JOHN KNEILING MAY 19-21, 2008 MAY 22-23, 2008 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME (ITALY)

Size: px
Start display at page:

Download "JOHN KNEILING MAY 19-21, 2008 MAY 22-23, 2008 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME (ITALY)"

Transcription

1 TECHNOLOGY TRANSFER PRESENTS JOHN KNEILING WEB SERVICES AND XML Tools, Technologies, and Architectures SECURITY IN THE WEB SERVICES/XML ENVIRONMENT MAY 19-21, 2008 MAY 22-23, 2008 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME (ITALY) info@technologytransfer.it

2 WEB SERVICES AND XML ABOUT THIS SEMINAR Web Services and XML are the technologies of choice for mainstream applications across virtually every major industry today. The standards and specifications for this technology are defined by W3C, Oasis, and other groups, as well as the vendors themselves, who support.net, Java, and other implementations. This seminar guides delegates through these architectural approaches, and examines tools and products that support the development of Web Services and XML applications and frameworks, including XML vocabularies, design, and organization, Web Services and XML implementation of a Service-Oriented Architecture (SOA),.NET and Java application servers, object-relational-xml mapping, XML databases, and XML Middleware. The course emphasizes Best-Practices in Web Services and XML development. YOU WILL LEARN TO Apply Service-Oriented Architecture to Web Services and XML Applications Develop applications to Web Services specifications Design a Web Services Application Develop an XML schema to support Business requirements Identify organizations that support and develop XML industry standards Choose an Application Server that conforms to Web Services and XML Standards Understand the strengths and weakness of.net and Java implementations Integrate.NET and Java applications using Web Services Choose an XML DMBS product Develop an XML database Query an XML database Integrate data and applications using XML Middleware Map XML, Relational, and Object-Oriented databases Implement and understand Web Services and XML Best Practices WHO SHOULD ATTEND Information Professionals responsible for Business Intelligence Frameworks IT Professionals who will design or develop Web Services and XML applications Professionals who will create or maintain the Web Services infrastructure or integrate it into the Enterprise Architects who will choose and/or integrate Web Service products, tools, or on-line services

3 SECURITY IN THE WEB SERVICES/XML ENVIRONMENT ABOUT THIS SEMINAR The unique characteristics of Web Services applications pose a significant challenge to the security of Web Services and XML applications and environments. In this seminar, delegates examine the various Web Services security schemes being designed and implemented by the industry and in the Business community, where security is always a top priority. Specific tools are examined so that delegates can integrate them into new and existing environments. This seminar explains how to implement secure Web Services and includes coverage of trust, confidentiality, cryptography, authentication, authorization, and Kerberos. You will also find details on Security Assertion Markup Language (SAML), XML Key Management Specification (XKMS), XML Encryption, Hypertext Transfer Protocol-Reliability (HTTP-R) and more. It provides delegates with up-to-the-minute information on tools, standards, vendor initiatives, and hands-on solutions to understanding and implementing secure Web Services. Practical examples are used throughout the seminar to present real-world solutions to Web security issues. YOU WILL LEARN HOW TO Develop security goals and requirements Determine security roles and responsibilities Manage risk Provide cryptography, authentication, and authorization Identify Web Services security limitations Create and use public key certificates Manage digital signatures Specify SAML, XACML, WS-Security, and other standards Secure eportal and ebusiness data Secure.NET, J2EE, and other infrastructures and apps Administer Web Services security Plan and build secure Web Services architectures WHO SHOULD ATTEND Software Architects who need to plan and design secure Web Services systems Developers who will build secure.net and EJB Web Services applications, pass and delegate credentials across applications and control the delegation of those credentials Security Planners and Developers who will create Web Services security strategies and implement XML Web Services security code

4 WEB SERVICES AND XML OUTLINE 1. XML Technology XML Principles and Architecture DTD: Document Type Definition XSD: XML Schema Definition Language XSLT: Extensible Stylesheet Language Transformations XQuery: XML Query Language XML 2. Basic Web Services Technology Web Services and SOA (Service-Oriented Architecture) WSDL: Web Services Description Language SOAP: Simple Object Access Protocol UDDI: Universal Description, Discovery, and Integration Basic Web Services Tools and Products 3. Advanced Web Services Technology Advanced Web Services Specifications and Applications WS-Coordination and WS-Transaction BPEL4WS: Business Process Execution Language for Web Services Web Services Security Standards and Implementations Reliable Messaging and Large Payload Transport Organizing Web Services with WS-Policy Advanced Technology Tools and Products 4. Developing XML Applications Integrating and Representing XML Documents Validating XML Data Administering XML Schemas Transforming XML Documents XML Data Query Approaches and Strategies XML Development and Integration 5. Developing Web Services Applications Utility, Business, and Controller Service Models Modeling Component Classes and Web Service Interfaces Web Services-Oriented Encapsulation Integrating Mixed Granularity Service Compositions Improving Web Services Functionality Integrating SOAP Messaging Web Services Development 6. Developing and Integrating XML and Databases XML and Relational Database Differences Integrating XML and Relational Databases Mapping XML to Relational Extending SQL to XML XML Native Databases Data that Support XML 7. Application Integration Strategies Application Integration Basics Levels of Integration Types of Integration Middleware Products Selecting and Defining an Integration Path How to Select Middleware Tools and Products 8. Integrating Legacy Applications with Web Services Application Integration Service Models Web Services Integration Components One-way Web Services Integration Point-to-point Integration with Web Services Controlling Data Access with Web Services Adapting Legacy Architectures to Web Services Legacy Application Integration 9. Web Services Enterprise Integration Enterprise Integration Architecture Service Models and Components Web Services Enterprise Integration Architecture Streamlining Integration Endpoint Interfaces Optimizing Endpoint Services Integrating Legacy Architectures Integrating Web Services Security Choosing Frameworks, Tools, and Products 10. XML Best Practices Planning XML Projects XML Knowledge Management Standardizing XML Applications Designing XML Applications Testing XML Applications XML Testing and Management 11. Web Services Best Practices Planning Web Services Projects Standardizing Web Services Designing Web Services Environments Managing Web Services Projects Implementing Web Services Testing Web Services Applications XML Testing and Management 12. Building a Service-Oriented Enterprise (SOE) SOE Activities, Services, and Processes SOE Business Modeling SOE Technology Architecture Supporting SOE with Web Services and XML Applying the XWIF Layered Scope Model (LSM) Product and Tools Support for the XWIF LSM

5 SECURITY IN THE WEB SERVICES/XML ENVIRONMENT OUTLINE 1. Web Services Security Overview Information Security Goals Security Responsibilities Managing Risk Cryptography Authorization 2. Application Security Example Walk-Through Business Requirements The Example Application Security Requirements Security Features Security Limitations 3. XML and Web Services (WS) Security Facilities Public Key Encryption and Digital Signatures Public Key Certificate Format and Infrastructure XML Encryption and Signature WS-Security Functionality and Structure WS-Security Facility Example 4. Security Assertion Markup Language (SAML) SAML Concepts and Functionality SAML Assertions and Statements SAML Protocols Single Sign-on Privacy and Trust Issues SAML, XACML, and WS-Security 5. Primary Principles: Requirements and Options Authenticating eportal and ebusiness Data Protection Protecting ebusiness Data Authorization Authorizing ebusiness Transactions 6. Implementing Web Services Infrastructure Security Basic Distributed Security Implementation Legacy CORBA and COM.NET J2EE 7..NET Web Services Security IP Security Facilities Creating Microsoft Technology Web Services ASP.NET Web Services Security Data Protection Access Control Audit 8. Java Web Services Security Traditional versus Web Services Java Security Data Protection Access Control Using SAML with Java Application Servers and JSR Compatibility Example JWASP and JWSDP Applications 9. Web Services Security Technology Interoperability Security Interoperability Issues Layered Security Perimeter Security Tiered Security Propagating Authentication and Authorization Maintaining Security Context Web Services Delegation Internet versus Intranet versus Extranet Example Application Walk- Through 10. Administration in the Web Services Environment Using Security Attributes Role-Based Access Control Delegation Audit, Authentication, and Data Protection Administration Formulating the Security Policy Integrating Web Services Development and Security Administration 11. Planning, Designing, and Building Secure Web Services Architecture Security Challenges and Evolution Security Architecture and Policy Principles Functional and Nonfunctional Requirements eportal and ebusiness Requirements Deploying Security Using a Security Policy Server Scaling and Performance Issues

6 INFORMATION PARTICIPATION FEE Web Sevices and XML: Tools, Technologies, and Architectures 1500 Securing in the Web Services/XML Environment 1200 Special price for the delegates who attend both seminars 2500 The fee includes all seminar documentation, luncheon and coffee breaks. VENUE Visconti Palace Hotel Via Federico Cesi, 37 Rome (Italy) SEMINAR TIMETABLE 9.30 am pm 2.00 pm pm HOW TO REGISTER You must send the registration form with the receipt of the payment to: TECHNOLOGY TRANSFER S.r.l. Piazza Cavour, Rome (Italy) Fax within May 5, 2008 PAYMENT Wire transfer to: Technology Transfer S.r.l. Banca Intesa Sanpaolo S.p.A. Agenzia 4815 di Roma Iban Code: IT 34 Y GENERAL CONDITIONS If anyone registered to participate is unable to attend, a substitute may participate in their place. A full refund is given for any cancellation received more than 15 days before the seminar starts. Cancellations less than 15 days prior the event are liable for 50% of the fee. Cancellations less than one week prior to the event are liable for the full fees as invoiced. In case of cancellation of the seminar, Technology Transfer s responsibility only applies to the refund of the participation fees which have already been forwarded. JOHN KNEILING WEB SEVICES AND XML: TOOLS, TECHNOLOGIES, AND ARCHITECTURES Rome May 19-21, 2008 Visconti Palace Hotel - Via Federico Cesi, 37 Registration fee: 1500 SECURING IN THE WEB SERVICES/XML ENVIRONMENT Rome May 22-23, 2008 Visconti Palace Hotel - Via Federico Cesi, 37 Registration fee: 1200 first name... surname... job title... organisation... address... postcode... city... Stamp and signature BOTH SEMINARS Special price for the delegates who attend both seminars: 2500 If anyone registered is unable to attend, or in case of cancellation of the seminar, the general conditions mentioned before are applicable. country... telephone... fax Send your registration form with the receipt of the payment to: Technology Transfer S.r.l. Piazza Cavour, Rome (Italy) Tel Fax info@technologytransfer.it

7 SPEAKER John Kneiling is Principal Advisor at The TechPar Group. His clients at TechPar include Cognos, Ascential Software, The Federal Reserve Bank and NATO. Prior to joining TPG, Mr. Kneiling was a Director of WebEAI, where he created the XML and Web Services strategy for Bristol-Myers Squibb s Global Strategic Sourcing Group. He was formerly Vice President of Information Architecture at MetLife, a Fortune 500 Financial Services Company, where he was responsible for information flow throughout the company, its affiliates, customers, suppliers and partners, using B2B e-commerce, XML strategies and Web-Enterprise application integration. Prior to joining MetLife, he was with International Systems Group, DataBase Associates, Codd & Date, Price Waterhouse, Citibank, The Bank of New York and Con Edison. Mr. Kneiling has participated as a speaker in numerous user and professional groups, has authored a number of books and articles on computer technology.

JOHN KNEILING APRIL 3-5, 2006 APRIL 6-7, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

JOHN KNEILING APRIL 3-5, 2006 APRIL 6-7, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS JOHN KNEILING CREATING XML AND WEB SERVICES SOLUTIONS SECURING THE WEB SERVICES ENVIRONMENT APRIL 3-5, 2006 APRIL 6-7, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME

More information

MAX DOLGICER EAI (ENTERPRISE APPLICATION INTEGRATION) OCTOBER 11-13, 2006 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME (ITALY)

MAX DOLGICER EAI (ENTERPRISE APPLICATION INTEGRATION) OCTOBER 11-13, 2006 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER EAI (ENTERPRISE APPLICATION INTEGRATION) Architectures, Technologies and Best Practices OCTOBER 11-13, 2006 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME

More information

TECHNOLOGY TRANSFER PRESENTS MARK BUSINESS INTELLIGENCE ESTENDING BI TO SUPPORT ONLINE MARKETING AND CUSTOMER ANALYSIS

TECHNOLOGY TRANSFER PRESENTS MARK BUSINESS INTELLIGENCE ESTENDING BI TO SUPPORT ONLINE MARKETING AND CUSTOMER ANALYSIS TECHNOLOGY TRANSFER PRESENTS MARK MADSEN SOCIAL MEDIA, WEB ANALYTICS AND BUSINESS INTELLIGENCE ESTENDING BI TO SUPPORT ONLINE MARKETING AND CUSTOMER ANALYSIS ROME MAY 12-13, 2011 VISCONTI PALACE HOTEL

More information

MAX DOLGICER THE INTERNET OF THINGS NAVIGATING THE FUTURE OF INFORMATION TECHNOLOGY

MAX DOLGICER THE INTERNET OF THINGS NAVIGATING THE FUTURE OF INFORMATION TECHNOLOGY LA TECHNOLOGY TRANSFER PRESENTS PRESENTA MAX DOLGICER THE INTERNET OF THINGS NAVIGATING THE FUTURE OF INFORMATION TECHNOLOGY DECEMBER 14-15, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

More information

TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER THE NEW INTEGRATION MANIFESTO APPLICATIONS, DATA, CLOUD, MOBILE, AND THE INTERNET OF THINGS

TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER THE NEW INTEGRATION MANIFESTO APPLICATIONS, DATA, CLOUD, MOBILE, AND THE INTERNET OF THINGS TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER THE NEW INTEGRATION MANIFESTO APPLICATIONS, DATA, CLOUD, MOBILE, AND THE INTERNET OF THINGS DECEMBER 10-11, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME

More information

TECHNOLOGY TRANSFER PRESENTS KEN VAN WYK JUNE 8-9, 2015 JUNE 10-11, 2015 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME (ITALY)

TECHNOLOGY TRANSFER PRESENTS KEN VAN WYK JUNE 8-9, 2015 JUNE 10-11, 2015 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS KEN VAN WYK BREAKING AND FIXING WEB APPLICATIONS SECURITY PENETRATION TESTING IOS APPS JUNE 8-9, 2015 JUNE 10-11, 2015 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME (ITALY)

More information

TECHNOLOGY TRANSFER PRESENTS JOHN O BRIEN MODERN DATA PLATFORMS APRIL 14-15 2014 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

TECHNOLOGY TRANSFER PRESENTS JOHN O BRIEN MODERN DATA PLATFORMS APRIL 14-15 2014 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS JOHN O BRIEN MODERN DATA PLATFORMS APRIL 14-15 2014 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it www.technologytransfer.it MODERN DATA

More information

KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS KEN VAN WYK Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it www.technologytransfer.it

More information

TECHNOLOGY TRANSFER PRESENTS MAX. From EAI to SOA ACHIEVING BUSINESS AGILITY THROUGH INTEGRATION

TECHNOLOGY TRANSFER PRESENTS MAX. From EAI to SOA ACHIEVING BUSINESS AGILITY THROUGH INTEGRATION TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER From EAI to SOA to Cloud Integration ACHIEVING BUSINESS AGILITY THROUGH INTEGRATION DECEMBER 12-14, 2011 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

More information

TECHNOLOGY TRANSFER PRESENTS JEN UNDERWOOD ADVANCED WORKSHOP MAY 6, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

TECHNOLOGY TRANSFER PRESENTS JEN UNDERWOOD ADVANCED WORKSHOP MAY 6, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS JEN UNDERWOOD ADVANCED ANALYTICS WORKSHOP MAY 6, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it www.technologytransfer.it ADVANCED

More information

MIKE FERGUSON ENTERPRISE SERVICE ORIENTED APRIL 14-15, 2008 APRIL 16-17, 2008 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

MIKE FERGUSON ENTERPRISE SERVICE ORIENTED APRIL 14-15, 2008 APRIL 16-17, 2008 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON ENTERPRISE SERVICE ORIENTED ARCHITECTURE AND INTEGRATION ENTERPRISE DATA INTEGRATION AND MASTER DATA MANAGEMENT APRIL 14-15, 2008 APRIL 16-17, 2008 RESIDENZA

More information

MICHAEL SCHMITZ NOVEMBER 20-22, 2006 NOVEMBER 23-24, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

MICHAEL SCHMITZ NOVEMBER 20-22, 2006 NOVEMBER 23-24, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS MICHAEL SCHMITZ DATA WAREHOUSING Advanced Design and Implementation Issues ETL FOR THE DATA WAREHOUSE A Template-Driven Approach NOVEMBER 20-22, 2006 NOVEMBER 23-24, 2006 RESIDENZA

More information

TECHNOLOGY TRANSFER PRESENTS OCTOBER 16 2012 OCTOBER 17 2012 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

TECHNOLOGY TRANSFER PRESENTS OCTOBER 16 2012 OCTOBER 17 2012 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS RICK VAN DER LANS Data Virtualization for Agile Business Intelligence Systems New Database Technology for Data Warehousing OCTOBER 16 2012 OCTOBER 17 2012 RESIDENZA DI RIPETTA

More information

TECHNOLOGY TRANSFER PRESENTS MIKE MARCH 22-23, 2010 MARCH 24-25, 2010 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

TECHNOLOGY TRANSFER PRESENTS MIKE MARCH 22-23, 2010 MARCH 24-25, 2010 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON ENTERPRISE BUSINESS INTEGRATION USING BUSINESS INTELLIGENCE, BAM AND EVENT PROCESSING FOR BUSINESS OPTIMIZATION MARCH 22-23, 2010 MARCH 24-25, 2010 RESIDENZA

More information

TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER IT S ALL ABOUT CLOUD CONCEPTS, STRATEGIES, ARCHITECTURES, PLAYERS, AND TECHNOLOGIES

TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER IT S ALL ABOUT CLOUD CONCEPTS, STRATEGIES, ARCHITECTURES, PLAYERS, AND TECHNOLOGIES TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER IT S ALL ABOUT CLOUD CONCEPTS, STRATEGIES, ARCHITECTURES, PLAYERS, AND TECHNOLOGIES APRIL 2-4, 2014 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it

More information

TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER CLOUD 2.0 MOVING FROM COST SAVINGS TO AGILE IT

TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER CLOUD 2.0 MOVING FROM COST SAVINGS TO AGILE IT TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER CLOUD 2.0 MOVING FROM COST SAVINGS TO AGILE IT APRIL 27-29, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it www.technologytransfer.it

More information

STEPHEN FEW SHOW ME THE NUMBERS

STEPHEN FEW SHOW ME THE NUMBERS TECHNOLOGY TRANSFER PRESENTS STEPHEN FEW SHOW ME THE NUMBERS Designing Tables and Graphs to Enlighten MAY 6, 2009 DATA VISUALIZATION FOR DISCOVERY AND ANALYSIS Simple Graphing Techniques for Analyzing

More information

DANIEL EKLUND UNDERSTANDING BIG DATA AND THE HADOOP TECHNOLOGIES NOVEMBER 2-3, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

DANIEL EKLUND UNDERSTANDING BIG DATA AND THE HADOOP TECHNOLOGIES NOVEMBER 2-3, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) LA TECHNOLOGY TRANSFER PRESENTS PRESENTA DANIEL EKLUND UNDERSTANDING BIG DATA AND THE HADOOP TECHNOLOGIES NOVEMBER 2-3, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it

More information

TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON NEXT GENERATION DATA MANAGEMENT BUILDING AN ENTERPRISE DATA RESERVOIR AND DATA REFINERY

TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON NEXT GENERATION DATA MANAGEMENT BUILDING AN ENTERPRISE DATA RESERVOIR AND DATA REFINERY TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON NEXT GENERATION DATA MANAGEMENT BUILDING AN ENTERPRISE DATA RESERVOIR AND DATA REFINERY MAY 11-13, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

More information

TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON BIG DATA MULTI-PLATFORM JUNE 25-27, 2014 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON BIG DATA MULTI-PLATFORM JUNE 25-27, 2014 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON BIG DATA MULTI-PLATFORM ANALYTICS JUNE 25-27, 2014 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it www.technologytransfer.it

More information

SONDRA SCHNEIDER JOHN NUNES

SONDRA SCHNEIDER JOHN NUNES TECHNOLOGY TRANSFER PRESENTS SONDRA SCHNEIDER JOHN NUNES CERTIFIED ETHICAL HACKER TM THE ONLY WAY TO STOP A HACKER IS TO THINK LIKE ONE MAY 21-25, 2007 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME

More information

TECHNOLOGY TRANSFER PRESENTS VLADIMIR NOVEMBER 26-27, 2015 NOVEMBER 30 DECEMBER 2, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

TECHNOLOGY TRANSFER PRESENTS VLADIMIR NOVEMBER 26-27, 2015 NOVEMBER 30 DECEMBER 2, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS VLADIMIR BACVANSKI MODERN INFORMATION ARCHITECTURE DEVELOPING WITH SCALA NOVEMBER 26-27, 2015 NOVEMBER 30 DECEMBER 2, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

More information

KEVIN CARDWELL. Q/SA (Qualified Security Analyst) Penetration Tester. & Optional Q/PTL (Qualified Penetration Licence) Workshop

KEVIN CARDWELL. Q/SA (Qualified Security Analyst) Penetration Tester. & Optional Q/PTL (Qualified Penetration Licence) Workshop TECHNOLOGY TRANSFER PRESENTS KEVIN CARDWELL Q/SA (Qualified Security Analyst) Penetration Tester & Optional Q/PTL (Qualified Penetration Licence) Workshop MAY 18-22, 2009 VISCONTI PALACE HOTEL - VIA FEDERICO

More information

TECHNOLOGY TRANSFER PRESENTS MITCHELL WEISBERG. Strategic Management of the IT Organization

TECHNOLOGY TRANSFER PRESENTS MITCHELL WEISBERG. Strategic Management of the IT Organization TECHNOLOGY TRANSFER PRESENTS MITCHELL WEISBERG Strategic Management of the IT Organization DEVELOPING A BALANCED SCORECARD TO MEASURE IT PERFORMANCE AND TO ALIGN IT AND BUSINESS ROME NOVEMBER 11-13, 2015

More information

MIKE FERGUSON OCTOBER 1-2, 2007 OCTOBER 3-4, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

MIKE FERGUSON OCTOBER 1-2, 2007 OCTOBER 3-4, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS MIKE FERGUSON BUSINESS INTELLIGENCE AND PERFORMANCE MANAGEMENT: BI 2.0 in the Real-Time Intelligent Enterprise ENTERPRISE DATA INTEGRATION AND MASTER DATA MANAGEMENT OCTOBER

More information

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)

More information

Web Services Security with SOAP Security Proxies

Web Services Security with SOAP Security Proxies Web Services Security with Security Proxies Gerald Brose, PhD Technical Product Manager Xtradyne Technologies AG OMG Web Services Workshop USA 22 April 2003, Philadelphia Web Services Security Risks! Exposure

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 OTM and SOA Mark Hagan Principal Software Engineer Oracle Product Development Content What is SOA? What is Web Services Security? Web Services Security in OTM Futures 3 PARADIGM 4 Content What is SOA?

More information

1.1 Why this guide is important

1.1 Why this guide is important 1 Introduction 1.1 Why this guide is important page 2 1.2 The XML & Web Services Integration Framework (XWIF) page 4 1.3 How this guide is organized page 5 1.4 www.serviceoriented.ws page 13 1.5 Contact

More information

Introduction to Service-Oriented Architecture for Business Analysts

Introduction to Service-Oriented Architecture for Business Analysts Introduction to Service-Oriented Architecture for Business Analysts This course will provide each participant with a high-level comprehensive overview of the Service- Oriented Architecture (SOA), emphasizing

More information

Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies

Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies 3-day seminar Give Your Business the Competitive Edge SOA has rapidly seized the momentum and center stage because

More information

Service Oriented Architecture

Service Oriented Architecture Service Oriented Architecture Charlie Abela Department of Artificial Intelligence charlie.abela@um.edu.mt Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline

More information

Enterprise Application Integration (EAI) Architectures, Technologies, and Best Practices

Enterprise Application Integration (EAI) Architectures, Technologies, and Best Practices Enterprise Application Integration (EAI) Architectures, Technologies, and Best Practices Give Your Business the Competitive Edge IT managers have been under increasing pressure to migrate a portfolio of

More information

Web Services Advanced Topics

Web Services Advanced Topics Web Services Advanced Topics Where things are now and where they are going Version 9 Web Services Advanced Topics WSAdvanced-2 Enterprise Web Services Industry trends and organizations Security and Reliability

More information

TECHNOLOGY TRANSFER PRESENTS SHAKU. Is it the new face of APRIL 8-10, 2013 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

TECHNOLOGY TRANSFER PRESENTS SHAKU. Is it the new face of APRIL 8-10, 2013 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS SHAKU ATRE DASHBOARD Is it the new face of Business Intelligence? APRIL 8-10, 2013 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it www.technologytransfer.it

More information

Christoph Bussler. B2B Integration. Concepts and Architecture. With 165 Figures and 4 Tables. IIIBibliothek. Springer

Christoph Bussler. B2B Integration. Concepts and Architecture. With 165 Figures and 4 Tables. IIIBibliothek. Springer Christoph Bussler B2B Integration Concepts and Architecture With 165 Figures and 4 Tables IIIBibliothek Springer Contents Part I Introduction to Business-to-Business Integration.... 1 1 History 3 1.1 Why

More information

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems Core Feature Comparison between XML / SOA Gateways and Web Application Firewalls Jason Macy jmacy@forumsys.com CTO, Forum Systems XML Gateway vs Competitive XML Gateways or Complementary? and s are Complementary

More information

Run-time Service Oriented Architecture (SOA) V 0.1

Run-time Service Oriented Architecture (SOA) V 0.1 Run-time Service Oriented Architecture (SOA) V 0.1 July 2005 Table of Contents 1.0 INTRODUCTION... 1 2.0 PRINCIPLES... 1 3.0 FERA REFERENCE ARCHITECTURE... 2 4.0 SOA RUN-TIME ARCHITECTURE...4 4.1 FEDERATES...

More information

Leveraging Service Oriented Architecture (SOA) to integrate Oracle Applications with SalesForce.com

Leveraging Service Oriented Architecture (SOA) to integrate Oracle Applications with SalesForce.com Leveraging Service Oriented Architecture (SOA) to integrate Oracle Applications with SalesForce.com Presented by: Shashi Mamidibathula, CPIM, PMP Principal Pramaan Systems shashi.mamidi@pramaan.com www.pramaan.com

More information

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,

More information

A Service Oriented Security Reference Architecture

A Service Oriented Security Reference Architecture International Journal of Advanced Computer Science and Information Technology (IJACSIT) Vol. 1, No.1, October 2012, Page: 25-31, ISSN: 2296-1739 Helvetic Editions LTD, Switzerland www.elvedit.com A Service

More information

Strategic Information Security. Attacking and Defending Web Services

Strategic Information Security. Attacking and Defending Web Services Security PS Strategic Information Security. Attacking and Defending Web Services Presented By: David W. Green, CISSP dgreen@securityps.com Introduction About Security PS Application Security Assessments

More information

Oracle SOA Reference Architecture

Oracle SOA Reference Architecture http://oraclearchworld.wordpress.com/ Oracle SOA Reference Architecture By Kathiravan Udayakumar Introduction to SOA Service Oriented Architecture is a buzz word in IT industry for few years now. What

More information

NIST s Guide to Secure Web Services

NIST s Guide to Secure Web Services NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:

More information

A standards-based approach to application integration

A standards-based approach to application integration A standards-based approach to application integration An introduction to IBM s WebSphere ESB product Jim MacNair Senior Consulting IT Specialist Macnair@us.ibm.com Copyright IBM Corporation 2005. All rights

More information

Web Services Security Standards Forum. Dr. Phillip M. Hallam-Baker C.Eng. FBCS VeriSign Inc.

Web Services Security Standards Forum. Dr. Phillip M. Hallam-Baker C.Eng. FBCS VeriSign Inc. Web Services Security Standards Forum Dr. Phillip M. Hallam-Baker C.Eng. FBCS VeriSign Inc. Web Services Security Standards For Um For um: Meeting to tell people that everyone agrees on an issue Walk the

More information

Enterprise Web & Cloud Computing

Enterprise Web & Cloud Computing T E C H N O L O G Y T R A N S F E R P R E S E N T S Rome, December 1-3, 2010 Residenza di Ripetta Via di Ripetta, 231 CONFERENCE E U R O P E 2 0 1 0 Enterprise Web & Cloud Computing A B O U T T H E C O

More information

Lesson 4. An survey of the impact on and use of Web Services in the industry today. Industry 4.1. Industry. 2004 SkillBuilders, Inc. V1.

Lesson 4. An survey of the impact on and use of Web Services in the industry today. Industry 4.1. Industry. 2004 SkillBuilders, Inc. V1. Industry 4.1 Lesson 4 Industry An survey of the impact on and use of Web Services in the industry today. SKILLBUILDERS Industry 4.2 4.2 Lesson Objectives What companies are using it? Popular SOAP Implementations.NET

More information

How To Understand A Services-Oriented Architecture

How To Understand A Services-Oriented Architecture Introduction to Service Oriented Architecture CSCI-5828 Foundations of Software Engineering Ming Lian March 2012 Executive Summary This Executive Summary gives the straight word to the fresh that have

More information

Service Oriented Architecture (SOA) Implementation Framework for Satellite Mission Control System Software Design

Service Oriented Architecture (SOA) Implementation Framework for Satellite Mission Control System Software Design Service Oriented Architecture (SOA) Implementation Framework for Satellite Mission Control System Software Design GSAW2006 28 th March 2006 Soon Hie Tan K I Thimothy Nanyang Technological University Singapore

More information

Alternatives to SNMP and Challenges in Management Protocols. Communication Systems Seminar Talk 10 Francesco Luminati

Alternatives to SNMP and Challenges in Management Protocols. Communication Systems Seminar Talk 10 Francesco Luminati Alternatives to SNMP and Challenges in Management Protocols Communication Systems Seminar Talk 10 Francesco Luminati Introduction Structure Network management Management approaches SNMP Alternatives: NetConf

More information

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

WEB SERVICES SECURITY

WEB SERVICES SECURITY WEB SERVICES SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

WebLogic Server 7.0 Single Sign-On: An Overview

WebLogic Server 7.0 Single Sign-On: An Overview WebLogic Server 7.0 Single Sign-On: An Overview Today, a growing number of applications are being made available over the Web. These applications are typically comprised of different components, each of

More information

Java Security Web Services Security (Overview) Lecture 9

Java Security Web Services Security (Overview) Lecture 9 Java Security Web Services Security (Overview) Lecture 9 Java 2 Cryptography Java provides API + SPI for crypto functions Java Cryptography Architecture Security related core classes Access control and

More information

Jamcracker Web Services. David Orchard Standards Architect

Jamcracker Web Services. David Orchard Standards Architect Jamcracker Web Services Web Services Position April 12, 2001 David Orchard Standards Architect 1 Web Services Vision Provide an ecosystem of web services Integrate XML interfaces/web Services together

More information

BUSINESS PROCESS AND EBXML - WEB SERVICES INTEGRATION PLATFORM, REQUIREMENTS, ARCHITECTURES, SECURITY

BUSINESS PROCESS AND EBXML - WEB SERVICES INTEGRATION PLATFORM, REQUIREMENTS, ARCHITECTURES, SECURITY 1 2 BUSINESS PROCESS AND EBXML - WEB SERVICES INTEGRATION PLATFORM, REQUIREMENTS, ARCHITECTURES, SECURITY 1 Carmen RĂDUŢ, 2 Maria STĂNILOIU 1 Universitatea Constantin Brâncoveanu PITEŞTI 2 Universitatea

More information

<Insert Picture Here> Oracle Web Services Manager (WSM)

<Insert Picture Here> Oracle Web Services Manager (WSM) Oracle Web Services Manager (WSM) Marc Chanliau Director, Product Management Outline Introduction Product Overview Typical Use-Case Scenarios Roadmap Q & A Introduction

More information

The Logical Data Warehouse

The Logical Data Warehouse TECHNOLOGY TRANSFER PRESENTS RICK VAN DER LANS The Logical Data Warehouse Design, Architecture, and Technology Incorporating Big Data, Hadoop and NoSQL in Data Warehouse and Business Intelligence Systems

More information

Business Performance Management Standards

Business Performance Management Standards Business Performance Management Standards Stephen A. White, PhD. BPM Architect Business Performance Management Business performance management Taking an holistic approach, companies align strategic and

More information

Introduction to UDDI: Important Features and Functional Concepts

Introduction to UDDI: Important Features and Functional Concepts : October 2004 Organization for the Advancement of Structured Information Standards www.oasis-open.org TABLE OF CONTENTS OVERVIEW... 4 TYPICAL APPLICATIONS OF A UDDI REGISTRY... 4 A BRIEF HISTORY OF UDDI...

More information

Federated Identity and Trust Management

Federated Identity and Trust Management Redpaper Axel Buecker Paul Ashley Neil Readshaw Federated Identity and Trust Management Introduction The cost of managing the life cycle of user identities is very high. Most organizations have to manage

More information

A Gateway to Web Services Security Securing SOAP with Proxies

A Gateway to Web Services Security Securing SOAP with Proxies A Gateway to Web Services Security Securing with Proxies Gerald Brose Xtradyne Technologies Schönhauser Allee 6-7, 10119 Berlin, Germany gerald.brose@xtradyne.com Abstract. Integrating applications and

More information

Presented By: Muhammad Afzal 08May, 2009

Presented By: Muhammad Afzal 08May, 2009 Secure Web ServiceTransportation for HL7 V3.0 Messages Authors: Somia Razzaq, Maqbool Hussain, Muhammad Afzal, Hafiz Farooq Ahmad Presented By: Muhammad Afzal 08May, 2009 NUST School of Electrical Engineering

More information

SCUR203 Why Do We Need Security Standards?

SCUR203 Why Do We Need Security Standards? SCUR203 Why Do We Need Security Standards? Cristina Buchholz Product Security, SAP Learning Objectives As a result of this workshop, you will be able to: Recognize the need for standardization Understand

More information

TECHNOLOGY TRANSFER PRESENTS CRAIG AGILE SOFTWARE DEVELOPMENT. Hands-on Practices, Principles, Agile Modeling, and TDD MAY 6-10, 2013

TECHNOLOGY TRANSFER PRESENTS CRAIG AGILE SOFTWARE DEVELOPMENT. Hands-on Practices, Principles, Agile Modeling, and TDD MAY 6-10, 2013 TECHNOLOGY TRANSFER PRESENTS CRAIG LARMAN AGILE SOFTWARE DEVELOPMENT Hands-on Practices, Principles, Agile Modeling, and TDD MAY 6-10, 2013 AGILE, LEAN & ITERATIVE DEVELOPMENT Management Overview MAY 13,

More information

Increasing IT flexibility with IBM WebSphere ESB software.

Increasing IT flexibility with IBM WebSphere ESB software. ESB solutions White paper Increasing IT flexibility with IBM WebSphere ESB software. By Beth Hutchison, Katie Johnson and Marc-Thomas Schmidt, IBM Software Group December 2005 Page 2 Contents 2 Introduction

More information

Introduction to Service Oriented Architectures (SOA)

Introduction to Service Oriented Architectures (SOA) Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction

More information

Architectural Requirements for an SOA Based on Web Services. Jim Bole VP, Engineering Infravio, Inc. April 23, 2003

Architectural Requirements for an SOA Based on Web Services. Jim Bole VP, Engineering Infravio, Inc. April 23, 2003 Architectural Requirements for an SOA Based on Web s Jim Bole VP, Engineering Infravio, Inc. April 23, 2003 Agenda! Web s is an integration technology! Web s role in an SOA! Unique Features and Challenges

More information

SOA Best Practices (from monolithic to service-oriented)

SOA Best Practices (from monolithic to service-oriented) SOA Best Practices (from monolithic to service-oriented) Clemens Utschig - Utschig Consulting Product Manager, Oracle SOA Suite & Integration clemens.utschig@oracle.com The following

More information

Agents and Web Services

Agents and Web Services Agents and Web Services ------SENG609.22 Tutorial 1 Dong Liu Abstract: The basics of web services are reviewed in this tutorial. Agents are compared to web services in many aspects, and the impacts of

More information

TECHNOLOGY TRANSFER PRESENTS INTERNATIONAL. Rome, December 3-4 2015 Residenza di Ripetta Via di Ripetta, 231 CONFERENCE BIG DATA

TECHNOLOGY TRANSFER PRESENTS INTERNATIONAL. Rome, December 3-4 2015 Residenza di Ripetta Via di Ripetta, 231 CONFERENCE BIG DATA TECHNOLOGY TRANSFER PRESENTS Rome, December 3-4 2015 Residenza di Ripetta Via di Ripetta, 231 INTERNATIONAL CONFERENCE 2 0 1 5 BIG DATA A B O U T T H E S U M M I T The last twelve months can only be described

More information

This Working Paper provides an introduction to the web services security standards.

This Working Paper provides an introduction to the web services security standards. International Civil Aviation Organization ATNICG WG/8-WP/12 AERONAUTICAL TELECOMMUNICATION NETWORK IMPLEMENTATION COORDINATION GROUP EIGHTH WORKING GROUP MEETING (ATNICG WG/8) Christchurch New Zealand

More information

Oracle Application Server 10g Web Services Frequently Asked Questions Oct, 2006

Oracle Application Server 10g Web Services Frequently Asked Questions Oct, 2006 Oracle Application Server 10g Web Services Frequently Asked Questions Oct, 2006 This FAQ addresses frequently asked questions relating to Oracle Application Server 10g Release 3 (10.1.3.1) Web Services

More information

CHAPTER - 3 WEB APPLICATION AND SECURITY

CHAPTER - 3 WEB APPLICATION AND SECURITY CHAPTER - 3 WEB APPLICATION AND SECURITY 3.1 Introduction Web application or Wepapp is the general term that is normally used to refer to all distributed web-based applications. According to the more technical

More information

Contents at a Glance. 1 Introduction 17. 2 Basic Principles of IT Security 23. 3 Authentication and Authorization in

Contents at a Glance. 1 Introduction 17. 2 Basic Principles of IT Security 23. 3 Authentication and Authorization in at a Glance 1 Introduction 17 2 Basic Principles of IT Security 23 3 Authentication and Authorization in SAP NetWeaver Application Server Java 53 4 Single Sign-On 151 5 Identity Provisioning 289 6 Secure

More information

Santa Clara 2008. and Energy Systems. William Cox. wtcox@coxsoftwarearchitects.com Copyright 2008. All Rights Reserved

Santa Clara 2008. and Energy Systems. William Cox. wtcox@coxsoftwarearchitects.com Copyright 2008. All Rights Reserved Application of ecommerce to Building and Energy Systems William Cox Cox Software Architects LLC wtcox@coxsoftwarearchitects.com Copyright 2008. All Rights Reserved Agenda Introduction and Goals Enterprise

More information

Data Management, Analytics and Business Intelligence

Data Management, Analytics and Business Intelligence TECHNOLOGY TRANSFER PRESENTS Rome, June 25-26 2015 Residenza di Ripetta Via di Ripetta, 231 INTERNATIONAL SUMMIT 2 0 1 5 Data Management, Analytics and Business Intelligence A B O U T T H E S U M M I T

More information

Web Services and Service Oriented Architectures. Thomas Soddemann, RZG

Web Services and Service Oriented Architectures. Thomas Soddemann, RZG Web Services and Service Oriented Architectures, RZG Delaman Workshop 2004 Overview The Garching Supercomputing Center - RZG Diving into the world of Web Services Service Oriented Architectures And beyond

More information

David Pilling Director of Applications and Development

David Pilling Director of Applications and Development Service Oriented Architecture for Law Firms: SOA is inevitable, are you ready? David Pilling Director of Applications and Development "Things should be made as simple as possible, but no simpler. -- Albert

More information

Service-Oriented Architecture

Service-Oriented Architecture Service-Oriented Architecture Concepts, Technology, and Design Thomas Erl PRENTICE HALL PROFESSIONAL TECHNICAL REFERENCE UPPER SADDLE RIVER, NJ BOSTON INDIANAPOLIS SAN FRANCISCO PRENTICE HALL pt R NEW

More information

SECURING WEB SERVICES

SECURING WEB SERVICES SECURING WEB SERVICES Ahmad Tasnim Siddiqui & Arun Kumar Singh Research Scholar, Singhania University, Pacheri bari, Jhunjhunu Rajasthan, India ABSTRACT HTTP, Web Server and Web Services share very complicated

More information

The Use of Service Oriented Architecture In Tax and Revenue

The Use of Service Oriented Architecture In Tax and Revenue The Use of Service Oriented Architecture In Tax and Revenue Presented by: Bruce Baur & Adam Schaffer Revenue Solutions, Inc. Introduction Adam Schaffer Director, Revenue Administration Practice Line More

More information

Methods and tools for data and software integration Enterprise Service Bus

Methods and tools for data and software integration Enterprise Service Bus Methods and tools for data and software integration Enterprise Service Bus Roman Hauptvogl Cleverlance Enterprise Solutions a.s Czech Republic hauptvogl@gmail.com Abstract Enterprise Service Bus (ESB)

More information

Redpaper. IBM Tivoli Security Solutions for Microsoft Software Environments. Front cover. ibm.com/redbooks

Redpaper. IBM Tivoli Security Solutions for Microsoft Software Environments. Front cover. ibm.com/redbooks Front cover IBM Tivoli Security Solutions for Microsoft Software Environments Explaining common architecture and standards Deploying on Microsoft operating systems Securing Microsoft software environments

More information

HexaCorp. White Paper. SOA with.net. Ser vice O rient ed Ar c hit ecture

HexaCorp. White Paper. SOA with.net. Ser vice O rient ed Ar c hit ecture White Paper SOA with.net Ser vice O rient ed Ar c hit ecture Introduction SOA, a rich technology foundation designed for building distributed service-oriented applications for the enterprise and the web

More information

Web Services Security: What s Required To Secure A Service-Oriented Architecture. An Oracle White Paper January 2008

Web Services Security: What s Required To Secure A Service-Oriented Architecture. An Oracle White Paper January 2008 Web Services Security: What s Required To Secure A Service-Oriented Architecture An Oracle White Paper January 2008 Web Services Security: What s Required To Secure A Service-Oriented Architecture. INTRODUCTION

More information

1.264 Lecture 24. Service Oriented Architecture Electronic Data Interchange (EDI) Next class: Anderson chapter 1, 2. Exercise due before class

1.264 Lecture 24. Service Oriented Architecture Electronic Data Interchange (EDI) Next class: Anderson chapter 1, 2. Exercise due before class 1.264 Lecture 24 Service Oriented Architecture Electronic Data Interchange (EDI) Next class: Anderson chapter 1, 2. Exercise due before class 1 B-to-B DB svr Web svr Solution- case study Customer anufacturer,

More information

Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact

Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact Robert C. Broeckelmann Jr., Enterprise Middleware Architect Ryan Triplett, Middleware Security Architect Requirements

More information

Copyright IONA Technologies 2002. Web Services. Seán Baker IONA Technologies

Copyright IONA Technologies 2002. Web Services. Seán Baker IONA Technologies Web Services Seán Baker IONA Technologies Overview There a number of different types of middleware So what does Web Services offer? 2 Enterprise IT is highly complex and heterogeneous Build new applications

More information

A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems

A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems Volume 1, Number 2, December 2014 JOURNAL OF COMPUTER SCIENCE AND SOFTWARE APPLICATION A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems Satish Kumar*,

More information

T E C H N O L O G Y T R A N S F E R P R E S E N T S

T E C H N O L O G Y T R A N S F E R P R E S E N T S T E C H N O L O G Y T R A N S F E R P R E S E N T S Rome, December 4-5 2014 Residenza di Ripetta Via di Ripetta, 231 INTERNATIONAL S U M M I T 2 0 1 4 BIG DATA ANALYTICS A B o U T T H E S U M M I T In

More information

T-Check in Technologies for Interoperability: Web Services and Security Single Sign-On

T-Check in Technologies for Interoperability: Web Services and Security Single Sign-On T-Check in Technologies for Interoperability: Web Services and Security Single Sign-On Lutz Wrage Soumya Simanta Grace A. Lewis Saul Jaspan December 2007 TECHNICAL NOTE CMU/SEI-2008-TN-026 Integration

More information

Web Services, CORBA and other Middleware

Web Services, CORBA and other Middleware Web Services, CORBA and other Middleware Dr. Seán Baker IONA Technologies Web Services For The Integrated Enterprise, OMG Workshop, Munich Feb 2003 Overview There a number of different types of middleware

More information

Service-Oriented Architecture: Analysis, the Keys to Success!

Service-Oriented Architecture: Analysis, the Keys to Success! Service-Oriented Architecture: Analysis, the Keys to Success! Presented by: William F. Nazzaro CTO, Inc. bill@iconatg.com www.iconatg.com Introduction Service-Oriented Architecture is hot, but we seem

More information

Securing Web Services with WS-Security

Securing Web Services with WS-Security Securing Web Services with WS-Security Demystifying WS-Security, WS-Policy, SAML, XML Signature and XML Encryption jothy Rosenberg David L. Remy SAMS Sams Publishing, 800 East 96th Street, Indianapolis,

More information

Web Services Strategy

Web Services Strategy Web Services Strategy Agenda What What are are Web Web Services? Services? Web Web Services Services --The The Technologies Technologies Web Web Services Services Compliments Compliments Overall Overall

More information

SOA REFERENCE ARCHITECTURE

SOA REFERENCE ARCHITECTURE SOA REFERENCE ARCHITECTURE August 15, 2007 Prepared by Robert Woolley, Chief Technologist and Strategic Planner INTRODUCTION This document is a derivative work of current documentation and presentations

More information

JavaPolis 2004 Middleware and Web Services Security

JavaPolis 2004 Middleware and Web Services Security JavaPolis 2004 Middleware and Web Services Security Dr. Konstantin Beznosov Assistant Professor University of British Columbia Do you know what these mean? SOAP WSDL IIOP CSI v2 Overall Presentation Goal

More information

Table of Contents. 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8

Table of Contents. 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8 Table of Contents 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8 3 SOA in Verizon The IT Workbench Platform... 10 3.1 Technology... 10 3.2 Processes

More information