Outsourcing security in service ecosystems with evolving security deployment as a service

Size: px
Start display at page:

Download "Outsourcing security in service ecosystems with evolving security deployment as a service"

Transcription

1 Outsourcing security in service ecosystems with evolving security deployment as a service Authors : Dr. Wendpanga Francis Ouedraogo Prof. Frédérique Biennier Dr. Philippe Merle

2 Sommaire Context and motivation State of the Art Contributions Context-aware security approach : Evaluation Conclusion et further works 2

3 Context and motivation Context Flexibility and agility provided by Intelligent Service Clouds Open and deperimeterized IS (Information System) organization Outsourcing part or all IS + inter-enterprises collaboration Services are reused to support new collaborative business process Shared data and features (services) between enterprises Cloud plasticity allows to use different access devices (BYOD - Bring your own device) and networks to interact with enterprise services and data No more global control on the IS and new security risks Enforce the protection mechanisms to mitigate vulnerabilities and / or threats related to business process and the execution environment Adapt on the fly business services security to changing environment 3

4 Context and motivation Motivating example 4

5 Context and motivation Motivating example 5

6 Context and motivation Motivating example Execution times 10ms 3ms 0 ms Track shipping security policies Track shipping ACL (Access Control List) 6

7 Context and motivation Security has a COST (time consuming, required resources ) Costly over-protection when all security requirements are fulfilled For example: restricted access to an information or service BUT a free access should be granted for any member of the enterprise connected on the enterprise site Systemic protection => Authentication + authorization process at each access Risky under-protection when some requirements are omitted Avoid under or over protection Compose and orchestrate on the fly security services depending on the execution context (and the related organizational and technical threats and vulnerabilities) 7

8 State of the art Different strategies can be used to provide a consistent protection on distributed IS Risks management methods (EBIOS, MEHARI, OCTAVE) Identify security requirements and countermeasures Security by Design approaches UML diagrams (UMLSec, SECURE UML) BPMN diagrams (BPSec) MDS(Model Driven Security) approach (Open PMF, SECTET) integrate the security requirements in the process model Security stack defined in the OASIS Service reference model Security requirement based on the ISO/IEC (Authentication, Authorization,.) OASIS security standards (WS-Security, SAML, XACML) define security services to fulfil the security requirements 8

9 Contribution Provide an end to end consistent protection of a given service, taking into account Business workflow context in which the service takes part Execution platform configuration (the hosting platform, the access devices, the interconnection network) Context-aware Security architecture coupling : MDS approach : transform security requirements to policies approach : use policies as abstract models adapts the protection according to the business process collaboration context and the execution context 9

10 Contribution : Context-aware Security architecture Software as a Service B u s i n e s s S e r v i c e M i d d l e w a r e Middleware Hosting cloud platform 10

11 Contribution: deployment environment Source: https://wiki.ow2.org/frascati/attach?page=documents%2f2011-ougf-frascati-with-osgi.pdf 11

12 Contribution : Context-aware Security implementation with FraSCAti. An Interceptor component plugged on the FraSCAti middleware intercepts each service invocation and routes this request to the component. 12

13 Contribution : Context-aware Security architecture Software as a Service T r a c k i n g S e r v i c e 1 S p e c i f i c M i d d l e w a r e I n t e r c e p t o r M D r u n. t i m e F r a S C A t i M i d d l e w a r e Middleware C l o u d c h a r a c t e r i s t i c s Hosting cloud platform 13

14 Contribution : Context-aware Security architecture Software as a Service T r a c k i n g S e r v i c e 1 2 S p e c i f i c M i d d l e w a r e I n t e r c e p t o r M D r u n. t i m e F r a S C A t i M i d d l e w a r e Middleware C l o u d c h a r a c t e r i s t i c s Hosting cloud platform 14

15 Contribution : Context-aware Security implementation with FraSCAti. 15

16 Contribution : Context-aware Security implementation with FraSCAti. The component is the core component to achieve the dynamic security deployment. It consists in three sub components: The Mediator component is responsible for analyzing service requests to retrieve the policy reference. It also composes and orchestrates the security policies associated to business services. The Policy Manager component receives from the Mediator the service reference requested and returns the related security policies The Context Manager component : identifies the different policies to be applied according to the user context and the execution environment. 16

17 Context Contribution and motivation : Context-aware Security Logistic Service WSDL Track shipping security policies 17

18 Contribution : Context-aware Security architecture Software as a Service T r a c k i n g S e r v i c e S e c u r i t y S e r v i c e 1 2 S p e c i f i c M i d d l e w a r e I n t e r c e p t o r M D r u n. t i m e F r a S C A t i M i d d l e w a r e 3 4 Middleware C l o u d c h a r a c t e r i s t i c s Hosting cloud platform 18

19 Contribution : Context-aware Security implementation with FraSCAti. The Security as a Service (SecaaS) composite is invoked by the Mediator component. It includes various security services (Authentication, authorization, ), which allow protecting business services according to a Security as a Service approach. 19

20 Contribution : Context-aware Security architecture Software as a Service 8 T r a c k i n g S e r v i c e S p e c i f i c M i d d l e w a r e I n t e r c e p t o r S e c u r i t y S e r v i c e 5 6 M D r u n. t i m e Middleware F r a S C A t i M i d d l e w a r e 7 C l o u d c h a r a c t e r i s t i c s Hosting cloud platform 20

21 Contribution Evaluation 21

22 Conclusion and further works Securing collaborative business processes deployed on cloud systems requires to pay attention on BP collaborative organization Execution environment (platform vulnerabilities, devices and networks used to interact with the business services) Contribution : security architecture build as plugged service on FraSCAti middleware Externalize the business service security management Dynamic security service selection/composition/orchestration Avoid over protection and under protection Provide an efficient protection 22

23 Conclusion and further works Further works Aggregate security policies Optimize the security service recalling to avoid redundancy Integration of more detailed platform models Develop a governance loop to integrate monitoring information to identify the context more precisely. 23

24 Thank you for your attention 24

Interoperable, Federated Identity Management Frameworks Across Enterprise Architectures. We can do this.

Interoperable, Federated Identity Management Frameworks Across Enterprise Architectures. We can do this. Interoperable, Federated Identity Management Frameworks Across Enterprise Architectures. We can do this. Scott McGrath COO Organization for the Advancement of Structured Information Standards A diverse

More information

Risk, security, and legal analysis for migration to cloud. PART 2: Organising a secured cloud architecture

Risk, security, and legal analysis for migration to cloud. PART 2: Organising a secured cloud architecture Project acronym: Project name: Project code: NEBULA A novel vocational training programme on cloud computing skills 540226-LLP-1-2013-1-GR-LEONARDO-LMP Document Information Document ID name: Nebula_WP4_D4.3.1_Learning_Material_and_Content_2015_30_04

More information

SERVICE ORIENTED ARCHITECTURE

SERVICE ORIENTED ARCHITECTURE SERVICE ORIENTED ARCHITECTURE Introduction SOA provides an enterprise architecture that supports building connected enterprise applications to provide solutions to business problems. SOA facilitates the

More information

Optimizing Service Protection with Model Driven Security@run.time

Optimizing Service Protection with Model Driven Security@run.time Optimizing Service Protection with Model Driven Security@run.time Francis Wendpanga, Frédérique Biennier, Philippe Merle To cite this version: Francis Wendpanga, Frédérique Biennier, Philippe Merle. Optimizing

More information

Government's Adoption of SOA and SOA Examples

Government's Adoption of SOA and SOA Examples Government's Adoption of SOA and SOA Examples Presented by : Ajay Budhraja, Chief of Enterprise Services ME (Engg), MS (Management), PMP, CICM, CSM, ECM (Master) AIIM, ITIL-F Copyright 2008 Ajay Budhraja

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

Secure Document Circulation Using Web Services Technologies

Secure Document Circulation Using Web Services Technologies Secure Document Circulation Using Web Services Technologies Shane Bracher Bond University, Gold Coast QLD 4229, Australia Siemens AG (Corporate Technology), Otto-Hahn-Ring 6, 81739 Munich, Germany sbracher@student.bond.edu.au

More information

Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies

Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies 3-day seminar Give Your Business the Competitive Edge SOA has rapidly seized the momentum and center stage because

More information

Challenges of Security Risks in Service-Oriented Architectures

Challenges of Security Risks in Service-Oriented Architectures UMR 5205 Challenges of Security Risks in Service-Oriented Architectures Youakim Badr 1, Frederique Biennier 1, Pascal Bou Nassar 3, Soumya Banerjee 2!! 1 LIRIS Lab, INSA-Lyon, France! 2 Agence Universitaire

More information

A governance framework for mitigating risks and uncertainty in collaborative business processes

A governance framework for mitigating risks and uncertainty in collaborative business processes A governance framework for mitigating risks and uncertainty in collaborative business processes Ziyi Su, FrédériqueBiennier, Wendpanga Francis Ouedraogo LIRIS, CNRS, INSA-Lyon, University of Lyon, 20,

More information

Model driven Security of Service Oriented Systems based on Security as a Service

Model driven Security of Service Oriented Systems based on Security as a Service Japan-Austria Joint Workshop on ICT October 18-19 2010, Tokyo, Japan SECTET Model driven Security of Oriented Systems based on Security as a Basel Katt, Ruth Breu, Mukhtiar Memon and Michael Hafner Research

More information

Introduction to Service Oriented Architecture

Introduction to Service Oriented Architecture Introduction to Service Oriented Architecture CSCI-5828 Foundations of Software Engineering Ming Lian March 2012 Executive Summary This Executive Summary gives the straight word to the fresh that have

More information

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management Table of Contents Executive Summary 1 SECTION 1: CHALLENGE 2 The Need for

More information

SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS

SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) VERSION 2.1 SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS 1 TABLE OF CONTENTS INTRODUCTION... 3 About The Service-Oriented Modeling Framework

More information

Service Oriented Architecture (SOA) An Introduction

Service Oriented Architecture (SOA) An Introduction Oriented Architecture (SOA) An Introduction Application Evolution Time Oriented Applications Monolithic Applications Mainframe Client / Server Distributed Applications DCE/RPC CORBA DCOM EJB s Messages

More information

The Jamcracker Enterprise CSB AppStore Unifying Cloud Services Delivery and Management for Enterprise IT

The Jamcracker Enterprise CSB AppStore Unifying Cloud Services Delivery and Management for Enterprise IT The Jamcracker Enterprise CSB AppStore Unifying Cloud Services Delivery and Management for Enterprise IT Jamcracker, Inc. 4677 Old Ironsides Drive Santa Clara, CA, USA 95054 www.jamcracker.com Table of

More information

Lesson 18 Web Services and. Service Oriented Architectures

Lesson 18 Web Services and. Service Oriented Architectures Lesson 18 Web Services and Service Oriented Architectures Service Oriented Architectures Module 4 - Architectures Unit 1 Architectural features Ernesto Damiani Università di Milano A bit of history (1)

More information

Oracle SOA Suite: The Evaluation from 10g to 11g

Oracle SOA Suite: The Evaluation from 10g to 11g KATTA Durga Reddy TATA Consultancy Services. Oracle SOA Suite: The Evaluation from 10g to 11g Introduction Oracle SOA Suite is an essential middleware layer of Oracle Fusion Middleware. It provides a complete

More information

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)

More information

SOA and SaaS - new challenges

SOA and SaaS - new challenges SOA and SaaS - new challenges Andre Grübel Business Technology Capgemini Loeffelstrasse 44-46 70597 Stuttgart andre.gruebel@capgemini.com Abstract: SOA is moving towards Software as a Service (SaaS), which

More information

Building the Agile Enterprise. The MK/OMG Press

Building the Agile Enterprise. The MK/OMG Press Brochure More information from http://www.researchandmarkets.com/reports/1757796/ Building the Agile Enterprise. The MK/OMG Press Description: In the last ten years IT has brought fundamental changes to

More information

Service Governance and Virtualization For SOA

Service Governance and Virtualization For SOA Service Governance and Virtualization For SOA Frank Cohen Email: fcohen@pushtotest.com Brian Bartel Email: bbartel@pushtotest.com November 7, 2006 Table of Contents Introduction 3 Design-Time Software

More information

Business Process Execution Language for Web Services

Business Process Execution Language for Web Services Business Process Execution Language for Web Services Second Edition An architect and developer's guide to orchestrating web services using BPEL4WS Matjaz B. Juric With Benny Mathew and Poornachandra Sarang

More information

Modeling Business Processes for SOA: Designing the Service Oriented Enterprise

Modeling Business Processes for SOA: Designing the Service Oriented Enterprise Modeling Business Processes for SOA: Designing the Service Oriented Enterprise 27 Mar. 03-23-05 2006 March 27, 2006 Fred A. Cummins, EDS Fellow, Chair OMG BMIDTF EDS Technology Policy, Processes and Standards

More information

Business-Driven Software Engineering Lecture 3 Foundations of Processes

Business-Driven Software Engineering Lecture 3 Foundations of Processes Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster jku@zurich.ibm.com Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary

More information

SOA and BPO SOA orchestration with flow. Jason Huggins Subject Matter Expert - Uniface

SOA and BPO SOA orchestration with flow. Jason Huggins Subject Matter Expert - Uniface SOA and BPO SOA orchestration with flow Jason Huggins Subject Matter Expert - Uniface Objectives Define SOA Adopting SOA Business Process Orchestration Service Oriented Architecture Business Level Componentisation

More information

Service-Oriented Architectures

Service-Oriented Architectures Architectures Computing & 2009-11-06 Architectures Computing & SERVICE-ORIENTED COMPUTING (SOC) A new computing paradigm revolving around the concept of software as a service Assumes that entire systems

More information

The case for service oriented architecture in realising trusted, interoperable, pan-european egovernment services.

The case for service oriented architecture in realising trusted, interoperable, pan-european egovernment services. The case for service oriented architecture in realising trusted, interoperable, pan-european egovernment services. Stephen McGibbon Microsoft EMEA Tel. +445511490070 Email. stephenm@microsoft.com Abstract:

More information

What s New in Sonic V7.5 Rick Kuzyk

What s New in Sonic V7.5 Rick Kuzyk What s New in Sonic V7.5 Sonic ESB 7.5 Senior Portfolio Specialist 2 What s New in Sonic V7.5 Sonic ESB Timeline Sonic XQ March 2002 World s First Enterprise Service Bus Sonic ESB 6.0 March 2005 Continuous

More information

Service Oriented Architecture 1 COMPILED BY BJ

Service Oriented Architecture 1 COMPILED BY BJ Service Oriented Architecture 1 COMPILED BY BJ CHAPTER 9 Service Oriented architecture(soa) Defining SOA. Business value of SOA SOA characteristics. Concept of a service, Enterprise Service Bus (ESB) SOA

More information

Service Virtualization: Managing Change in a Service-Oriented Architecture

Service Virtualization: Managing Change in a Service-Oriented Architecture Service Virtualization: Managing Change in a Service-Oriented Architecture Abstract Load balancers, name servers (for example, Domain Name System [DNS]), and stock brokerage services are examples of virtual

More information

Service-oriented architecture in e-commerce applications

Service-oriented architecture in e-commerce applications Service-oriented architecture in e-commerce applications What is a Service Oriented Architecture? Depends on who you ask Web Services A technical architecture An evolution of distributed computing and

More information

ITU-T Kaleidoscope Conference Innovations in NGN. Managing NGN using the SOA Philosophy. Y. Fun Hu University of Bradford y.f.hu@bradford.ac.

ITU-T Kaleidoscope Conference Innovations in NGN. Managing NGN using the SOA Philosophy. Y. Fun Hu University of Bradford y.f.hu@bradford.ac. ITU-T Kaleidoscope Conference Innovations in NGN Managing NGN using the SOA Philosophy Y. Fun Hu University of Bradford y.f.hu@bradford.ac.uk Next Generation Network (NGN) A IP/IMS based network Provide

More information

Approach to Service Management

Approach to Service Management Approach to Service Management In SOA Space Gopala Krishna Behara & Srikanth Inaganti Abstract SOA Management covers the Management and Monitoring of applications, services, processes, middleware, infrastructure,

More information

Introduction to UDDI: Important Features and Functional Concepts

Introduction to UDDI: Important Features and Functional Concepts : October 2004 Organization for the Advancement of Structured Information Standards www.oasis-open.org TABLE OF CONTENTS OVERVIEW... 4 TYPICAL APPLICATIONS OF A UDDI REGISTRY... 4 A BRIEF HISTORY OF UDDI...

More information

Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102

Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102 Cloud Standards Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102 2011 IBM Corporation Agenda Overview on Cloud Standards Identity and Access Management Discussion 2 Overview on Cloud

More information

A Unified Messaging-Based Architectural Pattern for Building Scalable Enterprise Service Bus

A Unified Messaging-Based Architectural Pattern for Building Scalable Enterprise Service Bus A Unified Messaging-Based Architectural Pattern for Building Scalable Enterprise Service Bus Karim M. Mahmoud 1,2 1 IBM, Egypt Branch Pyramids Heights Office Park, Giza, Egypt kmahmoud@eg.ibm.com 2 Computer

More information

Software Services. By Michał Antkiewicz http://gsd.uwaterloo.ca/mantkiew @ WCI CS Club

Software Services. By Michał Antkiewicz http://gsd.uwaterloo.ca/mantkiew @ WCI CS Club Software Services By Michał Antkiewicz http://gsd.uwaterloo.ca/mantkiew @ WCI CS Club Context Software Engineering Methods and processes of software development Evolving enterprise software ecosystem Hundreds

More information

Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies

Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies 3-day seminar Give Your Business the Competitive Edge SOA has rapidly seized the momentum and center stage because

More information

Business Process Management Enabled by SOA

Business Process Management Enabled by SOA Business Process Management Enabled by SOA Jyväskylä 8.5.2007 Kimmo Kaskikallio IT Architect IBM Software Brands Five middleware product lines designed to work together Service-Oriented Architecture (SOA)

More information

Certified Information Security Manager (CISM)

Certified Information Security Manager (CISM) Certified Information Security Manager (CISM) Course Introduction Course Introduction Domain 01 - Information Security Governance Lesson 1: Information Security Governance Overview Information Security

More information

Cloud up to business processes

Cloud up to business processes Chris Francis IBM Technical Relations and Regulatory Affairs Cloud up to business processes Chris Francis Existing state of play Conventional solutions Software as a Service Platform as a Service Infrastructure

More information

Guiding Principles for Technical Architecture

Guiding Principles for Technical Architecture This document is a statement of the principles that will guide the technical development of the Kuali Student system. It will serve as a reference throughout the full lifecycle of the project. While these

More information

TECHNOLOGY TRANSFER PRESENTS MAX. From EAI to SOA ACHIEVING BUSINESS AGILITY THROUGH INTEGRATION

TECHNOLOGY TRANSFER PRESENTS MAX. From EAI to SOA ACHIEVING BUSINESS AGILITY THROUGH INTEGRATION TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER From EAI to SOA to Cloud Integration ACHIEVING BUSINESS AGILITY THROUGH INTEGRATION DECEMBER 12-14, 2011 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

More information

Using MSBA as the Foundation for SOA

Using MSBA as the Foundation for SOA SOA Challenges Why is Business Architecture Important What is MSBA Using MSBA as the Foundation for SOA SOA in context 1 SOA holds out enormous promise to revitalise the business value of IT... but early

More information

A Service Oriented Security Reference Architecture

A Service Oriented Security Reference Architecture International Journal of Advanced Computer Science and Information Technology (IJACSIT) Vol. 1, No.1, October 2012, Page: 25-31, ISSN: 2296-1739 Helvetic Editions LTD, Switzerland www.elvedit.com A Service

More information

Table of Contents. 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8

Table of Contents. 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8 Table of Contents 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8 3 SOA in Verizon The IT Workbench Platform... 10 3.1 Technology... 10 3.2 Processes

More information

D. SERVICE ORIENTED ARCHITECTURE PRINCIPLES

D. SERVICE ORIENTED ARCHITECTURE PRINCIPLES D. SERVICE ORIENTED ARCHITECTURE PRINCIPLES 1. Principles of serviceorientation 2. Service exchange lifecycle 3. Service composition 4. Evolution of SOA 212 D.1 Principles of service-orientation 213 HISTORICAL

More information

Unlocking the Power of SOA with Business Process Modeling

Unlocking the Power of SOA with Business Process Modeling White Paper Unlocking the Power of SOA with Business Process Modeling Business solutions through information technology TM Entire contents 2006 by CGI Group Inc. All rights reserved. Reproduction of this

More information

Policy Driven Practices for SOA

Policy Driven Practices for SOA Independent Insight for Oriented Practice Policy Driven Practices for SOA Lawrence Wilkes CBDI Forum www.cbdiforum.com Agenda! Enterprise SOA Challenge! SOA Policy Areas! Layered Architecture as a basis

More information

Tool support for Collaborative Software Quality Management

Tool support for Collaborative Software Quality Management Tool support for Collaborative Software Quality Management Philipp Kalb and Ruth Breu Institute of Computer Science University of Innsbruck Email: philipp.kalb, ruth.breu@uibk.ac.at Abstract. Nowadays

More information

Mitra Innovation Leverages WSO2's Open Source Middleware to Build BIM Exchange Platform

Mitra Innovation Leverages WSO2's Open Source Middleware to Build BIM Exchange Platform Mitra Innovation Leverages WSO2's Open Source Middleware to Build BIM Exchange Platform May 2015 Contents 1. Introduction... 3 2. What is BIM... 3 2.1. History of BIM... 3 2.2. Why Implement BIM... 4 2.3.

More information

Run-time Service Oriented Architecture (SOA) V 0.1

Run-time Service Oriented Architecture (SOA) V 0.1 Run-time Service Oriented Architecture (SOA) V 0.1 July 2005 Table of Contents 1.0 INTRODUCTION... 1 2.0 PRINCIPLES... 1 3.0 FERA REFERENCE ARCHITECTURE... 2 4.0 SOA RUN-TIME ARCHITECTURE...4 4.1 FEDERATES...

More information

An End-to-End Security Auditing Approach for Service Oriented Architectures

An End-to-End Security Auditing Approach for Service Oriented Architectures An End-to-End Security Auditing Approach for Service Oriented Architectures Mehdi Azarmi, Bharat Bhargava, Pelin Angin, Rohit Ranchal Computer Science Department Purdue University Norman Ahmed, Asher Sinclair,

More information

SOA Executive Overview Achieve Business Agility, October 23, 2012. Ray Daniel, Connectivity and Integration Executive

SOA Executive Overview Achieve Business Agility, October 23, 2012. Ray Daniel, Connectivity and Integration Executive SOA Executive Overview Achieve Business Agility, October 23, 2012 Ray Daniel, Connectivity and Integration Executive 1 2 These trends are changing entire industries Mobile 2 Cloud Big Data Social 3 3 4

More information

JOURNAL OF OBJECT TECHNOLOGY

JOURNAL OF OBJECT TECHNOLOGY JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2008 Vol. 7, No. 8, November-December 2008 What s Your Information Agenda? Mahesh H. Dodani,

More information

Presentation Outline. Key Business Imperatives Service Oriented Architecture Defined Oracle SOA Platform 10.1.3 SOA Maturity/Adoption Model Demo Q&A

Presentation Outline. Key Business Imperatives Service Oriented Architecture Defined Oracle SOA Platform 10.1.3 SOA Maturity/Adoption Model Demo Q&A Presentation Outline Key Business Imperatives Service Oriented Architecture Defined Oracle SOA Platform 10.1.3 SOA Maturity/Adoption Model Demo Q&A Key Business Imperatives Increased Competition Requires

More information

FUJITSU Software Interstage Business Operations Platform: A Foundation for Smart Process Applications

FUJITSU Software Interstage Business Operations Platform: A Foundation for Smart Process Applications FUJITSU Software Interstage Business Operations Platform: A Foundation for Smart Process Applications Keith Swenson VP R&D, Chief Architect Fujitsu America, Inc. May 30, 2013 We are a software company

More information

E-Business Suite Oracle SOA Suite Integration Options

E-Business Suite Oracle SOA Suite Integration Options Specialized. Recognized. Preferred. The right partner makes all the difference. E-Business Suite Oracle SOA Suite Integration Options By: Abhay Kumar AST Corporation March 17, 2014 Applications Software

More information

Automated Virtual Cloud Management: The need of future

Automated Virtual Cloud Management: The need of future Automated Virtual Cloud Management: The need of future Prof. (Ms) Manisha Shinde-Pawar Faculty of Management (Information Technology), Bharati Vidyapeeth Univerisity, Pune, IMRDA, SANGLI Abstract: With

More information

Emerging Approaches in a Cloud-Connected Enterprise: Containers and Microservices

Emerging Approaches in a Cloud-Connected Enterprise: Containers and Microservices Emerging Approaches in a -Connected Enterprise: Containers and Microservices Anil Karmel Co-Founder and CEO, C2 Labs Co-Chair, NIST Security Working Group akarmel@c2labs.com @anilkarmel Emerging Technologies

More information

A Look at the New Converged Data Center

A Look at the New Converged Data Center Organizations around the world are choosing to move from traditional physical data centers to virtual infrastructure, affecting every layer in the data center stack. This change will not only yield a scalable

More information

Introduction to Service Oriented Architectures (SOA)

Introduction to Service Oriented Architectures (SOA) Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction

More information

SOA Governance & Security How BPM Can Help Philip Larson, Director of Product Management, Appian Corporation

SOA Governance & Security How BPM Can Help Philip Larson, Director of Product Management, Appian Corporation SOA Governance & Security How BPM Can Help Philip Larson, Director of Product Management, Appian Corporation Copyright 2006 Appian Corporation. All rights reserved. Agenda! SOA Intro! How BPM And SOA Fit

More information

Context-Aware Access Control for Pervasive Access to Process-Based Healthcare Systems

Context-Aware Access Control for Pervasive Access to Process-Based Healthcare Systems ehealth Beyond the Horizon Get IT There S.K. Andersen et al. (Eds.) IOS Press, 2008 2008 Organizing Committee of MIE 2008. All rights reserved. 679 Context-Aware Access Control for Pervasive Access to

More information

Software Requirement Specification Web Services Security

Software Requirement Specification Web Services Security Software Requirement Specification Web Services Security Federation Manager 7.5 Version 0.3 (Draft) Please send comments to: dev@opensso.dev.java.net This document is subject to the following license:

More information

A process model is a description of a process. Process models are often associated with business processes.

A process model is a description of a process. Process models are often associated with business processes. Process modeling A process model is a description of a process. Process models are often associated with business processes. A business process is a collection of related, structured activities that produce

More information

The Way to SOA Concept, Architectural Components and Organization

The Way to SOA Concept, Architectural Components and Organization The Way to SOA Concept, Architectural Components and Organization Eric Scholz Director Product Management Software AG Seite 1 Goals of business and IT Business Goals Increase business agility Support new

More information

[PACKT] entferiss. Do More with SOA Integration: Best of Packt. Integrate, automate, and regulate your business. with the best of Packt's SOA books

[PACKT] entferiss. Do More with SOA Integration: Best of Packt. Integrate, automate, and regulate your business. with the best of Packt's SOA books Do More with SOA Integration: Best of Packt Integrate, automate, and regulate your business processes with the best of Packt's SOA books Series Editor Carl Jones [PACKT] entferiss PUBLISHING BIRMINGHAM

More information

Urbancode Deploy Overview

Urbancode Deploy Overview Urbancode Deploy Overview Continuous delivery challenges facing customers 2 *Data based on UrbanCode customer survey Multi-Platform Application Deployment Automation Visibility and automated control of

More information

OSIRIS Middleware & ISIS Application

OSIRIS Middleware & ISIS Application OSIRIS Middleware & ISIS Application DELOS All Tasks Meeting Heiko Schuldt University of Basel, Switzerland UMIT, Austria What is OSIRIS? OSIRIS: Open Service Infrastructure for Reliable and Integrated

More information

Ironside Group Rational Solutions

Ironside Group Rational Solutions Ironside Group Rational Solutions IBM Cloud Orchestrator Accelerate the pace of your business innovation Richard Thomas IBM Cloud Management Platforms thomas1@us.ibm.com IBM Cloud Orchestrator Business

More information

From BPMN 2.0 to the Setting-Up on an ESB - Application to an Interoperability Problem

From BPMN 2.0 to the Setting-Up on an ESB - Application to an Interoperability Problem From BPMN 2.0 to the Setting-Up on an ESB - Application to an Interoperability Problem Y. Lemrabet, D. Clin, M. Bigand, and J.-P. Bourey Univ Lille Nord de France, F-59000 Lille, France Laboratoire de

More information

Realization of Security Events Management System via OPENSTF

Realization of Security Events Management System via OPENSTF Realization of Security Events Management System via OPENSTF Lance Yoo www.antpower.org Requirements Analysis of Security Event Management Background of Security Event Management Requirement We could not

More information

In this Lecture you will Learn: Development Process. Unified Software Development Process. Best Practice

In this Lecture you will Learn: Development Process. Unified Software Development Process. Best Practice In this Lecture you will Learn: Development Chapter 5C About the Unified Software Development How phases relate to workflows in an iterative life cycle An approach to system development Major activities

More information

Developing SOA solutions using IBM SOA Foundation

Developing SOA solutions using IBM SOA Foundation Developing SOA solutions using IBM SOA Foundation Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 4.0.3 4.0.3 Unit objectives After completing this

More information

SECURITY POLICY MANAGEMENT ACROSS THE NEXT GENERATION DATA CENTER

SECURITY POLICY MANAGEMENT ACROSS THE NEXT GENERATION DATA CENTER SECURITY POLICY MANAGEMENT ACROSS THE NEXT GENERATION DATA CENTER An AlgoSec Whitepaper MANAGE SECURITY AT THE SPEED OF BUSINESS AlgoSec Whitepaper Introduction Corporate networks today must deliver hundreds

More information

Trends and Innovation with Service Reuse, Cloud and Big Data

Trends and Innovation with Service Reuse, Cloud and Big Data Trends and Innovation with Service Reuse, Cloud and Big Data Presented by : Ajay Budhraja ME (Engg), MS (Mgmt), PMP, CICM, CSM, ECM (Master) AIIM, SOA(IBM), RUP (IBM), ITIL-F, CMMI, Security+ Copyright

More information

Platform Reusability to Support Multiple State Agencies, Systems and Programs

Platform Reusability to Support Multiple State Agencies, Systems and Programs Platform Reusability to Support Multiple State Agencies, Systems and Programs Leveraging a Health Insurance Exchange (HIX) Platform to achieve inter-agency and intra-agency interoperability to meet agency

More information

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems Core Feature Comparison between XML / SOA Gateways and Web Application Firewalls Jason Macy jmacy@forumsys.com CTO, Forum Systems XML Gateway vs Competitive XML Gateways or Complementary? and s are Complementary

More information

Business Process Modelling Languages

Business Process Modelling Languages Agent and Object Technology Lab Dipartimento di Ingegneria dell Informazione Università degli Studi di Parma Business Process Modelling Languages Paola Turci AOT Lab - DII - Università di Parma Business

More information

5 Do s and Don ts for every Oracle SOA Suite project

5 Do s and Don ts for every Oracle SOA Suite project 5 Do s and Don ts for every Oracle SOA Suite project The Oracle SOA Suite is comprehensive, which can make it hard to know where to start. That is why we have produced this list of Do s and Don t s for

More information

Creating a Payments Hub in Real Life

Creating a Payments Hub in Real Life David Jackson: IBM, Banking Industry Framework Gene Neyer: Fundtech, Product Management April 28, 2010 Creating a Payments Hub in Real Life Agenda Payment hubs analyst and industry view Old versus new

More information

Software Architecture & Composition. Guillaume Waignier, Anne-Françoise Le Meur, Laurence Duchien Project-Team U. Lille 1/CNRS-INRIA

Software Architecture & Composition. Guillaume Waignier, Anne-Françoise Le Meur, Laurence Duchien Project-Team U. Lille 1/CNRS-INRIA 1 Software Architecture & Composition Guillaume Waignier, Anne-Françoise Le Meur, Laurence Duchien Project-Team U. Lille 1/CNRS-INRIA http://adam.lille.inria.fr April 2009 2 Scientific context Future applications

More information

Testing a SOA Application

Testing a SOA Application Srikanth Inaganti and Sriram Aravamudan Abstract Conventional software testing methodologies often do not provide an efficient and accurate test plan for SOA. Since SOA is a loosely coupled, distributed

More information

OPENIAM ACCESS MANAGER. Web Access Management made Easy

OPENIAM ACCESS MANAGER. Web Access Management made Easy OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access

More information

E l i m i n a t i n g Au t hentication Silos and Passw or d F a t i g u e w i t h Federated Identity a n d Ac c e s s

E l i m i n a t i n g Au t hentication Silos and Passw or d F a t i g u e w i t h Federated Identity a n d Ac c e s s I D C T E C H N O L O G Y S P O T L I G H T E l i m i n a t i n g Au t hentication Silos and Passw or d F a t i g u e w i t h Federated Identity a n d Ac c e s s M a nagement November 2013 Adapted from

More information

API Management: Powered by SOA Software Dedicated Cloud

API Management: Powered by SOA Software Dedicated Cloud Software Dedicated Cloud The Challenge Smartphones, mobility and the IoT are changing the way users consume digital information. They re changing the expectations and experience of customers interacting

More information

Oracle SOA Suite 11g: Essential Concepts Student Guide

Oracle SOA Suite 11g: Essential Concepts Student Guide Oracle SOA Suite 11g: Essential Concepts Student Guide D58786GC20 Edition 2.0 August 2011 D73588 Author Iris Li Technical Contributors and Reviewers Gary Barg Pete Daly Joe Greenwald David Mills David

More information

For Version 1.0

For <Project> Version 1.0 Oklahoma Department of Human Services Data Services Division Service-Oriented Architecture (SOA) For Version 1.0 Table of Contents 1. Service Oriented Architecture (SOA) Scope...

More information

MODELING OF SERVICE ORIENTED ARCHITECTURE: FROM BUSINESS PROCESS TO SERVICE REALISATION

MODELING OF SERVICE ORIENTED ARCHITECTURE: FROM BUSINESS PROCESS TO SERVICE REALISATION MODELING OF SERVICE ORIENTED ARCHITECTURE: FROM BUSINESS PROCESS TO SERVICE REALISATION Marek Rychlý and Petr Weiss Faculty of Information Technology, Brno University of Technology, Czech Republic, rychly@fit.vutbr.cz,

More information

Oracle SOA Suite 11g : Build Composite Applications

Oracle SOA Suite 11g : Build Composite Applications Oracle University Contact Us: 1.800.529.0165 Oracle SOA Suite 11g : Build Composite Applications Duration: 5 Days What you will learn This course teaches you to design and develop SOA composite applications

More information

Enterprise Service Bus

Enterprise Service Bus Introduction to Enterprise Service Bus DISTRIBUTED SYSTEMS RESEARCH GROUP http://nenya.ms.mff.cuni.cz CHARLES UNIVERSITY PRAGUE Faculty of Mathematics and Physics What s the problem? o deploy disparate

More information

The standards landscape in cloud

The standards landscape in cloud The standards landscape in cloud PRESENTATION computing TITLE GOES HERE Vincent Franceschini CTO Distributed Architectures, Hitachi Data System Chairman Emeritus, SNIA Governing Board Member, SNIA Cloud

More information

EAI OVERVIEW OF ENTERPRISE APPLICATION INTEGRATION CONCEPTS AND ARCHITECTURES. Enterprise Application Integration. Peter R. Egli INDIGOO.

EAI OVERVIEW OF ENTERPRISE APPLICATION INTEGRATION CONCEPTS AND ARCHITECTURES. Enterprise Application Integration. Peter R. Egli INDIGOO. EAI OVERVIEW OF ENTERPRISE APPLICATION INTEGRATION CONCEPTS AND ARCHITECTURES Peter R. Egli INDIGOO.COM 1/16 Contents 1. EAI versus SOA versus ESB 2. EAI 3. SOA 4. ESB 5. N-tier enterprise architecture

More information

Objectif. Participant. Prérequis. Pédagogie. Oracle SOA Suite 11g - Build Composite Applications. 5 Jours [35 Heures]

Objectif. Participant. Prérequis. Pédagogie. Oracle SOA Suite 11g - Build Composite Applications. 5 Jours [35 Heures] Plan de cours disponible à l adresse http://www.adhara.fr/.aspx Objectif Describe SOA concepts and related technology Create an SOA Composite application using JDeveloper Work with Mediator components

More information

How service-oriented architecture (SOA) impacts your IT infrastructure

How service-oriented architecture (SOA) impacts your IT infrastructure IBM Global Technology Services January 2008 How service-oriented architecture (SOA) impacts your IT infrastructure Satisfying the demands of dynamic business processes Page No.2 Contents 2 Introduction

More information

Service-Oriented Architecture and Software Engineering

Service-Oriented Architecture and Software Engineering -Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based

More information

Who are We Specialized. Recognized. Preferred. The right partner makes all the difference.

Who are We Specialized. Recognized. Preferred. The right partner makes all the difference. Our Services Who are We Specialized. Recognized. Preferred. The right partner makes all the difference. Oracle Partnership Oracle Specialized E-Business Suite Business Intelligence EPM-Hyperion Fusion

More information

Service-Oriented Architecture: Analysis, the Keys to Success!

Service-Oriented Architecture: Analysis, the Keys to Success! Service-Oriented Architecture: Analysis, the Keys to Success! Presented by: William F. Nazzaro CTO, Inc. bill@iconatg.com www.iconatg.com Introduction Service-Oriented Architecture is hot, but we seem

More information