假设您有一个服务提供方策略和服务请求方策略。
Assume you have a service provider policy and a requester policy. These policies have been normalized and take the following form:.
在下面的部分中,我将研究从服务请求方发送消息到服务响应方。
In the following section I will investigate sending a message from a service requestor to a service responder.
例如服务提供方要求采用一种特殊的加密方法,而服务请求方没有支持这种加密方法的安全基础架构。
An example of this would be a service provider that asks for a particular type of encryption method, for which the service requester doesn't have the security infrastructure to support.
例如,假象在一个过去的商业服务公司的项目中,第三方合作伙伴使用一个Web服务请求您的系统的信息。
For example, suppose that on a past project at a financial services company, your system requested information from a third party by using a Web service.
选择使用服务提供者提供的某个服务(如,在仔细地查过UDDI注册方以后)的服务请求者预订使用该服务并订立合同。
Service requestors that have chosen to use one of the service providers services (e.g. after exploring the UDDI registry), subscribe and contract the usage.
在服务请求者方嵌入一个成员资格令牌符号到服务请求中,并且。
Embed a membership token in the service request at the requestor, and.
一个常用的实践方法是使用发送方的X . 509证书的私钥对Web服务请求的SOAPBody进行数字签名。
A common practice is to use the private key of the sender's X.509 certificate to digitally sign the SOAP body of a web service request.
一个常用的实践方法是使用发送方的X . 509证书的私钥对Web服务请求的SOAPBody进行数字签名。
A common practice is to use the private key of the sender's X.509 certificate to digitally sign the SOAP body of a web service request.
应用推荐