Service-oriented architectures (SOA) and their application and usage in healthcare

Size: px
Start display at page:

Download "Service-oriented architectures (SOA) and their application and usage in healthcare"

Transcription

1 Service-oriented architectures (SOA) and their application and usage in healthcare I. Abstract: Herak Sen CSE300: Topics in Biomedical Informatics Healthcare in United States is a major concern.it is estimated that healthcare spending continues to increase tremendously with an estimate of over $2.7 trillion by 2010 [1]. The rising hospital costs, medical errors, lack of medical records in case of medical emergency are few of the causes that add greatly to the healthcare costs. On the other hand healthcare not only involves patients and providers, it spans public-private boundaries involving policy makers, legislators, providers, citizen who interact in complicated ways. Medical data are sensitive and bound by laws that makes healthcare an important concern for both government and private organization. It is obvious that technology can be used in solving many of these issues also no single organization can solve all these problems and therefore a collaborative approach is needed. Service Oriented Architecture is a natural answer for developing such systems where the present, legacy and future systems build by different organization can communicate with each other. This approach would give a fast and reliable health services to the consumer. II. Introduction and Motivation Healthcare systems are very complex that work in different environments, different models and implementations. Many of the systems have been developed around entities such as doctors, hospitals, insurance companies, researchers etc. All of them work in their own environment with minimal interaction. Also none of them want to share information, which sometimes may lead to the suffering of the consumer of the health service. Patients have to deal with several of these entities that might not have any similarity. Each has a different approach in controlling the information. The sensitive nature of the health information is very critical. If it is not protected well all of the health entities will be reluctant to use a widespread and connected health system. Some of the key facts and challenges [2] are that many people die in hospitals each year as the result of medical errors which makes its eight leading cause of death in the country. Many people also die because they did not receive appropriate healthcare and it has been found that adults receive 55% of the recommended healthcare [3]. Despite spending a lot on healthcare [4] it has been found that United States does not rank high in the quality of services provided compared to other countries. It also does not do well in reducing medical errors, overall rating of doctors. Another key problem was that a patient has to tell his/her medical information repeatedly to various health professionals. This leads to duplication of information, sometimes-conflicting information which also results in re doing the health tests. A study shows that one-third of the spending on healthcare by the country goes to care that is duplicative.

2 With Internet and advancement in affordable technologies, healthcare services can be effectively delivered to the patient that would enable the patients to maintain and improve their own health through better options and choices. In long term patients can be directly involved in deciding what the system should offer by series of feedbacks about the system. Adoption of computer systems could reduce errors and saving huge amount of money. Similarly standardized healthcare information exchange would deliver high national savings. There has been significant work in various independent areas of healthcare such EMR [5] an PHR [6], standards such as HL7 [7], tools like medication management tools, chronic disease tools, systems used at hospitals and devices such as used by diabetic patients. There is a need to connect all of them rather than creating one system that does it all such that all of them conform some basic principles and standards. This way information would not be stored in one place but can be aggregated by authorized users to provide various health services. There has been recommendation [2] for creation of a non-proprietary network of networks to support the rapid acceleration of electronic connectivity that will enable the flow of information to support patient care. Service oriented architecture fits perfectly in such a scenario. There can be a common framework at national level comprising of standards for various information exchange, security and authorizations, data integrity built upon service-oriented paradigm. Using such architecture would help integrating various systems and services in secure manner without jeopardizing patients and providers confidential data. III. Service Oriented Architecture As more and more organizations are implementing systems that are across different architectures, network and even between organization The challenge is to find a solution that is extendible, flexible and fits well with the existing legacy systems [8]. Replacing the legacy systems may be costly and introduces new development cycle increasing the chance of malfunctioning. As business models changes organization quickly need to adapt such changes into their computing infrastructure that might require the legacy systems change to support to the new business functions and integrate to the newly developed systems or integrate to the systems of its partners. The complexity of the whole thing is what makes it a constant challenge to organizations [8]. This kind of complex scenario can be effectively handled using Service Oriented Architecture. Definitions In [9] SOA is defined as The policies, practices, frameworks that enable application functionality to be provided and consumed as sets of services published at a granularity relevant to the service consumer. Services can be invoked, published and discovered, and are abstracted away from the implementation using a single, standards-based form of interface. Some earlier definitions include Applications must be developed as independent sets of interacting services offering well-defined interfaces to their potential

3 users. Similarly, supporting technology must be available to allow application developers to browse collections of services, select those of interest, and assemble them to create the desired functionality [10]. In [11] a service is described as A course-grained, discoverable software entity that exists as a single instance and interacts with applications and other services through a loosely coupled (often asynchronous), message-based communication model. Components of SOA [8,11,12] Service: The contract defined between one or more published interfaces exposing welldefined functionalities. There is a critical difference between public and published interfaces that is key to SOA. A public interface can be used by components within the system whereas the published interfaces are exposed through the network. In the former case the clients are known and in the later they are not known. Service provider: The software entity that implements a service specification. It is important to remember that services are just interfaces, they have no definition for the services therefore providers provide the implementation. There can be many implementations of a particular service. Its up to the clients which provider they choose. Clients: The software entity that requests the services. Typically they would choose a particular provider and call the appropriate service. Clients can be an end user application or another service. Service locator: A specific kind of service provider that acts as a registry and allows for the lookup of service provider interfaces and service locations. As mentioned earlier the clients should be able to find and choose services implemented by various providers therefore the service must have some identifiers associated with them so that they an be discovered. Service must be dynamically discovered and therefore their location should not be hard coded. Service Broker: A special service provider that can pass on service requests to one or more additional service providers. Fig 1. Components of SOA

4 These components allow the services to work and managed independently. Some of the management issues can be [13] the following. Security: Authorize requests, encrypt and decrypt data as required, and validate information. Deployment: Allow the service to be moved around the network to maximize performance or eliminate redundancy to provide optimum availability. Logging: Provide auditing and metering capabilities. Dynamic rerouting: Provide fail-over or load-balancing capabilities. Maintenance: Manage new versions of the service. Web Services Service oriented architecture can be implemented in various ways, one of the most popular implementation is as Web Service. The Web Services Architecture Working Group [14] describes it as A Web service is a software system identified by a URI, whose public interfaces and bindings are defined and described using XML. Its definition can be discovered by other software systems. These systems may then interact with the Web service in a manner prescribed by its definition, using XML based messages conveyed by Internet protocols. Fig 2. Web Services XML based In Web Services the services are defined using an XML based language called Web Service Descriptor Language [15,16]. It contains operations performed, message used, data types used and communication protocol used by the web service [17,18].

5 Web Services can use any transport protocol to invoke the services and get the results. The most popular is Simple Object Access Protocol (SOAP) [19]. W3C defines it as lightweight protocol intended for exchanging structured information in a decentralized, distributed environment. [20]. SOAP is widely used as its XML based and easily used over HTTP. Originally applications communicated using Remote Procedure Call (RPC), but HTTP is not designed to handle this. RPC also had security and compatibility problems also firewalls and proxy servers would block most of it. Using XML over HTTP provides much better way of communication for applications running on different operating systems and programming language. Since XML is text based SOAP becomes totally platform independent and extensible. The services can be discovered (service locator) using Universal Description, Discovery and Integration (UDDI). It is defined as platform-independent framework (XML) for describing and discovering services [21]. The registry services manages, provides information about services providers, implementation and metadata [22]. Performance and Reliability As web services are based on HTTP and SOAP, their performance and reliability will always be questioned. Can web services be used in enterprise systems? Isn t it too slow and unreliable? The answer will be same as for any distributed architecture systems. We cannot totally depend on HTTP for reliability and correct trade-offs and decisions should be made to support the systems and business requirements [11]. If performance is the key requirement then some portion of the system can be designed with fast RPC mechanism. For example if a service use some other services which are not exposed to clients then those internal services can use RPC communication. There other ways problems such as load on the server, the problems is discussed in [23]. There are various load balancing techniques that can be used. Apart from load balancing software of a machine can be configured to respond. Fault Tolerance Clusters, Wide Area Load Distribution, Replica Management are some other techniques to handle performance and reliability. Web services can also be made scalable making them asynchronous and using queues. Since there is a transport overhead as the services by design are remote it is important to reduce the response time. Making asynchronous services the clients can continue executing and the providers has chance to respond. This is very helpful where network costs are high and latency is unpredictable. Queues are also popular where services that expect very high load. The system is designed in such a way that there is special component that just listens to the requests and another component that services the request. The former one is known as the queue. Security Web services communicate via SOAP that is XML based hence it can be easily read. This poses a serious question how secure is web services? Can it be used for data which are confidential WS-Security tries to address this issue by introducing security at SOAP messaging provide quality of protection through message integrity, message

6 confidentiality, and single message authentication [26]. It provides mechanism for associating security tokens with messages. It supports multiple security tokens format to accommodate different kinds of authentication and authorization. It also describes how to encode Username Tokens, X.509 Tokens, SAML Tokens, REL Tokens and Kerberos Tokens as well as how to include opaque encrypted keys as a sample of different binary token types. Message integrity is provided using XML signatures which tries to ensure that messages originated from the correct and not modified on the network. In general the following points are the key points in web service security [24,25]. 1. Choosing between message layer security and transport layer security. 2. Choosing a client authentication technology, from basic direct authentication to more sophisticated brokered solutions, including X.509, Kerberos version 5 protocol, and STS solutions. 3. Protecting confidentiality of messages. 4. Detecting tampered messages. 5. Preventing the processing of replayed messages. 6. Accessing remote resources and flowing identity across tiers. 7. Preventing exceptions from revealing sensitive implementation details. 8. Protecting Web services from malformed or malicious messages. Some of the most common scenarios for web services and their security are very well described in [24]. 1. Public Web service: In this scenario transport layer security that is HTTPS and Username Token can be a good choice. 2. Intranet Web service: Here message layer security with the Kerberos [28] protocol can be used. 3. Internet business-to-business: In B2B Kerberos protocol can be used within organization and X.509 certificates between businesses. 4. Multiple Internet Web services: In this scenario a Security Token Service (STS)[27] may be used.

7 IV. Health care systems and role of SOA Achieving electronic connectivity in healthcare Connecting for health [29] a private public collaborative organization that studies various fields of health information technology. In [2] they outlined ways and means to connect health care systems. Few of the key recommendations were the following-: 1. Develop the health information infrastructure in a way that safeguards privacy, leverages both bottom up and top down strategies, is incremental in nature, and is based on a decentralized and federated model -- an interoperable, standards-based network of networks built on the Internet. The network should not contain a central repository for patient medical records. Instead, it should be a pathway that facilitates their identification and exchange, with appropriate authorization, in a private and secure way. 2. A Common Framework is needed immediately in order to pursue a decentralized strategy that builds out from a local and regionally driven approach to creating the infrastructure. Only by conforming to a Common Framework can we ensure that data exchange pilots, personal health records, and regional systems will be able to interoperate across and with other regional systems. The Common Framework is premised on secure transport over the Internet and provides minimal but basic components for the infrastructure including secure connectivity, reliable authentication, and a minimum suite of standards for information exchange. It is comprised of network software, common policies, documents and methodologies that can be shared in the public domain. 3. Public-private collaboration should fund. 4. Implement and use the data standards that have been proven. It also ensures interoperability. 5. Accurate Linking of Health records are very important as it may lead to prompt services. Also it is recommended that using a National Health ID for linking is not the correct solution. There is a risk of privacy because if leaked it can provide very sensitive information. Also it cannot be implemented in short period of time, as it would require an upgrade for all health systems that will be expensive. It is proposed that linking and sharing are made at the edges of the network. It would also allow providing additional linking requirement locally. The choice of what to link and what to disclose should be given to patients. It is clear from the above recommendations that connecting health care systems cannot be done in centralized way i.e. one cannot build a system that does all the work. It has to be system of systems. The only way to do is build many systems based on common standards. The standards should allow easy connection of these systems. Service oriented

8 architecture provides all the necessary features to connect systems and exchange data in secure and robust way. Connected Health Services- Microsoft In October 2006 Microsoft proposed a framework for connected health services [1]. The Connected Health Framework is an architectural approach following the Connecting for health [2] guidelines. The architecture proposes of an information system with common definitions both at technical and business level. This is essential as per [2] which argues that the systems must use common data standards. This architecture puts patient as the main entity and recommends transforming healthcare through productive, dependable and economic solutions that are connected by design. In the paper it has also been mentioned that lack of integration between services provided by various organizations also results in inefficient use of the services not only by other organization but also themselves also. Microsoft proposed that the systems cannot be developed using a national health ID, as it is too risky and can cause security issue. Instead the system should link at the edges of the network that can be established using authorization. The system should be federated based on data standards, interoperable, protects patient s privacy and is built incrementally without using a national health ID or a centralized database. By aggregating the above the system should be connected, information driven and work in collaborative environment. Architectural Description The 4 key features [1] of the architecture are: - 1. Service-orientation a modular approach that reduces dependencies between systems, using open standards and protocols to promote data application and interoperability. 2. Federated data given the local nature of healthcare delivery, data should reside as close as possible to where it s created and administered, caching information at different levels within the system (departmental, regional, national) to allow for different levels of service. 3. Federated security allowing easier management of identities and security credentials by delegating aspects of authentication and role assignment to trusted parties. 4. Trustworthiness reliable, fault tolerant systems.

9 Fig 3: A business pattern for healthcare As per [2] the above figure describes a typical healthcare business pattern. There are various processes all around which interact with each other. These processes should be secured. Also the processes may be running on different environment. The challenge is how to integrate them so that at the end the users get the best experience. Service Oriented Architecture provides an ideal solution for this scenario. Each of the above processes can be designed as services and uses standards for exchange at the edges. Notice even the security envelope can be a service. Web Services based in XML and SOAP provides the mean of achieving this interoperability and also supports the evolving business processes and changing business objectives. Another key advantage is that the existing or the legacy systems need not be discarded. They can be re-engineered in such a way that all of its functionality is preserved and used as services.

10 Fig 4: Architecture It is easy to see from the above figure that various parts of the systems are divided into services that have well defined edges and connection points. This way user and business processes that are more volatile can also be separated from the data and business component that are relatively stable via connected health service hub. The advantage of such architecture is that it does not dictate any one way of implementing and designing various healthcare systems. It provides guidelines how various systems can easily interact and get connected to other systems. Health Research Data Network (HRDN) The above architecture is a very high level view that can be applied in various medical domains. Similar features can be seen in [34] that describes a service oriented architecture for a health research data network (HRDN). Health Researchers constantly need data or their research and experiments. The data sets though exist but are difficult

11 to acquire due to their sensitive nature. There are data custodian organizations that keep such data and there are ethical and legislative requirements for accessing those for research purpose. The goal of HRDN is to minimize the time for researchers to access the data while supporting the complex organizational and ethical requirements that arising from research in inter-organizational and inter-jurisdictional data collection. It tries to support collaboration and re-use of knowledge among the HRDN participants. HRDN addresses the problem by proposing an architecture that consists of layers of services as follows: - 1. Preparing and Storing: This layer is responsible for preparing the data. As mentioned earlier that the data is stored with the data custodian organizations that have their own system and methods for preparing the data hence HRDN architecture does not enforce any way of doing that. The specific services are specific to organization. It may be noticed that the architecture proposed by Microsoft also allows business processes to be separate. The advantage is that the data custodians can use their existing systems to be a part of the HRDN, hence saving lot of money and resources and also their business rules inside their systems are preserved. They interface with HRDN via a set of services that connect to their legacy application and pass only the required data to HRDN. 2. Sharing: Sharing allows resources to be discovered and also access to multiple data sources and other services. There are various sub services within this such as:- a. Data Services that accepts a request for data as query and returns requested data as messages. The request may include may include temporary data storages by client and may include various parameters. The response may also contain some metadata such as timestamp and volume summary. The data service may invoke security, auditing and logging services. b. Orchestration Services manages multiple composite invocation of network resources i.e. it takes a series of scenarios or a workflow that involves invocation of various resources. In other words the workflow that is a graph of data dependent service invocations. It provides with asynchronous execution of the workflow and output the result and the execution trace. c. Planner and Transformation services are responsible for transformation of data as per various schemas. The requests are presented to the planner and the planner produces a workflow plan. d. Cache Manager is responsible for the persistent and safe data storage. It receives requests from clients for standard data creation, updating, deletion and retrieval. It ensures that the operations are compliant with the custodian requirements. The clients can only access data if they are authorized. e. Structure Registry keeps track of various data and transformation services in the network. 3. Using: These services provide the final response to the clients and also uses Disclosure Risk Estimator and Risk Mitigator services to ensure that the result

12 presented to the client do not disclose confidential information unless the client has the approval. a. Analytical Information Management service checks whether the given data fits for the request. It generates metadata relating to the quality of fitness. b. Exploratory Data Analysis service provides various statistical summaries and graphical forms. c. Surveillance Analysis service provides some specialist analysis functions appropriate for health surveillance. d. Statistical Model Building service provides statistical and decision making services. 4. Describing: These services provide metadata management. At various layers some metadata is always tracked such as in sharing layer the metadata can be the track of information flow. On the other hand in the preparing and storing layer metadata such as who created and stored the data, time etc can be stored. 5. Protecting: Protecting data is always the highest priority in any healthcare service and HRDN provides various services for that, though it assumes that the transport layers security is by SSL. a. Member Registration Services provides mean to authenticate users using membership definitions policy etc and responds with security token. b. Security Token Services generated security tokens and may form input for other services. c. Some other services Session Initiator that allows user to log on, Agreement Facilitator that validates whether request matches the custodian requirements etc are part of this layer. HRDN provides an excellent example of design using services in health care scenario. It proves that various aspects of such a complicated systems can easily be designed using services. It also provides in details what kind of services should be there in the given scenario that can be extended in other health care areas. HRDN can itself be tied to other similar systems using services. Example Usage as presented in the paper: Consider an epidemiologist, Emma, who is interested in studying the relationship between the post-operative survival times of colorectal cancer patients and their MYC gene amplification level. She first obtains membership through Member Registration service. She then applies to obtain data from data custodians and agrees to the terms and conditions for the usage using Agreement Facilitator service. She uses Exploratory Data Analysis services to understand the quality of the data. The service internally uses Disclosure Risk Estimator and Disclosure Risk Mitigator service that ensures the presented data does not reveal some confidential

13 information against the agreement. Finally she builds her workflow that is executed using Planner and Orchestration services. Modeling medical e-services In [30] the description of service oriented architecture becomes even more specific than the Microsoft Architecture and the HRDN that talked at the architecture level about services. It describes services implemented as Web Services. Specifically its shows how medical workflows can be modeled as web services. Though the general idea remains the same but here specific web service technologies are discussed for various layers. It highlights that there are various standards of communication such HL7 and DICOM[31] (Digital Imaging and Communication in Medicine) and defining medical workflows via IHE[31] framework but they work well in Intranet solution. But in current scenario there is need to break away from the Intranet to the Internet. The workflows and business logic can be spread across various organizations. Web services provides a feasible way to model, design and implement workflows. Features such SOAP for transportation WS-Security and WS-ReliabileMessaging for reliability and security and to model workflows BPEL(Business Process Execution Language)[33] can be used. Web Service workflow model can therefore provide medical e-services functionality in both intranet/internet environment. The paper outlines the following requirements for modeling e-service:- 1. HL7, DICOM encoding: Messages in IHE framework are based on HL7 and DICOM. The problem is how to transfer messages based on these standards using Web Services. One solution is converting the messages, which may be in binary format in XML. Another better solution is to attach the original messages to SOAP messages. WS-Attachment or SOAP messages with attachment (SwA) can be used to achieve them. More recently base64binary encoding as a standard for transferring binary data as it does not require additional protocol parsers. WS- Security can also be applied to binary data to provide message level security. 2. Web Service Transactions: Transaction protocols introduce the concept of transactions. HL7 and DICOM do not specify any transactional behavior. The application must take care of transaction and make sure that the same records are not inserted twice etc. WS-Transaction provides a standard for web service transaction. BPEL also compensation based transaction processing that allows undoing an action that has been successfully completed. 3. Security: As mentioned earlier security is very important in health care and medicine. As discussed earlier WS- security provides many of securing web services. There are other standards such as WS-Trust and WS- SecureConversation which can be used. With WS-SecureConversation web service providers specify security requirements and requestors provide claims that can be matched prior to security establishment. It also states which part of SOAP message have to be signed and encrypted to avoid message tampering.

14 4. Web service registration and binding: UDDI is standard for searching, registration and binding of web services. The registry provides services that implement specific IHE transaction. Outlining a modeling process Fig 5: Modeling process 4level use case model 1. First the 4 level UML use case diagram is defined for profiles, flows, transactions and messages used in the IHE framework. The profiles gives an overview of what an application performs. The profiles are split into various flows and are described as sequence diagrams in IHE framework. Each IHE flow is further defined using several IHE transactions. The transactions consist of one or more HL7 and DICOM messages used for communication. 2. The public workflow or the IHE transaction performed by an IHE actor is described using UML activity diagrams. The diagram can be derived from the sequence diagram.

Service Virtualization: Managing Change in a Service-Oriented Architecture

Service Virtualization: Managing Change in a Service-Oriented Architecture Service Virtualization: Managing Change in a Service-Oriented Architecture Abstract Load balancers, name servers (for example, Domain Name System [DNS]), and stock brokerage services are examples of virtual

More information

Introduction to Service Oriented Architectures (SOA)

Introduction to Service Oriented Architectures (SOA) Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction

More information

Service Oriented Architecture

Service Oriented Architecture Service Oriented Architecture Charlie Abela Department of Artificial Intelligence charlie.abela@um.edu.mt Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline

More information

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)

More information

Service-Oriented Architectures

Service-Oriented Architectures Architectures Computing & 2009-11-06 Architectures Computing & SERVICE-ORIENTED COMPUTING (SOC) A new computing paradigm revolving around the concept of software as a service Assumes that entire systems

More information

Research on the Model of Enterprise Application Integration with Web Services

Research on the Model of Enterprise Application Integration with Web Services Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business

More information

Modeling and Implementing Medical Web services

Modeling and Implementing Medical Web services Modeling and Implementing Medical Web services Rainer Anzböck 1, Schahram Dustdar 2 1 D.A.T.A. Corporation, Invalidenstrasse 5-7/10, 1030 Wien, Austria ar@data.at 2 Distributed Systems Group, Information

More information

NIST s Guide to Secure Web Services

NIST s Guide to Secure Web Services NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:

More information

Getting Started with Service- Oriented Architecture (SOA) Terminology

Getting Started with Service- Oriented Architecture (SOA) Terminology Getting Started with - Oriented Architecture (SOA) Terminology Grace Lewis September 2010 -Oriented Architecture (SOA) is a way of designing, developing, deploying, and managing systems it is neither a

More information

The case for service oriented architecture in realising trusted, interoperable, pan-european egovernment services.

The case for service oriented architecture in realising trusted, interoperable, pan-european egovernment services. The case for service oriented architecture in realising trusted, interoperable, pan-european egovernment services. Stephen McGibbon Microsoft EMEA Tel. +445511490070 Email. stephenm@microsoft.com Abstract:

More information

AquaLogic Service Bus

AquaLogic Service Bus AquaLogic Bus Wolfgang Weigend Principal Systems Engineer BEA Systems 1 What to consider when looking at ESB? Number of planned business access points Reuse across organization Reduced cost of ownership

More information

Service Oriented Architecture (SOA) An Introduction

Service Oriented Architecture (SOA) An Introduction Oriented Architecture (SOA) An Introduction Application Evolution Time Oriented Applications Monolithic Applications Mainframe Client / Server Distributed Applications DCE/RPC CORBA DCOM EJB s Messages

More information

Emerging Technologies Shaping the Future of Data Warehouses & Business Intelligence

Emerging Technologies Shaping the Future of Data Warehouses & Business Intelligence Emerging Technologies Shaping the Future of Data Warehouses & Business Intelligence Service Oriented Architecture SOA and Web Services John O Brien President and Executive Architect Zukeran Technologies

More information

A standards-based approach to application integration

A standards-based approach to application integration A standards-based approach to application integration An introduction to IBM s WebSphere ESB product Jim MacNair Senior Consulting IT Specialist Macnair@us.ibm.com Copyright IBM Corporation 2005. All rights

More information

Software Requirement Specification Web Services Security

Software Requirement Specification Web Services Security Software Requirement Specification Web Services Security Federation Manager 7.5 Version 0.3 (Draft) Please send comments to: dev@opensso.dev.java.net This document is subject to the following license:

More information

Service-Oriented Architecture and its Implications for Software Life Cycle Activities

Service-Oriented Architecture and its Implications for Software Life Cycle Activities Service-Oriented Architecture and its Implications for Software Life Cycle Activities Grace A. Lewis Software Engineering Institute Integration of Software-Intensive Systems (ISIS) Initiative Agenda SOA:

More information

Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact

Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact Robert C. Broeckelmann Jr., Enterprise Middleware Architect Ryan Triplett, Middleware Security Architect Requirements

More information

Platform Autonomous Custom Scalable Service using Service Oriented Cloud Computing Architecture

Platform Autonomous Custom Scalable Service using Service Oriented Cloud Computing Architecture Platform Autonomous Custom Scalable Service using Service Oriented Cloud Computing Architecture 1 B. Kamala 2 B. Priya 3 J. M. Nandhini 1 2 3 ABSTRACT The global economic recession and the shrinking budget

More information

Enterprise Application Designs In Relation to ERP and SOA

Enterprise Application Designs In Relation to ERP and SOA Enterprise Application Designs In Relation to ERP and SOA DESIGNING ENTERPRICE APPLICATIONS HASITH D. YAGGAHAVITA 20 th MAY 2009 Table of Content 1 Introduction... 3 2 Patterns for Service Integration...

More information

Motivation Definitions EAI Architectures Elements Integration Technologies. Part I. EAI: Foundations, Concepts, and Architectures

Motivation Definitions EAI Architectures Elements Integration Technologies. Part I. EAI: Foundations, Concepts, and Architectures Part I EAI: Foundations, Concepts, and Architectures 5 Example: Mail-order Company Mail order Company IS Invoicing Windows, standard software IS Order Processing Linux, C++, Oracle IS Accounts Receivable

More information

A Quick Introduction to SOA

A Quick Introduction to SOA Software Engineering Competence Center TUTORIAL A Quick Introduction to SOA Mahmoud Mohamed AbdAllah Senior R&D Engineer-SECC mmabdallah@itida.gov.eg Waseim Hashem Mahjoub Senior R&D Engineer-SECC Copyright

More information

Using ESB and BPEL for evolving healthcare systems towards SOA

Using ESB and BPEL for evolving healthcare systems towards SOA ehealth Beyond the Horizon Get IT There S.K. Andersen et al. (Eds.) IOS Press, 2008 2008 Organizing Committee of MIE 2008. All rights reserved. 747 Using ESB and BPEL for evolving healthcare systems towards

More information

What You Need to Know About Transitioning to SOA

What You Need to Know About Transitioning to SOA What You Need to Know About Transitioning to SOA written by: David A. Kelly, ebizq Analyst What You Need to Know About Transitioning to SOA Organizations are increasingly turning to service-oriented architectures

More information

Federal Enterprise Architecture and Service-Oriented Architecture

Federal Enterprise Architecture and Service-Oriented Architecture Federal Enterprise Architecture and Service-Oriented Architecture Concepts and Synergies Melvin Greer Chief Strategist, SOA / Cloud Computing Certified Enterprise Architect Copyright August 19, 2010 2010

More information

Service-Oriented Architecture and Software Engineering

Service-Oriented Architecture and Software Engineering -Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based

More information

Service-Oriented Architecture: Analysis, the Keys to Success!

Service-Oriented Architecture: Analysis, the Keys to Success! Service-Oriented Architecture: Analysis, the Keys to Success! Presented by: William F. Nazzaro CTO, Inc. bill@iconatg.com www.iconatg.com Introduction Service-Oriented Architecture is hot, but we seem

More information

The Use of Service Oriented Architecture In Tax and Revenue

The Use of Service Oriented Architecture In Tax and Revenue The Use of Service Oriented Architecture In Tax and Revenue Presented by: Bruce Baur & Adam Schaffer Revenue Solutions, Inc. Introduction Adam Schaffer Director, Revenue Administration Practice Line More

More information

SOA Planning Guide. 2015 The Value Enablement Group, LLC. All rights reserved.

SOA Planning Guide. 2015 The Value Enablement Group, LLC. All rights reserved. SOA Planning Guide 1 Agenda q SOA Introduction q SOA Benefits q SOA Principles q SOA Framework q Governance q Measurement q Tools q Strategic (long term) View 2 Introduction to SOA q Service-oriented architecture

More information

Table of Contents. 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8

Table of Contents. 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8 Table of Contents 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8 3 SOA in Verizon The IT Workbench Platform... 10 3.1 Technology... 10 3.2 Processes

More information

SOA GOVERNANCE MODEL

SOA GOVERNANCE MODEL SOA GOVERNANCE MODEL Matjaz B. Juric University of Ljubljana, Slovenia matjaz.juric@fri.uni-lj.si Eva Zupancic University of Ljubljana, Slovenia Abstract: Service Oriented Architecture (SOA) has become

More information

Multi-Level Secure Architecture for Distributed Integrated Web Services

Multi-Level Secure Architecture for Distributed Integrated Web Services Multi-Level Secure Architecture for Distributed Integrated Web s J.G.R.Sathiaseelan Bishop Heber College (Autonomous) Tiruchirappalli 620 017, India jgrsathiaseelan@gmail.com S.Albert Rabara St Joseph

More information

Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus

Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 4.0.3 Unit objectives

More information

Introduction to Service-Oriented Architecture for Business Analysts

Introduction to Service-Oriented Architecture for Business Analysts Introduction to Service-Oriented Architecture for Business Analysts This course will provide each participant with a high-level comprehensive overview of the Service- Oriented Architecture (SOA), emphasizing

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 1 CHAPTER 1 INTRODUCTION Internet has revolutionized the world. There seems to be no limit to the imagination of how computers can be used to help mankind. Enterprises are typically comprised of hundreds

More information

SOA REFERENCE ARCHITECTURE

SOA REFERENCE ARCHITECTURE SOA REFERENCE ARCHITECTURE August 15, 2007 Prepared by Robert Woolley, Chief Technologist and Strategic Planner INTRODUCTION This document is a derivative work of current documentation and presentations

More information

Leveraging Service Oriented Architecture (SOA) to integrate Oracle Applications with SalesForce.com

Leveraging Service Oriented Architecture (SOA) to integrate Oracle Applications with SalesForce.com Leveraging Service Oriented Architecture (SOA) to integrate Oracle Applications with SalesForce.com Presented by: Shashi Mamidibathula, CPIM, PMP Principal Pramaan Systems shashi.mamidi@pramaan.com www.pramaan.com

More information

How service-oriented architecture (SOA) impacts your IT infrastructure

How service-oriented architecture (SOA) impacts your IT infrastructure IBM Global Technology Services January 2008 How service-oriented architecture (SOA) impacts your IT infrastructure Satisfying the demands of dynamic business processes Page No.2 Contents 2 Introduction

More information

SOA REFERENCE ARCHITECTURE: SERVICE TIER

SOA REFERENCE ARCHITECTURE: SERVICE TIER SOA REFERENCE ARCHITECTURE: SERVICE TIER SOA Blueprint A structured blog by Yogish Pai Service Tier The service tier is the primary enabler of the SOA and includes the components described in this section.

More information

Developers Integration Lab (DIL) System Architecture, Version 1.0

Developers Integration Lab (DIL) System Architecture, Version 1.0 Developers Integration Lab (DIL) System Architecture, Version 1.0 11/13/2012 Document Change History Version Date Items Changed Since Previous Version Changed By 0.1 10/01/2011 Outline Laura Edens 0.2

More information

WEB SERVICES SECURITY

WEB SERVICES SECURITY WEB SERVICES SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Service Computing: Basics Monica Scannapieco

Service Computing: Basics Monica Scannapieco Service Computing: Basics Monica Scannapieco Generalities: Defining a Service Services are self-describing, open components that support rapid, low-cost composition of distributed applications. Since services

More information

ACADEMIC RESEARCH INTEGRATION SYSTEM

ACADEMIC RESEARCH INTEGRATION SYSTEM ACADEMIC RESEARCH INTEGRATION SYSTEM Iulia SURUGIU 1 PhD Candidate, University of Economics, Bucharest, Romania E-mail: : iulia_surugiu2003@yahoo.com Manole VELICANU PhD, University Professor, Department

More information

Service Oriented Architecture 1 COMPILED BY BJ

Service Oriented Architecture 1 COMPILED BY BJ Service Oriented Architecture 1 COMPILED BY BJ CHAPTER 9 Service Oriented architecture(soa) Defining SOA. Business value of SOA SOA characteristics. Concept of a service, Enterprise Service Bus (ESB) SOA

More information

SOA for Healthcare: Promises and Pitfalls

SOA for Healthcare: Promises and Pitfalls SOA for Healthcare: Promises and Pitfalls Dennis B. Smith dbs@sei.cmu.edu SOA in Health Care Conference: Value in a Time of Change Chicago, IL USA June 3, 2009 Agenda Healthcare IT Challenges SOA: The

More information

Classic Grid Architecture

Classic Grid Architecture Peer-to to-peer Grids Classic Grid Architecture Resources Database Database Netsolve Collaboration Composition Content Access Computing Security Middle Tier Brokers Service Providers Middle Tier becomes

More information

Accelerate your SOA Projects through Service Simulation

Accelerate your SOA Projects through Service Simulation Accelerate your SOA Projects through Service Simulation Overview Modern web services-based Service Oriented Architecture (SOA) enables service consumers and producers to exchange messages over ubiquitous

More information

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

Improving Agility at PHMSA through Service-Oriented Architecture (SOA)

Improving Agility at PHMSA through Service-Oriented Architecture (SOA) Leveraging People, Processes, and Technology Improving Agility at PHMSA through Service-Oriented Architecture (SOA) A White Paper Author: Rajesh Ramasubramanian, Program Manager 11 Canal Center Plaza,

More information

Architectural Requirements for an SOA Based on Web Services. Jim Bole VP, Engineering Infravio, Inc. April 23, 2003

Architectural Requirements for an SOA Based on Web Services. Jim Bole VP, Engineering Infravio, Inc. April 23, 2003 Architectural Requirements for an SOA Based on Web s Jim Bole VP, Engineering Infravio, Inc. April 23, 2003 Agenda! Web s is an integration technology! Web s role in an SOA! Unique Features and Challenges

More information

Web Services Security with SOAP Security Proxies

Web Services Security with SOAP Security Proxies Web Services Security with Security Proxies Gerald Brose, PhD Technical Product Manager Xtradyne Technologies AG OMG Web Services Workshop USA 22 April 2003, Philadelphia Web Services Security Risks! Exposure

More information

Run-time Service Oriented Architecture (SOA) V 0.1

Run-time Service Oriented Architecture (SOA) V 0.1 Run-time Service Oriented Architecture (SOA) V 0.1 July 2005 Table of Contents 1.0 INTRODUCTION... 1 2.0 PRINCIPLES... 1 3.0 FERA REFERENCE ARCHITECTURE... 2 4.0 SOA RUN-TIME ARCHITECTURE...4 4.1 FEDERATES...

More information

Literature Review Service Frameworks and Architectural Design Patterns in Web Development

Literature Review Service Frameworks and Architectural Design Patterns in Web Development Literature Review Service Frameworks and Architectural Design Patterns in Web Development Connor Patrick ptrcon001@myuct.ac.za Computer Science Honours University of Cape Town 15 May 2014 Abstract Organizing

More information

Contents. 1010 Huntcliff, Suite 1350, Atlanta, Georgia, 30350, USA http://www.nevatech.com

Contents. 1010 Huntcliff, Suite 1350, Atlanta, Georgia, 30350, USA http://www.nevatech.com Sentinet Overview Contents Overview... 3 Architecture... 3 Technology Stack... 4 Features Summary... 6 Repository... 6 Runtime Management... 6 Services Virtualization and Mediation... 9 Communication and

More information

Oracle Service Bus Examples and Tutorials

Oracle Service Bus Examples and Tutorials March 2011 Contents 1 Oracle Service Bus Examples... 2 2 Introduction to the Oracle Service Bus Tutorials... 5 3 Getting Started with the Oracle Service Bus Tutorials... 12 4 Tutorial 1. Routing a Loan

More information

Service-Oriented Computing and Service-Oriented Architecture

Service-Oriented Computing and Service-Oriented Architecture Service-Oriented Computing and Service-Oriented Architecture Week 3 Lecture 5 M. Ali Babar Lecture Outline Service-Oriented Computing (SOC) Service-Oriented Architecture (SOA) Designing service-based systems

More information

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as

More information

Secure Authentication and Session. State Management for Web Services

Secure Authentication and Session. State Management for Web Services Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively

More information

Web Application Development for the SOA Age Thinking in XML

Web Application Development for the SOA Age Thinking in XML Web Application Development for the SOA Age Thinking in XML Enterprise Web 2.0 >>> FAST White Paper August 2007 Abstract Whether you are building a complete SOA architecture or seeking to use SOA services

More information

JOHN KNEILING APRIL 3-5, 2006 APRIL 6-7, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

JOHN KNEILING APRIL 3-5, 2006 APRIL 6-7, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS JOHN KNEILING CREATING XML AND WEB SERVICES SOLUTIONS SECURING THE WEB SERVICES ENVIRONMENT APRIL 3-5, 2006 APRIL 6-7, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME

More information

An Oracle White Paper November 2009. Oracle Primavera P6 EPPM Integrations with Web Services and Events

An Oracle White Paper November 2009. Oracle Primavera P6 EPPM Integrations with Web Services and Events An Oracle White Paper November 2009 Oracle Primavera P6 EPPM Integrations with Web Services and Events 1 INTRODUCTION Primavera Web Services is an integration technology that extends P6 functionality and

More information

Business Process Management Enabled by SOA

Business Process Management Enabled by SOA Business Process Management Enabled by SOA Jyväskylä 8.5.2007 Kimmo Kaskikallio IT Architect IBM Software Brands Five middleware product lines designed to work together Service-Oriented Architecture (SOA)

More information

Platform Autonomous Custom Scalable Service using Service Oriented Cloud Computing Architecture

Platform Autonomous Custom Scalable Service using Service Oriented Cloud Computing Architecture Platform Autonomous Custom Scalable Service using Service Oriented Cloud Computing Architecture 1 B. Kamala 2 B. Priya 3 J. M. Nandhini - 1 AP-II, MCA Dept, Sri Sai Ram Engineering College, Chennai, kamala.mca@sairam.edu.in

More information

Secure Semantic Web Service Using SAML

Secure Semantic Web Service Using SAML Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA

More information

Introduction into Web Services (WS)

Introduction into Web Services (WS) (WS) Adomas Svirskas Agenda Background and the need for WS SOAP the first Internet-ready RPC Basic Web Services Advanced Web Services Case Studies The ebxml framework How do I use/develop Web Services?

More information

Web Services Implementation: The Beta Phase of EPA Network Nodes

Web Services Implementation: The Beta Phase of EPA Network Nodes Web Services Implementation: The Beta Phase of EPA Network Nodes Connie Dwyer and Chris Clark U.S. Environmental Protection Agency, 1200 Pennsylvania Avenue, N. W., Washington, D.C. dwyer.connie@epa.gov

More information

Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies

Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies 3-day seminar Give Your Business the Competitive Edge SOA has rapidly seized the momentum and center stage because

More information

Scientific versus Business Workflows

Scientific versus Business Workflows 2 Scientific versus Business Workflows Roger Barga and Dennis Gannon The formal concept of a workflow has existed in the business world for a long time. An entire industry of tools and technology devoted

More information

A Guide Through the BPM Maze

A Guide Through the BPM Maze A Guide Through the BPM Maze WHAT TO LOOK FOR IN A COMPLETE BPM SOLUTION With multiple vendors, evolving standards, and ever-changing requirements, it becomes difficult to recognize what meets your BPM

More information

Multi-agent System based Service Oriented Architecture for Supply Chain Management System (MAS-SOA-SCM)

Multi-agent System based Service Oriented Architecture for Supply Chain Management System (MAS-SOA-SCM) Volume 27 No.5, August 2011 Multi-agent System based Service Oriented Architecture for Supply Chain Management System (MAS-SOA-SCM) Dr. S. Srinivasan Professor PDM Engineering College Bhadurgarh 1245 Haryana,

More information

RFP for Documentation and Development of Governance Process for Services Oriented Architecture

RFP for Documentation and Development of Governance Process for Services Oriented Architecture RFP for Documentation and Development of Governance Process for Services Oriented Architecture Section I RFP Process Introduction The University of Texas M. D. Anderson Cancer Center (M. D. Anderson) in

More information

A Survey Study on Monitoring Service for Grid

A Survey Study on Monitoring Service for Grid A Survey Study on Monitoring Service for Grid Erkang You erkyou@indiana.edu ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide

More information

EVALUATING INTEGRATION SOFTWARE

EVALUATING INTEGRATION SOFTWARE ENSEMBLE WHITE PAPER EVALUATING INTEGRATION SOFTWARE INTRODUCTION We created this white paper to help senior IT leaders and business managers who are evaluating integration software. On the following pages

More information

A Service Oriented Security Reference Architecture

A Service Oriented Security Reference Architecture International Journal of Advanced Computer Science and Information Technology (IJACSIT) Vol. 1, No.1, October 2012, Page: 25-31, ISSN: 2296-1739 Helvetic Editions LTD, Switzerland www.elvedit.com A Service

More information

Government's Adoption of SOA and SOA Examples

Government's Adoption of SOA and SOA Examples Government's Adoption of SOA and SOA Examples Presented by : Ajay Budhraja, Chief of Enterprise Services ME (Engg), MS (Management), PMP, CICM, CSM, ECM (Master) AIIM, ITIL-F Copyright 2008 Ajay Budhraja

More information

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,

More information

Service-oriented architecture in e-commerce applications

Service-oriented architecture in e-commerce applications Service-oriented architecture in e-commerce applications What is a Service Oriented Architecture? Depends on who you ask Web Services A technical architecture An evolution of distributed computing and

More information

XML Signatures in an Enterprise Service Bus Environment

XML Signatures in an Enterprise Service Bus Environment XML Signatures in an Enterprise Bus Environment Eckehard Hermann Research & Development XML Integration Uhlandstraße 12 64297 Darmstadt, Germany Eckehard.Hermann@softwareag.com Dieter Kessler Research

More information

WebLogic Server 7.0 Single Sign-On: An Overview

WebLogic Server 7.0 Single Sign-On: An Overview WebLogic Server 7.0 Single Sign-On: An Overview Today, a growing number of applications are being made available over the Web. These applications are typically comprised of different components, each of

More information

SOA Blueprints Concepts

SOA Blueprints Concepts TECHNICAL SPECIFICATION Draft v0.5 (For Public Review) A move to drive industry standardization of SOA concepts and terminology http://www.middlewareresearch.com The Middleware Company Research Team Steve

More information

Electronic Health Network - Case Study Consent2Share Share with Confidence

Electronic Health Network - Case Study Consent2Share Share with Confidence Electronic Health Network - Case Study Consent2Share Share with Confidence Jan 2015 About Consent2Share Complying with privacy regulations in an electronic environment is a very complex process. The Consent2Share

More information

How To Understand A Services-Oriented Architecture

How To Understand A Services-Oriented Architecture Introduction to Service Oriented Architecture CSCI-5828 Foundations of Software Engineering Ming Lian March 2012 Executive Summary This Executive Summary gives the straight word to the fresh that have

More information

Interacting the Edutella/JXTA Peer-to-Peer Network with Web Services

Interacting the Edutella/JXTA Peer-to-Peer Network with Web Services Interacting the Edutella/JXTA Peer-to-Peer Network with Web Services Changtao Qu Learning Lab Lower Saxony University of Hannover Expo Plaza 1, D-30539, Hannover, Germany qu @learninglab.de Wolfgang Nejdl

More information

SOA REFERENCE ARCHITECTURE: WEB TIER

SOA REFERENCE ARCHITECTURE: WEB TIER SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible

More information

Applying SOA to OSS. for Telecommunications. IBM Software Group

Applying SOA to OSS. for Telecommunications. IBM Software Group IBM Software Group Applying SOA to OSS for Telecommunications Kevin Twardus Manager of Industry Architecture and Standards IBM Software Group Communications Sector IBM Corporation The Details of SOA depends

More information

Improve business agility with WebSphere Message Broker

Improve business agility with WebSphere Message Broker Improve business agility with Message Broker Enhance flexibility and connectivity while controlling costs and increasing customer satisfaction Highlights Leverage business insight by dynamically enriching

More information

Sentinet for BizTalk Server SENTINET

Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and APIs Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication

More information

A Service-oriented Architecture for Business Intelligence

A Service-oriented Architecture for Business Intelligence A Service-oriented Architecture for Business Intelligence Liya Wu 1, Gilad Barash 1, Claudio Bartolini 2 1 HP Software 2 HP Laboratories {name.surname@hp.com} Abstract Business intelligence is a business

More information

Definition of SOA. Capgemini University Technology Services School. 2006 Capgemini - All rights reserved November 2006 SOA for Software Architects/ 2

Definition of SOA. Capgemini University Technology Services School. 2006 Capgemini - All rights reserved November 2006 SOA for Software Architects/ 2 Gastcollege BPM Definition of SOA Services architecture is a specific approach of organizing the business and its IT support to reduce cost, deliver faster & better and leverage the value of IT. November

More information

Implementation Guide SAP NetWeaver Identity Management Identity Provider

Implementation Guide SAP NetWeaver Identity Management Identity Provider Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before

More information

Extending SOA Infrastructure for Semantic Interoperability

Extending SOA Infrastructure for Semantic Interoperability Extending SOA Infrastructure for Semantic Interoperability Wen Zhu wzhu@alionscience.com Sumeet Vij svij@alionscience.com 3rd Annual DoD SOA & Semantic Technology Symposium July 14, 2011 www.alionscience.com

More information

JOURNAL OF OBJECT TECHNOLOGY

JOURNAL OF OBJECT TECHNOLOGY JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2008 Vol. 7 No. 7, September-October 2008 Applications At Your Service Mahesh H. Dodani, IBM,

More information

Extending the Benefits of SOA beyond the Enterprise

Extending the Benefits of SOA beyond the Enterprise Extending the Benefits of SOA beyond the Enterprise 2 TABLE OF CONTENTS 1 SOA The Right Approach for Application Integration...3 2 SOA outside the Firewall: An Opportunity to Improve Collaboration...4

More information

Entitlements Access Management for Software Developers

Entitlements Access Management for Software Developers Entitlements Access Management for Software Developers Market Environment The use of fine grained entitlements and obligations control for access to sensitive information and services in software applications

More information

API Architecture. for the Data Interoperability at OSU initiative

API Architecture. for the Data Interoperability at OSU initiative API Architecture for the Data Interoperability at OSU initiative Introduction Principles and Standards OSU s current approach to data interoperability consists of low level access and custom data models

More information

Policy Driven Practices for SOA

Policy Driven Practices for SOA Independent Insight for Oriented Practice Policy Driven Practices for SOA Lawrence Wilkes CBDI Forum www.cbdiforum.com Agenda! Enterprise SOA Challenge! SOA Policy Areas! Layered Architecture as a basis

More information

2 (18) - SOFTWARE ARCHITECTURE Service Oriented Architecture - Sven Arne Andreasson - Computer Science and Engineering.

2 (18) - SOFTWARE ARCHITECTURE Service Oriented Architecture - Sven Arne Andreasson - Computer Science and Engineering. Service Oriented Architecture Definition (1) Definitions Services Organizational Impact SOA principles Web services A service-oriented architecture is essentially a collection of services. These services

More information

Service-Oriented Architecture (SOA) vs. Component Based Architecture. Helmut Petritsch

Service-Oriented Architecture (SOA) vs. Component Based Architecture. Helmut Petritsch Service-Oriented Architecture (SOA) vs. Component Based Architecture Helmut Petritsch Index Introduction... 3 Definitions... 3 Component-based architecture:... 3 Service-oriented architecture (SOA)...

More information

A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems

A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems Volume 1, Number 2, December 2014 JOURNAL OF COMPUTER SCIENCE AND SOFTWARE APPLICATION A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems Satish Kumar*,

More information

Service Oriented Architecture: A driving force for paperless healthcare system

Service Oriented Architecture: A driving force for paperless healthcare system 2012 International Conference on Computer Technology and Science (ICCTS 2012) IPCSIT vol. 47 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V47.16 Service Oriented Architecture: A driving

More information

Six Strategies for Building High Performance SOA Applications

Six Strategies for Building High Performance SOA Applications Six Strategies for Building High Performance SOA Applications Uwe Breitenbücher, Oliver Kopp, Frank Leymann, Michael Reiter, Dieter Roller, and Tobias Unger University of Stuttgart, Institute of Architecture

More information