Track 8: services and integration, Services and integration – Google 2007 JavaOne Advance Conference Guide User Manual
Page 50

48
|
* Content subject to change.
TECHNICAL SESSIoNS
| TRACK EIGHT | SERVICES AND INTEGRATION
Services and Integration
TS-7080 open Source SoA realized
Soren Hartvig, Capgemini
Poul Moller, Capgemini
This session dives straight into the middle of a real-world open source
SOA implementation, showing all the facets of how the SOA Big Rules are
attained within the solution.
It presents an in-depth walk-through, including examples and demos, of
• How to implement large xmlschema-driven document/literal web
services, using partly Java EE 5 and partly Java 2 Platform, Enterprise
Edition (J2EE) 1.4
• How security is enabled through certificate-based authentication with
WS-Security
• How the services are orchestrated with WS-BPEL
• How JSR 168 portlets leverage the end-user experience and how these
are exposed by use of Web Services for Remote Portlets (WSRP)
The solution is based strictly on open source software, and the session
includes a guide for picking the right frameworks and the right products
from the myriad available.
Prerequisites: Knowledge of Java technology, IDEs, XML; interest in SOA
TS-8131 Java Technology and Web Services Security in Action
William Bathurst, Oracle
Marc Chanliau, Oracle
Tugdual Grall, Oracle
Vikas Jain, Oracle
In service-oriented architecture (SOA), security and especially identity
propagation are among the challenges IT organizations face today.
Java EE and Java SE provide standards and best practices, such as Java
Authentication and Authorization Service (JAAS) and Java Authorization
Contract for Containers (JACC), to ensure security in the platform, and
web services also provide WS-Security standards for achieving secure
communication and identity propagation. In this session, you find out
how you can achieve identity propagation between services and business
processes by using Java technology.
The session introduces you to the various security standards of the Java
platform and web services and demonstrates them in action by using
an end-to-end scenario involving Java SE, Java EE applications (JAX-WS),
business processes (BPEL), and the Enterprise Service Bus (ESB). You see
how Java technology-based security can be used in conjunction with WS-
Security standards to encrypt, sign messages, and propagate the identity
of users between the various actors of a classical SOA-based application.
SErvICES ANd INTEGrATIoN
SOA architectures are being realized in
implementations of high-value connections between
enterprises. These e-business collaborations present
a challenge not typically considered when SOA is
discussed. Developers must start creating global
applications. In addition, the delta between external
collaboration and internal integration is disappearing.
In effect, developers are beginning to converge on a
single global application development model.
This track’s sessions address the developer community’s
need for creating pragmatic e-business services with
Java technology. Among the topics are the following:
• Best practices for implementing composite
applications conforming to service-oriented
architecture principles
• Securing global collaboration
• The design of message-based collaborations
independent of platform and service implementation
• Best practices in policy enforcement
• Tools and technologies for implementing e-business
services for functions such as orchestration, routing,
rules, validation, and data access
• The use of REST and Web 2.0 techniques to solve
e-collaboration problems
• What facilities provided by web services and SOA
have been found to be of the most value in solving
e-collaboration problems
• New approaches and technologies such as SCA and
Java Business Integration (JBI)
• Interoperability
Te
ch
n
ic
al
S
es
si
o
n
s
:
Tr
ac
k
8
|
Se
rv
ic
es
a
n
d
I
n
te
g
ra
ti
o
n
n
n
n
n
n
n
n
n
n