RESTFUL WEB SERVICES: Let MultiValue Application Platforms Power Web and Mobile Applications

Byrne, Michael
October 2017
Database Trends & Applications;Oct/Nov2017, Vol. 31 Issue 5, p25
The article offers information on the development of Representational State Transfer (REST) software in order to create web and mobile applications with MultiValue data. It mentions adoption of the REST design approach for building web services using HTTP and interoperating via the internet and computer systems with different software and operating systems. It also states its use in creating various kinds of self-service applications.


Related Articles

  • HTTPI BASED WEB SERVICE SECURITY OVER SOAP. Choudhary, Pankaj; Aaseri, Rajendra; Roberts, Nirmal // International Journal of Network Security & Its Applications;May2013, Vol. 5 Issue 3, p55 

    Now a days, a new family of web applications 'open applications', are emerging (e.g., Social Networking, News and Blogging). Generally, these open applications are non-confidential. The security needs of these applications are only client/server authentication and data integrity. For securing...

  • Comparison analysis of RESTful and SOAP-WSDL applied in the image management system. HE REN YU // Applied Mechanics & Materials;2014, Issue 644-650, p3300 

    Nowadays, web is applied more and more extensively and the integration of application system between enterprises has become an important aspect of Web applications. The current mainstream middleware technologies such as CORBA, DCOM, etc. cannot be used for communication between heterogeneous...

  • Applying representational state transfer (REST) architecture to archetype-based electronic health record systems. Sundvall, Erik; Nyström, Mikael; Karlsson, Daniel; Eneling, Martin; Chen, Rong; Örman, Håkan // BMC Medical Informatics & Decision Making;2013, Vol. 13 Issue 1, p1 

    Background: The openEHR project and the closely related ISO 13606 standard have defined structures supporting the content of Electronic Health Records (EHRs). However, there is not yet any finalized openEHR specification of a service interface to aid application developers in creating,...

  • An information-centric and REST-based approach for EPC Information Services. Paganelli, Federica; Turchi, Stefano; Bianchi, Lorenzo; Ciofi, Lucia; Pettenati, Maria Chiara; Pirri, Franco; Giuli, Dino // Journal of Communications Software & Systems;Mar2013, Vol. 9 Issue 1, p14 

    Radio Frequency Identification (RFID) techniques are considered relevant building blocks for the Internet of Things. The interoperability across different RFID software and hardware infrastructures is a key requirement for achieving effective and wide-scale Internet of Thing deployments. In this...


    The article presents tips to take advantage of tools in the Apple Mac operating system (OS) X Mavericks, including the system's refined support for multiple displays, for power management tools, and for more-useful notifications. Ways to see the dock on nonprimary monitors, choose the display...

  • Developing an M-Learning Application for iOS. POCATILU, Paul // Informatica Economica;2013, Vol. 17 Issue 4, p77 

    The mobile market development has a high impact on all domains including education. Smart mobile devices started to be affordable and the massive use on educational processes does not seem to be too far. Mobile learning applications are be targeted for all major mobile operating systems as...

  • Web Acceleration in Asymmetrical Mobile Network. Xiaohui Chen; Weidong Wang; Guo Wei // Wireless Personal Communications;May2011, Vol. 58 Issue 2, p281 

    End to end performance of web application degrades seriously in mobile networks because the inefficiencies of HTTP and TCP in lossy and asymmetrical environment. In this article, we discussed common architecture of web accelerator which embraces both HTTP and TCP optimization. Based on the...

  • Cross Site Request Forgery: Preventive Measures. Sentamilselven, K.; Pandian, S. Lakshmana; Ramkumar, N. // International Journal of Computer Applications;Nov2014, Vol. 106 Issue 1-18, p20 

    Cross Site Request Forgery is considered as one of top vulnerability in today's web, where an untrusted website can force the user browser to send the unauthorized valid request to the trusted site. Cross Site Request Forgery will let the integrity of the legitimate user. So far many solutions...

  • Domination of Constrained Application Protocol: A Requirement Approach for Optimization of Internet of Things in Wireless Sensor Networks. Madhumitha, P.; Johnsema, B.; Manivannan, D. // Indian Journal of Science & Technology;Mar2014, Vol. 7 Issue 3, p296 

    The protocols related to the Internet of Things (IoT) have proven to undergo changes in the Wireless Sensor Network (WSN), to increase the compatibility of WSN with the industrial and automation applications. In this paper, the programming model, the framework and the security aspects for the...

  • Cloud Computing as Evolution of Distributed Computing - A Case Study for SlapOS Distributed Cloud Computing Platform. SUCIU, George; HALUNGA, Simona; APOSTU, Anca; VULPE, Alexandru; TODORAN, Gyorgy // Informatica Economica;2013, Vol. 17 Issue 4, p109 

    The cloud computing paradigm has been defined from several points of view, the main two directions being either as an evolution of the grid and distributed computing paradigm, or, on the contrary, as a disruptive revolution in the classical paradigms of operating systems, network layers and web...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics