Ebxml Registry Information Model Version

Total Page:16

File Type:pdf, Size:1020Kb

Ebxml Registry Information Model Version 1 2 ebXML Registry Information Model 3 Version 3.0 4 OASIS Standard, 2 May, 2005 5 Document identifier: 6 regrep-rim-3.0-os 7 Location: 8 http://docs.oasis-open.org/regrep-rim/v3.0/ 9 Editors: Name Affiliation Sally Fuger Individual Farrukh Najmi Sun Microsystems Nikola Stojanovic RosettaNet 10 11 Contributors: Name Affiliation Diego Ballve Individual Ivan Bedini France Telecom Kathryn Breininger The Boeing Company Joseph Chiusano Booz Allen Hamilton Peter Kacandes Adobe Systems Paul Macias LMI Government Consulting Carl Mattocks CHECKMi Matthew MacKenzie Adobe Systems Monica Martin Sun Microsystems Richard Martell Galdos Systems Inc Duane Nickull Adobe Systems regrep-rim-3.0-os May 2, 2005 Copyright © OASIS Open 2005. All Rights Reserved. Page 1 of 78 12 13 Abstract: 14 This document defines the types of metadata and content that can be stored in an ebXML 15 Registry. 16 A separate document, ebXML Registry: Service and Protocols [ebRS], defines the services and 17 protocols for an ebXML Registry. 18 19 Status: 20 This document is an OASIS ebXML Registry Technical Committee Approved Draft 21 Specification. 22 Committee members should send comments on this specification to the [email protected] 23 open.org list. Others should subscribe to and send comments to the regrep- 24 [email protected] list. To subscribe, send an email message to regrep-comment- 25 [email protected] with the word "subscribe" as the body of the message. 26 For information on whether any patents have been disclosed that may be essential to 27 implementing this specification, and any offers of patent licensing terms, please refer to the 28 Intellectual Property Rights section of the OASIS ebXML Registry TC web page 29 (http://www.oasis-open.org/committees/regrep/). regrep-rim-3.0-os May 2, 2005 Copyright © OASIS Open 2005. All Rights Reserved. Page 2 of 78 30 Table of Contents 31 1 Introduction.............................................................................................................................................10 32 1.1 Audience.........................................................................................................................................10 33 1.2 Terminology....................................................................................................................................10 34 1.3 Notational Conventions...................................................................................................................10 35 1.3.1 UML Diagrams.........................................................................................................................10 36 1.3.2 Identifier Placeholders.............................................................................................................10 37 1.3.3 Constants.................................................................................................................................10 38 1.3.4 Bold Text..................................................................................................................................11 39 1.3.5 Example Values.......................................................................................................................11 40 1.4 XML Schema Conventions.............................................................................................................11 41 1.4.1 Schemas Defined by ebXML Registry.....................................................................................11 42 1.4.2 Schemas Used By ebXML Registry........................................................................................12 43 1.5 RepositoryItems and RegistryObjects............................................................................................13 44 1.6 Canonical ClassificationSchemes..................................................................................................13 45 1.7 Registry Information Model: Overview............................................................................................15 46 1.7.1 Class Relationships View........................................................................................................15 47 1.7.2 Class Inheritance View............................................................................................................15 48 1.7.2.1 Class Identifiable................................................................................................................................16 49 2 Core Information Model..........................................................................................................................18 50 2.1 Attributes of Information Model Classes.........................................................................................18 51 2.2 Data Types......................................................................................................................................18 52 2.3 Internationalization (I18N) Support................................................................................................19 53 2.3.1 Class InternationalString.........................................................................................................19 54 2.3.1.1 Attribute Summary..............................................................................................................................19 55 2.3.1.2 Attribute localizedStrings....................................................................................................................19 56 2.3.2 Class LocalizedString..............................................................................................................19 57 2.3.2.1 Attribute Summary..............................................................................................................................20 58 2.3.2.2 Attribute lang .....................................................................................................................................20 59 2.3.2.3 Attribute charset..................................................................................................................................20 60 2.3.2.4 Attribute value.....................................................................................................................................20 61 2.4 Class Identifiable............................................................................................................................20 62 2.4.1 Attribute Summary...................................................................................................................20 63 2.4.2 Attribute id...............................................................................................................................20 64 2.4.3 Attribute home.........................................................................................................................20 65 2.4.4 Attribute slots...........................................................................................................................21 66 2.5 Class RegistryObject......................................................................................................................21 67 2.5.1 Attribute Summary...................................................................................................................21 68 2.5.2 Composed Object....................................................................................................................21 69 2.5.3 Attribute classifications............................................................................................................22 70 2.5.4 Attribute description.................................................................................................................22 71 2.5.5 Attribute externalIdentifier.......................................................................................................22 72 2.5.6 Attribute lid..............................................................................................................................22 73 2.5.7 Attribute name.........................................................................................................................23 74 2.5.8 Attribute objectType................................................................................................................23 regrep-rim-3.0-os May 2, 2005 Copyright © OASIS Open 2005. All Rights Reserved. Page 3 of 78 75 2.5.9 Attribute status........................................................................................................................23 76 2.5.9.1 Pre-defined RegistryObject Status Types..........................................................................................23 77 2.5.10 Attribute versionInfo..............................................................................................................24 78 2.6 Class VersionInfo ...........................................................................................................................24 79 2.6.1 Attribute Summary...................................................................................................................24 80 2.6.2 Attribute versionName.............................................................................................................24 81 2.6.3 Attribute comment...................................................................................................................24 82 2.7 Class ObjectRef..............................................................................................................................24
Recommended publications
  • TIBCO Businessconnect™ Ebxml Protocol User’S Guide — Ebms3/AS4 Standard
    TIBCO BusinessConnect™ ebXML Protocol User’s Guide — ebMS3/AS4 Standard Software Release 6.1 August 2015 Two-Second Advantage® Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY TO ENABLE THE FUNCTIONALITY (OR PROVIDE LIMITED ADD-ON FUNCTIONALITY) OF THE LICENSED TIBCO SOFTWARE. THE EMBEDDED OR BUNDLED SOFTWARE IS NOT LICENSED TO BE USED OR ACCESSED BY ANY OTHER TIBCO SOFTWARE OR FOR ANY OTHER PURPOSE. USE OF TIBCO SOFTWARE AND THIS DOCUMENT IS SUBJECT TO THE TERMS AND CONDITIONS OF A LICENSE AGREEMENT FOUND IN EITHER A SEPARATELY EXECUTED SOFTWARE LICENSE AGREEMENT, OR, IF THERE IS NO SUCH SEPARATE AGREEMENT, THE CLICKWRAP END USER LICENSE AGREEMENT WHICH IS DISPLAYED DURING DOWNLOAD OR INSTALLATION OF THE SOFTWARE (AND WHICH IS DUPLICATED IN THE LICENSE FILE) OR IF THERE IS NO SUCH SOFTWARE LICENSE AGREEMENT OR CLICKWRAP END USER LICENSE AGREEMENT, THE LICENSE(S) LOCATED IN THE “LICENSE” FILE(S) OF THE SOFTWARE. USE OF THIS DOCUMENT IS SUBJECT TO THOSE TERMS AND CONDITIONS, AND YOUR USE HEREOF SHALL CONSTITUTE ACCEPTANCE OF AND AN AGREEMENT TO BE BOUND BY THE SAME. This document contains confidential information that is subject to U.S. and international copyright laws and treaties. No part of this document may be reproduced in any form without the written authorization of TIBCO Software Inc. TIBCO, Two-Second Advantage, TIBCO ActiveMatrix BusinessWorks, TIBCO ActiveMatrix BusinessWorks Plug-in for BusinessConnect, TIBCO Administrator, TIBCO BusinessConnect, TIBCO BusinessConnect Palette, TIBCO Designer, TIBCO Enterprise Message Service, TIBCO Hawk, TIBCO Rendezvous, TIBCO Runtime Agent are either registered trademarks or trademarks of TIBCO Software Inc.
    [Show full text]
  • Realization of the System for Access Management and Identity Federation with Use of Service Mojeid and the Product Dirx Access
    MASARYKOVA UNIVERZITA FAKULTA}w¡¢£¤¥¦§¨ INFORMATIKY !"#$%&'()+,-./012345<yA| Realization of the system for access management and identity federation with use of service mojeID and the product DirX Access. DIPLOMA THESIS Jakub Šebök Brno, Autumn 2014 Declaration Hereby I declare, that this paper is my original authorial work, which I have worked out by my own. All sources, references and literature used or excerpted during elaboration of this work are properly cited and listed in complete reference to the due source. Jakub Šebök Advisor: RNDr. JUDr. Vladimír Šmíd, CSc. ii Acknowledgement I would like to thank firstly to my technical consultant Filip Höfer for his guidance. Secondly I thank to Mr. Šmíd for his advice about methodology and formal formatting of the thesis. And lastly I would like to thank all who survived by my side and cheered me up espe- cially during last months before the deadline. These are namely my mom, my girlfriend, Anton Gierlti, Matej Chrenko, Buddha and Bill Cosby. Thank you all again for enormous support. iii Abstract The aim of this thesis is implementation of a client program on the side of DirX Access which cooperates with the Czech identity provider mojeID. This cooperation consists of authenticating users by third party authority such that their credentials can be used for further processing in access management mechanism of DirX Access. iv Keywords security, SSO, OpenID, policies, RBAC, identity, mojeID, access man- agement, authentication, authorization v Contents 1 Introduction ............................3 2 Internet Security and Terminology ..............5 2.1 Identity ............................5 2.2 Identity Provider and Relying Party ...........6 2.3 Claims vs.
    [Show full text]
  • How to Use the IBM CMIS Authentication Methods Contents
    How to use the IBM CMIS authentication methods This tech note describes how to use the authentication methods supported with IBM CMIS. Contents Introduction .............................................................................................................................................. 1 Before You Start ........................................................................................................................................ 2 Using HTTP Basic Authentication .............................................................................................................. 2 Basic Authentication with Authorization Header ................................................................................. 2 Basic Authentication with an LTPA Token sent via an HTTP Cookie Header ........................................ 3 Using WS-Security Authentication ............................................................................................................ 4 LTPA Token sent via a SOAP Header ..................................................................................................... 4 Username Token sent via SOAP Header ............................................................................................... 5 Introduction There are two authentication methods supported with IBM CMIS: • HTTP Basic Authentication This option uses an HTTP header that contains an encoded username and password to authenticate clients. • WS-Security Authentication This option uses a WS-Security SOAP header to authenticate clients.
    [Show full text]
  • Trusted Computing Or Distributed Trust Management?
    Trusted computing or distributed trust management? Michele Tomaiuolo Dipartimento di Ingegneria dell’Informazione Università di Parma Via Usberti, 181/A – 43100 Parma – Italy [email protected] Abstract Nowadays, in contrast with centralized or hierarchical certification authorities and directory of names, other solutions are gaining momentum. Federation of already deployed security systems is considered the key to build global security infrastructures. In this field, trust management systems can play an important role, being based on a totally distributed architecture. The idea of distributed trust management can be confronted with the concept of trusted computing. Though having a confusingly similar denomination, the different interpretation of trust in these systems drives to divergent consequences with respect to system architectures and access policies, but also to law, ethics, politics. While trusted computing systems assure copyright holders and media producers that the hosting system will respect the access restrictions they defined, trust management systems, instead, allow users to grant trust to other users or software agents for accessing local resources. Keywords Data security, Security Management, Authentication, Authorization, Intellectual Property Rights, Information Access, Digital Books, Multimedia, Web Technologies Introduction A number of architectures and systems are being proposed as a ground for improved interoperability among diverse systems, mainly exploiting the idea of service-oriented architecture. Yet, some issues remain open. In fact, composition of services requires some delegation of goals and duties among partners. But these delegations cannot come into effect, if they’re not associated with a corresponding delegation of privileges, needed to access some resources and complete delegated tasks, or achieve desired goals.
    [Show full text]
  • Extensible Access Control Markup Language (XACML) Version 1.0
    1 2 eXtensible Access Control Markup Language 3 (XACML) Version 2.0 4 OASIS Standard, 1 Feb 2005 5 Document Identifier: oasis-access_control-xacml-2.0-core-spec-os 6 Location: http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdf 7 Editor: 8 Tim Moses, Entrust Inc. ([email protected]) 9 Abstract: 10 This specification defines version 2.0 of the extensible access-control markup language. 11 Status: 12 This version of the specification is an approved OASIS Standard within the OASIS Access 13 Control TC. 14 Access Control TC members should send comments on this specification to the 15 [email protected] list. Others may use the following link and complete the 16 comment form: http://oasis-open.org/committees/comments/form.php?wg_abbrev=xacml. 17 For information on whether any patents have been disclosed that may be essential to 18 implementing this specification, and any offers of patent licensing terms, please refer to the 19 Intellectual Property Rights section of the Access Control TC web page (http://www.oasis- 20 open.org/committees/tc_home.php?wg_abbrev=xacml). 21 For any errata page for this specification, please refer to the Access Control TC web page 22 (http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=xacml). 23 The non-normative errata page for this specification is located at 24 www.oasis-open.org/committees/access-control. 25 Copyright © OASIS Open 2004-2005 All Rights Reserved. access_control-xacml-2.0-core-spec-os 1 February 2005 Copyright © OASIS Open 2004.
    [Show full text]
  • SAML Profiles
    EUROPEAN COMMISSION DIRECTORATE-GENERAL FOR HEALTH AND FOOD SAFETY General Affairs Information systems eHealth DSI Patient Summary and ePrescription SAML Profiles DOCUMENT VERSION 2.0.0 DATE 28/03/2017 STATUS Release Candidate Disclaimer "Release Candidate" versions are provided for evaluation/approval purposes only. Minor updates that benefit the document maturity are expected towards the "Production Release". Responsibility for the information and views set out in this document lies entirely with the authors. Reproduction is authorised provided the source is acknowledged. COVER AND CONTROL PAGE OF DOCUMENT Document old name: epSOS Architecture and Design EED DESIGN – epSOS SAML Profiles Document name: SAML Profile Distribution level*: PU Status: Release Candidate Author(s): eHealth DSI provider Organization: * Distribution level: PU = Public, PP = Restricted to other programme participants, RE = Restricted to a group specified by the consortium, CO = Confidential, only for members of the consortium. ABSTRACT This normative binding specifies the mapping of the eHealth DSI HP identity and treatment context claims onto the SAML 2.0. CHANGE HISTORY Version Date Status Changes From Review V 1.1 17/12/2013 Publish Fraunhofer FOKUS V2.0.0 28/03/2017 Remove all eHealth DSI provider references to epSOS and requirements TABLE OF CONTENTS 1 Introduction............................................................................................................................... 4 1.1 eHealth DSI Identity and Context Claims...........................................................................
    [Show full text]
  • Web Single Sign-On Authentication Using SAML
    IJCSI International Journal of Computer Science Issues, Vol. 2, 2009 41 ISSN (Online): 1694-0784 ISSN (Printed): 1694-0814 Web Single Sign-On Authentication using SAML Kelly D. LEWIS, James E. LEWIS, Ph.D. Information Security, Brown-Forman Corporation Louisville, KY 40210, USA [email protected] Engineering Fundamentals, Speed School of Engineering, University of Louisville Louisville, KY 40292, USA [email protected] Abstract In addition, there are problems for the external service Companies have increasingly turned to application service provider as well. Every user in an organization will need providers (ASPs) or Software as a Service (SaaS) vendors to to be set up for the service provider’s application, offer specialized web-based services that will cut costs and provide specific and focused applications to users. The causing a duplicate set of data. Instead, if the complexity of designing, installing, configuring, deploying, and organization can control this user data, it would save the supporting the system with internal resources can be eliminated service provider time by not needing to set up and with this type of methodology, providing great benefit to organizations. However, these models can present an terminate user access on a daily basis. Furthermore, one authentication problem for corporations with a large number of central source would allow the data to be more accurate external service providers. This paper describes the and up-to-date. implementation of Security Assertion Markup Language (SAML) and its capabilities to provide secure single sign-on Given this set of problems for organizations and their (SSO) solutions for externally hosted applications. Keywords: Security, SAML, Single Sign-On, Web, service providers, it is apparent that a solution is needed Authentication that provides a standard for authentication information to be exchanged over the Internet.
    [Show full text]
  • OASIS Response to NSTC Request for Feedback on Standard Practices
    OASIS RESPONSE TO NSTC REQUEST FOR FEEDBACK ON STANDARDS PRACTICES OASIS (Organization for the Advancement of Structured Information Standards) is pleased to respond to the request from the National Science and Technology Council's Sub-Committee on Standards published at 75 FR 76397 (2010), and extended by 76 FR 3877 (2011), for feedback and observations regarding the effectiveness of Federal agencies' participation in the development and implementation of standards and conformity assessment activities and programs. We have advised our own members about the Federal Register inquiry, in case they wish to respond. Of course, their opinions are their own, and this response does not represent the views of any members, but only the observations of OASIS professional staff. I. RESPONDENT'S BACKGROUND OASIS is one of the largest and oldest global open data standards consortia, founded in 1993 as SGML Open. OASIS has over 5000 active participants representing about 600 member organizations and individual members in over 80 countries. We host widely-used standards in multiple fields including • cybersecurity & access control (such as WS-Security, SAML, XACML, KMIP, DSS & XSPA) [/1], • office documents and smart semantic documents (such as OpenDocument, DITA, DocBook & CMIS) [/2], and • electronic commerce (including SOA and web services, such as BPEL, ebXML, WS-ReliableMessaging & the WS-Transaction standards) [/3] among other areas. Various specific vertical industries also fulfill their open standards requirements by initiating OASIS projects, resulting in mission-specific standards such as • UBL and Business Document Exchange (for e-procurement) [/4], • CAP and EDML (for emergency first-responder notifications) [/5], and • LegalXML (for electronic court filing data)[/6].
    [Show full text]
  • A SOAP-Based Model for Secure Messaging in a Global Context
    A SOAP-Based Model for Secure Messaging in a Global Context by Johannes Jurie van Eeden A SOAP-based Model for Secure Messaging in a Global Context by Johannes Jurie van Eeden Dissertation submitted in fulfillment of the requirements for the degree Magister Technologiae in Information Technology in the School of Information and Communication Technology at the Nelson Mandela Metropolitan University Promoter: Dr Maree Pather December 2005 Table of Contents Declaration ............................................................................................................. v Abstract.................................................................................................................. vi Acknowledgements................................................................................................ vii Acronyms and Abbreviations used.......................................................................viii Part I ...................................................................................................................... 1 Introduction............................................................................................................. 1 Chapter 1 ............................................................................................................... 2 Introduction............................................................................................................. 2 1.1 Problem Statement........................................................................................ 3 1.2 Objectives ....................................................................................................
    [Show full text]
  • Sociotal Creating a Socially Aware Citizen-Centric Internet of Things
    Ref. Ares(2017)3187879 - 26/06/2017 Specific Targeted Research Projects (STReP) SocIoTal Creating a socially aware citizen-centric Internet of Things FP7 Contract Number: 609112 WP1 – Socially-aware citizen centric architecture and community APIs Deliverable report Contractual date of delivery:31/08/2016 Actual submission date: 31/08/2016 Deliverable ID: D1.2.2 Deliverable Title: Final version of SocIoTal Architecture Responsible beneficiary: UNIS Contributing beneficiaries: UNIS, CEA, UC, CRS4, DNET, UMU Start Date of the Project: 1 September 2013 Duration: 36 Months Revision: 1 Dissemination Level: Public PROPRIETARY RIGHTS STATEMENT This document contains information, which is proprietary to the SOCIOTAL Consortium. Neither this document nor the information contained herein shall be used, duplicated or communicated by any means to any third party, in whole or in parts, except with prior written consent of the SOCIOTAL consortium. FP7 Contract Number: 609112 Deliverable report – WP1 / T1.2/D1.2.1 Document ID: D1.2.1 Document Information Document ID: D1.2.2 Version: Final 1.0 Version Date: 31 August 2016 Authors: Colin O’Reilly (UNIS), Ignacio Elicegui (UC), Carmen Lopez (UC), Luis Sanchez (UC), Jose Luis Hernández, Jorge Bernabé (UMU), Alberto Serra (CRS4), Nenad Gligoric, Srdjan Krco (DNET), Christine Hennebert (CEA), Alexandre MACABIES (CEA), Niklas Palaghias (UNIS) Security: Public Approvals Name Organization Date Visa Project Management K. MOESSNER UNIS Team Internal Reviewer Colin O’Reilly UNIS 24/08/2016 Internal Reviewer Srdjan
    [Show full text]
  • First Experiences Using XACML for Access Control in Distributed Systems
    First Experiences Using XACML for Access Control in Distributed Systems M. Lorch', S. Procto9, R. Lepro3, D. Kafura', S. Shah' ' Department of Computer Science, Virginia Tech Sun Microsystems Laboratories NASA Ames Research Center Abstract Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as complex as the system itself. Worse still, while there are many standards that define authentication mechanisms, the standards that address authorization are less well defined and tend to work only within homogeneous systems. This paper presents XACML, a standard access control language, as one component of a distributed and inter-operable authorization framework. Several emerging systems which incorporate XACML are discussed. These discussions illustrate how authorization can be deployed in distributed, decentralized systems. Finally, some new and future topics are presented to show where this work is heading and how it will help connect the general components of an authorization system. 1. Introduction In modem systems, security is a critical feature. Beyond providing strong protection, security systems must also be flexible and promote inter-operability between domains of trust. However, flexibility can come at the price of simplicity and manageability, especially in the complex realm of authorization. Thus, the authorization components of a secure system must be able to work together across domains, but must be manageable to maintain their collaborative value. Authorization determines whether or not a given action, for example reading a file or logging into a server, is allowed. This is typically, though not always, achieved by authenticating a user and then using their locally assigned attributes or rights to make access decisions according to locally defined policies.
    [Show full text]
  • Content Assembly Mechanism (CAM) Business Transaction Information Management
    Content Assembly Mechanism (CAM) business transaction information management What CAM Is The CAM approach provides these three The CAM specification provides an open critical abilities: – XML based system for using business rules to • documentation of business interchange define, validate and compose specific business transactions, documents from generalized schema elements • design-time assembly support with and structures. verification, and A CAM rule set and document assembly • runtime checking of information content. template defines the specific business context, content requirement, and transactional function Next we consider the limitations of current of a document. A CAM template must be approaches and technologies and how the capable of consistently reproducing documents capabilities that CAM provides can address that can successfully carry out the specific these shortcomings. transactional function that they were designed for. CAM also provides the foundation for The Present Tools and Their Limitations for creating industry libraries and dictionaries Addressing the Problem of schema elements and business document structures to support business process needs. The advent of XML has also meant that other new tools are available to advance the technology of automatic transaction content Solving the Inherent Problem of Automated handling. These include formal structure Information Integration definitions using XML schema (XSD) with Automated information integration has content control at the element level using been the Holy Grail of e-Business systems datatyping; then XSLT rules and XPath since before XML was conceived. Early expressions and semantic tools such as RDF attempts centered on the use of industry and OWL to provide machine understanding of standard transaction formats typified by EDI the role and usage of the XML based messages1.
    [Show full text]