The Edge: Secure Information Sharing

Size: px
Start display at page:

Download "Sharing @ The Edge: Secure Information Sharing"

Transcription

1 The Edge: Secure Information Sharing Tony White 1, Dwight Deugo 1, Steve Gutz 2 1 School of Computer Science, Carleton University 2 Texar Corporation {arpwhite@scs.carleton.ca, deugo@scs.carleton.ca, sgutz@texar.com} Abstract Peer-to-peer (P2P) computing promises to return the World Wide Web to an environment where the edge of the network is as important as the Web servers that have dominated its early years. This paper describes issues associated with P2P computing that must be solved before widespread deployment is possible. The paper presents a P2P solution where services and content are equally secured and can be dynamically added to and removed from the network. Keywords: peer-to-peer, security, information sharing, internet computing 1. Introduction This paper concerns itself with the issues surrounding the creation of P2P The Edge, with information and service sharing taking place directly from desktop machines with dynamic creation and reconfiguration of services. This paper describes concepts that facilitate the creation of communities and how the information and users within these communities are protected and secured. The motivations for this are clear: current sharing mechanisms slow down business. Users often copy content in order to avoid security processes, or deal with a local copy of information that is frequently out of date. Collaborative Commerce, or c-commerce, is difficult in the current sharing model, as the creation, maintenance and tear down of business to business (B2B) relationships is mediated by a third party. The Internet is also used for transport, thereby complicating security. This paper continues with a discussion of the issues and requirements that motivate our architecture and solution. Key concepts are then introduced, followed by a description of our architecture. 2. Issues and Requirements P2P computing, and the creation of information networks, presents a number of serious challenges. These challenges are related to interoperability, discovery or search, identity and security. In order for information networks to flourish, standard communication protocols are required. Currently, many proprietary protocols exist but the P2P working group are working on standards. Sun s JXTA [1] project represents a community-based approach to standardization that is based upon HTTP and XML technologies. However, it lacks key authorization concepts that are addressed in this paper. The following paragraphs highlight several key issues. Anonymity is unacceptable. After all, would I give access to my bank account to a stranger? In effect, with Gnutella file sharing this is what I do as I do not have fine-grained control for what is shared, and to whom. When participating in an information network a user should be represented by a digital identity, which can be authenticated in a variety of standard ways, both weak and strong. It should be possible to associate a level of trust with an individual, as is the case in many social interactions. This level of trust, in turn, should be used to determine what is shared and to whom. The Poblano [2] trust framework represents a promising approach here. For information to be shared, it must be possible to tell who has asked for it, with whom the information has been shared and to control distribution and access beyond the delivery of the information. Information, and the intellectual property that it represents, requires protection. Information exchange should be secure. It should be possible to detect tampering with information that has been transmitted between peers. It should not be possible to intercept information in transit or modify it. Connections between peers should be encrypted. Information networks should support policy-based authorization. Information represents the intellectual property of an organization and has considerable value. Policies associated with information allow for fine-grained control of information sharing. Policies should go beyond simple access controls and be capable of monitoring, controlling and reacting to information access. This implies that policies need to have an executable specification much like a programming language. Security should be separate

2 from a resource being secured authorization services should be present in the network. Information networks should facilitate more effective search for interesting content. Information sharing is only effective if content of interest can be found. There are two challenges to resolve here. First, a protocol for routing search queries effectively throughout the network is required. Second, finding information in networks of peers containing large stores of documents requires that a semantic layer needs to be provided for the data itself. Metadata should be easy to manipulate by a search engine. Information networks should be easy to use and set up. The widespread use of web browsers compared to usage of Gopher and FTP clearly demonstrates the desire for ease of use. In other words, P2P networks should self-organize and deal with all of the issues surrounding information routing. It should not be necessary for a user to understand low-level communications concepts in order to obtain value from P2P networks. Information networks should scale. Today s Gnutella networks represent a flat structure that is exhaustively searched for interesting content when a <Identity> <ID>98765</ID> <ScreenName>Chief Weenie</ScreenName> <FullName>Tony White</FullName> < Address>twhite@texar.com</ Address> <PublicKey>123456A99CEBF B101995</PublicKey> <MetaData> <Data> <Key>IPAddress</Key> <Value> </Value> </Data> </MetaData> </Identity> user generates a query. Information networks need to support communities in order that queries can be restricted to relevant portions of the network. Communities should be easy to manage, and remain under the control of the creator or individuals to whom management has been delegated. We believe that the following concepts and architecture described in the next 2 sections meet these requirements. 3. Key Concepts 3.1 Identity The challenges provided by the requirements section are considerable. Key to the security-related issues of the previous section is the need for identity. Identity is typically implemented by use of authentication domains [3]. However, this presents serious difficulties when enterprise to enterprise sharing is involved, as authentication domains typically do not cross enterprise boundaries. It is possible to use Certificate Authorities (CA), using X.509 [4] certificates and relying upon the CA to authenticate a user. Unfortunately, not all enterprises provide certificates for their employees and even in certificate-enabled enterprises, obtaining a certificate can take some time. We have provided support for certificate-based authentication within our system; in fact, the authentication subsystem relies upon the Java Authentication and Authorization System (JAAS). When a user installs the software, an identity is created that contains a public key and a private key pair. A user s identity is protected by a pass phrase chosen by the user. It is used, along with key information, to encrypt the identity stored on disk. The metadata associated with an identity allows further information about the user to be stored; e.g. preferences, location, IP address and phone information. This information may optionally be used by an authentication system and is also used for index creation by a repository service. While no central authority is implied by this definition, trust in the individual claiming the identity can be generated by an out-of-band interaction. In our framework, the exported identity can be sent via to someone with whom collaboration is to occur. Once received, the identity can be checked to verify that it contains the address of the sender. The identity may then be incorporated by double clicking on the attachment. While this provides for a simple verification of identity, it says nothing about the trust that we should associate with that identity. It is possible for the user to poll a community to determine the trust level associated with the new identity. Other community members provide responses according to linguistic values. The responses are averaged and the user requesting the character reference can accept the community s highest, lowest or average rating. Naturally, they may also select a rating of their own choosing. A community member may notify other community members of changes in ratings. Finally, The ID element within the identity allows a policy to be associated with the user, the purpose being explained in the section on policies. 3.2 Community Communities are the fundamental building block for information organization and sharing. Communities define the boundaries for authentication and authorization and are designed to bring together individuals with similar interests or the need to

3 collaborate. Communities do not define resource access beyond the basic services available. Information sharing, and sharing of community member services, rely upon the privilege settings of individual users. A community also provides for a <Community> <Name>Bob s P2P Community</Name> <ID>234567</ID> <Creator>Bob White</Creator> <CreationDate>12:00:00 GMT 11-Nov-2001</CreationDate> <ModificationDate> 12:00:00 GMT 11-Nov-2001 </ModificationDate> <Description>A Sharing information on P2P</Description> <ParentCommunity>GLOBAL</ParentCommunity> <MembershipService> <PeerID>197EB2467</PeerID> <Advertisement>Membership</Advertisement> </MembershipService> <AuthorizationService> <PeerID>197EB2467</PeerID> <Advertisement>Authorization</Advertisement> </AuthorizationService> <Services> <Service> <PeerID>197EB2467</PeerID> <Advertisement>NoteTaker</Advertisement> </Service> </Services> <MetaData> <Data> <Key>IPAddress</Key> <Value> </Value> </Data> </MetaData> </Community> structure that allows trust between its members to be developed, with no single member being completely responsible for the assessment of trust of other members. This is particularly important, in that allowing a single member to dominate the trust associated with a member leaves the system open to a denial of trust attack. When a community is created, the creator associates a description and metadata with the community. From a security perspective, the key elements of the community structure are to be found in the <MembershipService> and <AuthorizationService> elements. These two elements contain definitions for the advertisements of membership and authorization services used by the community. Prospective and existing members who wish to modify their membership status use the membership service. It should be noted that the community document does not contain explicit membership or privilege information; this is stored elsewhere and manipulated by the aforementioned services. A special comment should be made regarding the management of the community itself. Authorization of community changes is performed by the authorization service. This ensures that security is coherently enforced for the community and the services that it supports. Another way of stating this is that by becoming a member of a community a member agrees to abide by access rules defined for that community. This does not mean that the member loses control over their shared information or services, but does mean that he or she agrees to the policies for sharing operating within the community. This is clearly an attractive feature for an enterprise where information technology groups need to define policies for sharing, but cannot reasonably expect to own user-defined services or information. Separation of policy and access control is clearly an important consideration for implementation of P2P communities. The ID element within the document allows a policy to be associated with the community, the purpose being explained in the section on policies. Finally, the description element of the community document is analyzed and indexed in order to facilitate the location of communities of interest. The <ParentCommunity> element allows for hierarchical structuring of communities. If defined, the membership and authorization service specifications need not be provided. 3.3 Encryption and XML XML documents wrapped using the HTTPS protocol are the primary mechanism for message exchange, although inter-peer messaging is possible using serialized Java objects or raw byte streams. Messages sent from one peer to another are digitally signed using the identity of peer. Community and individual keys may also be used to encrypt the body of messages. XML-based messaging has become the norm for P2P systems, with Groove, Jabber and JXTA using it. The emergence of standards based upon XML, such as XML-RPC and SOAP as message passing frameworks has strengthened its appeal for messaging. Standards such as XKMS [5], SAML [6] and ebxml [7] are specifically designed to support global marketplace initiatives. 3.4 Services The modeling of services is crucial to the effective implementation of a P2P infrastructure. Dynamic creation and ease of discovery are fundamentally important in our framework. Services are specified in XML documents, which are stored in a repository. Peers invoke the services of other peers, with authorization for service usage being controlled by the peer offering that service. Search is an example of a service, as are Membership and Authorization introduced earlier.

4 The guiding principle behind a service is that it should be possible to create services dynamically and have the output of one component of a service to be fed into the next component or service in the chain. Services and components receive two inputs: a structured document from the output of the previous component or service and an environment in which execution occurs. This is similar to JXTA, where pipes provide data flow between peers. Services can be built up from other services and components. Components have a MIME type that is used to determine the environment in which the component executes. Execution environments are also modeled as services. For example, a component created in Java is a simple Java class that conforms to the Component interface. It requires a JVM, whereas an executable file is instantiated by forking a process. <Service> <Name>Filter</Name> <ID>123456ABC</ID> <Creator>Bob</Creator> <CreationDate>12:00:00 GMT 11-Nov-2001</CreationDate> <ExpiryDate>12:00:00 GMT 11-Nov-2002</ExpiryDate> <Description>This service is used as an example</description> <Definition> <Component mimetype= binary/java >example</component> <Component mimetype= binary/exe > file://ex-exe</component> <Service>Another example</service> </Definition> <MetaData> <Data> <Key>Source</Key> <Value> </Data> </MetaData> </Service> The metadata associated with a service defines an environment in which the service always runs. This environment is available to all components or services that run as part of the service execution. In the example above, the service always has a source of information to access. The expiry date information essentially defines a lease for the service. In this way, periodic updates for the service can be obtained from a known and trusted repository or through searching the P2P network. The creator of the service is a mandatory element as it is used to determine the level of trust in the service. The definition section is made up of the set of components and services that are to be executed for the service to run. MIME types have a registry that defines an association between the type and the execution environment required to process the component. The output of the final component in a service is returned to the requestor. Services defined in this way are easy to find as they are indexed in the same way as documents and the component representation allows for flexible combination and service definition. Given the references to XML and HTML processing, it will not come as a surprise to the reader that we have implemented services for screen scraping. We have also implemented services to interface to various instant messaging services, the Gnutella file sharing network and wrapped the FastTrack tm protocol to access media distribution networks that support it. The XML representation of a service facilitates transfer of services from one peer to another, and service creation is a straightforward matter of composing a new document. The ID element within the document allows a policy to be associated with the service, the purpose being explained in the next section. 3.5 Policies While communities define a boundary, this is insufficient to define the security associated with services or information available within the community. Communities represent coarse-grained access control. Users must retain control over their own services and information. Association of a policy with a service or information resource provides this fine-grained capability. However, the community may define the policies available to the user; in essence the community defines the rules for sharing. In our system, all service or information access is considered abstractly as answering the question, Can X perform action A on Y? Typically, X is a user, A is an operation such as read and Y is a file or a service. Referring to the service definition shown in the previous section, another example might ask the question, Can Alice execute the Filter service? Clearly, the question may be answered by appealing to a policy associated with the user or the resource. <AuthorizationEntity> <ID>123456</ID> <Policy>Name of policy</policy> </AuthorizationEntity> The framework allows for the association of policies with information or services and defines the AuthorizationEntity concept. AuthorizationEntities are objects that have an associated authorization policy. AuthorizationEntities provide a mapping between a service or information resource represented by the identity (ID), to the name of a policy. Policies are evaluated by a policy service, the specification of which follows the definition provided in the section on services. Policies may be associated with groups of services or information resources; a discussion of mechanisms for achieving this is beyond the scope of this paper. Polices are implemented in a language

5 called Idyllic [8], which is based upon the functional programming paradigm. Policies written in Idyllic can react to the access attempt; for example, they can compose and send an or page a security administrator. Policies can make use of information stored in corporate databases or LDAP directories in order to enforce the business policies for a particular enterprise. Simple Role Based Access Controls (RBAC) are also possible. Tomcat Servlet Runner Browser Broker Tomcat Servlet Runner Browser 4. Architecture Using the ideas of the previous section, we have implemented a P2P solution using a broker-based architecture. A servlet runner executes on the users platform (we use Tomcat) and a user interface is provided via a browser. The clean separation of presentation and application logic means that a user can access their peer remotely; e.g. from PDAs, remote PCs and browser-enabled phones. Communication between the servlet runner and the broker is through the use of messaging middleware; in this case the Java Message Service (JMS). Encryption of the message stream between the peer and the broker is supported we currently use 1024 bit encryption. Integration with the JXTA protocols has also been prototyped. The broker, which sits within the enterprise DMZ, performs a number of securityrelated functions, which include the validation of the IP address of the peer communicating and the authentication of the peer user. Authentication, being based on the JAAS standard means that the selfregistration mechanism currently implemented can easily be replaced by plugging in an alternative compliant implementation. The broker and peer mutually authenticate upon session initialization. The primary service of the broker is to route messages to the appropriate peer or peers, which then runs the service requested by the peer. Multi-cast messages are possible, where the entire community is addressed when a search is performed. Content returned from running the service on the peer is routed back to the requesting peer where the skin and rendering services generate HTML for presentation in the browser. Several system services are implemented on every peer. These services provide timing, security, event management, file access, indexing, plug-in management and rendering. Security services allow the peer user to associate access controls and sophisticated policies at a fine grained level, to communities and the services and information that they contain. Event management services interpret notifications from other peers, although strict notification is not supported. The file access service isolates the peer from the details of a file system. The plug-in service is used to provide an execution environment for services composed of scripts, using a sandbox model to enforce a high degree of security. The rendering service is used in conjunction with the skin service to create HTML (or potentially XML) representations of the data received from other peers. The indexing service provides the ability for content such as notes and files to be made searchable via the distributed search service. There are several application services that have been implemented which focus on collaboration. These are: distributed search, file sharing, notes, outliner and the whiteboard service. Communities are created by peer users, and application services are associated with them. For example, a peer user may choose to have multiple file sharing services within a community, each one sharing a different directory. Members may be given different roles within the community; potentially being able to read, write, or delete content. Management may also be delegated, an administrator role being assignable. Access rights are inherited, that is if the user is assigned a reviewer role within the community, he or she will adopt that role for each service assigned to the community. Particular users may become friends, and be given a default role that becomes active when they are added to a community created by the owner of the friend list. The assignment of default roles is also extended to services and content; inheritance being used to determine a role if one is not explicitly assigned. Being browser-based, the interface is available to a peer user on a wide range of platforms; in fact, the

6 Community service and membership management Communities: Local and Remote Community Application Services peer can reside on one machine while the user accesses it from another. We have demonstrated the utility of this separation by accessing the peer from a PDA and plan to implement an interface for next generation cell phones in the coming months. The figure above shows an example of the peer interface. 5. Conclusions This paper presents a set of important concepts that facilitate the creation of well-defined P2P communities. Ownership of the information and services remains with the authors and corporations can be assured that the members of the community can be bound by policies and procedures that define what are deemed to be proper uses. We have implemented these concepts within a brokered P2P network. The distributed use of identity, along with familiar social mechanisms for identity validation, aligned with structured communities, has enabled the creation of secure P2P collaboration environments into which services are easily introduced. We are currently evaluating these ideas and framework with users in the research, health and financial communities. Modelling users, services, information and the community itself as authorization entities has reduced the access control problem to answering the simple question, Can one entity perform a specific action on another. In short, security has been reduced to the execution of policies operating on abstract relationships between authorization entities. The architecture described provides facilities that enable pervasive computing: the separation of security from services and the browser-based interface being two examples. The implementation is firmly based upon standards, with the use of HTTP, JMS and JAAS, making it attractive as an advanced P2P platform for enterprise deployment. We continue to work on the platform and intend to add remote object execution and code mobility services in the near future. References [1] [2] Chen R., and Yeager W., Poblano: A Distributed Trust Model for Peer-to-Peer Networks, available at [3] [4] [5] [6] See links to SAML on [7] [8] Bacic E., The Generic Policy Engine, M.C.S. diss. Carleton University, 1998.

Classic Grid Architecture

Classic Grid Architecture Peer-to to-peer Grids Classic Grid Architecture Resources Database Database Netsolve Collaboration Composition Content Access Computing Security Middle Tier Brokers Service Providers Middle Tier becomes

More information

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška

More information

A Survey Study on Monitoring Service for Grid

A Survey Study on Monitoring Service for Grid A Survey Study on Monitoring Service for Grid Erkang You erkyou@indiana.edu ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide

More information

Service Virtualization: Managing Change in a Service-Oriented Architecture

Service Virtualization: Managing Change in a Service-Oriented Architecture Service Virtualization: Managing Change in a Service-Oriented Architecture Abstract Load balancers, name servers (for example, Domain Name System [DNS]), and stock brokerage services are examples of virtual

More information

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

Run-time Service Oriented Architecture (SOA) V 0.1

Run-time Service Oriented Architecture (SOA) V 0.1 Run-time Service Oriented Architecture (SOA) V 0.1 July 2005 Table of Contents 1.0 INTRODUCTION... 1 2.0 PRINCIPLES... 1 3.0 FERA REFERENCE ARCHITECTURE... 2 4.0 SOA RUN-TIME ARCHITECTURE...4 4.1 FEDERATES...

More information

Xerox DocuShare Security Features. Security White Paper

Xerox DocuShare Security Features. Security White Paper Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a

More information

What Is the Java TM 2 Platform, Enterprise Edition?

What Is the Java TM 2 Platform, Enterprise Edition? Page 1 de 9 What Is the Java TM 2 Platform, Enterprise Edition? This document provides an introduction to the features and benefits of the Java 2 platform, Enterprise Edition. Overview Enterprises today

More information

Interacting the Edutella/JXTA Peer-to-Peer Network with Web Services

Interacting the Edutella/JXTA Peer-to-Peer Network with Web Services Interacting the Edutella/JXTA Peer-to-Peer Network with Web Services Changtao Qu Learning Lab Lower Saxony University of Hannover Expo Plaza 1, D-30539, Hannover, Germany qu @learninglab.de Wolfgang Nejdl

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Security Overview Introduction Application Firewall Compatibility

Security Overview Introduction Application Firewall Compatibility Security Overview Introduction ShowMyPC provides real-time communication services to organizations and a large number of corporations. These corporations use ShowMyPC services for diverse purposes ranging

More information

SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.

SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.

More information

Secure Semantic Web Service Using SAML

Secure Semantic Web Service Using SAML Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA

More information

Filtering remote users with Websense remote filtering software v7.6

Filtering remote users with Websense remote filtering software v7.6 Filtering remote users with Websense remote filtering software v7.6 Websense Support Webinar April 2012 Websense 2012 Webinar Presenter Greg Didier Title: Support Specialist Accomplishments: 9 years supporting

More information

FAQs for Oracle iplanet Proxy Server 4.0

FAQs for Oracle iplanet Proxy Server 4.0 FAQs for Oracle iplanet Proxy Server 4.0 Get answers to the questions most frequently asked about Oracle iplanet Proxy Server Q: What is Oracle iplanet Proxy Server (Java System Web Proxy Server)? A: Oracle

More information

PHIN MS Detailed Security Design

PHIN MS Detailed Security Design The Public Health Information Network Messaging System (PHINMS) sends and receives sensitive data over the internet to the public health information systems using Electronic Business Extensible Markup

More information

Service Oriented Architecture

Service Oriented Architecture Service Oriented Architecture Charlie Abela Department of Artificial Intelligence charlie.abela@um.edu.mt Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline

More information

A Federated Model for Secure Web-Based Videoconferencing

A Federated Model for Secure Web-Based Videoconferencing A Federated Model for Secure Web-Based Videoconferencing Douglas C. Sicker, Ameet Kulkarni, Anand Chavali, and Mudassir Fajandar Interdisciplinary Telecommunications Dept. and Dept. of Computer Science

More information

MD Link Integration. 2013 2015 MDI Solutions Limited

MD Link Integration. 2013 2015 MDI Solutions Limited MD Link Integration 2013 2015 MDI Solutions Limited Table of Contents THE MD LINK INTEGRATION STRATEGY...3 JAVA TECHNOLOGY FOR PORTABILITY, COMPATIBILITY AND SECURITY...3 LEVERAGE XML TECHNOLOGY FOR INDUSTRY

More information

SPML (Service Provisioning Markup Language) and the Importance of it within the Security Infrastructure Framework for ebusiness

SPML (Service Provisioning Markup Language) and the Importance of it within the Security Infrastructure Framework for ebusiness Interoperability Summit 2002 SPML (Service Provisioning Markup Language) and the Importance of it within the Security Infrastructure Framework for ebusiness Gavenraj Sodhi Senior Technology Analyst Provisioning

More information

PDF hosted at the Radboud Repository of the Radboud University Nijmegen

PDF hosted at the Radboud Repository of the Radboud University Nijmegen PDF hosted at the Radboud Repository of the Radboud University Nijmegen The following full text is a publisher's version. For additional information about this publication click this link. http://hdl.handle.net/2066/60933

More information

WEB SERVICES SECURITY

WEB SERVICES SECURITY WEB SERVICES SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Service-Oriented Architectures

Service-Oriented Architectures Architectures Computing & 2009-11-06 Architectures Computing & SERVICE-ORIENTED COMPUTING (SOC) A new computing paradigm revolving around the concept of software as a service Assumes that entire systems

More information

The Security Framework 4.1 Programming and Design

The Security Framework 4.1 Programming and Design Tel: (301) 587-3000 Fax: (301) 587-7877 E-mail: info@setecs.com Web: www.setecs.com Security Architecture for Development and Run Time Support of Secure Network Applications Sead Muftic, President/CEO

More information

Last Updated: July 2011. STATISTICA Enterprise Server Security

Last Updated: July 2011. STATISTICA Enterprise Server Security Last Updated: July 2011 STATISTICA Enterprise Server Security STATISTICA Enterprise Server Security Page 2 of 10 Table of Contents Executive Summary... 3 Introduction to STATISTICA Enterprise Server...

More information

E-Business Technologies for the Future

E-Business Technologies for the Future E-Business Technologies for the Future Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh spring@imap.pitt.edu http://www.sis.pitt.edu/~spring Overview

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

Automatic Configuration and Service Discovery for Networked Smart Devices

Automatic Configuration and Service Discovery for Networked Smart Devices Automatic Configuration and Service Discovery for Networked Smart Devices Günter Obiltschnig Applied Informatics Software Engineering GmbH St. Peter 33 9184 St. Jakob im Rosental Austria Tel: +43 4253

More information

WebEx Security Overview Security Documentation

WebEx Security Overview Security Documentation WebEx Security Overview Security Documentation 8/1/2003: WebEx Communications Inc. WebEx Security Overview WebEx Security Overview Introduction WebEx Communications, Inc. provides real-time communication

More information

End User Guide The guide for email/ftp account owner

End User Guide The guide for email/ftp account owner End User Guide The guide for email/ftp account owner ServerDirector Version 3.7 Table Of Contents Introduction...1 Logging In...1 Logging Out...3 Installing SSL License...3 System Requirements...4 Navigating...4

More information

MIGRATING DESKTOP AND ROAMING ACCESS. Migrating Desktop and Roaming Access Whitepaper

MIGRATING DESKTOP AND ROAMING ACCESS. Migrating Desktop and Roaming Access Whitepaper Migrating Desktop and Roaming Access Whitepaper Poznan Supercomputing and Networking Center Noskowskiego 12/14 61-704 Poznan, POLAND 2004, April white-paper-md-ras.doc 1/11 1 Product overview In this whitepaper

More information

Experimental Implementation of Emerging e- Business Technologies: ebxml and PKI

Experimental Implementation of Emerging e- Business Technologies: ebxml and PKI Experimental Implementation of Emerging e- Business Technologies: ebxml and PKI Marko Topolnik, Damir Pintar, and Mihaela Sokić Faculty of Electrical Engineering and Computing Unska 3, Zagreb, Croatia

More information

A Quick Introduction to SOA

A Quick Introduction to SOA Software Engineering Competence Center TUTORIAL A Quick Introduction to SOA Mahmoud Mohamed AbdAllah Senior R&D Engineer-SECC mmabdallah@itida.gov.eg Waseim Hashem Mahjoub Senior R&D Engineer-SECC Copyright

More information

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC)

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) econsent Trial Project Architectural Analysis & Technical Standards Produced

More information

Key Management Interoperability Protocol (KMIP)

Key Management Interoperability Protocol (KMIP) (KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).

More information

Client-Server Architecture & J2EE Platform Technologies Overview Ahmed K. Ezzat

Client-Server Architecture & J2EE Platform Technologies Overview Ahmed K. Ezzat Client-Server Architecture & J2EE Platform Technologies Overview Ahmed K. Ezzat Page 1 of 14 Roadmap Client-Server Architecture Introduction Two-tier Architecture Three-tier Architecture The MVC Architecture

More information

AquaLogic Service Bus

AquaLogic Service Bus AquaLogic Bus Wolfgang Weigend Principal Systems Engineer BEA Systems 1 What to consider when looking at ESB? Number of planned business access points Reuse across organization Reduced cost of ownership

More information

Communiqué 4. Standardized Global Content Management. Designed for World s Leading Enterprises. Industry Leading Products & Platform

Communiqué 4. Standardized Global Content Management. Designed for World s Leading Enterprises. Industry Leading Products & Platform Communiqué 4 Standardized Communiqué 4 - fully implementing the JCR (JSR 170) Content Repository Standard, managing digital business information, applications and processes through the web. Communiqué

More information

Live Model Pointers A requirement for future model repositories

Live Model Pointers A requirement for future model repositories Live Model Pointers A requirement for future model repositories Keith Duddy QUT/Smart Services CRC 8 April 2009 1 Introduction Model interoperability is a topic that assumes that models are created and

More information

Introduction to Service Oriented Architectures (SOA)

Introduction to Service Oriented Architectures (SOA) Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction

More information

DreamFactory Security Whitepaper Customer Information about Privacy and Security

DreamFactory Security Whitepaper Customer Information about Privacy and Security DreamFactory Security Whitepaper Customer Information about Privacy and Security DreamFactory Software publishes rich applications for salesforce.com. All of our products for salesforce use the DreamFactory

More information

What is an SSL Certificate?

What is an SSL Certificate? Security is of the utmost importance when doing business on the Web. Your customers want to know that their information is protected when crossing data lines. A Thawte SSL Web Server Certificate or SuperCert

More information

Web Hosting. Comprehensive, scalable solutions for hosting dynamic websites, secure web services, and enterprise applications.

Web Hosting. Comprehensive, scalable solutions for hosting dynamic websites, secure web services, and enterprise applications. Web Hosting Comprehensive, scalable solutions for hosting dynamic websites, secure web services, and enterprise applications. Features High-performance Apache web server Apache 1.3 and 2.0 1 with HTTP

More information

IONA Security Platform

IONA Security Platform IONA Security Platform February 22, 2002 Igor Balabine, PhD IONA Security Architect Copyright IONA Technologies 2001 End 2 Anywhere Agenda IONA Security Platform (isp) architecture Integrating with Enterprise

More information

IBM WebSphere ESB V6.0.1 Technical Product Overview

IBM WebSphere ESB V6.0.1 Technical Product Overview IBM WebSphere ESB V6.0.1 Technical Product Overview SOA on your terms and our expertise 2005 IBM Corporation The SOA Lifecycle.. For Flexible Business & IT Assemble Assemble existing and new assets to

More information

Certification Practice Statement

Certification Practice Statement FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification

More information

Software Architecture Document

Software Architecture Document Software Architecture Document Project Management Cell 1.0 1 of 16 Abstract: This is a software architecture document for Project Management(PM ) cell. It identifies and explains important architectural

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER

ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER M-FILES CORPORATION ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER VERSION 2.3 DECEMBER 18, 2015 Page 1 of 15 CONTENTS 1. Version history... 3 2. Overview... 3 2.1. System Requirements... 3 3. Network

More information

SECURE YOUR WINDOWS ENTERPRISE WITH STRONG PASSWORD MANAGEMENT

SECURE YOUR WINDOWS ENTERPRISE WITH STRONG PASSWORD MANAGEMENT Specops Software presents: SECURE YOUR WINDOWS ENTERPRISE WITH STRONG PASSWORD MANAGEMENT By Derek Melber, MCSE, MVP Secure Your Windows Enterprise with Strong Password Management... 3 Windows Default

More information

Virtual Credit Card Processing System

Virtual Credit Card Processing System The ITB Journal Volume 3 Issue 2 Article 2 2002 Virtual Credit Card Processing System Geraldine Gray Karen Church Tony Ayres Follow this and additional works at: http://arrow.dit.ie/itbj Part of the E-Commerce

More information

How To Build A Connector On A Website (For A Nonprogrammer)

How To Build A Connector On A Website (For A Nonprogrammer) Index Data's MasterKey Connect Product Description MasterKey Connect is an innovative technology that makes it easy to automate access to services on the web. It allows nonprogrammers to create 'connectors'

More information

GenericServ, a Generic Server for Web Application Development

GenericServ, a Generic Server for Web Application Development EurAsia-ICT 2002, Shiraz-Iran, 29-31 Oct. GenericServ, a Generic Server for Web Application Development Samar TAWBI PHD student tawbi@irit.fr Bilal CHEBARO Assistant professor bchebaro@ul.edu.lb Abstract

More information

Christoph Bussler. B2B Integration. Concepts and Architecture. With 165 Figures and 4 Tables. IIIBibliothek. Springer

Christoph Bussler. B2B Integration. Concepts and Architecture. With 165 Figures and 4 Tables. IIIBibliothek. Springer Christoph Bussler B2B Integration Concepts and Architecture With 165 Figures and 4 Tables IIIBibliothek Springer Contents Part I Introduction to Business-to-Business Integration.... 1 1 History 3 1.1 Why

More information

Lepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with

Lepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with Lepide Active Directory Self Service Configuration Guide 2014 Follow the simple steps given in this document to start working with Lepide Active Directory Self Service Table of Contents 1. Introduction...3

More information

Getting Started Guide

Getting Started Guide Getting Started Guide Operations Center 5.0 March 3, 2014 Legal Notices THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT

More information

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

PINsafe Multifactor Authentication Solution. Technical White Paper

PINsafe Multifactor Authentication Solution. Technical White Paper PINsafe Multifactor Authentication Solution Technical White Paper Abstract PINsafe is a flexible authentication solution that offers a wide range of authentication models. The use of the patented one-time

More information

Figure 1. perfsonar architecture. 1 This work was supported by the EC IST-EMANICS Network of Excellence (#26854).

Figure 1. perfsonar architecture. 1 This work was supported by the EC IST-EMANICS Network of Excellence (#26854). 1 perfsonar tools evaluation 1 The goal of this PSNC activity was to evaluate perfsonar NetFlow tools for flow collection solution and assess its applicability to easily subscribe and request different

More information

A technical guide for monitoring Adobe LiveCycle ES deployments

A technical guide for monitoring Adobe LiveCycle ES deployments Technical Guide A technical guide for monitoring Adobe LiveCycle ES deployments Table of contents 1 Section 1: LiveCycle ES system monitoring 4 Section 2: Internal LiveCycle ES monitoring 5 Section 3:

More information

Smartphone Enterprise Application Integration

Smartphone Enterprise Application Integration WHITE PAPER MARCH 2011 Smartphone Enterprise Application Integration Rhomobile - Mobilize Your Enterprise Overview For more information on optimal smartphone development please see the Rhomobile White

More information

Web Services Trust and XML Security Standards

Web Services Trust and XML Security Standards Web Services Trust and XML Security Standards Date: April 9, 2001 Version: 1.0 Copyright 2001-2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States

More information

A Java proxy for MS SQL Server Reporting Services

A Java proxy for MS SQL Server Reporting Services 1 of 5 1/10/2005 9:37 PM Advertisement: Support JavaWorld, click here! January 2005 HOME FEATURED TUTORIALS COLUMNS NEWS & REVIEWS FORUM JW RESOURCES ABOUT JW A Java proxy for MS SQL Server Reporting Services

More information

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices

More information

Stopping secure Web traffic from bypassing your content filter. BLACK BOX

Stopping secure Web traffic from bypassing your content filter. BLACK BOX Stopping secure Web traffic from bypassing your content filter. BLACK BOX 724-746-5500 blackbox.com Table of Contents Introduction... 3 Implications... 4 Approaches... 4 SSL CGI Proxy... 5 SSL Full Proxy...

More information

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc. Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component

More information

Web Express Logon Reference

Web Express Logon Reference IBM WebSphere Host On-Demand Version 10 Web Express Logon Reference SC31-6377-01 IBM WebSphere Host On-Demand Version 10 Web Express Logon Reference SC31-6377-01 Note Before using this information and

More information

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication

More information

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network. Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components

More information

Introduction into Web Services (WS)

Introduction into Web Services (WS) (WS) Adomas Svirskas Agenda Background and the need for WS SOAP the first Internet-ready RPC Basic Web Services Advanced Web Services Case Studies The ebxml framework How do I use/develop Web Services?

More information

How To Secure Your Data Center From Hackers

How To Secure Your Data Center From Hackers Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard

More information

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things. Privacy and Security FAQ Privacy 1. Who owns the data that organizations put into Google Apps? 2. When can Google employees access my account? 3. Who can gain access to my Google Apps administrative account?

More information

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...

More information

Unicenter Remote Control r11

Unicenter Remote Control r11 Data Sheet Unicenter Remote Control r11 Unicenter Remote Control TM is a highly reliable and secure application for controlling and supporting remote Windows and Linux systems. It delivers all of the features

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1.1 Introduction Service Discovery Protocols (SDPs) are network protocols which allow automatic detection of devices and services offered by these devices on a computer network [1].

More information

Introduction to Cloud Computing. Lecture 02 History of Enterprise Computing Kaya Oğuz

Introduction to Cloud Computing. Lecture 02 History of Enterprise Computing Kaya Oğuz Introduction to Cloud Computing Lecture 02 History of Enterprise Computing Kaya Oğuz General Course Information The textbook: Enterprise Cloud Computing by Gautam Shroff (available at bookstore). Course

More information

Business Process Management with @enterprise

Business Process Management with @enterprise Business Process Management with @enterprise March 2014 Groiss Informatics GmbH 1 Introduction Process orientation enables modern organizations to focus on the valueadding core processes and increase

More information

A QoS-aware Method for Web Services Discovery

A QoS-aware Method for Web Services Discovery Journal of Geographic Information System, 2010, 2, 40-44 doi:10.4236/jgis.2010.21008 Published Online January 2010 (http://www.scirp.org/journal/jgis) A QoS-aware Method for Web Services Discovery Bian

More information

Virtual Team Collaboration Glossary

Virtual Team Collaboration Glossary Virtual Team Collaboration Glossary Steve Prahst, Rhonda Arterberrie, and Dennis Kay Knowledge Management and Collaborative Technologies Branch NASA Glenn Research Center Introduction Most NASA projects

More information

Securing LAN Connected Devices in Industrial Sites with TLS and Multicast DNS

Securing LAN Connected Devices in Industrial Sites with TLS and Multicast DNS Securing LAN Connected Devices in Industrial Sites with TLS and Multicast DNS Tero Keski-Valkama May 28, 2015 Version 1.0 Abstract This whitepaper outlines a more flexible and more secure user interface

More information

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter

More information

Installation and Configuration Guide

Installation and Configuration Guide Entrust Managed Services PKI Auto-enrollment Server 7.0 Installation and Configuration Guide Document issue: 1.0 Date of Issue: July 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark

More information

enterprise^ IBM WebSphere Application Server v7.0 Security "publishing Secure your WebSphere applications with Java EE and JAAS security standards

enterprise^ IBM WebSphere Application Server v7.0 Security publishing Secure your WebSphere applications with Java EE and JAAS security standards IBM WebSphere Application Server v7.0 Security Secure your WebSphere applications with Java EE and JAAS security standards Omar Siliceo "publishing enterprise^ birmingham - mumbai Preface 1 Chapter 1:

More information

Configuring Security Features of Session Recording

Configuring Security Features of Session Recording Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording

More information

Introduction to the EIS Guide

Introduction to the EIS Guide Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment

More information

XML Document Management Architecture

XML Document Management Architecture XML Document Management Architecture Candidate Version 2.0 02 Dec 2010 Open Mobile Alliance OMA-AD-XDM-V2_0-20101202-C OMA-AD-XDM-V2_0-20101202-C Page 2 (30) Use of this document is subject to all of the

More information

Cyan Networks Secure Web vs. Websense Security Gateway Battle card

Cyan Networks Secure Web vs. Websense Security Gateway Battle card URL Filtering CYAN Secure Web Database - over 30 million web sites organized into 31 categories updated daily, periodically refreshing the data and removing expired domains Updates of the URL database

More information

Common P2P Examples. Peer to Peer Networks. Client-Server Architecture. Uses of P2P. Napster Morpheus Gnutella Freenet BitTorrent Skype

Common P2P Examples. Peer to Peer Networks. Client-Server Architecture. Uses of P2P. Napster Morpheus Gnutella Freenet BitTorrent Skype Peer to Peer Networks Common P2P Examples Napster Morpheus Gnutella Freenet BitTorrent Skype 1 2 Uses of P2P Client-Server Architecture File sharing Instant messaging Voice communication Collaboration

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

GUIDE TO WEBSITES AND E-COMMERCE

GUIDE TO WEBSITES AND E-COMMERCE GUIDE TO WEBSITES AND E-COMMERCE Version 1.0, 26-Sept-01 This document is available from www.webcentro.com.au 2001, WebCentro WebCentro Guide To Websites And E-commerce CONTENTS 1. What is a Website? 1

More information

Middleware support for the Internet of Things

Middleware support for the Internet of Things Middleware support for the Internet of Things Karl Aberer, Manfred Hauswirth, Ali Salehi School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL) CH-1015 Lausanne,

More information

Qlik Sense Enabling the New Enterprise

Qlik Sense Enabling the New Enterprise Technical Brief Qlik Sense Enabling the New Enterprise Generations of Business Intelligence The evolution of the BI market can be described as a series of disruptions. Each change occurred when a technology

More information

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01 Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,

More information

Technical specifications

Technical specifications Technical specifications PhD Manager is built on the Haplo open source platform. The Haplo platform provides a flexible database tailored to storing information about the activities in complex organisations.

More information

Exploring ADSS Server Signing Services

Exploring ADSS Server Signing Services ADSS Server is a multi-function server providing digital signature creation and signature verification services, as well as supporting other infrastructure services including Time Stamp Authority (TSA)

More information

ITAR Compliant Data Exchange

ITAR Compliant Data Exchange ITAR Compliant Data Exchange Managing ITAR Data Across Collaborative Project Teams WebSpace Customers Aerospace & Defense Manufacturing High Tech & Contract Manufacturing Automotive Manufacturing Medical/

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise

More information

PARTNER INTEGRATION GUIDE. Edition 1.0

PARTNER INTEGRATION GUIDE. Edition 1.0 PARTNER INTEGRATION GUIDE Edition 1.0 Last Revised December 11, 2014 Overview This document provides standards and guidance for USAA partners when considering integration with USAA. It is an overview of

More information