Service-oriented architectures (SOA) and their application and usage in healthcare
|
|
- Brook Hudson
- 8 years ago
- Views:
Transcription
1 Service-oriented architectures (SOA) and their application and usage in healthcare I. Abstract: Herak Sen CSE300: Topics in Biomedical Informatics Healthcare in United States is a major concern.it is estimated that healthcare spending continues to increase tremendously with an estimate of over $2.7 trillion by 2010 [1]. The rising hospital costs, medical errors, lack of medical records in case of medical emergency are few of the causes that add greatly to the healthcare costs. On the other hand healthcare not only involves patients and providers, it spans public-private boundaries involving policy makers, legislators, providers, citizen who interact in complicated ways. Medical data are sensitive and bound by laws that makes healthcare an important concern for both government and private organization. It is obvious that technology can be used in solving many of these issues also no single organization can solve all these problems and therefore a collaborative approach is needed. Service Oriented Architecture is a natural answer for developing such systems where the present, legacy and future systems build by different organization can communicate with each other. This approach would give a fast and reliable health services to the consumer. II. Introduction and Motivation Healthcare systems are very complex that work in different environments, different models and implementations. Many of the systems have been developed around entities such as doctors, hospitals, insurance companies, researchers etc. All of them work in their own environment with minimal interaction. Also none of them want to share information, which sometimes may lead to the suffering of the consumer of the health service. Patients have to deal with several of these entities that might not have any similarity. Each has a different approach in controlling the information. The sensitive nature of the health information is very critical. If it is not protected well all of the health entities will be reluctant to use a widespread and connected health system. Some of the key facts and challenges [2] are that many people die in hospitals each year as the result of medical errors which makes its eight leading cause of death in the country. Many people also die because they did not receive appropriate healthcare and it has been found that adults receive 55% of the recommended healthcare [3]. Despite spending a lot on healthcare [4] it has been found that United States does not rank high in the quality of services provided compared to other countries. It also does not do well in reducing medical errors, overall rating of doctors. Another key problem was that a patient has to tell his/her medical information repeatedly to various health professionals. This leads to duplication of information, sometimes-conflicting information which also results in re doing the health tests. A study shows that one-third of the spending on healthcare by the country goes to care that is duplicative.
2 With Internet and advancement in affordable technologies, healthcare services can be effectively delivered to the patient that would enable the patients to maintain and improve their own health through better options and choices. In long term patients can be directly involved in deciding what the system should offer by series of feedbacks about the system. Adoption of computer systems could reduce errors and saving huge amount of money. Similarly standardized healthcare information exchange would deliver high national savings. There has been significant work in various independent areas of healthcare such EMR [5] an PHR [6], standards such as HL7 [7], tools like medication management tools, chronic disease tools, systems used at hospitals and devices such as used by diabetic patients. There is a need to connect all of them rather than creating one system that does it all such that all of them conform some basic principles and standards. This way information would not be stored in one place but can be aggregated by authorized users to provide various health services. There has been recommendation [2] for creation of a non-proprietary network of networks to support the rapid acceleration of electronic connectivity that will enable the flow of information to support patient care. Service oriented architecture fits perfectly in such a scenario. There can be a common framework at national level comprising of standards for various information exchange, security and authorizations, data integrity built upon service-oriented paradigm. Using such architecture would help integrating various systems and services in secure manner without jeopardizing patients and providers confidential data. III. Service Oriented Architecture As more and more organizations are implementing systems that are across different architectures, network and even between organization The challenge is to find a solution that is extendible, flexible and fits well with the existing legacy systems [8]. Replacing the legacy systems may be costly and introduces new development cycle increasing the chance of malfunctioning. As business models changes organization quickly need to adapt such changes into their computing infrastructure that might require the legacy systems change to support to the new business functions and integrate to the newly developed systems or integrate to the systems of its partners. The complexity of the whole thing is what makes it a constant challenge to organizations [8]. This kind of complex scenario can be effectively handled using Service Oriented Architecture. Definitions In [9] SOA is defined as The policies, practices, frameworks that enable application functionality to be provided and consumed as sets of services published at a granularity relevant to the service consumer. Services can be invoked, published and discovered, and are abstracted away from the implementation using a single, standards-based form of interface. Some earlier definitions include Applications must be developed as independent sets of interacting services offering well-defined interfaces to their potential
3 users. Similarly, supporting technology must be available to allow application developers to browse collections of services, select those of interest, and assemble them to create the desired functionality [10]. In [11] a service is described as A course-grained, discoverable software entity that exists as a single instance and interacts with applications and other services through a loosely coupled (often asynchronous), message-based communication model. Components of SOA [8,11,12] Service: The contract defined between one or more published interfaces exposing welldefined functionalities. There is a critical difference between public and published interfaces that is key to SOA. A public interface can be used by components within the system whereas the published interfaces are exposed through the network. In the former case the clients are known and in the later they are not known. Service provider: The software entity that implements a service specification. It is important to remember that services are just interfaces, they have no definition for the services therefore providers provide the implementation. There can be many implementations of a particular service. Its up to the clients which provider they choose. Clients: The software entity that requests the services. Typically they would choose a particular provider and call the appropriate service. Clients can be an end user application or another service. Service locator: A specific kind of service provider that acts as a registry and allows for the lookup of service provider interfaces and service locations. As mentioned earlier the clients should be able to find and choose services implemented by various providers therefore the service must have some identifiers associated with them so that they an be discovered. Service must be dynamically discovered and therefore their location should not be hard coded. Service Broker: A special service provider that can pass on service requests to one or more additional service providers. Fig 1. Components of SOA
4 These components allow the services to work and managed independently. Some of the management issues can be [13] the following. Security: Authorize requests, encrypt and decrypt data as required, and validate information. Deployment: Allow the service to be moved around the network to maximize performance or eliminate redundancy to provide optimum availability. Logging: Provide auditing and metering capabilities. Dynamic rerouting: Provide fail-over or load-balancing capabilities. Maintenance: Manage new versions of the service. Web Services Service oriented architecture can be implemented in various ways, one of the most popular implementation is as Web Service. The Web Services Architecture Working Group [14] describes it as A Web service is a software system identified by a URI, whose public interfaces and bindings are defined and described using XML. Its definition can be discovered by other software systems. These systems may then interact with the Web service in a manner prescribed by its definition, using XML based messages conveyed by Internet protocols. Fig 2. Web Services XML based In Web Services the services are defined using an XML based language called Web Service Descriptor Language [15,16]. It contains operations performed, message used, data types used and communication protocol used by the web service [17,18].
5 Web Services can use any transport protocol to invoke the services and get the results. The most popular is Simple Object Access Protocol (SOAP) [19]. W3C defines it as lightweight protocol intended for exchanging structured information in a decentralized, distributed environment. [20]. SOAP is widely used as its XML based and easily used over HTTP. Originally applications communicated using Remote Procedure Call (RPC), but HTTP is not designed to handle this. RPC also had security and compatibility problems also firewalls and proxy servers would block most of it. Using XML over HTTP provides much better way of communication for applications running on different operating systems and programming language. Since XML is text based SOAP becomes totally platform independent and extensible. The services can be discovered (service locator) using Universal Description, Discovery and Integration (UDDI). It is defined as platform-independent framework (XML) for describing and discovering services [21]. The registry services manages, provides information about services providers, implementation and metadata [22]. Performance and Reliability As web services are based on HTTP and SOAP, their performance and reliability will always be questioned. Can web services be used in enterprise systems? Isn t it too slow and unreliable? The answer will be same as for any distributed architecture systems. We cannot totally depend on HTTP for reliability and correct trade-offs and decisions should be made to support the systems and business requirements [11]. If performance is the key requirement then some portion of the system can be designed with fast RPC mechanism. For example if a service use some other services which are not exposed to clients then those internal services can use RPC communication. There other ways problems such as load on the server, the problems is discussed in [23]. There are various load balancing techniques that can be used. Apart from load balancing software of a machine can be configured to respond. Fault Tolerance Clusters, Wide Area Load Distribution, Replica Management are some other techniques to handle performance and reliability. Web services can also be made scalable making them asynchronous and using queues. Since there is a transport overhead as the services by design are remote it is important to reduce the response time. Making asynchronous services the clients can continue executing and the providers has chance to respond. This is very helpful where network costs are high and latency is unpredictable. Queues are also popular where services that expect very high load. The system is designed in such a way that there is special component that just listens to the requests and another component that services the request. The former one is known as the queue. Security Web services communicate via SOAP that is XML based hence it can be easily read. This poses a serious question how secure is web services? Can it be used for data which are confidential WS-Security tries to address this issue by introducing security at SOAP messaging provide quality of protection through message integrity, message
6 confidentiality, and single message authentication [26]. It provides mechanism for associating security tokens with messages. It supports multiple security tokens format to accommodate different kinds of authentication and authorization. It also describes how to encode Username Tokens, X.509 Tokens, SAML Tokens, REL Tokens and Kerberos Tokens as well as how to include opaque encrypted keys as a sample of different binary token types. Message integrity is provided using XML signatures which tries to ensure that messages originated from the correct and not modified on the network. In general the following points are the key points in web service security [24,25]. 1. Choosing between message layer security and transport layer security. 2. Choosing a client authentication technology, from basic direct authentication to more sophisticated brokered solutions, including X.509, Kerberos version 5 protocol, and STS solutions. 3. Protecting confidentiality of messages. 4. Detecting tampered messages. 5. Preventing the processing of replayed messages. 6. Accessing remote resources and flowing identity across tiers. 7. Preventing exceptions from revealing sensitive implementation details. 8. Protecting Web services from malformed or malicious messages. Some of the most common scenarios for web services and their security are very well described in [24]. 1. Public Web service: In this scenario transport layer security that is HTTPS and Username Token can be a good choice. 2. Intranet Web service: Here message layer security with the Kerberos [28] protocol can be used. 3. Internet business-to-business: In B2B Kerberos protocol can be used within organization and X.509 certificates between businesses. 4. Multiple Internet Web services: In this scenario a Security Token Service (STS)[27] may be used.
7 IV. Health care systems and role of SOA Achieving electronic connectivity in healthcare Connecting for health [29] a private public collaborative organization that studies various fields of health information technology. In [2] they outlined ways and means to connect health care systems. Few of the key recommendations were the following-: 1. Develop the health information infrastructure in a way that safeguards privacy, leverages both bottom up and top down strategies, is incremental in nature, and is based on a decentralized and federated model -- an interoperable, standards-based network of networks built on the Internet. The network should not contain a central repository for patient medical records. Instead, it should be a pathway that facilitates their identification and exchange, with appropriate authorization, in a private and secure way. 2. A Common Framework is needed immediately in order to pursue a decentralized strategy that builds out from a local and regionally driven approach to creating the infrastructure. Only by conforming to a Common Framework can we ensure that data exchange pilots, personal health records, and regional systems will be able to interoperate across and with other regional systems. The Common Framework is premised on secure transport over the Internet and provides minimal but basic components for the infrastructure including secure connectivity, reliable authentication, and a minimum suite of standards for information exchange. It is comprised of network software, common policies, documents and methodologies that can be shared in the public domain. 3. Public-private collaboration should fund. 4. Implement and use the data standards that have been proven. It also ensures interoperability. 5. Accurate Linking of Health records are very important as it may lead to prompt services. Also it is recommended that using a National Health ID for linking is not the correct solution. There is a risk of privacy because if leaked it can provide very sensitive information. Also it cannot be implemented in short period of time, as it would require an upgrade for all health systems that will be expensive. It is proposed that linking and sharing are made at the edges of the network. It would also allow providing additional linking requirement locally. The choice of what to link and what to disclose should be given to patients. It is clear from the above recommendations that connecting health care systems cannot be done in centralized way i.e. one cannot build a system that does all the work. It has to be system of systems. The only way to do is build many systems based on common standards. The standards should allow easy connection of these systems. Service oriented
8 architecture provides all the necessary features to connect systems and exchange data in secure and robust way. Connected Health Services- Microsoft In October 2006 Microsoft proposed a framework for connected health services [1]. The Connected Health Framework is an architectural approach following the Connecting for health [2] guidelines. The architecture proposes of an information system with common definitions both at technical and business level. This is essential as per [2] which argues that the systems must use common data standards. This architecture puts patient as the main entity and recommends transforming healthcare through productive, dependable and economic solutions that are connected by design. In the paper it has also been mentioned that lack of integration between services provided by various organizations also results in inefficient use of the services not only by other organization but also themselves also. Microsoft proposed that the systems cannot be developed using a national health ID, as it is too risky and can cause security issue. Instead the system should link at the edges of the network that can be established using authorization. The system should be federated based on data standards, interoperable, protects patient s privacy and is built incrementally without using a national health ID or a centralized database. By aggregating the above the system should be connected, information driven and work in collaborative environment. Architectural Description The 4 key features [1] of the architecture are: - 1. Service-orientation a modular approach that reduces dependencies between systems, using open standards and protocols to promote data application and interoperability. 2. Federated data given the local nature of healthcare delivery, data should reside as close as possible to where it s created and administered, caching information at different levels within the system (departmental, regional, national) to allow for different levels of service. 3. Federated security allowing easier management of identities and security credentials by delegating aspects of authentication and role assignment to trusted parties. 4. Trustworthiness reliable, fault tolerant systems.
9 Fig 3: A business pattern for healthcare As per [2] the above figure describes a typical healthcare business pattern. There are various processes all around which interact with each other. These processes should be secured. Also the processes may be running on different environment. The challenge is how to integrate them so that at the end the users get the best experience. Service Oriented Architecture provides an ideal solution for this scenario. Each of the above processes can be designed as services and uses standards for exchange at the edges. Notice even the security envelope can be a service. Web Services based in XML and SOAP provides the mean of achieving this interoperability and also supports the evolving business processes and changing business objectives. Another key advantage is that the existing or the legacy systems need not be discarded. They can be re-engineered in such a way that all of its functionality is preserved and used as services.
10 Fig 4: Architecture It is easy to see from the above figure that various parts of the systems are divided into services that have well defined edges and connection points. This way user and business processes that are more volatile can also be separated from the data and business component that are relatively stable via connected health service hub. The advantage of such architecture is that it does not dictate any one way of implementing and designing various healthcare systems. It provides guidelines how various systems can easily interact and get connected to other systems. Health Research Data Network (HRDN) The above architecture is a very high level view that can be applied in various medical domains. Similar features can be seen in [34] that describes a service oriented architecture for a health research data network (HRDN). Health Researchers constantly need data or their research and experiments. The data sets though exist but are difficult
11 to acquire due to their sensitive nature. There are data custodian organizations that keep such data and there are ethical and legislative requirements for accessing those for research purpose. The goal of HRDN is to minimize the time for researchers to access the data while supporting the complex organizational and ethical requirements that arising from research in inter-organizational and inter-jurisdictional data collection. It tries to support collaboration and re-use of knowledge among the HRDN participants. HRDN addresses the problem by proposing an architecture that consists of layers of services as follows: - 1. Preparing and Storing: This layer is responsible for preparing the data. As mentioned earlier that the data is stored with the data custodian organizations that have their own system and methods for preparing the data hence HRDN architecture does not enforce any way of doing that. The specific services are specific to organization. It may be noticed that the architecture proposed by Microsoft also allows business processes to be separate. The advantage is that the data custodians can use their existing systems to be a part of the HRDN, hence saving lot of money and resources and also their business rules inside their systems are preserved. They interface with HRDN via a set of services that connect to their legacy application and pass only the required data to HRDN. 2. Sharing: Sharing allows resources to be discovered and also access to multiple data sources and other services. There are various sub services within this such as:- a. Data Services that accepts a request for data as query and returns requested data as messages. The request may include may include temporary data storages by client and may include various parameters. The response may also contain some metadata such as timestamp and volume summary. The data service may invoke security, auditing and logging services. b. Orchestration Services manages multiple composite invocation of network resources i.e. it takes a series of scenarios or a workflow that involves invocation of various resources. In other words the workflow that is a graph of data dependent service invocations. It provides with asynchronous execution of the workflow and output the result and the execution trace. c. Planner and Transformation services are responsible for transformation of data as per various schemas. The requests are presented to the planner and the planner produces a workflow plan. d. Cache Manager is responsible for the persistent and safe data storage. It receives requests from clients for standard data creation, updating, deletion and retrieval. It ensures that the operations are compliant with the custodian requirements. The clients can only access data if they are authorized. e. Structure Registry keeps track of various data and transformation services in the network. 3. Using: These services provide the final response to the clients and also uses Disclosure Risk Estimator and Risk Mitigator services to ensure that the result
12 presented to the client do not disclose confidential information unless the client has the approval. a. Analytical Information Management service checks whether the given data fits for the request. It generates metadata relating to the quality of fitness. b. Exploratory Data Analysis service provides various statistical summaries and graphical forms. c. Surveillance Analysis service provides some specialist analysis functions appropriate for health surveillance. d. Statistical Model Building service provides statistical and decision making services. 4. Describing: These services provide metadata management. At various layers some metadata is always tracked such as in sharing layer the metadata can be the track of information flow. On the other hand in the preparing and storing layer metadata such as who created and stored the data, time etc can be stored. 5. Protecting: Protecting data is always the highest priority in any healthcare service and HRDN provides various services for that, though it assumes that the transport layers security is by SSL. a. Member Registration Services provides mean to authenticate users using membership definitions policy etc and responds with security token. b. Security Token Services generated security tokens and may form input for other services. c. Some other services Session Initiator that allows user to log on, Agreement Facilitator that validates whether request matches the custodian requirements etc are part of this layer. HRDN provides an excellent example of design using services in health care scenario. It proves that various aspects of such a complicated systems can easily be designed using services. It also provides in details what kind of services should be there in the given scenario that can be extended in other health care areas. HRDN can itself be tied to other similar systems using services. Example Usage as presented in the paper: Consider an epidemiologist, Emma, who is interested in studying the relationship between the post-operative survival times of colorectal cancer patients and their MYC gene amplification level. She first obtains membership through Member Registration service. She then applies to obtain data from data custodians and agrees to the terms and conditions for the usage using Agreement Facilitator service. She uses Exploratory Data Analysis services to understand the quality of the data. The service internally uses Disclosure Risk Estimator and Disclosure Risk Mitigator service that ensures the presented data does not reveal some confidential
13 information against the agreement. Finally she builds her workflow that is executed using Planner and Orchestration services. Modeling medical e-services In [30] the description of service oriented architecture becomes even more specific than the Microsoft Architecture and the HRDN that talked at the architecture level about services. It describes services implemented as Web Services. Specifically its shows how medical workflows can be modeled as web services. Though the general idea remains the same but here specific web service technologies are discussed for various layers. It highlights that there are various standards of communication such HL7 and DICOM[31] (Digital Imaging and Communication in Medicine) and defining medical workflows via IHE[31] framework but they work well in Intranet solution. But in current scenario there is need to break away from the Intranet to the Internet. The workflows and business logic can be spread across various organizations. Web services provides a feasible way to model, design and implement workflows. Features such SOAP for transportation WS-Security and WS-ReliabileMessaging for reliability and security and to model workflows BPEL(Business Process Execution Language)[33] can be used. Web Service workflow model can therefore provide medical e-services functionality in both intranet/internet environment. The paper outlines the following requirements for modeling e-service:- 1. HL7, DICOM encoding: Messages in IHE framework are based on HL7 and DICOM. The problem is how to transfer messages based on these standards using Web Services. One solution is converting the messages, which may be in binary format in XML. Another better solution is to attach the original messages to SOAP messages. WS-Attachment or SOAP messages with attachment (SwA) can be used to achieve them. More recently base64binary encoding as a standard for transferring binary data as it does not require additional protocol parsers. WS- Security can also be applied to binary data to provide message level security. 2. Web Service Transactions: Transaction protocols introduce the concept of transactions. HL7 and DICOM do not specify any transactional behavior. The application must take care of transaction and make sure that the same records are not inserted twice etc. WS-Transaction provides a standard for web service transaction. BPEL also compensation based transaction processing that allows undoing an action that has been successfully completed. 3. Security: As mentioned earlier security is very important in health care and medicine. As discussed earlier WS- security provides many of securing web services. There are other standards such as WS-Trust and WS- SecureConversation which can be used. With WS-SecureConversation web service providers specify security requirements and requestors provide claims that can be matched prior to security establishment. It also states which part of SOAP message have to be signed and encrypted to avoid message tampering.
14 4. Web service registration and binding: UDDI is standard for searching, registration and binding of web services. The registry provides services that implement specific IHE transaction. Outlining a modeling process Fig 5: Modeling process 4level use case model 1. First the 4 level UML use case diagram is defined for profiles, flows, transactions and messages used in the IHE framework. The profiles gives an overview of what an application performs. The profiles are split into various flows and are described as sequence diagrams in IHE framework. Each IHE flow is further defined using several IHE transactions. The transactions consist of one or more HL7 and DICOM messages used for communication. 2. The public workflow or the IHE transaction performed by an IHE actor is described using UML activity diagrams. The diagram can be derived from the sequence diagram.
Service Virtualization: Managing Change in a Service-Oriented Architecture
Service Virtualization: Managing Change in a Service-Oriented Architecture Abstract Load balancers, name servers (for example, Domain Name System [DNS]), and stock brokerage services are examples of virtual
More informationIntroduction to Service Oriented Architectures (SOA)
Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction
More informationService Oriented Architecture
Service Oriented Architecture Charlie Abela Department of Artificial Intelligence charlie.abela@um.edu.mt Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline
More informationPrinciples and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)
More informationService-Oriented Architectures
Architectures Computing & 2009-11-06 Architectures Computing & SERVICE-ORIENTED COMPUTING (SOC) A new computing paradigm revolving around the concept of software as a service Assumes that entire systems
More informationResearch on the Model of Enterprise Application Integration with Web Services
Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business
More informationModeling and Implementing Medical Web services
Modeling and Implementing Medical Web services Rainer Anzböck 1, Schahram Dustdar 2 1 D.A.T.A. Corporation, Invalidenstrasse 5-7/10, 1030 Wien, Austria ar@data.at 2 Distributed Systems Group, Information
More informationNIST s Guide to Secure Web Services
NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:
More informationGetting Started with Service- Oriented Architecture (SOA) Terminology
Getting Started with - Oriented Architecture (SOA) Terminology Grace Lewis September 2010 -Oriented Architecture (SOA) is a way of designing, developing, deploying, and managing systems it is neither a
More informationThe case for service oriented architecture in realising trusted, interoperable, pan-european egovernment services.
The case for service oriented architecture in realising trusted, interoperable, pan-european egovernment services. Stephen McGibbon Microsoft EMEA Tel. +445511490070 Email. stephenm@microsoft.com Abstract:
More informationAquaLogic Service Bus
AquaLogic Bus Wolfgang Weigend Principal Systems Engineer BEA Systems 1 What to consider when looking at ESB? Number of planned business access points Reuse across organization Reduced cost of ownership
More informationService Oriented Architecture (SOA) An Introduction
Oriented Architecture (SOA) An Introduction Application Evolution Time Oriented Applications Monolithic Applications Mainframe Client / Server Distributed Applications DCE/RPC CORBA DCOM EJB s Messages
More informationEmerging Technologies Shaping the Future of Data Warehouses & Business Intelligence
Emerging Technologies Shaping the Future of Data Warehouses & Business Intelligence Service Oriented Architecture SOA and Web Services John O Brien President and Executive Architect Zukeran Technologies
More informationA standards-based approach to application integration
A standards-based approach to application integration An introduction to IBM s WebSphere ESB product Jim MacNair Senior Consulting IT Specialist Macnair@us.ibm.com Copyright IBM Corporation 2005. All rights
More informationSoftware Requirement Specification Web Services Security
Software Requirement Specification Web Services Security Federation Manager 7.5 Version 0.3 (Draft) Please send comments to: dev@opensso.dev.java.net This document is subject to the following license:
More informationService-Oriented Architecture and its Implications for Software Life Cycle Activities
Service-Oriented Architecture and its Implications for Software Life Cycle Activities Grace A. Lewis Software Engineering Institute Integration of Software-Intensive Systems (ISIS) Initiative Agenda SOA:
More informationSecure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact
Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact Robert C. Broeckelmann Jr., Enterprise Middleware Architect Ryan Triplett, Middleware Security Architect Requirements
More informationPlatform Autonomous Custom Scalable Service using Service Oriented Cloud Computing Architecture
Platform Autonomous Custom Scalable Service using Service Oriented Cloud Computing Architecture 1 B. Kamala 2 B. Priya 3 J. M. Nandhini 1 2 3 ABSTRACT The global economic recession and the shrinking budget
More informationEnterprise Application Designs In Relation to ERP and SOA
Enterprise Application Designs In Relation to ERP and SOA DESIGNING ENTERPRICE APPLICATIONS HASITH D. YAGGAHAVITA 20 th MAY 2009 Table of Content 1 Introduction... 3 2 Patterns for Service Integration...
More informationMotivation Definitions EAI Architectures Elements Integration Technologies. Part I. EAI: Foundations, Concepts, and Architectures
Part I EAI: Foundations, Concepts, and Architectures 5 Example: Mail-order Company Mail order Company IS Invoicing Windows, standard software IS Order Processing Linux, C++, Oracle IS Accounts Receivable
More informationA Quick Introduction to SOA
Software Engineering Competence Center TUTORIAL A Quick Introduction to SOA Mahmoud Mohamed AbdAllah Senior R&D Engineer-SECC mmabdallah@itida.gov.eg Waseim Hashem Mahjoub Senior R&D Engineer-SECC Copyright
More informationUsing ESB and BPEL for evolving healthcare systems towards SOA
ehealth Beyond the Horizon Get IT There S.K. Andersen et al. (Eds.) IOS Press, 2008 2008 Organizing Committee of MIE 2008. All rights reserved. 747 Using ESB and BPEL for evolving healthcare systems towards
More informationWhat You Need to Know About Transitioning to SOA
What You Need to Know About Transitioning to SOA written by: David A. Kelly, ebizq Analyst What You Need to Know About Transitioning to SOA Organizations are increasingly turning to service-oriented architectures
More informationFederal Enterprise Architecture and Service-Oriented Architecture
Federal Enterprise Architecture and Service-Oriented Architecture Concepts and Synergies Melvin Greer Chief Strategist, SOA / Cloud Computing Certified Enterprise Architect Copyright August 19, 2010 2010
More informationService-Oriented Architecture and Software Engineering
-Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based
More informationService-Oriented Architecture: Analysis, the Keys to Success!
Service-Oriented Architecture: Analysis, the Keys to Success! Presented by: William F. Nazzaro CTO, Inc. bill@iconatg.com www.iconatg.com Introduction Service-Oriented Architecture is hot, but we seem
More informationThe Use of Service Oriented Architecture In Tax and Revenue
The Use of Service Oriented Architecture In Tax and Revenue Presented by: Bruce Baur & Adam Schaffer Revenue Solutions, Inc. Introduction Adam Schaffer Director, Revenue Administration Practice Line More
More informationSOA Planning Guide. 2015 The Value Enablement Group, LLC. All rights reserved.
SOA Planning Guide 1 Agenda q SOA Introduction q SOA Benefits q SOA Principles q SOA Framework q Governance q Measurement q Tools q Strategic (long term) View 2 Introduction to SOA q Service-oriented architecture
More informationTable of Contents. 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8
Table of Contents 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8 3 SOA in Verizon The IT Workbench Platform... 10 3.1 Technology... 10 3.2 Processes
More informationSOA GOVERNANCE MODEL
SOA GOVERNANCE MODEL Matjaz B. Juric University of Ljubljana, Slovenia matjaz.juric@fri.uni-lj.si Eva Zupancic University of Ljubljana, Slovenia Abstract: Service Oriented Architecture (SOA) has become
More informationMulti-Level Secure Architecture for Distributed Integrated Web Services
Multi-Level Secure Architecture for Distributed Integrated Web s J.G.R.Sathiaseelan Bishop Heber College (Autonomous) Tiruchirappalli 620 017, India jgrsathiaseelan@gmail.com S.Albert Rabara St Joseph
More informationIntroduction to WebSphere Process Server and WebSphere Enterprise Service Bus
Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 4.0.3 Unit objectives
More informationIntroduction to Service-Oriented Architecture for Business Analysts
Introduction to Service-Oriented Architecture for Business Analysts This course will provide each participant with a high-level comprehensive overview of the Service- Oriented Architecture (SOA), emphasizing
More informationCHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION Internet has revolutionized the world. There seems to be no limit to the imagination of how computers can be used to help mankind. Enterprises are typically comprised of hundreds
More informationSOA REFERENCE ARCHITECTURE
SOA REFERENCE ARCHITECTURE August 15, 2007 Prepared by Robert Woolley, Chief Technologist and Strategic Planner INTRODUCTION This document is a derivative work of current documentation and presentations
More informationLeveraging Service Oriented Architecture (SOA) to integrate Oracle Applications with SalesForce.com
Leveraging Service Oriented Architecture (SOA) to integrate Oracle Applications with SalesForce.com Presented by: Shashi Mamidibathula, CPIM, PMP Principal Pramaan Systems shashi.mamidi@pramaan.com www.pramaan.com
More informationHow service-oriented architecture (SOA) impacts your IT infrastructure
IBM Global Technology Services January 2008 How service-oriented architecture (SOA) impacts your IT infrastructure Satisfying the demands of dynamic business processes Page No.2 Contents 2 Introduction
More informationSOA REFERENCE ARCHITECTURE: SERVICE TIER
SOA REFERENCE ARCHITECTURE: SERVICE TIER SOA Blueprint A structured blog by Yogish Pai Service Tier The service tier is the primary enabler of the SOA and includes the components described in this section.
More informationDevelopers Integration Lab (DIL) System Architecture, Version 1.0
Developers Integration Lab (DIL) System Architecture, Version 1.0 11/13/2012 Document Change History Version Date Items Changed Since Previous Version Changed By 0.1 10/01/2011 Outline Laura Edens 0.2
More informationWEB SERVICES SECURITY
WEB SERVICES SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
More informationService Computing: Basics Monica Scannapieco
Service Computing: Basics Monica Scannapieco Generalities: Defining a Service Services are self-describing, open components that support rapid, low-cost composition of distributed applications. Since services
More informationACADEMIC RESEARCH INTEGRATION SYSTEM
ACADEMIC RESEARCH INTEGRATION SYSTEM Iulia SURUGIU 1 PhD Candidate, University of Economics, Bucharest, Romania E-mail: : iulia_surugiu2003@yahoo.com Manole VELICANU PhD, University Professor, Department
More informationService Oriented Architecture 1 COMPILED BY BJ
Service Oriented Architecture 1 COMPILED BY BJ CHAPTER 9 Service Oriented architecture(soa) Defining SOA. Business value of SOA SOA characteristics. Concept of a service, Enterprise Service Bus (ESB) SOA
More informationSOA for Healthcare: Promises and Pitfalls
SOA for Healthcare: Promises and Pitfalls Dennis B. Smith dbs@sei.cmu.edu SOA in Health Care Conference: Value in a Time of Change Chicago, IL USA June 3, 2009 Agenda Healthcare IT Challenges SOA: The
More informationClassic Grid Architecture
Peer-to to-peer Grids Classic Grid Architecture Resources Database Database Netsolve Collaboration Composition Content Access Computing Security Middle Tier Brokers Service Providers Middle Tier becomes
More informationAccelerate your SOA Projects through Service Simulation
Accelerate your SOA Projects through Service Simulation Overview Modern web services-based Service Oriented Architecture (SOA) enables service consumers and producers to exchange messages over ubiquitous
More informationWhite Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
More informationImproving Agility at PHMSA through Service-Oriented Architecture (SOA)
Leveraging People, Processes, and Technology Improving Agility at PHMSA through Service-Oriented Architecture (SOA) A White Paper Author: Rajesh Ramasubramanian, Program Manager 11 Canal Center Plaza,
More informationArchitectural Requirements for an SOA Based on Web Services. Jim Bole VP, Engineering Infravio, Inc. April 23, 2003
Architectural Requirements for an SOA Based on Web s Jim Bole VP, Engineering Infravio, Inc. April 23, 2003 Agenda! Web s is an integration technology! Web s role in an SOA! Unique Features and Challenges
More informationWeb Services Security with SOAP Security Proxies
Web Services Security with Security Proxies Gerald Brose, PhD Technical Product Manager Xtradyne Technologies AG OMG Web Services Workshop USA 22 April 2003, Philadelphia Web Services Security Risks! Exposure
More informationRun-time Service Oriented Architecture (SOA) V 0.1
Run-time Service Oriented Architecture (SOA) V 0.1 July 2005 Table of Contents 1.0 INTRODUCTION... 1 2.0 PRINCIPLES... 1 3.0 FERA REFERENCE ARCHITECTURE... 2 4.0 SOA RUN-TIME ARCHITECTURE...4 4.1 FEDERATES...
More informationLiterature Review Service Frameworks and Architectural Design Patterns in Web Development
Literature Review Service Frameworks and Architectural Design Patterns in Web Development Connor Patrick ptrcon001@myuct.ac.za Computer Science Honours University of Cape Town 15 May 2014 Abstract Organizing
More informationContents. 1010 Huntcliff, Suite 1350, Atlanta, Georgia, 30350, USA http://www.nevatech.com
Sentinet Overview Contents Overview... 3 Architecture... 3 Technology Stack... 4 Features Summary... 6 Repository... 6 Runtime Management... 6 Services Virtualization and Mediation... 9 Communication and
More informationOracle Service Bus Examples and Tutorials
March 2011 Contents 1 Oracle Service Bus Examples... 2 2 Introduction to the Oracle Service Bus Tutorials... 5 3 Getting Started with the Oracle Service Bus Tutorials... 12 4 Tutorial 1. Routing a Loan
More informationService-Oriented Computing and Service-Oriented Architecture
Service-Oriented Computing and Service-Oriented Architecture Week 3 Lecture 5 M. Ali Babar Lecture Outline Service-Oriented Computing (SOC) Service-Oriented Architecture (SOA) Designing service-based systems
More informationCA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as
More informationSecure Authentication and Session. State Management for Web Services
Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively
More informationWeb Application Development for the SOA Age Thinking in XML
Web Application Development for the SOA Age Thinking in XML Enterprise Web 2.0 >>> FAST White Paper August 2007 Abstract Whether you are building a complete SOA architecture or seeking to use SOA services
More informationJOHN KNEILING APRIL 3-5, 2006 APRIL 6-7, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
TECHNOLOGY TRANSFER PRESENTS JOHN KNEILING CREATING XML AND WEB SERVICES SOLUTIONS SECURING THE WEB SERVICES ENVIRONMENT APRIL 3-5, 2006 APRIL 6-7, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME
More informationAn Oracle White Paper November 2009. Oracle Primavera P6 EPPM Integrations with Web Services and Events
An Oracle White Paper November 2009 Oracle Primavera P6 EPPM Integrations with Web Services and Events 1 INTRODUCTION Primavera Web Services is an integration technology that extends P6 functionality and
More informationBusiness Process Management Enabled by SOA
Business Process Management Enabled by SOA Jyväskylä 8.5.2007 Kimmo Kaskikallio IT Architect IBM Software Brands Five middleware product lines designed to work together Service-Oriented Architecture (SOA)
More informationPlatform Autonomous Custom Scalable Service using Service Oriented Cloud Computing Architecture
Platform Autonomous Custom Scalable Service using Service Oriented Cloud Computing Architecture 1 B. Kamala 2 B. Priya 3 J. M. Nandhini - 1 AP-II, MCA Dept, Sri Sai Ram Engineering College, Chennai, kamala.mca@sairam.edu.in
More informationSecure Semantic Web Service Using SAML
Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA
More informationIntroduction into Web Services (WS)
(WS) Adomas Svirskas Agenda Background and the need for WS SOAP the first Internet-ready RPC Basic Web Services Advanced Web Services Case Studies The ebxml framework How do I use/develop Web Services?
More informationWeb Services Implementation: The Beta Phase of EPA Network Nodes
Web Services Implementation: The Beta Phase of EPA Network Nodes Connie Dwyer and Chris Clark U.S. Environmental Protection Agency, 1200 Pennsylvania Avenue, N. W., Washington, D.C. dwyer.connie@epa.gov
More informationService Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies
Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies 3-day seminar Give Your Business the Competitive Edge SOA has rapidly seized the momentum and center stage because
More informationScientific versus Business Workflows
2 Scientific versus Business Workflows Roger Barga and Dennis Gannon The formal concept of a workflow has existed in the business world for a long time. An entire industry of tools and technology devoted
More informationA Guide Through the BPM Maze
A Guide Through the BPM Maze WHAT TO LOOK FOR IN A COMPLETE BPM SOLUTION With multiple vendors, evolving standards, and ever-changing requirements, it becomes difficult to recognize what meets your BPM
More informationMulti-agent System based Service Oriented Architecture for Supply Chain Management System (MAS-SOA-SCM)
Volume 27 No.5, August 2011 Multi-agent System based Service Oriented Architecture for Supply Chain Management System (MAS-SOA-SCM) Dr. S. Srinivasan Professor PDM Engineering College Bhadurgarh 1245 Haryana,
More informationRFP for Documentation and Development of Governance Process for Services Oriented Architecture
RFP for Documentation and Development of Governance Process for Services Oriented Architecture Section I RFP Process Introduction The University of Texas M. D. Anderson Cancer Center (M. D. Anderson) in
More informationA Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You erkyou@indiana.edu ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
More informationEVALUATING INTEGRATION SOFTWARE
ENSEMBLE WHITE PAPER EVALUATING INTEGRATION SOFTWARE INTRODUCTION We created this white paper to help senior IT leaders and business managers who are evaluating integration software. On the following pages
More informationA Service Oriented Security Reference Architecture
International Journal of Advanced Computer Science and Information Technology (IJACSIT) Vol. 1, No.1, October 2012, Page: 25-31, ISSN: 2296-1739 Helvetic Editions LTD, Switzerland www.elvedit.com A Service
More informationGovernment's Adoption of SOA and SOA Examples
Government's Adoption of SOA and SOA Examples Presented by : Ajay Budhraja, Chief of Enterprise Services ME (Engg), MS (Management), PMP, CICM, CSM, ECM (Master) AIIM, ITIL-F Copyright 2008 Ajay Budhraja
More informationAn Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
More informationService-oriented architecture in e-commerce applications
Service-oriented architecture in e-commerce applications What is a Service Oriented Architecture? Depends on who you ask Web Services A technical architecture An evolution of distributed computing and
More informationXML Signatures in an Enterprise Service Bus Environment
XML Signatures in an Enterprise Bus Environment Eckehard Hermann Research & Development XML Integration Uhlandstraße 12 64297 Darmstadt, Germany Eckehard.Hermann@softwareag.com Dieter Kessler Research
More informationWebLogic Server 7.0 Single Sign-On: An Overview
WebLogic Server 7.0 Single Sign-On: An Overview Today, a growing number of applications are being made available over the Web. These applications are typically comprised of different components, each of
More informationSOA Blueprints Concepts
TECHNICAL SPECIFICATION Draft v0.5 (For Public Review) A move to drive industry standardization of SOA concepts and terminology http://www.middlewareresearch.com The Middleware Company Research Team Steve
More informationElectronic Health Network - Case Study Consent2Share Share with Confidence
Electronic Health Network - Case Study Consent2Share Share with Confidence Jan 2015 About Consent2Share Complying with privacy regulations in an electronic environment is a very complex process. The Consent2Share
More informationHow To Understand A Services-Oriented Architecture
Introduction to Service Oriented Architecture CSCI-5828 Foundations of Software Engineering Ming Lian March 2012 Executive Summary This Executive Summary gives the straight word to the fresh that have
More informationInteracting the Edutella/JXTA Peer-to-Peer Network with Web Services
Interacting the Edutella/JXTA Peer-to-Peer Network with Web Services Changtao Qu Learning Lab Lower Saxony University of Hannover Expo Plaza 1, D-30539, Hannover, Germany qu @learninglab.de Wolfgang Nejdl
More informationSOA REFERENCE ARCHITECTURE: WEB TIER
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
More informationApplying SOA to OSS. for Telecommunications. IBM Software Group
IBM Software Group Applying SOA to OSS for Telecommunications Kevin Twardus Manager of Industry Architecture and Standards IBM Software Group Communications Sector IBM Corporation The Details of SOA depends
More informationImprove business agility with WebSphere Message Broker
Improve business agility with Message Broker Enhance flexibility and connectivity while controlling costs and increasing customer satisfaction Highlights Leverage business insight by dynamically enriching
More informationSentinet for BizTalk Server SENTINET
Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and APIs Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication
More informationA Service-oriented Architecture for Business Intelligence
A Service-oriented Architecture for Business Intelligence Liya Wu 1, Gilad Barash 1, Claudio Bartolini 2 1 HP Software 2 HP Laboratories {name.surname@hp.com} Abstract Business intelligence is a business
More informationDefinition of SOA. Capgemini University Technology Services School. 2006 Capgemini - All rights reserved November 2006 SOA for Software Architects/ 2
Gastcollege BPM Definition of SOA Services architecture is a specific approach of organizing the business and its IT support to reduce cost, deliver faster & better and leverage the value of IT. November
More informationImplementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
More informationExtending SOA Infrastructure for Semantic Interoperability
Extending SOA Infrastructure for Semantic Interoperability Wen Zhu wzhu@alionscience.com Sumeet Vij svij@alionscience.com 3rd Annual DoD SOA & Semantic Technology Symposium July 14, 2011 www.alionscience.com
More informationJOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2008 Vol. 7 No. 7, September-October 2008 Applications At Your Service Mahesh H. Dodani, IBM,
More informationExtending the Benefits of SOA beyond the Enterprise
Extending the Benefits of SOA beyond the Enterprise 2 TABLE OF CONTENTS 1 SOA The Right Approach for Application Integration...3 2 SOA outside the Firewall: An Opportunity to Improve Collaboration...4
More informationEntitlements Access Management for Software Developers
Entitlements Access Management for Software Developers Market Environment The use of fine grained entitlements and obligations control for access to sensitive information and services in software applications
More informationAPI Architecture. for the Data Interoperability at OSU initiative
API Architecture for the Data Interoperability at OSU initiative Introduction Principles and Standards OSU s current approach to data interoperability consists of low level access and custom data models
More informationPolicy Driven Practices for SOA
Independent Insight for Oriented Practice Policy Driven Practices for SOA Lawrence Wilkes CBDI Forum www.cbdiforum.com Agenda! Enterprise SOA Challenge! SOA Policy Areas! Layered Architecture as a basis
More information2 (18) - SOFTWARE ARCHITECTURE Service Oriented Architecture - Sven Arne Andreasson - Computer Science and Engineering.
Service Oriented Architecture Definition (1) Definitions Services Organizational Impact SOA principles Web services A service-oriented architecture is essentially a collection of services. These services
More informationService-Oriented Architecture (SOA) vs. Component Based Architecture. Helmut Petritsch
Service-Oriented Architecture (SOA) vs. Component Based Architecture Helmut Petritsch Index Introduction... 3 Definitions... 3 Component-based architecture:... 3 Service-oriented architecture (SOA)...
More informationA Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems
Volume 1, Number 2, December 2014 JOURNAL OF COMPUTER SCIENCE AND SOFTWARE APPLICATION A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems Satish Kumar*,
More informationService Oriented Architecture: A driving force for paperless healthcare system
2012 International Conference on Computer Technology and Science (ICCTS 2012) IPCSIT vol. 47 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V47.16 Service Oriented Architecture: A driving
More informationSix Strategies for Building High Performance SOA Applications
Six Strategies for Building High Performance SOA Applications Uwe Breitenbücher, Oliver Kopp, Frank Leymann, Michael Reiter, Dieter Roller, and Tobias Unger University of Stuttgart, Institute of Architecture
More information