Index
[SYMBOL][A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]
Action elements 2nd 3rd 4th 5th active requestorsaddressing Agents base addresses endpoint references 2nd FaultTo addresses management resource example processing semantics references 2nd reply examplespecification.
[See WSAddressing]Agents, WS-Management addressing message sequence agreement coordination protocols All operator, WS-Policy application integration application security, system federations assertions, security 2nd 3rd asynchronous request/response pattern atomic transactions 2ndattachments, SOAP policy ZIP files for attacks attribute information items 2ndauthentication defined message authentication Single Sign On WS-SecureConversation WS-Securityauthorization attacks 2nd definedautonomous services advantages defined federated model implications requirements versioning implications