Hidden
Body-1 Body-2
Top-1
Top-2
H
i
d
d
e
n
T
o
p
B
o
d
y
Body-5 Body-6
Domain-1
Body-4Body-3
Service entry
Network directory
Domain directory
Directory service
Body-7
Figure 3: Network Topology.
• Identical results may be returned by one or more
directory services for a single query.
Figure 3 illustrates our network topology. We dis-
tinguish two types of directories: network directories
and domain directories. Network directories are a re-
served set of directories that are used for the construc-
tion of the network. Among them, we can distinguish
three different network directories:
• Hidden network directory forms the root of the
federation by registering the top-level nodes of the
network.
• Top network directory is visible to the network
as being one of the roots of the federation multi-
rooted tree.
• Body network directory is used for regular di-
rectory services that form the body of the multi-
rooted tree.
Domain directories emerge from the registrations
of service descriptions at the directory services that
make up the directory system. By definition, domain
directories are contained in the ”Body Members” di-
rectory.
At boot time, the directory makes use of a pre-
defined network configuration to create a network
topology. The configuration specifies management
and data relations between members of the network.
In a typical setting, the node at the highest level will
be hidden to all nodes not belonging to the ”Top
Members” directory.
To construct the network topology, WSDir em-
ploys a set of pre-defined pro-active policies. For in-
stance, a specific policy would make search requests
directed at a directory service be forwarded to its reg-
istered children and its known siblings.
8 CONCLUSION
WSDir has been tested thoroughly in a real distributed
setting spread over different countries. The system
has proven to be scalable and very stable. It is be-
ing used as backbone in a use case scenario in health
emergency management. Future work could espe-
cially enhance security.
We currently employ standard security mecha-
nisms for accessing the directory services. In particu-
lar, if a directory service requires protecting messag-
ing from overhearing or if it would require privacy
sensible data as parameters, the access to this web
service will be based on HTTPS. In cases where no
HTTPS is available, e.g., in most MIDP 2.0 imple-
mentations, we could couple WSDir with Guarantor
agents (Bianchi et al., 2005) spread in the architec-
ture in order to provide a secure tunnelling between
secure ACL messages and HTTPS.
Another improvement could define security mea-
sures directly within the directory system by defining
specific policies. A policy can be employed to restrict
the right to perform a certain operation on a directory
to only those clients that can provide the right creden-
tials.
REFERENCES
Bianchi, R., Fontana, A., and Bergenti, F. (2005). A real-
world approach to secure and trusted negotiation in
mass. In AAMAS ’05: Proceedings of the fourth inter-
national joint conference on Autonomous agents and
multiagent systems, pages 1163–1164, New York, NY,
USA. ACM Press.
Kawamura, T., Blasio, J.-A. D., Hasegawa, T., Paolucci, M.,
and Sycara, K. P. (2003). Preliminary report of public
experiment of semantic service matchmaker with uddi
business registry. In ICSOC, pages 208–224.
Martin, D., Paolucci, M., McIlraith, S., Burstein, M., Mc-
Dermott, D., McGuinness, D., Parsia, B., Payne, T.,
Sabou, M., Solanki, M., Srinivasan, N., and Sycara,
K. (2004). Bringing semantics to web services: The
owl-s approach. In Proceedings of the First Interna-
tional Workshop on Semantic Web Services and Web
Process Composition (SWSWPC 2004).
Verma, K., Sivashanmugam, K., Sheth, A., Patil, A., Ound-
hakar, S., and Miller, J. (2004). METEOR-S WSDI:
A Scalable Infrastructure of Registries for Semantic
Publication and Discovery of Web Services. Journal
of Information Technology and Management.
ICEIS 2007 - International Conference on Enterprise Information Systems
286