亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? draft-ietf-simple-xcap-12-latest.txt

?? 有關IMS SIP及Presence應用的RFC文檔包
?? TXT
?? 第 1 頁 / 共 5 頁
字號:

   One particularly important semantic is the base URI to be used for
   the resolution of any relative URI references pointed to XCAP
   resources.  As discussed below, relative URI references pointing to
   XCAP resources cannot be resolved using the retrieval URI as the base
   URI.  Therefore, it is up to the application usage to specify the
   base URI.

5.5.  Naming Conventions

   In addition to defining the meaning of the document in the context of
   a particular application, an application usage has to specify how the
   applications obtain the documents they need.  In particular, it needs



Rosenberg                Expires April 16, 2007                [Page 10]

Internet-Draft                    XCAP                      October 2006


   to define any well-known URIs used for bootstrapping purposes, and
   document any other conventions on the URIs used by an application.
   It should also document how documents reference each other.  These
   conventions are called naming conventions.

   For many application usages, users need only a single document.  In
   such a case, it is RECOMMENDED that the application usage require
   that this document be called "index" and exist within the users home
   directory.

   As an example, the RLS services application usage allows an RLS to
   obtain the contents of a resource list when the RLS receives a
   SUBSCRIBE request for a SIP URI identifying an RLS service.  The
   application usage specifies that the list of service definitions is
   present within a specific document with a specific name within the
   global tree.  This allows the RLS to perform a single XCAP request to
   fetch the service definition for the service associated with the SIP
   URI in a SUBSCRIBE request.

   Naming conventions are used by XCAP clients to construct their URIs.
   The XCAP server does not make use of them.

5.6.  Resource Interdependencies

   When a user modifies an XCAP resource, the content of many other
   resources is affected.  For example, when a user deletes an XML
   element within a document, it does so by issuing a DELETE request
   against the URI for the element resource.  However, deleting this
   element also deletes all child elements and their attributes, each of
   which is also an XCAP resource.  As such, manipulation of one
   resource affects the state of other resources.

   For the most part, these interdependencies are fully specified by the
   XML schema used by the application usage.  However, in some
   application usages, there is a need for the server to relate
   resources together, and such a relationship cannot be specified
   through a schema.  This occurs when changes in one document will
   affect another document.  Typically, this is the case when an
   application usage is defining a document that acts as a collection of
   information defined in other documents.

   As an example, when a user creates a new RLS service (that is, it
   creates a new <service> element within an RLS services document), the
   server adds that element to a read-only global list of services
   maintained by the server in the global tree.  This read-only global
   list is accessed by the RLS when processing a SIP SUBSCRIBE request.

   Resource interdependencies are used by both XCAP clients and servers.



Rosenberg                Expires April 16, 2007                [Page 11]

Internet-Draft                    XCAP                      October 2006


5.7.  Authorization Policies

   By default, each user is able to access (read, modify, and delete)
   all of the documents below their home directory, and any user is able
   to read documents within the global directory.  However, only trusted
   users, explicitly provisioned into the server, can modify global
   documents.

   The application usage can specify a different authorization policy
   that applies to all documents associated with that application usage.
   An application usage can also specify whether another application
   usage is used to define the authorization policies.  An application
   usage for setting authorization policies can also be defined
   subsequent to the definition of the the main application usage.  In
   such a case, the main application usage needs only to specify that
   such a usage will be defined in the future.

   If an application usage does not wish to change the default
   authorization policy, it can merely state that the default policy is
   used.

   The authorization policies defined by the application usage are used
   by the XCAP server during its operation.

5.8.  Data Extensibility

   An XCAP server MUST understand an application usage in order to
   process an HTTP request made against a resource for that particular
   application usage.  However, it is not required for the server to
   understand all of the contents of a document used by an application
   usage.  A server is required to understand the baseline schema
   defined by the application usage.  However, those schemas can define
   points of extensibility where new content can be added from other
   namespaces and corresponding schemas.  Sometimes, the server will
   understand those namespaces and therefore have access to their
   schemas.  Sometimes, it will not.

   A server MUST allow for documents that contain elements from
   namespaces not known to the server.  In such a case, the server
   cannot validate that such content is schema compliant; it will only
   verify that the XML is well-formed.

   If a client wants to verify that a server supports a particular
   namespace before operating on a resource, it can query the server for
   its capabilities using the XCAP Capabilities application usage,
   discussed in Section 12.





Rosenberg                Expires April 16, 2007                [Page 12]

Internet-Draft                    XCAP                      October 2006


5.9.  Documenting Application Usages

   Application usages are documented in specifications which convey the
   information described above.  In particular, an application usage
   specification MUST provide the following information:

   o  Application Unique ID (AUID): If the application usage is meant
      for general use on the Internet, the application usage MUST
      register the AUID into the IETF tree using the IANA procedures
      defined in Section 15.

   o  XML Schema

   o  Default Document Namespace

   o  MIME Type

   o  Validation Constraints

   o  Data Semantics

   o  Naming Conventions

   o  Resource Interdependencies

   o  Authorization Policies

5.10.  Guidelines for Creating Application Usages

   The primary design task when creating a new application usage is to
   define the schema.  Although XCAP can be used with any XML document,
   intelligent schema design will improve the efficiency and utility of
   the document when it is manipulated with XCAP.

   XCAP provides three fundamental ways to select elements amongst a set
   of siblings - by the expanded name of the element, by its position,
   or by the value of a specific attribute.  Positional selection always
   allows a client to get exactly what it wants.  However, it requires a
   client to cache a copy of the document in order to construct the
   predicate.  Furthermore, if a client performs a PUT, it requires the
   client to reconstruct the PUT processing that a server would follow
   in order to update its local cached copy.  Otherwise, the client will
   be forced to re-GET the document after every PUT, which is
   inefficient.  As such, it is a good idea to design schemas such that
   common operations can be performed without requiring the client to
   cache a copy of the document.

   Without positional selection, a client can pick the element at each



Rosenberg                Expires April 16, 2007                [Page 13]

Internet-Draft                    XCAP                      October 2006


   step by its expanded name or the value of an attribute.  Many schemas
   include elements that can be repeated within a parent (often,
   minOccurs equals zero or one, and maxOccurs is unbounded).  As such,
   all of the elements have the same name.  This leaves the attribute
   value as the only way to select an element.  Because of this, if an
   application usage expects user to manipulate elements or attributes
   that are descendants of an element which can repeat, that element
   SHOULD include, in its schema, an attribute which can be suitably
   used as a unique index.  Furthermore, the naming conventions defined
   by that application usage SHOULD specify this uniqueness constraint
   explicitly.

   URIs often make a good choice for such unique index.  They have
   fundamental uniqueness properties, and are also usually of semantic
   significance in the application usage.  However, care must be taken
   when using a URI as an attribute value.  URI equality is usually
   complex.  However, attribute equality is performed by the server
   using XML rules, which are based on case sensitive string comparison.
   Thus, XCAP will match URIs based on lexical equality, not functional
   equality.  In such cases, an application usage SHOULD consider these
   implications carefully.

   XCAP provides the ability of a client to operate on a single element,
   attribute or document at a time.  As a result, it may be possible
   that common operations the client might perform will require a
   sequence of multiple requests.  This is inefficient, and introduces
   the possibility of failure conditions when another client modifies
   the document in the middle of a sequence.  In such a case, the client
   will be forced to detect this case using entity tags (discussed below
   in Section 7.11), and undo its previous changes.  This is very
   difficult.

   As a result, the schemas SHOULD be defined so that common operations
   generally require a single request to perform.  Consider an example.
   Lets say an application usage is defining permissions for users to
   perform certain operations.  The schema can be designed in two ways.
   The top level of the tree can identify users, and within each user,
   there can be the permissions associated with the user.  In an
   alternative design, the top level of the tree identifies each
   permission, and within that permission, the set of users who have it.
   If, in this application usage, it is common to change the permission
   for a user from one value to another, the former schema design is
   better for xcap; it will require a single PUT to make such a change.
   In the latter case, either the entire document needs to be replaced
   (which is a single operation), or two PUT operations need to occur -
   one to remove the user from the old permission, and one to add the
   user to the new permission.




Rosenberg                Expires April 16, 2007                [Page 14]

Internet-Draft                    XCAP                      October 2006


   Naming conventions form another key part of the design of an
   application usage.  The application usage should be certain that XCAP
   clients know where to "start" to retrieve and modify documents of
   interest.  Generally, this will involve the specification of a well-
   known document at a well-known URI.  That document can contain
   references to other documents that the client needs to read or
   modify.


6.  URI Construction

   In order to manipulate an XCAP resource, the data must be represented
   by an HTTP URI.  XCAP defines a specific naming convention for
   constructing these URIs.  The URI is constructed by concatenating the
   XCAP root with the document selector with the node selector separator
   with a percent-encoded form of the node selector.  This is followed
   by an optional query component that defines namespace bindings used
   in evaluating the URI.  The XCAP root is the enclosing context in
   which all XCAP resources live.  The document selector is a path that
   identifies a document within the XCAP root.  The node selector
   separator is a path segment with a value of double tilde ("~~"), and
   SHOULD NOT be percent-encoded, as advised in Section 2.3 of RFC 3986
   [13].  URIs containing %7E%7E should be normalized to ~~ for
   comparison; they are equivalent.  The node selector separator is
   piece of syntactic sugar that separates the document selector from

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
秋霞国产午夜精品免费视频| 悠悠色在线精品| 欧美久久久影院| 色www精品视频在线观看| 成人av在线网站| 99久久精品99国产精品| 色播五月激情综合网| 欧美性xxxxx极品少妇| 欧美另类videos死尸| 欧美一区二区不卡视频| 精品国产乱码久久久久久图片| 日韩欧美综合在线| 国产亚洲一区字幕| 日韩理论片中文av| 一区二区三区四区不卡在线| 亚洲成人精品影院| 蜜臀99久久精品久久久久久软件| 久久电影网站中文字幕| 91影院在线观看| 欧美日韩一区二区在线观看| 欧美成人在线直播| 中国色在线观看另类| 亚洲一区二区三区精品在线| 久久99国产精品免费网站| 国产.欧美.日韩| 日本精品一区二区三区四区的功能| 555www色欧美视频| 日本一区二区三级电影在线观看| 亚洲精品久久久久久国产精华液| 日韩中文字幕亚洲一区二区va在线 | 极品少妇xxxx偷拍精品少妇| 国产精品一区二区免费不卡| 在线观看免费亚洲| 久久久综合九色合综国产精品| 一区二区三区高清| 激情六月婷婷综合| 欧美性感一类影片在线播放| 国产日韩欧美在线一区| 亚洲国产欧美另类丝袜| 成人综合日日夜夜| 欧美刺激脚交jootjob| 亚洲色图在线看| 国产在线看一区| 欧美日韩视频在线第一区| 日本一区二区久久| 久久er精品视频| 精品婷婷伊人一区三区三| 国产精品全国免费观看高清| 免费在线一区观看| 91精品国产综合久久精品图片| 26uuu另类欧美亚洲曰本| 一区二区三区国产精品| 99久久久久久| 国产三区在线成人av| 久久狠狠亚洲综合| 91麻豆精品国产91久久久久| 亚洲精品高清视频在线观看| 从欧美一区二区三区| 久久毛片高清国产| 国内久久精品视频| 欧美一区二区国产| 日本亚洲三级在线| 4438x成人网最大色成网站| 亚洲伊人伊色伊影伊综合网| jiyouzz国产精品久久| 国产欧美日韩久久| 国产激情一区二区三区桃花岛亚洲| 欧美一区二区黄| 麻豆国产91在线播放| 日韩一级视频免费观看在线| 日韩激情视频网站| 日韩你懂的电影在线观看| 日本va欧美va欧美va精品| 日韩欧美在线1卡| 久久av老司机精品网站导航| 欧美一区二区日韩| 精品影视av免费| 2021中文字幕一区亚洲| 国产精品 日产精品 欧美精品| 久久久久久久久99精品| 成人性色生活片| 中文字幕制服丝袜一区二区三区 | 91老师国产黑色丝袜在线| 18成人在线视频| 99久久综合国产精品| 亚洲精品一卡二卡| 欧美日韩国产大片| 精品在线播放免费| 中文成人综合网| 91国偷自产一区二区三区观看| 亚洲一区二区三区不卡国产欧美| 欧美日本一区二区三区四区| 日韩精品欧美精品| 国产日韩欧美高清| 一本色道**综合亚洲精品蜜桃冫| 亚洲成精国产精品女| 日韩欧美久久久| 一本大道av一区二区在线播放| 亚洲成av人片在线| 精品国产亚洲一区二区三区在线观看| 国产精品一区二区久久精品爱涩 | 国产美女精品人人做人人爽| 国产精品卡一卡二| 欧美一区二区三区成人| 成人性视频免费网站| 天天免费综合色| 国产午夜一区二区三区| 在线观看一区日韩| 六月丁香综合在线视频| 亚洲久本草在线中文字幕| 日韩欧美一区二区免费| 色综合天天综合在线视频| 精品中文字幕一区二区| 中文字幕av资源一区| 欧美男同性恋视频网站| 成人在线综合网| 免费在线欧美视频| 亚洲欧洲av在线| 精品美女在线观看| 91无套直看片红桃| 国产乱码精品一品二品| 丝袜美腿亚洲色图| 中文字幕日韩av资源站| 欧美精品一区二区三区很污很色的| 9i在线看片成人免费| 极品尤物av久久免费看| 午夜精品福利久久久| 国产精品国产三级国产aⅴ无密码| 日韩亚洲欧美综合| 欧美色手机在线观看| 99视频精品全部免费在线| 国产在线精品一区二区三区不卡| 石原莉奈在线亚洲二区| 亚洲国产精品久久久男人的天堂 | 日韩中文字幕亚洲一区二区va在线 | 久久精品国产秦先生| 一区二区欧美精品| 亚洲欧洲一区二区三区| 日本一区二区三区久久久久久久久不 | 国产成人8x视频一区二区| 免费在线观看视频一区| 亚洲图片一区二区| 一区二区视频免费在线观看| 国产精品超碰97尤物18| 国产精品免费视频一区| 国产精品婷婷午夜在线观看| 久久久久久亚洲综合影院红桃| 精品国产乱码91久久久久久网站| 欧美一区二区三区白人| 日韩视频一区二区在线观看| 欧美另类变人与禽xxxxx| 这里只有精品99re| 欧美一区二区三区免费视频| 5月丁香婷婷综合| 精品人伦一区二区色婷婷| 精品少妇一区二区三区日产乱码| 欧美一区二视频| 91精品欧美久久久久久动漫| 日韩欧美中文字幕一区| 日韩欧美国产成人一区二区| 日韩久久免费av| 国产亚洲1区2区3区| 自拍av一区二区三区| 夜夜精品视频一区二区| 亚洲成人中文在线| 蓝色福利精品导航| 韩国视频一区二区| 成人丝袜18视频在线观看| 91浏览器入口在线观看| 欧美性色综合网| 精品对白一区国产伦| 亚洲欧美在线观看| 亚洲午夜羞羞片| 午夜av电影一区| 国产精品一区久久久久| 色系网站成人免费| 日韩午夜在线观看| 国产精品私人影院| 亚洲一区二区av电影| 国产一区二区福利| 一本一道久久a久久精品综合蜜臀| 欧美少妇一区二区| 久久精品夜色噜噜亚洲a∨| 亚洲青青青在线视频| 美女精品一区二区| 91原创在线视频| 精品乱码亚洲一区二区不卡| 中文字幕在线一区二区三区| 免费成人在线网站| 日本福利一区二区| 久久综合九色综合久久久精品综合 | 综合久久久久综合| 久久精品国产一区二区三| 91丝袜国产在线播放| 精品88久久久久88久久久| 亚洲一区二区三区视频在线| 国产成人一级电影| 日韩一区二区三区电影在线观看 | 国产成人免费视频精品含羞草妖精| 91网站在线观看视频|