\relax 
\@istfilename {rel-tec-processos.ist}
\@writefile{toc}{\contentsline {chapter}{\numberline {1}Introdu\IeC {\c c}\IeC {\~a}o}{1}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\citation{w3c}
\citation{w3c}
\@writefile{toc}{\contentsline {chapter}{\numberline {2}Servi\IeC {\c c}os {\it  WEB}}{2}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {2.1}Ciclo de Vida de um Servi\IeC {\c c}o {\it  WEB}}{2}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.1}{\ignorespaces Processo de Descoberta de Servi\IeC {\c c}o}}{3}}
\newlabel{fig:descoberta}{{2.1}{3}}
\@writefile{toc}{\contentsline {section}{\numberline {2.2}Padr\IeC {\~o}es que apoiam os servi\IeC {\c c}os WEB}{4}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.1}XML}{4}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.2}WSDL}{4}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.3}SOAP}{4}}
\citation{uddi}
\citation{vulnerabilidades}
\citation{perfil-seguranca}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.4}UDDI}{5}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.5}WS-Addressing}{5}}
\@writefile{toc}{\contentsline {section}{\numberline {2.3}Seguran\IeC {\c c}a}{5}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.1}XML-Signature}{6}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.2}XML-Encryption}{6}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.3}WS-Security}{6}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.4}SALM}{6}}
\citation{soc}
\@writefile{toc}{\contentsline {chapter}{\numberline {3}Arquitetura Orientada a Servi\IeC {\c c}os}{7}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\citation{ESB1}
\@writefile{toc}{\contentsline {chapter}{\numberline {4}Enterprise Service Bus (ESB)}{8}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\citation{ESB2}
\@writefile{toc}{\contentsline {section}{\numberline {4.1}Habilidades T\IeC {\'\i }picas de um ESB}{9}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.1}Invoca\IeC {\c c}\IeC {\~a}o}{9}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.2}Roteamento}{9}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.3}Media\IeC {\c c}\IeC {\~a}o}{9}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.4}Seguran\IeC {\c c}a}{9}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.5}Gerenciamento}{10}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.6}Orquestra\IeC {\c c}\IeC {\~a}o}{10}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.7}Exemplos de ESB}{10}}
\citation{bpel}
\@writefile{toc}{\contentsline {chapter}{\numberline {5}Orquestra\IeC {\c c}\IeC {\~a}o}{11}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\citation{bass}
\@writefile{toc}{\contentsline {chapter}{\numberline {6}BASS}{13}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {chapter}{\numberline {7}Infra-estrutura tecnologica da SPTC/PC-ES}{15}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {chapter}{\numberline {8}Abordagens Relacionadas}{17}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {8.1}e-PING}{17}}
\@writefile{toc}{\contentsline {subsection}{\numberline {8.1.1}Seguran\IeC {\c c}a}{18}}
\@writefile{toc}{\contentsline {subsection}{\numberline {8.1.2}Pol\IeC {\'\i }ticas T\IeC {\'e}cnicas}{18}}
\@writefile{toc}{\contentsline {subsection}{\numberline {8.1.3}Padr\IeC {\~o}es Aprovados}{20}}
\@writefile{toc}{\contentsline {chapter}{\numberline {9}Proposta}{22}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {chapter}{\numberline {10}Conclus\IeC {\~a}o}{23}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\gdef \LT@i {\LT@entry 
    {3}{352.92653pt}\LT@entry 
    {3}{246.00238pt}}
\bibdata{referencias}
\bibcite{uddi}{1}
\bibcite{vulnerabilidades}{2}
\bibcite{perfil-seguranca}{3}
\bibcite{w3c}{4}
\bibcite{bass}{5}
\bibcite{bpel}{6}
\bibcite{ESB1}{7}
\bibcite{soc}{8}
\bibcite{ESB2}{9}
\bibstyle{plain}
