Mobile Web Services Workshop 行 動 式 網 際 網 路 服 務 平 臺. 工 研 院 電 通 所 網 際 網 路 軟 體 技 術 組 鄭 仁 傑 Roger Jen-Chieh Cheng

Size: px
Start display at page:

Download "Mobile Web Services Workshop 行 動 式 網 際 網 路 服 務 平 臺. 工 研 院 電 通 所 網 際 網 路 軟 體 技 術 組 鄭 仁 傑 Roger Jen-Chieh Cheng rogercheng@itri.org."

Transcription

1 Mobile Web Services Workshop 行 動 式 網 際 網 路 服 務 平 臺 工 研 院 電 通 所 網 際 網 路 軟 體 技 術 組 鄭 仁 傑 Roger Jen-Chieh Cheng 1

2 Agenda Evolution (What hava happened?) Web Application Mobile Internet Mobile Commerce Area and Market Mobile Service Framework Open Service Access (OSA) MExE Web Services Architecture and Technology P2P Service Gateway Security Issue Conclusion 2

3 Evolution of a Web System - I Web Server Client Yesterday 3

4 Evolution of a Web System - II Web Server Client Transaction Server Rendering Server Client Independent of development between the business logic and the rendering More dynamic content as a aggregation of the business logic and rendering operations Profiling and advertizement added at the rendering level Scalable solution Invisible revolution for the end users Yesterday Today 4

5 Evolution of a Web System - III Multi channel to cross channel transaction User based services Calender, address book, wallet, billing Experience profilling, Projection of the user at the network level for permanent presence New business creation: User Service Provider Transaction Transaction Client Server Server User Server Rendering Rendering Rendering Rendering Server Server Server Server Realtime Realtime Interaction Interaction Server Server 5

6 Evolution of a Web System - IV Transaction Transaction Server Server Realtime Realtime Interaction Interaction Server Server Realtime Context Interaction Server User Server User Server Transaction Server Services Rendering Rendering Rendering Rendering Server Server Server Server Rendering Rendering Rendering Rendering Server Server Server Server Client Client Emerging Tomorrow 6

7 Wireless Today Wireless subscribers are demanding new services: Fast internet access Global roaming Wireless commerce Video communication Need higher transmission rate and more function features 7

8 Wireless Evolution 1st generation: 1980s Analog Voice Service 2nd generation: from 1992 Digital Voice and low rate data service 3rd generation: 2002 High rate data and multimedia service 8

9 Wireless Evolution AMPS GSM, IS-95A WCDMA, cdma2000 3rd Gen. 1st Gen. Mobile Telephone Service Analog Cellular Technology Macrocellular Technology Past 2nd Gen. Advanced Wireless Voice Services Advanced Wireless Data Services Digital Cellular Technology Microcellular & Picocellular Technologies Intelligent Base Station Technology Now Integrated High Quality Voice, High Speed Data, Location Services Global Roaming Advanced Multimedia Services Broader Bandwidth Radio Channels Higher Frequency Spectrum Utilization Advanced Speech, Data, Visual Compression & Radio Transmission 4th Gen. Distance Learning IN Capabilities (Intelligent Agents) Knowledge-Based Network Operation Unified Service Networks Year 2010 Year

10 Goals of Network Evolving Essence of network evolution: Convergence of communication and distributed computing Voice, video and data Telecom and datacom Control and management A ubiquitous QoS-enabled packet-oriented multimedia service network with an open service architecture is the trend. 10

11 Today Access is Channel Specific User in context Devices Networks Services For Each User Experience For Each Service 11

12 Tomorrow Access is in Two Steps A Service Level Agreement that defines the best devices for the best experience Virtual Identity Services User 12

13 Mobile M-Commerce Area $ Banking Transacting Delivering business / individual s information services Over Mobile!!! Informing Portal News Sport Weather Shares... Travelling Scheduling Shopping Entertainment Boots New Applications & Services Video conferencing Database Positioning Location 13

14 Mobile E-Commerce (M- Commerce) Where can M-Commerce be applied to? B-C (Business to Consumer) Mobile banking, Mobile retailing, Mobile stockbroking, Mobile auction, Mobile ticketing, Mobile advertising, Short Message Service, B-E (Business to Employee) Mobile scheduling, Mobile PIM, Mobile , Mobile Learning, Mobile intranet access, Document Retrieval and Management B-B (Business to Business) Mobile Application Service Provider, Mobile CRM, Mobile ERP, industryspecific application Source :IEK,2001/7 14

15 2G & 3G Mobile Internet Shifting Value 使 用 者 電 信 業 者 無 線 ISP 附 加 價 值 提 供 者 內 容 提 供 者 ( 行 動 商 務 ) 100% Shifting Value 72% $ 25% 23% 25% 小 於 3% 12% 小 於 2% 38% $ 註 : 2G 3G $ 主 要 獲 利 者 15

16 1,800 1,600 1,400 1,200 1,000 Million Subscribers Mobile Market Worldwide Quick Growth: 1 Billion Internet (mobile & fixed) and mobile subscribers respectively in 2004 World Subscriber Forecast Mobile Fixed Fixed Internet Mobile Internet Source: Siemens Year 16

17 Framework for Services VHE OSA Personal Service Environment (Customized/Portable) Applications/Clients Service Capability Features Service Capabilities Personalized services Personalized user interface Consistent set of services anytime and anywhere Built using Service Capability Features Standard API Pre-set by Standards, e.g. CAMEL, SAT, MExE Bearers 17

18 Virtual Home Environment (VHE) Users are consistently presented with the same personalized features, User interface customization, Services In User profiles whatever network services accessible by all kinds of netowrk and wahtever terminal(within the capabilities of the terminal and network) wherever the user may be located global roaming MExE and OSA are two of the toolkits which may be used to support VHE 18

19 VHE Value Added Service Provider USER Personal Service Environment Provided and controlled by Control Access to services depending on: Location of users available capability features user preference Home Environment Contains 1:N General User Preferences and Subscribed Service User Profile HE Value Added Service Provider Services are accessible from Whatever network wherever users may be 19

20 Open Service Access (OSA) Provide an extendible and scalable architecture that allows for inclusion of new service capability features and service capability servers. API is general; independent of vender specific solution; Programming language; Operating systems. Object-oriented techniques, like CORBA, can be used to achieve above goals. 20

21 Why needs OSA? Network Operator 多, 環 境 不 一 服 務 業 者 投 入 意 願 難 提 昇 整 合 各 Operator, 提 供 相 同 之 開 放 服 務 平 台 Network Operator 1 Internet Network Operator 1 Network Operator 2 Internet Network Operator 2 Internet Network Operator 3 Internet Network Operator 3 Service Platforms Service/Content Providers Open Service Platform Service/Content Providers 21

22 OSA Capability Web Server MExE Client GPRS/3G Bearer HLR CSE Communication Network Internet/DPE Multimedia Message Server WAP Client SAT SAT Client WAP PPG MExE Server OSA Gateway Payment Gateway Application Server 22

23 行 動 式 資 訊 交 換 開 放 平 台 技 術 Service Terminal Common Service Platform MExE Client Open Service Access * * * Embedded Browser Mobile Information Device Profile J2ME Core APIs KVM Gateway API Framework API Call Control OSA APPLICATIONS API Messaging API API User Interaction Mobility API Accounting Management API Data Session Term Caps API Content Based Charging RTOS Framework SCFs *Authentication *Authorization *Discovery *Registration *Notification *Integrity Management *Security/Privacy *Public Key Infrastructure (extension) Network SCFs Call Control *Data Session Control User Location User Status *Terminal capabilities *User Profile Mngt. Billing MExE Server WAP PPG 23

24 MExE Mobile Execution Environment details a flexible and secure application environment for 3G (and 2G+) mobile devices. MExE consists of a variety of current technologies and incorporates both WAP and Java. It also includes a framework which specifies: Capability and content negotiation User profiles Management of services Virtual home environment User control of application connections Journalling of network events 24

25 High level architecture MExE Aspects 25

26 MExE Services (1) Access to MExE Services Services execute on a remote server 26

27 MExE Services (2) Service client downloaded to MExE MT 27

28 MExE Services (3) Standalone service downloaded to MExE MT 28

29 MExE Services (4) MExE MT to MExE MT services 29

30 Web Services Architecture Uses UDDI to find appropriate Web service WSDL WSDL Green pages White pages Yellow pages UDDI XML / SOAP Web services repository UDDI XML / SOAP XML/SOAP Web How a client talks Web services to a service provider client depends on the WSDL UDDI WSDL Web services provider Uses UDDI to register a Web service with the repository SOAP FTP HTTP SMTP 30

31 .NET and J2EE Security/identity.NET Transaction support Messagin Microsoft Security/identity J2EE Transaction support Messagin XML/SOAP XML/SOAP J2EE implementations Web services UDDI WSDL iplanet(sun) IBM BEA HP Hitachi IONA Fujitsu Sybase Oracle SOAP HTTP XML 31

32 Microsoft.NET Platform VisualStudio.NET IDE-cross language debuggers-xml Schema editors.net servers Application Center 2000 BizTalk Server 2000 Commerce Server 2000 Exchange Server 2000 Host Integration Server 2000 Internet Security and Acceleration Server 2000 SQL Server 2000.NET framework COBOL VB C# CLR C++.NET building Block services Passport HailSotrm Operating system layer Windows XP Windows 2000 Windows ME Windows CE Security/identity.NET Transaction support Messagin Microsoft XML/SOAP Web services XML/SOAP 32

33 J2EE Web Services pack The Java architecture For XML binding (JAXB) The Java API for messaging (JAXM) The Java API for XML (JAXP) The Java connection architecture The Java API For remote procedure Calls (JAX-RPC) The Java API for registries (JAXR) Security/identity J2EE Transaction support Messagin XML/SOAP XML/SOAP Web services 33

34 P2P/Web Srvice Gateway Service Portal Service Gateway 線 上 資 訊 服 務 Internet Information Proxy Agent Filter 個 人 資 訊 服 務 Information Warehouse 金 融 資 訊 商 務 esoho Server Ethernet VoIP NAT Fierwall Kernel Space Smart Phone User Space WLAN Access Point Notebook PC Printer P2P/Web Service Gateway 34

35 P2P/Web Srvice Gateway( 續 ) Proxy & QOS Personalization Content Filtering Service Mapping Export mapping Import Services Transformation Service Publication & Lookup Security & Management Service Provision/Brokering NAT/Firewall 35

36 M-Commerce Security WTLS vs SSL WEB with PrivateWire Client - WAP Solution Internet Thin Client WAP Gateway PrivateWire Gateway Application Web Server WTLS SSL 36

37 Wireless Identity Module(WIM) Card (Smart Card + SIM Card) Application( EC, Push Application) SIM WAP(1.2,1.3,2.0) Application Non-WAP Application WPKI (draft) WTLS WML SSL3.0(TLS) S/MIME 3.0 PKCS#15 (Information format) Unwrapping key,digital Signature,hash Verify Certificate,Access Control ISO 7816 Bluetooth Privacy Integrity Authentication Non-Repudiation A B 37

38 Transaction WPKI Architecture Mid-Tier Service Provider CA CA PKI Repository PKI Portal WAP Phone WAP Gateway WTLS or signtext LDAP HTTP Application Service Provider 38

39 XML Key Management System(XKMS) Application Key Pair Holder Private key Public key Relying Party production Register my public key! Registration Server Give me the public key I need! Assertion Server XML Public keys PKI Provider PKI Private Keys 39

40 Web Service Security Issues POST /TravelService HTTP/1.1. <SOAP-ENV:Body> <m:makereservation.> Non-repudiation <flight>abc 1234</flight> <hotel>efg 5678<.hotel>. Integrity </m:makereservation> Confidentiality </SOAP-ENV:Body>. Authentication/ Authorization. <SOAP-ENV:Body> <m:makereservationresponse.>. </m:makereservationresponse> </SOAP-ENV:Body>. Travel Agency Service Web Server Web Service Engine Travel Service POST /TravelService HTTP/1.1. Non-repudiation <SOAP-ENV:Body> <m:booking.> Integrity <flight>1234</flight>. </m:booking> Confidentiality </SOAP-ENV:Body>. Authentication/ Authorization POST /TravelService HTTP/1.1. Non-repudiation <SOAP-ENV:Body> <m:booking.> Integrity <hotel>5678</hotel>. </m:booking> Confidentiality </SOAP-ENV:Body>. Authentication/ Authorization Airline Service Web Service Engine Airline Service Hotel Service Web Service Engine Airline Service 40

41 Web Service Security: Possible Solution Security Token Service Service Provider opens back channel to Identity Provider to query about user Travel Agency Service Bob Secured XML(SOAP) Message Transport-specific SSL TLS Transport-neutral XML Digital Signature XML Encryption SAML Web Server Web Service Engine Travel Service Hotel Service Web Service Engine Airline Service 41

42 Web Service Security in The World TrustBridge 係 根 據 微 軟 與 IBM VeriSign 聯 手 發 展 的 網 路 服 務 安 全 技 術, 著 重 於 一 種 稱 為 網 路 服 務 安 全 (WS-Security) 的 規 格 Liberty Alliance Project 自 由 聯 盟 計 畫 ( 是 一 個 嶄 新 的 組 織, 成 立 目 的 為 了 建 構 開 放 式 的 聯 合 單 一 登 入 Single sign-on) 解 決 方 案, 符 合 數 位 經 濟 以 任 何 設 備 上 網 的 需 要 42

43 Web Service 整 合 服 務 架 構 Browser Interface Hand Phone Interface PDA Interface Web Services 認 證 授 權 Single Sign-on Security Service Flow Control Content Manager CA Server Legacy Object Legacy Object Legacy Object Business Object XML-RPC/RMI/HTTP XML/DCOM/CORBA/ Web Service/JCBC/ODBC.. Internet Internet / / Extranet Extranet / / Intranet Intranet XML-RPC/RMI/HTTP XML/DCOM/ Web Service/CORBA/JCBC/ODBC.. Legacy System Legacy System.. SOAP Web Service UDDI JCBC/ODBC/ Files.. User Profile Content Meta Data Database Bank System 43

44 Service-Driven Network New Products New Markets 3rd Party Content Creators ISDN DSL Dial-up Network Services Technology Foundation Cable Modem Cellular/PCS Back Office Servers Paging Satellite Services : Anytime Anyplace on Anything Airport SOHO Home Hotel 44

45 Thank you! 45

Wireless Mobile Workers

Wireless Mobile Workers Wireless Mobile Workers Ted Burnham SEAGULL Product Manager, TigerRay and Wireless-to to-host Who is? SEAGULL Solutions Emulation Enterprise Applications Mainframe Web Host Access Interactive G UI Windows/Java

More information

The Ubiquitous Web, UPnP and Smart Homes

The Ubiquitous Web, UPnP and Smart Homes The Ubiquitous Web, UPnP and Smart Homes Franklin Reynolds Nokia Research Center, Cambridge franklin.reynolds@nokia.com 1 NOKIA PCG.PPT / 15 6 2004 / Franklin Reynolds Our Vision "The essence of this vision

More information

Mobility and cellular networks

Mobility and cellular networks Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission

More information

Chapter 6 Telecommunications, Networks, and Wireless. Computing

Chapter 6 Telecommunications, Networks, and Wireless. Computing Chapter 6 Telecommunications, Networks, and Wireless Computing Essay Questions: 1. Define a hub, switch, and a router. 2. List the challenges associated with managing contemporary telecommunications and

More information

The Enterprise Service Bus

The Enterprise Service Bus 1 ESBs: Essential Infrastructure for a Successful SOA March 2005 2 at a glance Customers include world s largest firms! 80% of Global Telecom! 70% of Financial Services in Global 100! Blue Chip System

More information

Guide to Wireless Communications. Digital Cellular Telephony. Learning Objectives. Digital Cellular Telephony. Chapter 8

Guide to Wireless Communications. Digital Cellular Telephony. Learning Objectives. Digital Cellular Telephony. Chapter 8 Guide to Wireless Communications Digital Cellular Telephony Chapter 2 Learning Objectives Digital Cellular Telephony 3 Describe the applications that can be used on a digital cellular telephone Explain

More information

Whitepaper Mobile Enterprise. The path to the Mobile Enterprise

Whitepaper Mobile Enterprise. The path to the Mobile Enterprise Whitepaper Mobile Enterprise The path to the Mobile Enterprise 1 Executive summary At Ericsson, we are in a unique position to help enterprises achieve a truly mobile way of working. This involves providing

More information

Research on Mobile E-business Security Model based on WPKI Technology and its Application

Research on Mobile E-business Security Model based on WPKI Technology and its Application , pp.119-128 http://dx.doi.org/10.14257/ijsia.2015.9.7.11 Research on Mobile E-business Security Model based on WPKI Technology and its Application Yongsheng Luo Department of Electronic and Information

More information

JOHN KNEILING APRIL 3-5, 2006 APRIL 6-7, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

JOHN KNEILING APRIL 3-5, 2006 APRIL 6-7, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS JOHN KNEILING CREATING XML AND WEB SERVICES SOLUTIONS SECURING THE WEB SERVICES ENVIRONMENT APRIL 3-5, 2006 APRIL 6-7, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME

More information

Web Services and Service Oriented Architectures. Thomas Soddemann, RZG

Web Services and Service Oriented Architectures. Thomas Soddemann, RZG Web Services and Service Oriented Architectures, RZG Delaman Workshop 2004 Overview The Garching Supercomputing Center - RZG Diving into the world of Web Services Service Oriented Architectures And beyond

More information

Mobile Office Security Requirements for the Mobile Office

Mobile Office Security Requirements for the Mobile Office Mobile Office Security Requirements for the Mobile Office S.Rupp@alcatel.de Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used

More information

Introduction to Mobile Systems

Introduction to Mobile Systems Introduction to Mobile Systems EE1072 By: Alireza Mousavi (1) Lecture notes Available on: people.brunel.ac.uk/~emstaam and WebCT Sources: Electronic Enterprise Systems Modern Enterprise: Design, Manage

More information

Sun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost

Sun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost Sun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost Timothy Siu SE Manager, JES Nov/10/2003 sun.com/solutions/

More information

How To Understand And Understand The Security Of A Key Infrastructure

How To Understand And Understand The Security Of A Key Infrastructure Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used

More information

Development of Wireless Networks

Development of Wireless Networks Development of Wireless Networks Cellular Revolution In 1990 mobile phone users populate 11 million. By 2004 the figure will become 1 billion Phones are most obvious sign of the success of wireless technology.

More information

SCUR203 Why Do We Need Security Standards?

SCUR203 Why Do We Need Security Standards? SCUR203 Why Do We Need Security Standards? Cristina Buchholz Product Security, SAP Learning Objectives As a result of this workshop, you will be able to: Recognize the need for standardization Understand

More information

Mobile Commerce and Ubiquitous Computing. Chapter 6

Mobile Commerce and Ubiquitous Computing. Chapter 6 Mobile Commerce and Ubiquitous Computing Chapter 6 Learning Objectives 1. Discuss the value-added attributes, benefits, and fundamental drivers of m-commerce. 2. Describe the mobile computing infrastructure

More information

Mobile Commerce. Contents

Mobile Commerce. Contents Mobile Commerce The new commercial environment ivazquez@eside.deusto.es Faculty of Engineering Contents What is m-commerce? Advantages Enabling technologies services Forecasts Conclussions 1 What is m-commerce?

More information

How To Design The Web And The Internet

How To Design The Web And The Internet 1 The Environment and the Tools Web Design, 4 th Edition Chapter Objectives Describe the Internet and the World Wide Web Discuss ways to access the Internet and the Web Categorize types of Web sites Identify

More information

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:

More information

Discovering Computers 2008. Chapter 9 Communications and Networks

Discovering Computers 2008. Chapter 9 Communications and Networks Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices

More information

Building an ecommerce Solution Architecture

Building an ecommerce Solution Architecture New England Electronic Commerce Users' Group Building an ecommerce Solution Architecture Vin D AmicoD President vin@damicon damicon.com January 2002 Goals Introduce Damicon, LLC Define Architecture Show

More information

Detailed Table of Contents

Detailed Table of Contents Detailed Table of Contents Foreword Preface 1. Networking Protocols and OSI Model 1 1.1 Protocols in Computer Communications 3 1.2 The OSI Model 7 1.3 OSI Layer Functions 11 Summary 19 Key Terms and Concepts

More information

AquaLogic Service Bus

AquaLogic Service Bus AquaLogic Bus Wolfgang Weigend Principal Systems Engineer BEA Systems 1 What to consider when looking at ESB? Number of planned business access points Reuse across organization Reduced cost of ownership

More information

Securely Managing and Exposing Web Services & Applications

Securely Managing and Exposing Web Services & Applications Securely Managing and Exposing Web Services & Applications Philip M Walston VP Product Management Layer 7 Technologies Layer 7 SecureSpan Products Suite of security and networking products to address the

More information

Index. Corporate Profile. Page 2 360Global Company Profile

Index. Corporate Profile. Page 2 360Global Company Profile Index Corporate Profile. Page 2 360Global Company Profile 1. Introduction Of SMS.. Page 2 1.1. What is SMS? 1.2 Comparison Of SMS Against Other Means Of Advertising 1.3 Where does SMS fit in? 2. Bulk SMS

More information

SSL VPN vs. IPSec VPN

SSL VPN vs. IPSec VPN SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White

More information

Mobile Wireless Overview

Mobile Wireless Overview Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure

More information

4. Concepts and Technologies for B2C, B2E, and B2B Transaction

4. Concepts and Technologies for B2C, B2E, and B2B Transaction 4. Concepts and Technologies for B2C, B2E, and B2B Transaction 4.4 Exchanging Information within Open Business Communities 4.4.1 Pre-Internet B2B standards: EDI, Interactive EDI, Universal EDI, OpenEDI

More information

Research on the Model of Enterprise Application Integration with Web Services

Research on the Model of Enterprise Application Integration with Web Services Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business

More information

Christoph Bussler. B2B Integration. Concepts and Architecture. With 165 Figures and 4 Tables. IIIBibliothek. Springer

Christoph Bussler. B2B Integration. Concepts and Architecture. With 165 Figures and 4 Tables. IIIBibliothek. Springer Christoph Bussler B2B Integration Concepts and Architecture With 165 Figures and 4 Tables IIIBibliothek Springer Contents Part I Introduction to Business-to-Business Integration.... 1 1 History 3 1.1 Why

More information

Interoperable Provisioning in a Distributed World

Interoperable Provisioning in a Distributed World Interoperable Provisioning in a Distributed World Mark Diodati, Burton Group Ramesh Nagappan, Sun Microsystems Sampo Kellomaki, SymLabs 02/08/07 IAM 302 Contacts Mark Diodati (mdiodati@burtongroup.com)

More information

Advanced Higher Computing. Computer Networks. Homework Sheets

Advanced Higher Computing. Computer Networks. Homework Sheets Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards

More information

E-Business Technologies for the Future

E-Business Technologies for the Future E-Business Technologies for the Future Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh spring@imap.pitt.edu http://www.sis.pitt.edu/~spring Overview

More information

WebSphere Portal Server and Web Services Whitepaper

WebSphere Portal Server and Web Services Whitepaper WebSphere Server and s Whitepaper Thomas Schaeck (schaeck@de.ibm.com) IBM Software Group Abstract As web services will become the predominant method for making information and applications available programmatically

More information

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

Lesson 4. An survey of the impact on and use of Web Services in the industry today. Industry 4.1. Industry. 2004 SkillBuilders, Inc. V1.

Lesson 4. An survey of the impact on and use of Web Services in the industry today. Industry 4.1. Industry. 2004 SkillBuilders, Inc. V1. Industry 4.1 Lesson 4 Industry An survey of the impact on and use of Web Services in the industry today. SKILLBUILDERS Industry 4.2 4.2 Lesson Objectives What companies are using it? Popular SOAP Implementations.NET

More information

Web Services Implementation: The Beta Phase of EPA Network Nodes

Web Services Implementation: The Beta Phase of EPA Network Nodes Web Services Implementation: The Beta Phase of EPA Network Nodes Connie Dwyer and Chris Clark U.S. Environmental Protection Agency, 1200 Pennsylvania Avenue, N. W., Washington, D.C. dwyer.connie@epa.gov

More information

Contents at a Glance. 1 Introduction 17. 2 Basic Principles of IT Security 23. 3 Authentication and Authorization in

Contents at a Glance. 1 Introduction 17. 2 Basic Principles of IT Security 23. 3 Authentication and Authorization in at a Glance 1 Introduction 17 2 Basic Principles of IT Security 23 3 Authentication and Authorization in SAP NetWeaver Application Server Java 53 4 Single Sign-On 151 5 Identity Provisioning 289 6 Secure

More information

Windows 2000 Security Architecture. Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation

Windows 2000 Security Architecture. Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation Windows 2000 Security Architecture Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation Topics Single Sign-on Kerberos v5 integration Active Directory security Delegation of authentication

More information

Unified Communications

Unified Communications Unified Communications Definition Unified communications encompasses all forms of call and multimedia/crossmedia message-management functions controlled by an individual user for both business and social

More information

Agents and Web Services

Agents and Web Services Agents and Web Services ------SENG609.22 Tutorial 1 Dong Liu Abstract: The basics of web services are reviewed in this tutorial. Agents are compared to web services in many aspects, and the impacts of

More information

ETSI TR 102 071 V1.2.1 (2002-10)

ETSI TR 102 071 V1.2.1 (2002-10) TR 102 071 V1.2.1 (2002-10) Technical Report Mobile Commerce (M-COMM); Requirements for Payment Methods for Mobile Commerce 2 TR 102 071 V1.2.1 (2002-10) Reference RTR/M-COMM-007 Keywords commerce, mobile,

More information

Realising the Virtual Home Environment (VHE) concept in ALL-IP UMTS networks

Realising the Virtual Home Environment (VHE) concept in ALL-IP UMTS networks December 2000 European Institute for Research and Strategic Studies in Telecommunications GmbH AT THE THEATRE: Remove the Theatre Bookmark from her homepage PDA ONLINE THEATRE-TICKETS BOOKING Project P920

More information

2.3GHz Portable Internet (WiBro) for Wireless Broadband Access

2.3GHz Portable Internet (WiBro) for Wireless Broadband Access ITU-APT Regional Seminar 2004 2.3GHz Portable Internet (WiBro) for Wireless Broadband Access Daehyoung Hong Chair, TTA 2.3GHz Portable Internet (WiBro) Project Group (PG302) and Professor, Sogang University,

More information

Strategic Information Security. Attacking and Defending Web Services

Strategic Information Security. Attacking and Defending Web Services Security PS Strategic Information Security. Attacking and Defending Web Services Presented By: David W. Green, CISSP dgreen@securityps.com Introduction About Security PS Application Security Assessments

More information

Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions

Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions 1 2005 Nokia city_wlan_2005_haverinen.ppt / 2005-08-19 / HH Outline Key use cases of integrating Wireless

More information

Grid Computing. Web Services. Explanation (2) Explanation. Grid Computing Fall 2006 Paul A. Farrell 9/12/2006

Grid Computing. Web Services. Explanation (2) Explanation. Grid Computing Fall 2006 Paul A. Farrell 9/12/2006 Grid Computing Web s Fall 2006 The Grid: Core Technologies Maozhen Li, Mark Baker John Wiley & Sons; 2005, ISBN 0-470-09417-6 Web s Based on Oriented Architecture (SOA) Clients : requestors Servers : s

More information

CHAPTER - 3 WEB APPLICATION AND SECURITY

CHAPTER - 3 WEB APPLICATION AND SECURITY CHAPTER - 3 WEB APPLICATION AND SECURITY 3.1 Introduction Web application or Wepapp is the general term that is normally used to refer to all distributed web-based applications. According to the more technical

More information

Comparing Mobile VPN Technologies WHITE PAPER

Comparing Mobile VPN Technologies WHITE PAPER Comparing Mobile VPN Technologies WHITE PAPER Executive Summary Traditional approaches for encrypting data in transit such as IPSec and SSL are intended for wired networks with high speed, highly reliable

More information

9243060 Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

9243060 Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation 9243060 Issue 1 EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300i Configuring connection settings Nokia 9300i Configuring connection settings Legal Notice

More information

Middleware- Driven Mobile Applications

Middleware- Driven Mobile Applications Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary

More information

Web Services Advanced Topics

Web Services Advanced Topics Web Services Advanced Topics Where things are now and where they are going Version 9 Web Services Advanced Topics WSAdvanced-2 Enterprise Web Services Industry trends and organizations Security and Reliability

More information

Wireless LANs vs. Wireless WANs

Wireless LANs vs. Wireless WANs White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,

More information

Federated Identity Architectures

Federated Identity Architectures Federated Identity Architectures Uciel Fragoso-Rodriguez Instituto Tecnológico Autónomo de México, México {uciel@itam.mx} Maryline Laurent-Maknavicius CNRS Samovar UMR 5157, GET Institut National des Télécommunications,

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

Oracle Internet Messaging - UM Option

Oracle Internet Messaging - UM Option Oracle Internet Messaging - UM Option Prepared by Oracle Business Development - NEMS Creation Date: Friday, July 17th, 1998 Last Updated: Friday, July 24th, 1998 Copyright (C) 1998 Oracle Corporation All

More information

Strategies for Mobile Wireless Internet. Parallels with Television

Strategies for Mobile Wireless Internet. Parallels with Television Strategies for Mobile Wireless Internet Presented by KATHRYN RUDIE HARRIGAN Henry R. Kravis Professor of Business Leadership COLUMBIA UNIVERSITY Parallels with Television Electronic components firms assembled

More information

Developing Vietnam s Infrastructure

Developing Vietnam s Infrastructure Developing Vietnam s Infrastructure Creating investment opportunities by including interoperability in deployment plans Jari Alvinen Chairman of the Board, Open Mobile Alliance www.openmobilealliance.org

More information

Beyond Broadband Access

Beyond Broadband Access Beyond Broadband Access Dr. Sanghoon Lee Executive Vice President Agenda Broadband Internet in Korea Beyond Broadband Services Features and Directions Summary & Remarks Broadband Internet Business in Korea

More information

<Insert Picture Here> Oracle Security Developer Tools (OSDT) August 2008

<Insert Picture Here> Oracle Security Developer Tools (OSDT) August 2008 Oracle Security Developer Tools (OSDT) August 2008 Items Introduction OSDT 10g Architecture Business Benefits Oracle Products Currently Using OSDT 10g OSDT 10g APIs Description OSDT

More information

JEE Web Applications Jeff Zhuk

JEE Web Applications Jeff Zhuk JEE Web Applications Jeff Zhuk From the book and beyond Integration-Ready Architecture and Design Cambridge University Press Software Engineering With XML, Java,.NET, Wireless, Speech and Knowledge Technologies

More information

Leveraging Service Oriented Architecture (SOA) to integrate Oracle Applications with SalesForce.com

Leveraging Service Oriented Architecture (SOA) to integrate Oracle Applications with SalesForce.com Leveraging Service Oriented Architecture (SOA) to integrate Oracle Applications with SalesForce.com Presented by: Shashi Mamidibathula, CPIM, PMP Principal Pramaan Systems shashi.mamidi@pramaan.com www.pramaan.com

More information

Concept Proposal. A standards based SOA Framework for Interoperable Enterprise Content Management

Concept Proposal. A standards based SOA Framework for Interoperable Enterprise Content Management Concept Proposal A standards based SOA Framework for Interoperable Enterprise Content Management Mike Connor miconnor@adobe.com Paul Fontaine Paul.Fontaine@ost.dot.gov What is it? IECM Framework Vision:

More information

A Middleware-Based Approach to Mobile Web Services

A Middleware-Based Approach to Mobile Web Services Abstract A Middleware-Based Approach to Mobile Web Services Pampa Sadhukhan, Pradip K Das, Rijurekha Sen, Niladrish Chatterjee and Arijit Das Centre for Mobile Computing and Communication (CMCC), Jadavpur

More information

Case studies in Identity Management for Meeting HIPAA Privacy and Security Requirements

Case studies in Identity Management for Meeting HIPAA Privacy and Security Requirements Case studies in Identity Management for Meeting HIPAA Privacy and Security Requirements Agenda E-business trends in healthcare Challenges in Identity Management The Impact of HIPAA Privacy and Security

More information

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution,

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part III-b Contents Part III-b Secure Applications and Security Protocols Practical Security Measures Internet Security IPSEC, IKE SSL/TLS Virtual Private Networks Firewall Kerberos SET Security Measures

More information

IONA Security Platform

IONA Security Platform IONA Security Platform February 22, 2002 Igor Balabine, PhD IONA Security Architect Copyright IONA Technologies 2001 End 2 Anywhere Agenda IONA Security Platform (isp) architecture Integrating with Enterprise

More information

Identity Management im Liberty Alliance Project

Identity Management im Liberty Alliance Project Rheinisch-Westfälische Technische Hochschule Aachen Lehrstuhl für Informatik IV Prof. Dr. rer. nat. Otto Spaniol Identity Management im Liberty Alliance Project Seminar: Datenkommunikation und verteilte

More information

FUSE-ESB4 An open-source OSGi based platform for EAI and SOA

FUSE-ESB4 An open-source OSGi based platform for EAI and SOA FUSE-ESB4 An open-source OSGi based platform for EAI and SOA Introduction to FUSE-ESB4 It's a powerful OSGi based multi component container based on ServiceMix4 http://servicemix.apache.org/smx4/index.html

More information

Introducing Cisco Unified Communications Express

Introducing Cisco Unified Communications Express CHAPTER 1 Introducing Cisco Unified Communications Express Cisco Unified Communications Express is an award-winning communications solution that is provided with the Cisco Integrated Services Router portfolio.

More information

The Information Revolution for the Enterprise

The Information Revolution for the Enterprise Click Jon Butts to add IBM text Software Group Integration Manufacturing Industry jon.butts@uk.ibm.com The Information Revolution for the Enterprise 2013 IBM Corporation Disclaimer IBM s statements regarding

More information

m Commerce Working Group

m Commerce Working Group m-powering Development Initiative Advisory Board second meeting Geneva, 23 rd of May 2014 m Commerce Working Group M-Commerce structure 2 Definitions Mobile Device m-commerce MFS m-marketing m-banking

More information

WebSphere Everyplace Connection Manager: increasing mobile security, reducing wireless costs

WebSphere Everyplace Connection Manager: increasing mobile security, reducing wireless costs Security-enhanced IBM solution for mobile enterprises and Service Providers April 2003 WebSphere Everyplace Connection Manager: increasing mobile security, reducing wireless costs Dennis Anderson Fred

More information

1.264 Lecture 37. Telecom: Enterprise networks, VPN

1.264 Lecture 37. Telecom: Enterprise networks, VPN 1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients

More information

Trusting XBRL: Using the Liberty Web Services Framework to Secure and Authenticate XBRL Documents

Trusting XBRL: Using the Liberty Web Services Framework to Secure and Authenticate XBRL Documents Trusting XBRL: Using the Liberty Web Services Framework to Secure and Authenticate XBRL Documents Farrukh Najmi and Eve Maler farrukh.najmi@sun.com, eve.maler@sun.com Sun Microsystems, Inc. Goals for today's

More information

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part III-a Contents Part III-a Public-Key Infrastructure (PKI) Definition of a PKI and PKI components PKI Trust Models Digital Certificate, X.509 Certificate Management and Life Cycle Public Key Infrastructure

More information

15 May 2013 Version 5. for Mac OS X. Public version. Gemfor s.r.o. Tyršovo nám. 600 252 63 Roztoky Czech Republic

15 May 2013 Version 5. for Mac OS X. Public version. Gemfor s.r.o. Tyršovo nám. 600 252 63 Roztoky Czech Republic Mobile Connection Explorer for Mac OS X 15 May 2013 Version 5 Introduction and Feature s Public version Gemfor s.r.o. Contents Contents... 2 History... 2 1. Scope... 3 2. Abbreviations... 3 3. Introduction...

More information

Integrating Siebel CRM 8 with Oracle Applications

Integrating Siebel CRM 8 with Oracle Applications Integrating Siebel CRM 8 with Oracle Applications Agenda Corporate Overview Siebel 8.0 New Features Siebel Integration Approaches Integration with Oracle Applications Option 1 Option 2 Pros and Cons Evaluation

More information

GUIDE TO WEBSITES AND E-COMMERCE

GUIDE TO WEBSITES AND E-COMMERCE GUIDE TO WEBSITES AND E-COMMERCE Version 1.0, 26-Sept-01 This document is available from www.webcentro.com.au 2001, WebCentro WebCentro Guide To Websites And E-commerce CONTENTS 1. What is a Website? 1

More information

CHAPTER 13: ELECTRONIC COMMERCE AND E-BUSINESS

CHAPTER 13: ELECTRONIC COMMERCE AND E-BUSINESS CHAPTER 13: ELECTRONIC COMMERCE AND E-BUSINESS Multiple Choice: 1. founded Amazon.com. A. Alan Kay B. Jeff Bezos C. Bill Gates D. Andy Grove Answer: B Reference: Jeff Bezos: The Virtual Bookseller Difficulty:

More information

WEB SERVICES. Revised 9/29/2015

WEB SERVICES. Revised 9/29/2015 WEB SERVICES Revised 9/29/2015 This Page Intentionally Left Blank Table of Contents Web Services using WebLogic... 1 Developing Web Services on WebSphere... 2 Developing RESTful Services in Java v1.1...

More information

How To Develop A Web Service In A Microsoft J2Ee (Java) 2.5 (Oracle) 2-Year Old (Orcient) 2Dj (Oracles) 2E (Orca) 2Gj (J

How To Develop A Web Service In A Microsoft J2Ee (Java) 2.5 (Oracle) 2-Year Old (Orcient) 2Dj (Oracles) 2E (Orca) 2Gj (J Tool Support for Developing Scalable J2EE Web Service Architectures Guus Ramackers Application Development Tools Oracle Corporation guus.ramackers@oracle.com www.oracle.com Using All This in Real Life

More information

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems Core Feature Comparison between XML / SOA Gateways and Web Application Firewalls Jason Macy jmacy@forumsys.com CTO, Forum Systems XML Gateway vs Competitive XML Gateways or Complementary? and s are Complementary

More information

WebSphere Portal, Portlets and Web Services

WebSphere Portal, Portlets and Web Services WebSphere Portal, s and Web Services June 2002 Peter Fischer Developer, WebSphere Portal Server Portal Architecture Introduction What are Portals? Common access point to distributed information and applications

More information

New Business Planning Group KT. March 2005

New Business Planning Group KT. March 2005 The Project New Business Planning Group KT March 2005 Today s Telco - Broadband Downfall of Main Revenue Stream PSTN Business Leased-line Broadband take-up over first 10 years is faster than previous services

More information

UDDI v3: The Registry Standard for SOA

UDDI v3: The Registry Standard for SOA www.oasis-open.org UDDI v3: The Registry Standard for SOA Hosted by: OASIS UDDI Specification Technical Committee Agenda Welcome James Bryce Clark Director of Standards Development, OASIS Overview Luc

More information

Web Services for Environmental Informatics

Web Services for Environmental Informatics Web Services for Environmental Informatics Erick Arauco a and Lorenzo Sommaruga b a University of Piura - Engineering Department,Piura, Perú- earauco@udep.edu.pe b University of Applied Sciences of Southern

More information

IT Infrastructure and Emerging Technologies

IT Infrastructure and Emerging Technologies IT Infrastructure and Emerging Technologies Content IT Infrastructure Infrastructure Components Contemporary Hardware Platform Trends Contemporary Software Platform Trends Management Issues 2 IT infrastructure

More information

NIST s Guide to Secure Web Services

NIST s Guide to Secure Web Services NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:

More information

Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus

Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 4.0.3 Unit objectives

More information

IPv6 over Power Line for the Digital Home

IPv6 over Power Line for the Digital Home IPv6 over Power Line for the Digital Home Moscow, November 2004 Jordi Palet & Francisco Ortiz Consulintel - 1 Typical PLC Network Topology - 2 Next generation applications Every device, even every application,

More information

Pre Sales Communications

Pre Sales Communications Pre Sales Communications OmniVista 4760 from R4.1 & OmniPCX Enterprise R7.1 IP Protocols and Ports All rights reserved 2006, Alcatel Table of contents 1. Objectives...3 2. IP protocols...3 2.1. Global

More information

Service Oriented Architecture

Service Oriented Architecture Service Oriented Architecture Charlie Abela Department of Artificial Intelligence charlie.abela@um.edu.mt Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline

More information

Using mobile phones to access Web Services in a secure way. Dan Marinescu

Using mobile phones to access Web Services in a secure way. Dan Marinescu Using mobile phones to access Web Services in a secure way Dan Marinescu March 7, 2007 Abstract Web Services is a technology that has gained in acceptance and popularity over the past years. The promise

More information

Agenda. How to configure

Agenda. How to configure dlaw@esri.com Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services

More information

The Mobile Imperative. A J.Gold Associates White Paper

The Mobile Imperative. A J.Gold Associates White Paper The Mobile Imperative A J.Gold Associates White Paper Contents The Mobile Imperative...1 Introduction... 1 Major General Mobility Trends... 1 What Does a Mobile Worker Need?... 2 Mobile Application Deployment

More information

Cisco Virtual Office Express

Cisco Virtual Office Express . Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside

More information