Computing Environment XML
Application Vulnerability Description Language (AVDL): An XML definition for exchange of information relating to security vulnerabilities of applications exposed to networks. Organization: OASIS. More information: AVDL page on the OASIS website
Intrusion Detection Message Exchange Format (IDMEF): Data formats and exchange procedures for sharing information of interest to intrusion detection and response systems, and to management systems which may need to interact with them. Organization: IETF. More information: IDMEF RFC on the IEFT website
The Web-Based Enterprise Management (WBEM) Initiative: A set of management and Internet standard technologies developed to unify the management of enterprise computing environments. WBEM provides the ability for the industry to deliver a well-integrated set of standard-based management tools leveraging the emerging Web technologies. The DMTF has developed a core set of standards that make up WBEM, which includes a data model, the Common Information Model (CIM) standard; an encoding specification, xmlCIM Encoding Specification; and a transport mechanism, CIM Operations over HTTP. The CIM specification is the language and methodology for describing management data. The CIM schema includes models for Systems, Applications, Networks (LAN) and Devices. The CIM schema will enable applications from different developers on different platforms to describe management data in a standard format so that it can be shared among a variety of management applications. The xmlCIM Encoding Specification defines XML elements, written in Document Type Definition (DTD), which can be used to represent CIM classes and instances. The CIM Operations over HTTP specification defines a mapping of CIM operations onto HTTP that allows implementations of CIM to interoperate in an open, standardized manner and completes the technologies that support WBEM. Organization: The Distributed Management Task Force (DMTF). More information: WBEM page on the DMTF website
Utility Computing Environment: Two organizations have announced work in this area. They are the Distributed Management Task Force (DMTF) and the Data Center Markup Language (DCML) Interest Group.
Web Services Distributed Management (WSDM): The Web Services Distributed Management (WSDM) specifies the Web Services architecture and technology to manage distributed resources. It includes a model of a Web service as a manageable resource. Organization: OASIS. More information: WAS page on the OASIS website
Web Application Security (WAS): The Web Application Security (WAS) specification includes:
- a classification scheme for Web security vulnerabilities
- a model to provide guidance for initial threat, impact and therefore risk ratings
- an XML schema to describe web security conditions that can be used by both assessment and protection tools
Organization: OASIS. More information: WAS page on the OASIS website
Context for Computing Environment XML
Related Articles for Computing Environment XML
- Address XML
- Content Syndication XML
- Customer Information XML
- Electronic Data Interchange (EDI) XML
- Geospatial XML
- Human XML
- Localization XML
- Math XML
- Open Applications Group Integration Specification (OAGIS)
- Open Office XML
- Topic Maps XML
- Trade XML
- Translation XML
- Universal Business Language (UBL)
- Universal Data Element Framework (UDEF)
Author
Douglas K Barry
Principal
You may use this material for your work or classes. Reprint Policy. Be sure to check the menu at the left for other articles available on this site.
The Savvy Manager's Guide
Douglas K Barry is also the author of a book that explains Web Services, service-oriented architecture, and Cloud Computing in an easy-to-understand, non-technical manner.
Web Services, Service-Oriented Architectures, and Cloud Computing: The Savvy Manager's Guide (Second Edition)
by Douglas K Barry with David Dick
This is a guide for the savvy manager who wants to capitalize on the wave of change that is occurring with Web Services, service-oriented architecture, and—more recently—Cloud Computing. The changes wrought by these technologies will require both a basic grasp of the technologies and an effective way to deal with how these changes will affect the people who build and use the systems in our organizations. This book covers both issues. Managers at all levels of all organizations must be aware of both the changes that we are now seeing and ways to deal with issues created by those changes.