|
Key Services Management Concepts |
|
|
167 | (2) |
|
Managing the Enterprise Service Bus |
|
|
168 | (1) |
|
|
169 | (1) |
|
Operational Management Challenges |
|
|
169 | (3) |
|
Challenges with Respect to Management Perspectives |
|
|
170 | (1) |
|
|
171 | (1) |
|
Service-Level Agreement Considerations |
|
|
172 | (1) |
|
|
173 | (5) |
|
Business Performance and Business Service Management |
|
|
173 | (1) |
|
IT Application and Resource Management |
|
|
174 | (2) |
|
Other Areas of Management |
|
|
176 | (2) |
|
External Product Relationships |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (2) |
|
Case Studies in SOA Deployment |
|
|
181 | (14) |
|
Case Study: SOA in the Insurance Industry |
|
|
181 | (8) |
|
IT and Business Challenges |
|
|
182 | (1) |
|
|
182 | (4) |
|
|
186 | (2) |
|
|
188 | (1) |
|
Case Study: SOA in Government Services |
|
|
189 | (4) |
|
IT and Business Challenges |
|
|
189 | (1) |
|
|
190 | (1) |
|
|
190 | (2) |
|
|
192 | (1) |
|
|
193 | (2) |
|
|
195 | (8) |
|
|
195 | (2) |
|
|
197 | (1) |
|
|
198 | (3) |
|
|
199 | (1) |
|
Web Services Monitoring and Visualization |
|
|
199 | (1) |
|
|
199 | (1) |
|
Open Development Platforms |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
200 | (1) |
|
Virtual Services Platform |
|
|
200 | (1) |
|
Event-Driven Architectures |
|
|
200 | (1) |
|
Model-Driven Architectures |
|
|
201 | (1) |
|
|
201 | (1) |
|
|
201 | (1) |
|
|
201 | (1) |
|
|
202 | (1) |
Glossary |
|
203 | (18) |
Index |
|
221 | |