OASIS approves WS-BPEL 2.0

The Organization for the Advancement of Structured Information Standards has approved the Web Services Business Process Execution Language (WS-BPEL) version 2.0, giving WS-BPEL the highest level of ratification available from the global OASIS standards body.

Creation of the WS-BPEL specification began in 2002. It is the product of work by more than 37 vendors, including Microsoft, IBM, Adobe Systems, BEA Systems, Oracle and Sun Microsystems.

The specification uses Web standards to describe business process activities as Web services, creating standardized ways in which groups of Web services can be combined to accomplish common business processes, making it a critical component of interactive Web services such as business-to-business electronic commerce, developers of the specification say.

Within a business process, the WS-BPEL standard describes interactions between the process and its partners and accomplishes each interaction using standardized Web services interfaces. According to backers, it gives users a flexible way to achieve business tasks using Web services since it maintains uniform application-level behavior across multiple types of tasks or environments. For example, it provides a systematic mechanism for handling compensation in cases of business exceptions or requests for reversals, supporters say.

OASIS began its review of the WS-BPEL specification in 2003, and its approval of WS-BPEL 2.0 for the first time establishes an officially approved version of the specification.


  • automated processes (Nikolay Klimenko/Shutterstock.com)

    How the Army’s DORA bot cuts manual work for contracting professionals

    Thanks to robotic process automation, the time it takes Army contracting professionals to determine whether prospective vendors should receive a contract has been cut from an hour to just five minutes.

  • Russia prying into state, local networks

    A Russian state-sponsored advanced persistent threat actor targeting state, local, territorial and tribal government networks exfiltrated data from at least two victims.

Stay Connected