NIST s Guide to Secure Web Services
|
|
|
- Timothy McDaniel
- 10 years ago
- Views:
Transcription
1 NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication : Guide to Secure Web Services. Aug Ingham, D., et al. Constructing Dependable Web Services. IEEE Internet Computing, Jan/Feb Moser, L., et al. Making Web Services Dependable International Conference on Availability, Reliability, and Security (ARES 06). 1
2 Goals Give a broad overview of field (secure and dependable web services) Provide challenges and open problems in research Outline Introduction to Web Services Web Security Dimensions Attacks to Web Services Web Service Security Functions Challenge and Open Problems 2
3 Introduction to Web Services WS: Software system designed to support interoperable machine to machine interaction over a network [W3C] Ex: Web APIs accessed over a network and executed remotely Introduction to Web Services Make a collection of software services accessible via standardized protocols whose functionality can be automatically discovered and integrated into applications (loosely coupled) Allows WS to dynamically bind to other WS at run-time, depending on needs of user or app Allows data and apps to interact (no human intervention) through dynamic and ad hoc connections 3
4 A Few More Acronyms to Your Vocabulary OWL-S: Ontology Web Language for Services SOA: Service Oriented Architecture SOAP: Service Oriented Architecture Protocol SAML: Security Assertion Markup Language UDDI: Universal Description, Discovery and Integration WSDL: Web Services Description Language XACML: extensible Access Control Markup Language Introduction to Web Services Components of a SOA application Discovery UDDI / WSDL Messaging Portals Roles Coordination 4
5 Introduction to Web Services Components of a SOA application Discovery Messaging SOAP (XML) Portals Roles Coordination Introduction to Web Services Components of a SOA application Discovery Messaging Portals Roles Coordination 5
6 Introduction to Web Services Components of a SOA application Discovery Messaging Portals Roles Requester Intermediary Provider Coordination Introduction to Web Services Components of a SOA application Discovery Messaging Portals Roles Coordination Orchestration Choreography 6
7 Introduction to Web Services Components of a SOA application Discovery Messaging Portals Roles Coordination Orchestration Choreography Outline Introduction to Web Services Web Security Dimensions Attacks to Web Services Web Service Security Functions Challenge and Open Problems 7
8 WS Security Dimensions Secure Messaging SOAP was not designed with security in mind Possible approaches: HTTP over SSL, XML Encryption and XML Signature, WS-Security Protecting Resources WS are intended to be accessible only to authorized requesters Protection involves more than just access control (disruption, mitm, eavesdropping, impersonating) WS Security Dimensions Negotiation of Contracts WS should automatically negotiate and agree upon contracts (ebxml, WSDL) No standards that support enforcement of implicit contracts (WSDL) QoP: Only some support for negotiating security requirements Area of research: Semantic Web Services Architecture (SWSA) 8
9 WS Security Dimensions Trust Relationships Currently limited to trust of the service identity Architecture models: Pairwise trust Each WS is provided the sec info of all other WS Brokered trust Uses TTP, WS should be designed with this in mind Federated trust WS from different organizations can interact Perimeter defense XML gateways placed between providers and requesters WS Security Dimensions Protection Some Pitfalls XML Encryption / XML Signature: no std for informing recipients how were applied to message of Contracts Management 9
10 Web Services Security Standards Web Services Example 10
11 Attacks to Web Services Reconnaissance Attacks Code Templates Forceful Browsing Attack Directory Traversal Attack WSDL Scanning Registry Disclosure Attack Privilege Escalation Attack Dictionary Attack Attacks to Web Services 11
12 Outline Introduction to Web Services Web Security Dimensions Attacks to Web Services Web Service Security Functions Challenge and Open Problems Web Service Security Functions Service-to-Service Authentication Identity Management Establishing Trust between Services Describing Web Services Policies (WS- Policy) Distributed Authorization and Access Management Confidentiality and Integrity of Service to Service Interchanges Accountability End-to-end throughout a Service Chain Availability of WS Securing the Discovery Service 12
13 Identity Management An Identity Management System (IDMS) is responsible for Verifying identities of entities Registering them Issuing them digital identifiers Identity Management Three major identity architectures for WS Isolated identity management Credential and identity providers are merged Service must know for all requesters (scalability issue) Federated identity management Group of providers agrees to recognize user ids from one another More feasible in a single enterprise-wide SOA Centralized identity management Rely on single TTP to provide credentials/identifiers Single point of failure 13
14 Establishing Trust between Services Trust relationships need to be established between remote WSs for SAML or WS-Security to be useful on a large scale Trust models like Kerberos have worked well for a single organization Pairwise trust circle Each entity that is authorized to communicate with another must share its key information (unscalable) Brokered trust model TTP is used to exchange key information between services to communicate Community trust model Relies on an external PKI for establishing trust Establishing Trust between Services Practical approaches for federation of trust Liberty Alliance Provides both Web app and WS federation using SAML to perform trust brokering Suitable for businesses and governments WS-Federation Allows different security realms to federate by defining trust brokers, who will validate security tokens used between WS using WS-Trust (tokens) 14
15 Describing Web Services Policies (WS-Policy) Extension to WSDL, allows to express capabilities, requirements and characteristics of WS WSDL is limited to describing what is included in the message itself WS-Policy requirement types On the wire (WS-Sec encryption, signature) Abstract (QoS, privacy) WS-Policy expression contains a set of policy alternatives encompassing sets of assertions Policy expressions are external to metadata stored in UDDI and WSDL, need distribution mechanism WS-MetadataExchange or WS-PolicyAttachment Describing Web Services Policies (WS-Policy) Specifications defining WS-Policy assertions WS-SecurityPolicy defines assertions to specify integrity, confidentiality, and information about security tokens WS-RM Policy defines assertions that can be used to specify how a WS uses WS-Reliable Messaging WS-Addressing WSDL Binding defines elements that can be used within a WSDL descriptor to specify the use of WS-Addressing 15
16 Describing Web Services Policies (WS-Policy) Describing Web Services Policies (WS-Policy) 16
17 Availability of WS Availability is intended to ensure that QoS and reliability are maintained even under intentional attempts to compromise the WS operation (DoS) Recognize and react to DoS patterns Constrain and isolate the DoS attack Recover and resume secure operation after DoS Necessary to include redundancy, error handling capabilities and defensive techniques Most common accidental threats Service recursion Service deadlock Availability of WS Failover UDDI supports listing multiple URIs for each WS Makes the UDDI registry the point of failure UDDI supports replication QoS Expected level of performance Most WS do not provide guarantees for QoS In distributed deadlock, a WS may lead entire choreography stalling 17
18 Outline Introduction to Web Services Web Security Dimensions Attacks to Web Services Web Service Security Functions Challenge and Open Problems Challenge and Open Problems Security remains a major challenge, in the presence of dynamic composition and heterogeneity in large, autonomous and untrusted environments Shift from old paradigm of Alice and Bob Alice Bob 18
19 Challenge and Open Problems Service description, automatic service discovery, and QoS Make WS simpler? Feasible? Secure issuance of credentials Repudiation of transactions Few logging implementations that can be used across an entire SOA Relationship between contracts and federated identity management Challenge and Open Problems DoS attacks Protection from DoS attacks that exploit vulnerabilities unique to WS (discovery service) Spread of malware Compromised services Functional integrity of WS that requires the establishment of trust between services on transaction-by-transaction basis Confidentiality and integrity of data transmitted via WS protocols in service-to-service transaction Exploitation of covert channels 19
20 NIST s Guide to Secure Web Services Thanks! Happy Halloween 20
Guide to Secure Web Services
Special Publication 800-95 (Draft) Guide to Secure Web Services Recommendations of the National Institute of Standards and Technology Anoop Singhal Theodore Winograd Karen Scarfone NIST Special Publication
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)
WEB SERVICES SECURITY
WEB SERVICES SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Run-time Service Oriented Architecture (SOA) V 0.1
Run-time Service Oriented Architecture (SOA) V 0.1 July 2005 Table of Contents 1.0 INTRODUCTION... 1 2.0 PRINCIPLES... 1 3.0 FERA REFERENCE ARCHITECTURE... 2 4.0 SOA RUN-TIME ARCHITECTURE...4 4.1 FEDERATES...
The Use of Service Oriented Architecture In Tax and Revenue
The Use of Service Oriented Architecture In Tax and Revenue Presented by: Bruce Baur & Adam Schaffer Revenue Solutions, Inc. Introduction Adam Schaffer Director, Revenue Administration Practice Line More
Web Services Security: What s Required To Secure A Service-Oriented Architecture. An Oracle White Paper January 2008
Web Services Security: What s Required To Secure A Service-Oriented Architecture An Oracle White Paper January 2008 Web Services Security: What s Required To Secure A Service-Oriented Architecture. INTRODUCTION
A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems
Volume 1, Number 2, December 2014 JOURNAL OF COMPUTER SCIENCE AND SOFTWARE APPLICATION A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems Satish Kumar*,
Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy [email protected] CTO, Forum Systems
Core Feature Comparison between XML / SOA Gateways and Web Application Firewalls Jason Macy [email protected] CTO, Forum Systems XML Gateway vs Competitive XML Gateways or Complementary? and s are Complementary
Web Service Security Vulnerabilities and Threats in the Context of WS-Security
Web Service Security Vulnerabilities and Threats in the Context of WS-Security Jesper Holgersson Eva Söderström University of Skoevde, Sweden SIIT 2005, ITU, Geneva, September 2005 Outline of presentation
This Working Paper provides an introduction to the web services security standards.
International Civil Aviation Organization ATNICG WG/8-WP/12 AERONAUTICAL TELECOMMUNICATION NETWORK IMPLEMENTATION COORDINATION GROUP EIGHTH WORKING GROUP MEETING (ATNICG WG/8) Christchurch New Zealand
Using WS-Federation and WS-Security for Identity Management in Virtual Organisations
Using WS-Federation and WS-Security for Identity Management in Virtual Organisations Demchenko, Yu. , Universiteit van Amsterdam Abstracts The paper provides insight into one of key
Copyright 2012, Oracle and/or its affiliates. All rights reserved.
1 OTM and SOA Mark Hagan Principal Software Engineer Oracle Product Development Content What is SOA? What is Web Services Security? Web Services Security in OTM Futures 3 PARADIGM 4 Content What is SOA?
Software Requirement Specification Web Services Security
Software Requirement Specification Web Services Security Federation Manager 7.5 Version 0.3 (Draft) Please send comments to: [email protected] This document is subject to the following license:
Service Oriented Architecture
Service Oriented Architecture Charlie Abela Department of Artificial Intelligence [email protected] Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline
Authentication and Authorization Systems in Cloud Environments
Authentication and Authorization Systems in Cloud Environments DAVIT HAKOBYAN Master of Science Thesis Stockholm, Sweden 2012 TRITA-ICT-EX-2012:203 Abstract The emergence of cloud computing paradigm offers
Trusting XBRL: Using the Liberty Web Services Framework to Secure and Authenticate XBRL Documents
Trusting XBRL: Using the Liberty Web Services Framework to Secure and Authenticate XBRL Documents Farrukh Najmi and Eve Maler [email protected], [email protected] Sun Microsystems, Inc. Goals for today's
Introduction to Service Oriented Architectures (SOA)
Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction
A Service Oriented Security Reference Architecture
International Journal of Advanced Computer Science and Information Technology (IJACSIT) Vol. 1, No.1, October 2012, Page: 25-31, ISSN: 2296-1739 Helvetic Editions LTD, Switzerland www.elvedit.com A Service
Federated Identity Management Solutions
Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single
Chapter 12 GRID SECURITY ARCHITECTURE: Requirements,fundamentals, standards, and models
Author manuscript, published in Security in Distributed, Grid, Mobile, and Pervasive Computing, Auerbach Publications, pp. 255-288, April, 2007 https://www.nics.uma.es Security in Distributed, Grid, and
Web Services and Service Oriented Architectures. Thomas Soddemann, RZG
Web Services and Service Oriented Architectures, RZG Delaman Workshop 2004 Overview The Garching Supercomputing Center - RZG Diving into the world of Web Services Service Oriented Architectures And beyond
An Open Policy Framework for Cross-vendor Integrated Governance
An Open Policy Framework for Cross-vendor Integrated Governance White Paper Intel SOA Expressway An Open Policy Framework for Cross-vendor Integrated Governance Intel SOA Expressway delivers a pluggable
Service Virtualization: Managing Change in a Service-Oriented Architecture
Service Virtualization: Managing Change in a Service-Oriented Architecture Abstract Load balancers, name servers (for example, Domain Name System [DNS]), and stock brokerage services are examples of virtual
Securely Managing and Exposing Web Services & Applications
Securely Managing and Exposing Web Services & Applications Philip M Walston VP Product Management Layer 7 Technologies Layer 7 SecureSpan Products Suite of security and networking products to address the
The Global Justice Reference Architecture (JRA) Web Services Service Interaction Profile
The Global Justice Reference Architecture (JRA) Web Services Service Interaction Profile V 1.1 by The Global Infrastructure/Standards Working Group August 1, 2007 Table of Contents Acknowledgements...
Redbook Overview Patterns: SOA Design with WebSphere Message Broker and WebSphere ESB
IBM Software for WebSphere Redbook Overview Patterns: SOA Design with WebSphere Message Broker and WebSphere ESB Presenter: Kim Clark Email: [email protected] Date: 27/02/2007 SOA Design with WebSphere
Quality Model for Web Services
Quality Model for Web Services September 2005 Document identifier: WSQM -2.0 Location: Editor: Eunju Kim (NCA), Youngkon Lee (KOREA Polytechnic University) Abstract: The purpose of this document is to
AquaLogic Service Bus
AquaLogic Bus Wolfgang Weigend Principal Systems Engineer BEA Systems 1 What to consider when looking at ESB? Number of planned business access points Reuse across organization Reduced cost of ownership
Szolgáltatásorientált rendszerintegráció. WS-* standards
Szolgáltatásorientált rendszerintegráció WS-* standards Outline Requirements WS-* standards XML digital signature XML encryption 2 Integration requirements 3 Integration within a company SAP.NET? JEE SQL
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
CHAPTER - 3 WEB APPLICATION AND SECURITY
CHAPTER - 3 WEB APPLICATION AND SECURITY 3.1 Introduction Web application or Wepapp is the general term that is normally used to refer to all distributed web-based applications. According to the more technical
Network Security. Chapter 10. Application Layer Security: Web Services. Part I: Introduction to Web Services
Network Architectures and Services, Georg Carle Faculty of Informatics Technische Universität München, Germany Part I: Introduction to Web Services Network Security Chapter 10 Application Layer Security:
Federated Service Oriented Architecture for Effects-Based Operations
Federated Service Oriented Architecture for Effects-Based Operations Intelligence and Information Systems Matt Brown (720) 88-4014 [email protected] Customer Success Is Our Mission is a trademark of
Web Services Standards: obix in the wider XML Web Services context
www.oasis-open.org Web Services Standards: obix in the wider XML Web Services context Pim van der Eijk OASIS European Representative OASIS Mission OASIS drives the development, convergence and adoption
Federated Identity and Trust Management
Redpaper Axel Buecker Paul Ashley Neil Readshaw Federated Identity and Trust Management Introduction The cost of managing the life cycle of user identities is very high. Most organizations have to manage
Securing Web Services From Encryption to a Web Service Security Infrastructure
Securing Web Services From Encryption to a Web Service Security Infrastructure Kerberos WS-Security X.509 TLS Gateway OWSM WS-Policy Peter Lorenzen WS-Addressing Agent SAML Policy Manager Technology Manager
Service-Oriented Computing and Service-Oriented Architecture
Service-Oriented Computing and Service-Oriented Architecture Week 3 Lecture 5 M. Ali Babar Lecture Outline Service-Oriented Computing (SOC) Service-Oriented Architecture (SOA) Designing service-based systems
Mobile Identity and Edge Security Forum Sentry Security Gateway. Jason Macy CTO, Forum Systems [email protected]
Mobile Identity and Edge Security Forum Sentry Security Gateway Jason Macy CTO, Forum Systems [email protected] Evolution Evolution of Enterprise Identities Cloud Computing Iaas Infrastructure as a Service
Digital Signature Web Service Interface
1 2 Digital Signature Web Service Interface 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 1 Introduction This document describes an RPC interface for a centralized
Research on the Model of Enterprise Application Integration with Web Services
Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
Service-Oriented Architecture and its Implications for Software Life Cycle Activities
Service-Oriented Architecture and its Implications for Software Life Cycle Activities Grace A. Lewis Software Engineering Institute Integration of Software-Intensive Systems (ISIS) Initiative Agenda SOA:
The Role of Identity Enabled Web Services in Cloud Computing
The Role of Identity Enabled Web Services in Cloud Computing April 20, 2009 Patrick Harding CTO Agenda Web Services and the Cloud Identity Enabled Web Services Some Use Cases and Case Studies Questions
Table of Contents. 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8
Table of Contents 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8 3 SOA in Verizon The IT Workbench Platform... 10 3.1 Technology... 10 3.2 Processes
Biometric Single Sign-on using SAML Architecture & Design Strategies
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan Java Technology Architect Sun Microsystems [email protected] 1 Setting Expectations What you can take away! Understand
Identity Federation Broker for Service Cloud
2010 International Conference on Sciences Identity Federation Broker for Cloud He Yuan Huang 1, Bin Wang 1, Xiao Xi Liu 1, Jing Min Xu 1 1 IBM Research China {huanghey, wangbcrl, liuxx, xujingm}@cn.ibm.com
An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
1 What Are Web Services?
Oracle Fusion Middleware Introducing Web Services 11g Release 1 (11.1.1.6) E14294-06 November 2011 This document provides an overview of Web services in Oracle Fusion Middleware 11g. Sections include:
1 What Are Web Services?
Oracle Fusion Middleware Introducing Web Services 11g Release 1 (11.1.1) E14294-04 January 2011 This document provides an overview of Web services in Oracle Fusion Middleware 11g. Sections include: What
Service-Oriented Architectures
Architectures Computing & 2009-11-06 Architectures Computing & SERVICE-ORIENTED COMPUTING (SOC) A new computing paradigm revolving around the concept of software as a service Assumes that entire systems
Secure Semantic Web Service Using SAML
Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA
APIs The Next Hacker Target Or a Business and Security Opportunity?
APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone
An Oracle White Paper November 2009. Oracle Primavera P6 EPPM Integrations with Web Services and Events
An Oracle White Paper November 2009 Oracle Primavera P6 EPPM Integrations with Web Services and Events 1 INTRODUCTION Primavera Web Services is an integration technology that extends P6 functionality and
Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014
Standards for Identity & Authentication Catherine J. Tilton 17 September 2014 Purpose of these standards Wide deployment of authentication technologies that may be used in a global context is heavily dependent
Creating Web Services in NetBeans
Creating Web Services in NetBeans Fulvio Frati [email protected] Sesar Lab http://ra.crema.unimi.it 1 Outline Web Services Overview Creation of a Web Services Server Creation of different Web Services
Business Rule Standards -- Interoperability and Portability
Rule Standards -- Interoperability and Portability April 2005 Mark H. Linehan Senior Technical Staff Member IBM Software Group Emerging Technology [email protected] Donald F. Ferguson IBM Fellow Software
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
David Pilling Director of Applications and Development
Service Oriented Architecture for Law Firms: SOA is inevitable, are you ready? David Pilling Director of Applications and Development "Things should be made as simple as possible, but no simpler. -- Albert
Managing SOA Security and Operations with SecureSpan
Managing SOA Security and Operations with SecureSpan Francois Lascelles Technical Director, Layer 7 Technologies 1 Customers Revenue About Layer 7 Layer 7 is the leading vendor of security and governance
Strategic Information Security. Attacking and Defending Web Services
Security PS Strategic Information Security. Attacking and Defending Web Services Presented By: David W. Green, CISSP [email protected] Introduction About Security PS Application Security Assessments
Java Security Web Services Security (Overview) Lecture 9
Java Security Web Services Security (Overview) Lecture 9 Java 2 Cryptography Java provides API + SPI for crypto functions Java Cryptography Architecture Security related core classes Access control and
Getting Started with Service- Oriented Architecture (SOA) Terminology
Getting Started with - Oriented Architecture (SOA) Terminology Grace Lewis September 2010 -Oriented Architecture (SOA) is a way of designing, developing, deploying, and managing systems it is neither a
SOA Fundamentals For Java Developers. Alexander Ulanov, System Architect Odessa, 30 September 2008
SOA Fundamentals For Java Developers Alexander Ulanov, System Architect Odessa, 30 September 2008 What is SOA? Software Architecture style aimed on Reuse Growth Interoperability Maturing technology framework
Presentation Outline. Key Business Imperatives Service Oriented Architecture Defined Oracle SOA Platform 10.1.3 SOA Maturity/Adoption Model Demo Q&A
Presentation Outline Key Business Imperatives Service Oriented Architecture Defined Oracle SOA Platform 10.1.3 SOA Maturity/Adoption Model Demo Q&A Key Business Imperatives Increased Competition Requires
Securing Web Services with WS-Security
Securing Web Services with WS-Security Demystifying WS-Security, WS-Policy, SAML, XML Signature and XML Encryption jothy Rosenberg David L. Remy SAMS Sams Publishing, 800 East 96th Street, Indianapolis,
Interoperable Provisioning in a Distributed World
Interoperable Provisioning in a Distributed World Mark Diodati, Burton Group Ramesh Nagappan, Sun Microsystems Sampo Kellomaki, SymLabs 02/08/07 IAM 302 Contacts Mark Diodati ([email protected])
Leveraging Service Oriented Architecture (SOA) to integrate Oracle Applications with SalesForce.com
Leveraging Service Oriented Architecture (SOA) to integrate Oracle Applications with SalesForce.com Presented by: Shashi Mamidibathula, CPIM, PMP Principal Pramaan Systems [email protected] www.pramaan.com
Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus
Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 4.0.3 Unit objectives
CICS Web Service Security. Anthony Papageorgiou IBM CICS Development March 13, 2012 Session: 10282
Web Service Security Anthony Papageorgiou IBM Development March 13, 2012 Session: 10282 Agenda Web Service Support Overview Security Basics and Terminology Pipeline Security Overview Identity Encryption
Server based signature service. Overview
1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...
XML Signatures in an Enterprise Service Bus Environment
XML Signatures in an Enterprise Bus Environment Eckehard Hermann Research & Development XML Integration Uhlandstraße 12 64297 Darmstadt, Germany [email protected] Dieter Kessler Research
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Secure Identity in Cloud Computing
Secure Identity in Cloud Computing Michelle Carter The Aerospace Corporation March 20, 2013 The Aerospace Corporation 2013 All trademarks, service marks, and trade names are the property of their respective
Security in the PEPPOL
Security in the PEPPOL infrastructure Presentation for OASIS BUSDOX TC, March 2011 Thomas Gundel, IT Crew Agenda PART I Security goals in PEPPOL Scope and requirements Security overview PART II Trust models
Architectural Requirements for an SOA Based on Web Services. Jim Bole VP, Engineering Infravio, Inc. April 23, 2003
Architectural Requirements for an SOA Based on Web s Jim Bole VP, Engineering Infravio, Inc. April 23, 2003 Agenda! Web s is an integration technology! Web s role in an SOA! Unique Features and Challenges
Biometric Single Sign-on using SAML
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan CISSP [email protected] 1 Setting Expectations What you can take away! Understand the importance of Single Sign-On
SECURITY ARCHITECTURES. Service Oriented Security Architecture. Gunnar Peterson
We have no future because our present is too volatile. We have only risk management. The spinning of the given moment s scenarios. Pattern recognition... -William Gibson Pattern Recognition Service Oriented
REST and SOAP Services with Apache CXF
REST and SOAP Services with Apache CXF Andrei Shakirin, Talend [email protected] ashakirin.blogspot.com/ Agenda Introduction in Apache CXF New CXF features Project using Apache CXF How CXF community
