Cooperative Brokerage Integration for Transaction Capacity Sharing: A Case Study in Hong Kong

Size: px
Start display at page:

Download "Cooperative Brokerage Integration for Transaction Capacity Sharing: A Case Study in Hong Kong"

Transcription

1 Cooperative Brokerage Integration for Transaction Capacity Sharing: A Case Study in Hong Kong Anthony C. Y. Lam 1 and Dickson K.W. Chiu 2, Senior Member, IEEE 1 Department of Computer Science, Hong Kong University of Science and Technology 2 Dickson Computer Systems, Hong Kong yuenchi@ust.hk, dicksonchiu@ieee.org Abstract Although today s brokerage trading platforms designed by software vendors fulfill the basic functionalities, the brokerage industry still has difficulties to face emerging problems such as the gradual increase of trading volume that cannot be handled because of the limitation of the current system architecture and throughput. Based on our consultation experience, we explain some of such constraints in Hong Kong from the business viewpoint of medium size brokerages. We introduce how a cooperative Transaction Capacity Sharing System (TCSS) among brokerages could help improve the situation by sharing their transaction capacity. In such business-to-business (B2B) system integration, we adopt asynchronous Web services and explain how they can work together to overcome these constraints in a real-time brokerage trading environment. We also detail the TCSS architecture and protocols for the integration which orchestrates the new cooperative trading process in our Web service based solution. 1. Introduction Since the Hong Kong Exchange and Clearing Limited (HKEX) introduced the new Order Routing System (ORS) with the Third Generation Automatic Order Matching and Execution System (AMS/3) on 23 rd February 2001, more than 100 brokerages have expressed their interest in connecting their trading system to the ORS [1]. Because AMS/3 is an open system, many stock trading system developers integrate their flagship solutions such as the Broker Supplied System (BSS) for brokerages and financial institutions to connect to HKEX. This allows online trading rather than over the phone and therefore improves the efficiency and effectiveness. Although the integration of BSS to AMS/3 solution has become common in the brokerage industry nowadays, it cannot fulfill more advanced and emerging requirements. Most of the trading systems running in brokerages are independent. In other words, a brokerage cannot achieve the maximum benefit in the financial industry using the automated trading system only for internal uses because of the very expensive trading capacity cost. To overcome these problems, we introduce a cooperative Transaction Capacity Sharing System (TCSS) among brokerage partners to help improve the situation. From a technical perspective, in order to expedite the trading process and minimize costs, some of the trading platform solutions provide Application Programming Interface (API) that allows in-house trading systems to communicate with one another. Many products in today s competitive market may achieve this but they have some common problems as described below: Communications among partners have no common standard of message protocols. No intelligent mechanisms have been or could possibly be integrated with the trading system for capacity sharing. It is hard to manage the security issues using different kinds of encryption techniques. For most integration architecture, extended Markup Language (XML) plays a role of trivializing the exchange of business data among companies by providing cross-platform approach in the areas of data encoding and data formatting. For example, Simple Object Access Protocol (SOAP), built on XML, defines a simple way to package information for exchange across system boundaries. By adopting standardized technologies, not only do we get interoperability for the customers, but we can also use our multi-platform approach to provide better solutions that help the financial industry accomplish their transactions more efficiently and profitably. Therefore, we propose the TCSS operate on a Web service platform using SOAP protocol. The TCSS aims at helping brokerages act more quickly and more efficiently by integrating the business logic, reducing the processing time, increasing the efficiency of order transaction, and therefore gaining competitive advantage in the industry. The major contribution of this paper is to /06/$20.00 (C) 2006 IEEE 1

2 show from this case study, how business-to-business (B2B) integration with contemporary technologies can help in this competitive digital economy. This paper is organized as follows. Section 2 discusses the background of Hong Kong s brokerage industry, the limitations of the current systems that affect the industry, and some related work. Section 3 presents the TCSS capacity sharing mechanisms. Section 4 discusses our design of the system architecture, integration protocol, and security based on Web services. The discussion and summary will be given at the end of this paper with future work direction. 2. Background and Related Work The previous Automatic Order Matching and Execution System (i.e., AMS/2) is an order-driven electronic trading system which supports on-floor and off-floor trading. Figure 1 depicts an overview of AMS/3, in which all the existing functionality such as order entry and automatic matching are maintained. In AMS/3, brokerages are allowed to access the market through the Trading Terminal or the Open Gateway (OG). OG is a new AMS/3 feature implemented to enhance the market capability of accessing the Order Routing System (ORS) to facilitate the electronically collection of clients order inputs. The OG is designed to support two different forms of trading facilities, namely the Multi-Workstation System (MWS) developed by HKEX and the brokerage s own front office trading system (termed as Broker Supplied System, BSS) [1]. Further, a BSS can either be a customized system or a commercial packaged product. By connecting a BSS to the OG, brokerages can design their trading processes and user interfaces to meet their own business and operational requirements. The Open gateway (OG) is a Windows NT-based device, located in the brokerage, to provide the connection between a BSS with the AMS/3 Host and Order Routing System through an IP-based Wide Area Network (WAN). For trading facilities, it supports an incoming Transmission Control Protocol (TCP) connection from either kinds of BSSs [2]. Figure 2 illustrates the information flow between BSS and the Host as well as ORS. Figure 1. System architecture of AMS/3 Figure 2. OG Connection Point Figure 3. Client placing a request A channel is provided for transaction flows between the AMS/3 Host and BSS, while another channel facilitates the control communication 2

3 between the ORS and BSS. Brokerages can choose to operate the OG and BSS on a 24-hour basis to collect client orders when HKEX operates the ORS on a round the clock basis. Figure 3 shows how typically a client can easily place an order request through an online broker [1]. Although the brokerages can leverage these new facilities to improve operational efficiency significantly and provide trading economies for their clients, there are still some constraints and limitations as explained below. Throttle rate control The OG will issue a throttle invitation to the BSS to solicit the submission of transactions [2]. The BSS may only send a transaction to the AMS/3 Host for each invitation received; otherwise such transactions will normally be rejected. As the OG allows brokerages to develop connections with the AMS/3 Trading Host, this mechanism is used to ensure a fair and orderly operation of the market. In addition, it ensures that the OG-Host traffic flow will not exceed the capacity of AMS/3. The throttle rate under AMS/3 is defined as 1 second per transaction per trading right. This means that the brokerage can have one or more trading right so that the BSS under such arrangement can send multiple transactions to the Host at the same time via the use of multiple throttle pipes. However, such throttle rate control also causes some drawbacks highlighted as follows: Additional trading right subscription is very expensive. Buying additional throttle rate is less expensive but on a monthly-fee basis. The basic throttle rate of only one order per second per trading right also means a slow response when the trading volume is high. Recently, the Hong Kong trading market data and statistics has indicated an exponential growth of the total value from the past 3 years as well as a potential increase of the trading value or volume by 2005 [3]. The throttle rate control is a major limitation of the transaction throughput. Medium size brokerages are unable to handle huge transactions volumes using the current BSS. Unless the brokerage is willing to buy expensive additional throttle rate as a short term solution, all the transactions must be queued on OG until the AMS/3 Host grants an invitation. Hardware failure is a major problem, especially for the financial industry. Nowadays, the OG has two technical configurations for choices, namely, Single Node Configuration and Active-standby Cluster Configuration. Medium to large brokerage enterprises tend to choose the latter configuration. With a primary and a secondary gateway installed at the brokerage, the secondary gateway will automatically takes over all the shared resources and performs as a primary gateway upon the failure of the primary gateway. However, in case of any abnormal situation that caused a long outage, both configurations are inadequate to handle. Based on the clients point of view, they cannot accept any kind of failures that affects heavily on the trading. Business integration and extensibility - Different trading systems often have proprietary message protocols and most of them are running in the brokerages independently. It is very time consuming and unreliable to understand or hack different interoperation protocols. Further, medium size brokerages often have several different applications. For example, credit controllers use the credit monitor application to approve or reject the clients who have inadequate balance to buy the commodities. Settlement officers use the back-office system to mange the clients portfolio and positions. In order to achieve system integration, each of them has to link with the trading system in order to obtain the realtime information. Often, a brokerage is forced to purchase a complete solution rather than spend the time in the integration or develop its own customized solution. Thus, an open standard for integration is called for. Reuters [13], one of the leading financial market information distributors, indicates that Web services are of strategic importance for Reuters and its clients. From Reuter s perspective, the concept of Web services appears to be ambitious, innovative, and more importantly an achievable approach to clarify, simplify, and resolve the ongoing system development of Reuters. Technical reports from other software vendors (such as [14]) indicate that they have the planning to develop Web services in order to extend their current system to other trading markets. Consequently, the software vendors in the financial market will be very competitive. There have been few technical papers on brokers applications. For example, McLeod [17] presents a study of broker desktop applications, which focuses on smoothing the workflow of brokers in a brokerage. Brokerages like Merrill Lynch have implemented such applications for their brokers since 1996 [16]. A current trend of application development is to focus on the collaboration with a brokerage s web presence. For example, the Trusted Global Advisory (TGA) system of Merrill Lynch started collaboration with its web presence Merrill Lynch Online in 1999 [18]. Chiu et al. [15] describe the stock trading environment in Hong Kong and proposes an event- 3

4 driven customer relationship management system for small brokerages. However, most of these studies relate more to the front office of the brokerage operations. There are even fewer work on the backend business logic as this is probably highly sensitive and valuable in the brokerage industry. These background and related work motivate our case study and provided some key requirements for designing the TCSS. 3. TCSS Capacity Sharing Mechanism Based on the requirements as discussed above, we highlight an overview of our TCSS and discuss its key mechanisms for capacity sharing TCSS Overview HKEX Trading Host Router Hub Open Gateway (OG) ` Workstation ibss ` Workstation RAS with SOAP / Http Figure 4. TCSS overview SOAP / Http SOAP / Http Local Brokerage Partner with Global Brokerage Partner with Local Brokerage Partner with According to the requirements discussed in the previous section, Figure 4 depicts an overview of our TCSS. The TCSS is one of the server-side applications running on an internal network within a brokerage. In order to exchange the order information with partners in an open platform, we choose to use Web services with SOAP protocol for this B2B integration Although most of the basic business logics have been implemented in common BSS such as margin calculation for order request, etc., our objective is to enhance it through integration with partner brokerages. Regarding to the huge transaction queuing on OG, capacity sharing mechanism plays the major role in TCSS System. Let us first explain the traditional mechanism with the following example. Suppose the client wants to place a 50K quantity with the price of 18 dollars using a user front-end trading system. Upon confirmation, the request is directly delivered over TCP/IP connection to the BSS backend application. The BSS takes this request and performs various verifications, such as whether the client has enough balance to buy the stock. After the verification process, the validated order is placed into the order queue (as shown in Figure 5), waiting to be sent out the HKEX host. As mentioned before, the HKEX host only accepts the order request packed with throttle control. All the orders will be marked as invalid if the packet message has no throttle control. Therefore, the order queue increases gradually when many clients are making the request at the same time Figure 5. Order Queue Now let us explain the capacity sharing of TCSS. To improve the turnaround time for each order request, we maintain the maximum length of order queue, as this example, 20 is the maximum buffer size of the order queue. If the queue if full or reach a certain threshold, the BSS will route the request to TCSS in order to forward it to partner brokerages. Each brokerage has its own broker ID, which is saved with the order. This enables TCSS to identify these forwarded orders with its partners as well as the dealer to have the clear picture about the order flows. After the forwarded transactions are executed with the notification sent back to TCSS, the relevant order can be matched, updated, and logged accordingly. As a result, the client also receives the acknowledgement promptly 1. All the forwarded orders are sent to the destination via Web services while TCSS asynchronously tracks for the completion acknowledgement. An asynchronous implementation is essential because TCSS has to handle many outstanding orders simultaneously while the time when the orders can be fulfilled is unpredictable. The order number and the partner ID is saved in the database so that it identifies all the pieces sent to the partners. Then the TCSS will send the forwarding information as well as any matching results back to the front-end application, so that both the dealers and the clients know clearly the full progress of the trade. Hence, the forwarded orders and B2B integration can be fully automated. 1 In Hong Kong, a client must accept a partial order in correct lot size if the price criterion is met. 4

5 3.2. TCSS Intelligence and Heuristics The forwarding process takes the following three criteria into consideration. 1. Outstanding backlog and forwarding threshold 2. Forwarding limit and cost of different brokerages 3. Number of partner brokerages The most important heuristic is that if the OG is not queued fully or reach a certain forwarding threshold, the system may not perform the forwarding process. This is because the turnaround time of the transaction may not be better compared with the turnaround time using the internal BSS system. For example, if the brokerage has one trading right and the order queue size was 10, it takes 10 seconds to complete the order request. If the orders are routed to TCSS for forwarding, the time consumed during the forwarding process added with the queuing time at the partner may possibly be longer. Another criterion is the forwarding limit imposed by a partner. This is because the throttle rate is a very valuable and limited resource to a brokerage. They can offer only a limited portion of their capacity to partners so that such service does not affect that of their own. In addition, they can impose a cost on it because the trading right is very expensive. In addition, a TCSS can adjust its forwarding threshold and forwarding limit dynamically according to its current queue length to achieve an effective flow control. This information as well as the current queue length can be sent piggy-back with acknowledgements or broadcasted to partners if necessary. Other partner TCSSs can use such information for choosing an appropriate target of the next forwarded order. Therefore, a TCSS also have to observe and honor this limiting of partners in order to maintain a good relationship. So, outstanding backlog orders have to be delayed until the next round when any partners can then accept them. Therefore, the more partner brokerages join together, the more chance are there to have a partner with a short or empty queue. So, with more partners, it is possible to set the forwarding threshold lower. As every brokerage have at least one trading right, small brokerages with less transactions may consider to team up with medium size ones in order to recover some costs from sharing of the expensive trading rights. 4. TCSS Design and Implementation In this section, we present the design and implementation of our TCSS, highlighting the system architecture, protocol, and security System Architecture Partner Brokerage with TCSS / BSS SOAP Internet SOAP Transaction Web Services Interface Service Dispatching and Aggregation Adaptation Manager TCSS Process Manager TCP/IP ODBC Figure 5. TCSS architecture BSS Application Database As shown in Figure 5, the TCSS has three main components, namely, the main TCSS Process Manager, the Adaptation Manager, and the Web Services Interface. The Adaptation Manager is the key connector of the TCSS. It transforms the messages among the inhouse BSS, TCSS Process Manager, and the Web Services Interfaces into the correct format and calling conventions. For example, it accepts outgoing order requests from the BSS Application and incoming order requests from partners via the Interface. Here, the required protocol transformation is among SOAP and TCP/IP [4][5]. It also dispatches outgoing orders from the TCSS Process Manager and routes completion acknowledgements back. Moreover, it routes information messages to the BSS so that the relevant clients and dealers know the trade progress. The TCSS Process Manager controls and monitors the execution of the main typical trading processes including Add Order, Amend Order, and Delete Order. It contains the intelligent logic for deciding the forwarding of outgoing order. It also validates if incoming orders from partners meets the mutually imposed limits. Whenever completion acknowledgements are obtained from the asynchronous Web service via the Adaptation Manager, this triggers the TCSS Process Manager to update the transaction trading status. 5

6 The Interface is invoked with a SOAP call that it binds data such as stock code, order price to the XML response template. Once the Adaptation Manager sends the request to the Transaction Web services, it dynamically binds the data such as the lot size and the price to input XML template [4] and send the request directly to the destination partner. When an acknowledgement is sent back from a partner, it binds the live data with the response XML template and sends it back to Adaptation manager TCSS Protocol After evaluations, we choose the Microsoft.Net framework [6] to implement Web services with a standard protocol called Financial Information exchange (FIX), which is developed specifically for real-time electronic exchange of securities transactions [7]. Before sending the request to the partners, the Adaptation Manager translates the message as FIX Markup Language (FIXML) using the FIX protocol [7][8]. The FIX protocol consists of: A Standard Header; A set of Tag = Value fields separated by field delimiters; and A Standard Trailer Using the symbol ; as a separator, the format of a FIX message looks like: 35=D;55=0001.HK;54=2;38=1000;40=1 As the tags are numeric values so it is not very readable, we turn it into pseudo English and yield: Symbol=1000.HK;Side=Sell; OrderQty=1000;OrdType= Market For example, a complete FIX message looks like: 8=FIX.4.2;9=199;35=D;34=10;49=VENDOR;115=CUS TOMER;144=BOSTONEQ;56=BROKER; 57=DOT;143=NY;52= :25:28;11=ORD_1;21=2;110=1000;55=EK;22=1; 48= ;54=1;60= :25:56;38=500 0;40=2;44=62.5; 15=HKD;47=A;10=165; When the highlighted body of the message is translated into FIXML, this becomes: <FIXML> <FIXML Message> <Header>...</Header> <ApplicationMessage> <Order> <CIOrdID>ORD_1</CIOrdID> <HandInst Value="2" /> <MinQty>1000</MinQty> <Instrument> <Symbol>EK</Symbol> <IDSource>1</IDSource> <SecurityID> </SecurityID> </Instrument> <Side Value="1" /> <TransactTime> :25:56</TransactTime> <OrderQuantity> <OrderQty>5000</OrderQty> </OrderQuantity> <OrderType> <LimitOrder Value="2"> <Price>62.5</Price> </LimitOrder> </OrderType> <Currency Value="HKD" /> <Rule80A Value="A" /> </Order> <ApplicationMessage> </FIXMLMessage> </FIXML> The following example shows the data encoded into SOAP message: <?xml version= 1.0 encoding= UTF-8?> <SOAP-ENV:Envelope xmlns:soap-env= xmlns:soap-enc= xmlns:xsi= <SOAP-ENV:Body SOAP- ENV:encodingStyle= > <sendmessage> <FIXMLMessage> <Header> <Sender> <CompID>Hopgood</CompID> </Sender> <Target> <CompID>Lloyds</CompID> </Target> </Header> <ApplicationMessage> <Indication> <IOIid>41926</IOIid> <Instrument> <Security> <Symbol>IBM</Symbol> </Security> </Instrument> <IOISide Value="1"/> <IOIShares>2000</IOIShares> <Price>30.00</Price> <Currency Value="GBP"/> <ValidUntilTime>22:50</ValidUntilTime> </Indication> </ApplicationMessage> </FIXMLMessage></sendMessage> </SOAP-ENV:Body> </SOAP-ENV:Envelope> One of our designs is to make use of asynchronous Web service calls as explained in Section 3. Asynchronous calls return immediately and 6

7 then use some other mechanisms for indicating when the call actually completes. This is essential because the completion time of a transaction is unpredictable. Microsoft.Net Framework provides support for making asynchronous Web service calls over HTTP [9]. For example, the SoapHttpClientProtocol class also has a method called BeginInvoke, which is the mechanism used to start an asynchronous request. The code is shown as below: Public Function BeginDelayedResponse( _ ByVal waitperiod As Integer, _ ByVal callback As System.AsyncCallback, _ ByVal asyncstate As Object) As System.IAsyncResult Return Me.BeginInvoke("DelayedResponse", _ New Object() {waitperiod}, _ callback, _ asyncstate) End Function 4.3. Security in Asynchronous Web services When choosing Web services for business applications, security is one of the important issues that have to be addressed. At the InfoWorld Next- Generation Web services Conference in January 2002 [10], more than half of the attendants considered security as one of their major concerns when implementing Web services. In order to build a secure Web services architecture, security issues of all layers of the Web services stack should be carefully tackled, as vulnerability will invite malicious attackers to penetrate the system. The basic security requirements on information systems also apply to Web services messaging. They include: Confidentiality Web services messages should only be read by the intended recipients. Integrity Web services messages should not be modified by any unauthorized party accidentally or deliberately during transmission. Authentication Web services messages should be transmitted by a properly identified sender. This is a prerequisite for applying authorization to access Web services. Authorization Only authorized senders can send messages. Non-repudiation Message senders cannot deny that they did send the message. Here we discuss how contemporary security technologies for Web service helps. As shown in the previous sub-section, SOAP messages play an important role in the proposed system. Hence, to make sure the message protocol is well protected, we apply WS-Security for the communication. WS- Security describes how to use the existing W3C security specifications, XML Signature, and XML Encryption, to ensure the integrity and confidentiality of SOAP messages. Together with WS-License, it describes how existing digital credentials and their associated trust semantics can be securely associated with SOAP messages. Together, these specifications form the bottom layer of comprehensive modular security architecture for XML Web services. Future security specifications will build on these basic capabilities to provide mechanisms for credential exchange, trust management, revocation, and other higher-level capabilities [11][12]. Figure 6. Embedded XML encryption WS-Security defines a SOAP Header element to carry security-related data. If XML Signature is used, this header can contain the information defined by XML Signature that conveys how the message was signed, the key that was used, and the resulting signature value. Similarly, if an element within the message is encrypted, the encryption information such as that conveyed by XML Encryption can be contained within the WS-Security header. WS- Security does not specify the format of the signature or encryption. Instead, it specifies how one would embed the security information laid out by other 7

8 specifications within a SOAP message. WS-Security is primarily a specification for an XML-based security metadata container. Figure 6 (extracted from the Knowledge Base at Microsoft) shows a WS-Securitybased message with embedded XML Encryption information [11][12]. As such, security among TCSS partners can be ensured. 5. Discussion and Summary In this paper, we have presented our proposed TCSS, a system which can decrease the queuing time in the OG during peak transaction volumes by sharing transaction capacities among partner brokerages. We have explained the background business practices and how the routing of orders help. In particular, this helps them avoid significant costs of buying extra trading rights, which is very expensive. Such improvement helps them to group together against large brokerages that have much better facilities and trading capacities, as better trading services and performance is the key to customer relationships [15]. Further, upon hardware failure of the OG, orders can be routed to partner brokerages through the TCSS. Therefore the cost of implementing the TCSS is justified for its benefits. We have also presented a pragmatic system architecture for the TCSS together with its major components. We illustrate how Web services technologies can be used effectively and efficiently in the B2B integration, supporting adequate communications and security features, even for realtime financial services with stringent requirements. The TCSS Process Manager can incorporate customizable intelligent business logic and augment the current Broker Trading System (BSS) platform as a separate system, so that it can be developed and maintained separately. This allows for the coexistence of the legacy BSS, which is a key software component of the brokerages for their current daily operations. So, this helps decrease the development time and effort as well as facilitate testing and finetuning. Another advantage is the automation and transparency of the TCSS, which does not increase the regular operation overheads for the dealers. One might imagine the security and management issues as well as the management s worry involved in such operations that involve a large transaction amount. However, in Hong Kong, many small and medium size brokerages have multiple broker licenses (i.e., different broker IDs for trading at HKEX), they can deploy the TCSS integration within their enterprise or within their group, where they have adequate security, governance, and trust. Instead of manual diverting clients to other offices or trading hot-lines within an enterprise, the TCSS provides such automation in a fully transparent manner and therefore has no legal issues or conflict with HKEX regulations. For the alliance of different brokerages, we identify legal and regulatory issues as one important direction for future research. In addition, inter-brokerage charging policies and schemes constitute another important direction for future research. Although the proposed system obviously increases the transaction volume and improves the queuing time, how detail heuristics could be best formulated is still a major research problem. We are investigating in simulations to experiment various parameters. Order processing and turnaround time are also important parameters to be measured and affects the choice of parameters. After obtaining the statistical data, we have to make some adjustments on the current system and parameters. On the other hand, we would like to introduce priority management in the routing for valued customers as well as for transactions that involve a large amount. References [1] Hong Kong Exchanges and Clearing Limited: AMS/3, [2] Hong Kong Exchanges and Clearing Limited: OG [3] Hong Kong Exchanges and Clearing Limited: Data and Statistics [4] Microsoft: Web service Basic, webservicebasics/default.aspx [5] Microsoft: Understand SOAP, webservicebasics/default.aspx?pull=/library/enus//dnsoap/html/understandsoap.asp [6] Creating and Using Web services with.net framework Services.asp [7] Financial Information Exchange protocol [8] FIXML Resources for FIX 4.4 Specification [9] Microsoft: Asynchronous Web services call over HTTP with.net Framework ary/en-us/dnservice/html/service asp [10] InfoWorld Next-Generation Web services Conference, 8

9 [11] Microsoft: Understand WS-Security, ary/e-us/dnwssecur/html/understw.asp [12] Microsoft: Web services Security Specification Index Page specs/default.aspx?pull=/library/enus/dnglobspec/html/wssecurspecindex.asp [13] Position paper for W3C Workshop [14] ebroker System Limited [15] D.K.W. Chiu, Wesley C. W. Chan, Gary K. W. Lam, S. C. Cheung, and Franklin T. Luk. An Event Driven Approach to Customer Relationship Management in an e-brokerage Environment, in Proc HICSS36, 10 pages, CDROM, Jan [16] S. Hopper, Real World Design in the Corporate Environment: Designing an Interface for the Technically Challenged, In Proceedings of the Conference on Human Factors in Computing Systems, Vancouver, British Columbia, Canada, April Online at: Hopper/Hwh_txt.html [17] J. McLeod. The Broker Desktop. The Future of Trading Has Arrived, in J. Keyes (ed), Financial Services Information Systems, 2nd edition, Auerbach, [18] J. L. Steffens. The Role of Online Advice, In Proceedings of the Forrester Conference Princeton, New Jersey,

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Developers Integration Lab (DIL) System Architecture, Version 1.0

Developers Integration Lab (DIL) System Architecture, Version 1.0 Developers Integration Lab (DIL) System Architecture, Version 1.0 11/13/2012 Document Change History Version Date Items Changed Since Previous Version Changed By 0.1 10/01/2011 Outline Laura Edens 0.2

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s

More information

Network Security. Chapter 9 Integrating Security Services into Communication Architectures

Network Security. Chapter 9 Integrating Security Services into Communication Architectures Network Security Chapter 9 Integrating Security Services into Communication Architectures Network Security (WS 00): 09 Integration of Security Services Motivation: What to do where?! Analogous to the methodology

More information

Section A Notes to the Application

Section A Notes to the Application Explanatory Note 1 (Hosting OG/BSS - For Normal Trading) Section A Notes to the Application a. Hosting OG Server Hardware Configuration and Software Package : Hosting OG will support both standard and

More information

Enhancing Workflow Automation in Insurance Underwriting Processes with Web Services and Alerts

Enhancing Workflow Automation in Insurance Underwriting Processes with Web Services and Alerts Enhancing Workflow Automation in Insurance Underwriting Processes with Web Services and Alerts Raymond C.M. Lee, Kai Pan Mark, and Dickson K.W. Chiu, Senior Member, IEEE Department of Computing, The Hong

More information

Apigee Gateway Specifications

Apigee Gateway Specifications Apigee Gateway Specifications Logging and Auditing Data Selection Request/response messages HTTP headers Simple Object Access Protocol (SOAP) headers Custom fragment selection via XPath Data Handling Encryption

More information

Industrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity

Industrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity Industrial Network Security and Connectivity Tunneling Process Data Securely Through Firewalls A Solution To OPC - DCOM Connectivity Manufacturing companies have invested billions of dollars in industrial

More information

1 Product. Open Text is the leading fax server vendor in the world. *

1 Product. Open Text is the leading fax server vendor in the world. * 1 Product Open Text Fax s Replace fax machines and inefficient paper processes with efficient and secure computer-based faxing and electronic document delivery Open Text is the leading fax server vendor

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern

More information

Chapter 9 Integrating Security Services into Communication Architectures

Chapter 9 Integrating Security Services into Communication Architectures Network Security Chapter 9 Integrating Security Services into Communication Architectures Prof. Dr.-Ing. Georg Carle Chair for Computer Networks & Internet Wilhelm-Schickard-Institute for Computer Science

More information

Rights Management Services

Rights Management Services www.css-security.com 425.216.0720 WHITE PAPER Microsoft Windows (RMS) provides authors and owners the ability to control how they use and distribute their digital content when using rights-enabled applications,

More information

A Quick Introduction to SOA

A Quick Introduction to SOA Software Engineering Competence Center TUTORIAL A Quick Introduction to SOA Mahmoud Mohamed AbdAllah Senior R&D Engineer-SECC mmabdallah@itida.gov.eg Waseim Hashem Mahjoub Senior R&D Engineer-SECC Copyright

More information

WEB SERVICES SECURITY

WEB SERVICES SECURITY WEB SERVICES SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Service Virtualization: Managing Change in a Service-Oriented Architecture

Service Virtualization: Managing Change in a Service-Oriented Architecture Service Virtualization: Managing Change in a Service-Oriented Architecture Abstract Load balancers, name servers (for example, Domain Name System [DNS]), and stock brokerage services are examples of virtual

More information

Introduction to SAML

Introduction to SAML Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments

More information

PaperClip Incorporated 3/7/06; Rev 9/18/09. PaperClip Compliant Email Service Whitepaper

PaperClip Incorporated 3/7/06; Rev 9/18/09. PaperClip Compliant Email Service Whitepaper Incorporated 3/7/06; Rev 9/18/09 PaperClip Compliant Email Service Whitepaper Overview The FTC Safeguard Rules require Financial, Insurance and Medical providers to protect their customer s private information

More information

Cisco Application Networking for Citrix Presentation Server

Cisco Application Networking for Citrix Presentation Server Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems

Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems If company want to be competitive on global market nowadays, it have to be persistent on Internet. If we

More information

Introducing Cisco Unified Communications Express

Introducing Cisco Unified Communications Express CHAPTER 1 Introducing Cisco Unified Communications Express Cisco Unified Communications Express is an award-winning communications solution that is provided with the Cisco Integrated Services Router portfolio.

More information

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9 NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document

More information

Pervasive Software + NetSuite = Seamless Cloud Business Processes

Pervasive Software + NetSuite = Seamless Cloud Business Processes Pervasive Software + NetSuite = Seamless Cloud Business Processes Successful integration solution between cloudbased ERP and on-premise applications leveraging Pervasive integration software. Prepared

More information

Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012 Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret

More information

Cloud Infrastructure Planning. Chapter Six

Cloud Infrastructure Planning. Chapter Six Cloud Infrastructure Planning Chapter Six Topics Key to successful cloud service adoption is an understanding of underlying infrastructure. Topics Understanding cloud networks Leveraging automation and

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.

More information

Research on the Model of Enterprise Application Integration with Web Services

Research on the Model of Enterprise Application Integration with Web Services Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business

More information

Comparison of SNMP. Versions 1, 2 and 3

Comparison of SNMP. Versions 1, 2 and 3 Comparison of SNMP 1 Comparison of SNMP Versions 1, 2 and 3 Eddie Bibbs Brandon Matt ICTN 4600-001 Xin Tang April 17, 2006 Comparison of SNMP 2 During its development history, the communities of researchers,

More information

A Unified Messaging-Based Architectural Pattern for Building Scalable Enterprise Service Bus

A Unified Messaging-Based Architectural Pattern for Building Scalable Enterprise Service Bus A Unified Messaging-Based Architectural Pattern for Building Scalable Enterprise Service Bus Karim M. Mahmoud 1,2 1 IBM, Egypt Branch Pyramids Heights Office Park, Giza, Egypt kmahmoud@eg.ibm.com 2 Computer

More information

redcoal EmailSMS for MS Outlook and Lotus Notes

redcoal EmailSMS for MS Outlook and Lotus Notes redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: support@redcoal.com Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

Security Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/

Security Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Security Design thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing

More information

Classic Grid Architecture

Classic Grid Architecture Peer-to to-peer Grids Classic Grid Architecture Resources Database Database Netsolve Collaboration Composition Content Access Computing Security Middle Tier Brokers Service Providers Middle Tier becomes

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1) Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including

More information

PQoS Parameterized Quality of Service. White Paper

PQoS Parameterized Quality of Service. White Paper P Parameterized Quality of Service White Paper Abstract The essential promise of MoCA no new wires, no service calls and no interference with other networks or consumer electronic devices remains intact

More information

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

Web Services Trust and XML Security Standards

Web Services Trust and XML Security Standards Web Services Trust and XML Security Standards Date: April 9, 2001 Version: 1.0 Copyright 2001-2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 1 CHAPTER 1 INTRODUCTION Internet has revolutionized the world. There seems to be no limit to the imagination of how computers can be used to help mankind. Enterprises are typically comprised of hundreds

More information

Part 2: The Neuron ESB

Part 2: The Neuron ESB Neuron ESB: An Enterprise Service Bus for the Microsoft Platform This paper describes Neuron ESB, Neudesic s ESB architecture and framework software. We first cover the concept of an ESB in general in

More information

Detection of illegal gateways in protected networks

Detection of illegal gateways in protected networks Detection of illegal gateways in protected networks Risto Vaarandi and Kārlis Podiņš Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia firstname.lastname@ccdcoe.org 1. Introduction In this

More information

ITL BULLETIN FOR JANUARY 2011

ITL BULLETIN FOR JANUARY 2011 ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division

More information

IT Architecture Review. ISACA Conference Fall 2003

IT Architecture Review. ISACA Conference Fall 2003 IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture

More information

Motivation Definitions EAI Architectures Elements Integration Technologies. Part I. EAI: Foundations, Concepts, and Architectures

Motivation Definitions EAI Architectures Elements Integration Technologies. Part I. EAI: Foundations, Concepts, and Architectures Part I EAI: Foundations, Concepts, and Architectures 5 Example: Mail-order Company Mail order Company IS Invoicing Windows, standard software IS Order Processing Linux, C++, Oracle IS Accounts Receivable

More information

Protocol Data Units and Encapsulation

Protocol Data Units and Encapsulation Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing

More information

Remote Services. Managing Open Systems with Remote Services

Remote Services. Managing Open Systems with Remote Services Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater

More information

Customized Data Exchange Gateway (DEG) for Automated File Exchange across Networks

Customized Data Exchange Gateway (DEG) for Automated File Exchange across Networks Customized Data Exchange Gateway (DEG) for Automated File Exchange across Networks *Abhishek Vora B. Lakshmi C.V. Srinivas National Remote Sensing Center (NRSC), Indian Space Research Organization (ISRO),

More information

OPCNet Broker TM for Industrial Network Security and Connectivity

OPCNet Broker TM for Industrial Network Security and Connectivity OPCNet Broker TM for Industrial Network Security and Connectivity Tunneling Process Data Securely Through Firewalls A Solution To OPC - DCOM Connectivity from Integration Objects Compatible for DA, HDA

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email

WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email WHITE PAPER Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email EXECUTIVE SUMMARY Data Loss Prevention (DLP) monitoring products have greatly

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data Md. Golam Shagadul Amin Talukder and Al-Mukaddim Khan Pathan* Department of Computer Science and Engineering, Metropolitan University, Sylhet,

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,

More information

Collaboration Protocol Agreement Guide. Public Health Information Network Messaging System (PHINMS)

Collaboration Protocol Agreement Guide. Public Health Information Network Messaging System (PHINMS) Collaboration Protocol Agreement Guide Public Health Information Network Messaging System (PHINMS) Version: 1.0.0 Prepared by: U.S. Department of Health & Human Services Date: April 15, 2008 EXECUTIVE

More information

Chapter 10. Cloud Security Mechanisms

Chapter 10. Cloud Security Mechanisms Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based

More information

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,KathagarhUmeshsehgalind@gmail.com

More information

How To Set Up A Net Integration Firewall

How To Set Up A Net Integration Firewall Net Integration Technologies, Inc. http://www.net itech.com Net Integrator Firewall Technical Overview Version 1.00 TABLE OF CONTENTS 1 Introduction...1 2 Firewall Architecture...2 2.1 The Life of a Packet...2

More information

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But

More information

Layer 4-7 Server Load Balancing. Security, High-Availability and Scalability of Web and Application Servers

Layer 4-7 Server Load Balancing. Security, High-Availability and Scalability of Web and Application Servers Layer 4-7 Server Load Balancing Security, High-Availability and Scalability of Web and Application Servers Foundry Overview Mission: World Headquarters San Jose, California Performance, High Availability,

More information

Oracle Net Services for Oracle10g. An Oracle White Paper May 2005

Oracle Net Services for Oracle10g. An Oracle White Paper May 2005 Oracle Net Services for Oracle10g An Oracle White Paper May 2005 Oracle Net Services INTRODUCTION Oracle Database 10g is the first database designed for enterprise grid computing, the most flexible and

More information

Java Security Web Services Security (Overview) Lecture 9

Java Security Web Services Security (Overview) Lecture 9 Java Security Web Services Security (Overview) Lecture 9 Java 2 Cryptography Java provides API + SPI for crypto functions Java Cryptography Architecture Security related core classes Access control and

More information

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,

More information

Foreign Account Tax Compliance Act (FATCA) IDES Implementation Update. April 2015

Foreign Account Tax Compliance Act (FATCA) IDES Implementation Update. April 2015 Foreign Account Tax Compliance Act (FATCA) IDES Implementation Update April 2015 IDES Implementation Developments 2 The IRS has made significant progress in developing and deploying technology capabilities

More information

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,lshi@tssg.org

More information

The Way to SOA Concept, Architectural Components and Organization

The Way to SOA Concept, Architectural Components and Organization The Way to SOA Concept, Architectural Components and Organization Eric Scholz Director Product Management Software AG Seite 1 Goals of business and IT Business Goals Increase business agility Support new

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute

More information

Titolo del paragrafo. Titolo del documento - Sottotitolo documento The Benefits of Pushing Real-Time Market Data via a Web Infrastructure

Titolo del paragrafo. Titolo del documento - Sottotitolo documento The Benefits of Pushing Real-Time Market Data via a Web Infrastructure 1 Alessandro Alinone Agenda Introduction Push Technology: definition, typology, history, early failures Lightstreamer: 3rd Generation architecture, true-push Client-side push technology (Browser client,

More information

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Antelope Enterprise. Electronic Documents Management System and Workflow Engine

Antelope Enterprise. Electronic Documents Management System and Workflow Engine Antelope Enterprise Electronic Documents Management System and Workflow Engine Antelope Enterprise v4 High Availability Edition Information in this document applies to the Antelope Enterprise v4 High Availability.

More information

Extending the Internet of Things to IPv6 with Software Defined Networking

Extending the Internet of Things to IPv6 with Software Defined Networking Extending the Internet of Things to IPv6 with Software Defined Networking Abstract [WHITE PAPER] Pedro Martinez-Julia, Antonio F. Skarmeta {pedromj,skarmeta}@um.es The flexibility and general programmability

More information

Frequently Asked Questions For Investors

Frequently Asked Questions For Investors Frequently Asked Questions For Investors 1. What is trade day (T) and settlement day (T+2)? Trade day (T) means a normal working day for securities trading under the regulation of stock exchange. To a

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

ΕΠΛ 674: Εργαστήριο 5 Firewalls

ΕΠΛ 674: Εργαστήριο 5 Firewalls ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized

More information

Microsoft Dynamics GP 2013. econnect Installation and Administration Guide

Microsoft Dynamics GP 2013. econnect Installation and Administration Guide Microsoft Dynamics GP 2013 econnect Installation and Administration Guide Copyright Copyright 2012 Microsoft Corporation. All rights reserved. Limitation of liability This document is provided as-is. Information

More information

Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current

More information

Legislative Council Panel on Financial Affairs Congestion in Securities Trading Networks

Legislative Council Panel on Financial Affairs Congestion in Securities Trading Networks CB(1)362/07-08(01) For information Legislative Council Panel on Financial Affairs Congestion in Securities Trading Networks Purpose This paper sets out the responses of the Hong Kong Exchanges and Clearing

More information

SSDG Operational Manual Draft version: 0.1. Operational Manual For SSDG

SSDG Operational Manual Draft version: 0.1. Operational Manual For SSDG Operational Manual For SSDG 1 Table of Contents ABBREVIATIONS... 5 SECTION 1: INTRODUCTION... 6 1 INTRODUCTION... 7 1.1 INTENDED USER... 7 1.2 HOW TO USE... 7 1.3 ORGANIZATION OF THE MANUAL... 8 1.4 HELPDESK...

More information

ATHABASCA UNIVERSITY. Enterprise Integration with Messaging

ATHABASCA UNIVERSITY. Enterprise Integration with Messaging ATHABASCA UNIVERSITY Enterprise Integration with Messaging BY Anuruthan Thayaparan A thesis essay submitted in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE in INFORMATION

More information

Approaches to Enterprise Identity Management: Best of Breed vs. Suites

Approaches to Enterprise Identity Management: Best of Breed vs. Suites Approaches to Enterprise Identity Management: Best of Breed vs. Suites 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Executive Summary 1 3 Background 2 3.1 Enterprise Identity

More information

3GPP TS 24.623 V8.1.0 (2008-09)

3GPP TS 24.623 V8.1.0 (2008-09) TS 24.623 V8.1.0 (2008-09) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Extensible Markup Language (XML) Configuration Access Protocol

More information

Security Technology: Firewalls and VPNs

Security Technology: Firewalls and VPNs Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up

More information

SiteCelerate white paper

SiteCelerate white paper SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance

More information

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005 State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology

More information

An Overview of the SaskTel Hosted Contact Centre Solution Design and Delivery Principles, and Core Architecture

An Overview of the SaskTel Hosted Contact Centre Solution Design and Delivery Principles, and Core Architecture 23082011 An Overview of the SaskTel Hosted Contact Centre Solution Design and Delivery Principles, and Core Architecture TABLE OF CONTENTS The SaskTel Hosted Contact Centre Solution... 3 Benefits of the

More information

Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT)

Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Course Number: 642 845 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP Exam 642 845:

More information

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT To Study the Overall Cloud Computing Security Using Virtual Private Network. Aparna Gaurav Jaisingpure/Gulhane Email id: aparnagulhane@gmail.com Dr.D.Y.Patil Vidya Pratishthan s Dr. D.Y Patil College of

More information

Replacements TECHNICAL REFERENCE. DTCCSOLUTIONS Dec 2009. Copyright 2009 Depository Trust Clearing Corporation. All Rights Reserved.

Replacements TECHNICAL REFERENCE. DTCCSOLUTIONS Dec 2009. Copyright 2009 Depository Trust Clearing Corporation. All Rights Reserved. TECHNICAL REFERENCE Replacements Page 1 Table of Contents Table of Contents 1 Overview... 3 1.1 Replacements Features... 3 2 Roles and Responsibilities... 4 2.1 Sender (Receiving Carrier)... 4 2.2 Recipient

More information

Low-rate TCP-targeted Denial of Service Attack Defense

Low-rate TCP-targeted Denial of Service Attack Defense Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu

More information

Cisco Application Networking for IBM WebSphere

Cisco Application Networking for IBM WebSphere Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Base One's Rich Client Architecture

Base One's Rich Client Architecture Base One's Rich Client Architecture Base One provides a unique approach for developing Internet-enabled applications, combining both efficiency and ease of programming through its "Rich Client" architecture.

More information

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane SE 4C03 Winter 2005 Firewall Design Principles By: Kirk Crane Firewall Design Principles By: Kirk Crane 9810533 Introduction Every network has a security policy that will specify what traffic is allowed

More information