Feeds

XML Tower of Babel - bring on UBL

First-rate draft

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

XML is taking over the world for all sorts of good reasons. But just as we thought that it would solve all our problems and let us build a tower up to the gods, babble intervenes.

XML has allowed messages to be passed from one system to another in such a way that they can be parsed, dissected, queried and rebuilt, but it only deals with the syntax and not the semantics. To take a simple example, different messages using different schemas could have tags like: zip, zipcode, zip_code, post-code, post_code, postal_code, or PostalZone, all of which in a generic sense relate to the same type of data. So a message from one schema has to be transformed into another schema before it can be processed.

This causes considerable redundant processing as well as adding significant opportunities for errors, potential security exposures and a need for additional modelling and testing. It also reduces the opportunity for reuse and discrete services. For example, it should be possible to develop a service that can be handed any XML stream and it will add the insurance group for the PostalZone and pass the message back; this would be much easier if the tag was always the same.

Individual element names are one level of the problem and the next level of problem is messages for typical transactions such as an invoice. Again the advantage of a single agreed format would be immense.

Well, OASIS, the e-business standards organisation, looks as if it has solved this problem with the publication of its Committee draft of the Universal Business Language (UBL) 1.0 last month. This is a major piece of work which is freely available and I believe should be the standard by which all new XML schemas and messages are built. It provides for extensions and is obviously not yet universal in its coverage. It does however cover many of the basic concepts and elements needed as its documents and component library are designed to support a typical order-to-invoice procurement cycle. It includes the following document types: Order, Order Response Simple, Order Response (detailed), Order Change, Order Cancellation, Despatch Advice, Receipt Advice and Invoice.

My initial review of the standard shows a great deal of thought and understanding from the members of the committee. Given its size it is remarkably easy to navigate around and find bits of interest. Ever since my early data modelling experience, with a pre-release version of IMS/DB, deciding how best to deal with addresses has been a major issue. So I looked at this area in particular and it does seem to work well and give the flexibility needed (this is partly due to the greater flexibility of XML over IMS) and I can easily see this becoming the standard. One small criticism is that the definitions are somewhat terse and it is probable that over time they will need to be expanded to ensure real commonality of semantics.

In short, an excellent version one with plenty of promise of more to come.

For the detail go here: you still have time to comment.

© IT-Analysis.com

Related stories

Sun rallies J2EE faithful
W3C completes framework for the Semantic Web
IBM throws weight behind BPEL
IBM moots BPEL-Java fusion

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.