Identity Provisions for Cloud Services: Applying OASIS SOA Reference Model
|
|
- Alvin Wilson
- 8 years ago
- Views:
Transcription
1 Identity Provisions for Cloud Services: Applying OASIS SOA Reference Model Presented by: Dr Michael Poulin Member & Co editor at SOA RM TC Member of AASCIT (American Association for Science and Technology) OASIS RM for SOA & RAF for SOA Head of EA, Clingstone Ltd.
2 Unexpected and Hidden Problem What is the difference between a File in your company s File Server and the same File, but located in the Cloud File Server? Assumption: your company does not own this Cloud Answer 1: no differences Answer 3: it is not 100% my file any more Answer 2: do not know A treatment of Consumer Identity for in house Applications or Services A treatment of Consumer Identity for Cloud Services A procurement of this problem from the perspective of SOA-RAF - the Reference Architecture Foundation for SOA, the OASIS Specification [Version 1.0 Committee Specification 01, 04 December 2012 ] has led to interesting results 2
3 OASIS RAF for SOA SO Ecosystem <viewpoint> Captures what is meant to realize a SOA-based system in a SOA ecosystem. Stakeholders - involved in the design, development and deployment of SOA-based systems Effective construction of SOA-based systems. <model> Understanding Governance A Generic Model for Governance Governance Applied to SOA Architectural Implications of SOA Governance <viewpoint> <viewpoint> Captures what is meant for people to participate in a SOA ecosystem Stakeholders - all participants in the SOA ecosystem Understanding ecosystem constraints and contexts in which business can be conducted predictably and effectively. OASIS Reference Architecture Foundation for SOA Captures what is meant to own a SOA-based system in a SOA ecosystem Stakeholders - involved in governing, managing, securing, and testing SOA-based systems Processes to ensure governance, management, security, and testing of SOA-based systems feedback direction <position> <model> Landscape Around Architecture," Joint Paper, The Open Group, OASIS, and OMG, July 2009 Management Management Means & Relationships Management & Governance Management & Contracts Management for Monitoring & Reporting Management for Infrastructure Architectural Implications on the Management Model 3
4 SO Ecosystem about Business Aspects of Services SO Ecosystem (OASIS RAF) o is a space in which people, processes and machines act together to deliver business capabilities as services in order to further both their own objectives and the objectives of the larger community o there may not be any single person or organization that is really "in control" or"in charge" ofthe whole ecosystem The OASIS SOA Reference Model defines : Service Oriented Architecture SOA (OASIS RAF) is a paradigm for organizing and utilizing distributed capabilities that may be under the control of different ownership domains. It provides a uniform means to offer, discover, interact with and use capabilities to produce desired effects consistent with measurable preconditions and expectations. The central focus of SOA is the task or business function getting something done, and Services as the mechanism by which needs and capabilities are brought together. Together, these ideas describe an environment in which business functions (realized in the form of services) address business needs. Service body utilizes capabilities or represents a capability implementation to produce specific (real world) effects that fulfil business needs. Both the services and the capabilities may be distributed across ownership domains, with different policies and conditions of use Applications do not need Trust, services do Trust is the private assessment or internal perception of one actor that another actor will perform actions in accordance with an assertion regarding a desired real world effect. Ownership A set of claims, expressed as rights and responsibilities that a stakeholder has in relation to a resource; it may include the right to transfer that ownership, or some subset of rights and responsibilities, to another entity. Service Contract is a derivative from Service Description: An implicit or explicit documented agreement between the service consumer and service provider about the use of the service based on the commitment by a service provider to provide service functionality and results consistent with identified real world effects and the commitment by a service consumer to interact with the service per specific means and per specified policies, where both consumer and provider actions are in the manner described in the service description. 4
5 A Cloud Service is a SOA Service As for a regular SOA Business Service: o A Cloud Service is provided by independent business entity o A Cloud consumers reaches a Cloud Service based on a Service Contract o A Cloud consumers selects a Cloud Service based on an off-line Service Description o A Cloud Provider engages other Cloud Services on demand o A Cloud Provider offers different interfaces of the Cloud consumers depending on the agreement with them o A Cloud Provider competes with other Cloud Providers for the Cloud consumers. o A Cloud Provider charges Cloud consumers for the provided Cloud Services A Cloud Service is not your IT service; it requires a business, rather than technology, management 5
6 A Power of Knowledge SO Ecosystem mimics & models a real world Business. Since we know how SO Ecosystem operates, we can predict with a high level of accuracy the behavioural patterns of Service Providers and Service Consumers 6
7 Back to the Problem: Competing Security Realms I do not want to pay You, or I do not want to pay You more than your competitor charges Security Authority Security Authority Security Realm A Cloud Consumer Security Realm B 7
8 If You are not my Consumer, Why would I Care about your ID? XYZ MNQ ID ABC A propagation of an end-user identity among independent Cloud Services requires special considerations that may be commercially infeasible 8
9 Knight Rules of Service Ownership When work in SO Ecosystem, do as Services do A Service of my Service is not my Service A Supplier of my Supplier is not my Supplier A Partner of my Partner is not my Partner A Consumer of my Consumer is not my Consumer 9
10 What to Do? From Provider World to Consumer World We need to cross the boundaries of Cloud Security Realms Bridging 3 rd party Security Authority Security Gateway Service for the Realm A Security Authority ID 2 Security Authority Security Realm A ID 1 A Cloud Consumer Security Realm B 10
11 Clouds Service Security: how SOA Handles Commercialisation To Take Away: Every Cloud Provider is an independent business. Cloud includes security services of authentication, authorisation, encryption and so forth. Security services are for a cost to Cloud consumers Every Cloud Provider is free to chose a Security Authority and its protected realm Providers of Security Realms are not obliged to agree on any security cooperation, collaboration or federation No Cloud Provider can enforce a consumer to share the same Security Authority & realm A Provider of the Cloud services cannot and is not obliged to deal with any identity information that belongs to a consumer of its consumer. Nonetheless, this identity may be verified if they all consumers and providers are in the same Security Realm A Security Gateway Service can be created in any Security Realm and, being an independent business entity, participate in another Security Realm at the same time A Security Gateway Service can play a role of an intermediary across boundaries of the Security Realms Business Services establish trust regardless Security Authorities and Security Realms A propagation of the end-user s Identity in the chain of Cloud services makes sense only if both end-user and all chained Cloud services belong to the same Cloud Security Realm 11
12 Thank You! 12
FUJITSU Software Interstage Business Operations Platform: A Foundation for Smart Process Applications
FUJITSU Software Interstage Business Operations Platform: A Foundation for Smart Process Applications Keith Swenson VP R&D, Chief Architect Fujitsu America, Inc. May 30, 2013 We are a software company
More informationRealizing business flexibility through integrated SOA policy management.
SOA policy management White paper April 2009 Realizing business flexibility through integrated How integrated management supports business flexibility, consistency and accountability John Falkl, distinguished
More informationA Service Oriented Security Reference Architecture
International Journal of Advanced Computer Science and Information Technology (IJACSIT) Vol. 1, No.1, October 2012, Page: 25-31, ISSN: 2296-1739 Helvetic Editions LTD, Switzerland www.elvedit.com A Service
More informationDelivery date: 18 October 2014
Genomic and Clinical Data Sharing Policy Questions with Technology and Security Implications: Consensus s from the Data Safe Havens Task Team Delivery date: 18 October 2014 When the Security Working Group
More informationAn Introduction to the Technical Considerations of Social Business Version 1.0
An Introduction to the Technical Considerations of Social Business Version 1.0 November 2012 Contents An Introduction to the Technical Considerations of Social Business Version 1.0... 1 Acknowledgements...
More informationFederal Enterprise Architecture and Service-Oriented Architecture
Federal Enterprise Architecture and Service-Oriented Architecture Concepts and Synergies Melvin Greer Chief Strategist, SOA / Cloud Computing Certified Enterprise Architect Copyright August 19, 2010 2010
More informationTrust areas: a security paradigm for the Future Internet
Trust areas: a security paradigm for the Future Internet Carsten Rudolph Fraunhofer Institute for Secure Information Technology SIT Rheinstrasse 75, Darmstadt, Germany Carsten.Rudolph@sit.fraunhofer.de
More informationUPDATING RM-ODP BY INTEGRATION OF SOA AND CLOUD COMPUTING
UPDATING RM-ODP BY INTEGRATION OF SOA AND CLOUD COMPUTING MOSTAFA JEBBAR, OTHMAN BENAMMAR and ABDERRAHIM SEKKAKI Department of Mathematics and Computer Science University Hassan II, Aïn Chock, Faculty
More informationIntroduction to Service Oriented Architectures (SOA)
Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction
More informationSecuring Web Services With SAML
Carl A. Foster CS-5260 Research Project Securing Web Services With SAML Contents 1.0 Introduction... 2 2.0 What is SAML?... 2 3.0 History of SAML... 3 4.0 The Anatomy of SAML 2.0... 3 4.0.1- Assertion
More informationServer based signature service. Overview
1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...
More informationEA, BPM and SOA. Bridging the information gap using the Oracle BPA Suite and an integrated model. Dirk Stähler, Director Strategy and Innovation
EA, BPM and SOA Bridging the information gap using the Oracle BPA Suite and an integrated model Dirk Stähler, Director Strategy and Innovation OPITZ CONSULTING GmbH Warsaw, 2010/09/14 OPITZ CONSULTING
More informationService Oriented Architecture
Service Oriented Architecture Impact on Information Quality PG 945 John Walsh - Personal GROUP 1 software PG 946 Service Oriented Architecture (SOA) Key Concepts Software functionality is a re-usable service
More informationCloud, security and the mobile enterprise: An end-to-end manageability challenge
GreHack-2012 19 th October, Grenoble France Cloud, security and the mobile enterprise: An end-to-end manageability challenge Boris Balacheff Dave Penkler seamless, secure, context-aware experiences for
More informationIntegration of SOA and Cloud Computing in RM- ODP
Integration of SOA and Cloud Computing in RM- ODP Mostafa Jebbar, Abedrrahim Sekkaki, Othmane Benamar. Departement of Mathematics and Computer Science University Hassan II, Ain Chock, Faculty of Sciences
More informationCloud Computing Standards: Overview and ITU-T positioning
ITU Workshop on Cloud Computing (Tunis, Tunisia, 18-19 June 2012) Cloud Computing Standards: Overview and ITU-T positioning Dr France Telecom, Orange Labs Networks & Carriers / R&D Chairman ITU-T Working
More informationService-Oriented Architecture and Software Engineering
-Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based
More informationTMW01 Managing and Deploying BYOD Identity Solutions with a Microsoft PKI
TMW01 Managing and Deploying BYOD Identity Solutions with a Microsoft PKI Mark B. Cooper President & Founder PKI Solutions Inc. @PKISOLUTIONS Level: Intermediate [ About PKI Solutions Inc. 10 years as
More informationRun-time Service Oriented Architecture (SOA) V 0.1
Run-time Service Oriented Architecture (SOA) V 0.1 July 2005 Table of Contents 1.0 INTRODUCTION... 1 2.0 PRINCIPLES... 1 3.0 FERA REFERENCE ARCHITECTURE... 2 4.0 SOA RUN-TIME ARCHITECTURE...4 4.1 FEDERATES...
More informationFigure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT
An Overview Of Future Impact Of Cloud Computing Shiva Chaudhry COMPUTER SCIENCE DEPARTMENT IFTM UNIVERSITY MORADABAD Abstraction: The concept of cloud computing has broadcast quickly by the information
More informationBuilding the Agile Enterprise. The MK/OMG Press
Brochure More information from http://www.researchandmarkets.com/reports/1757796/ Building the Agile Enterprise. The MK/OMG Press Description: In the last ten years IT has brought fundamental changes to
More informationSoftware Engineering Reference Framework
Software Engineering Reference Framework Michel Chaudron, Jan Friso Groote, Kees van Hee, Kees Hemerik, Lou Somers, Tom Verhoeff. Department of Mathematics and Computer Science Eindhoven University of
More informationOpen S-BPM: Goals and Architecture
Open S-BPM: Goals and Architecture Albert Fleischmann Werner Schmidt Table of Content 1 Introduction... 2 2 Mission, Vision and Objectives... 2 3 Research and Development Areas... 3 4 Open S-BPM Architecture...
More informationCustomer Cloud Architecture for Mobile. http://cloud-council.org/resource-hub.htm#customer-cloud-architecture-for-mobile
Customer Cloud Architecture for Mobile http://cloud-council.org/resource-hub.htm#customer-cloud-architecture-for-mobile June, 2015 1 Presenters Heather Kreger CTO International Standards, IBM US SC38 mirror
More informationOPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
More informationInfrastructure as a SERVICE
It s our opinion infrastructure Infrastructure as a SERVICE More efficient, cheaper infrastructure that can be better controlled and managed Providing infrastructure as a catalogue of services attacks
More informationThe Ethics of Cloud Computing A Conceptual Review
The A Conceptual Review Job Timmermans, TU Delft, Department of Philosophy, The Netherlands Bernd Carsten Stahl, De Montfort, Critical Research in Technology, UK Veikko Ikonen, VTT, Finland Engin Bozdag,
More informationTECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES
REALIZATION OF A RESEARCH AND DEVELOPMENT PROJECT (PRE-COMMERCIAL PROCUREMENT) ON CLOUD FOR EUROPE TECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES ANNEX IV (D) TO THE CONTRACT NOTICE TENDER
More informationITL BULLETIN FOR JULY 2012. Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance
ITL BULLETIN FOR JULY 2012 Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance Paul Turner, Venafi William Polk, Computer Security Division, Information
More informationPrivacy & Security of Mobile Cloud Computing (MCC)
Privacy & Security of Mobile Cloud Computing (MCC) Manmohan Chaturvedi Principal Advisor Research & Technology Development Beyond Evolution Tech Solutions Pvt. Ltd. MOBILE COMPUTING CHALLENGES Mobile devices
More informationGuiding SOA Evolution through Governance From SOA 101 to Virtualization to Cloud Computing
Guiding SOA Evolution through Governance From SOA 101 to Virtualization to Cloud Computing 3-day seminar The evolution of how companies employ SOA can be broken down into three phases: the initial phase
More informationComparative Analysis of SOA and Cloud Computing Architectures using Fact Based Modeling
Comparative Analysis of SOA and Cloud Computing Architectures using Fact Based Modeling Baba Piprani 1, Don Sheppard 2, Abbie Barbir 3 1 MetaGlobal Systems, Canada 2 ConCon Management Services, Canada
More informationEnterprise Service Specification
Enterprise Service Specification ProPath Office of Information and Technology Table of Contents Enterprise Service Specification Process Map... 1 Process: Enterprise Service Specification... 2 Enterprise
More informationThe XACML Enabled Gateway The Entrance to a New SOA Ecosystem
The XACML Enabled Gateway The Entrance to a New SOA Ecosystem White Paper Intel SOA Expressway and Axiomatics Policy Server Solution Intel SOA Expressway and Axiomatics Policy Server combined provide a
More informationIBM WebSphere Application Server
IBM WebSphere Application Server SAML 2.0 web single-sign-on 2012 IBM Corporation This presentation describes support for SAML 2.0 web browser Single Sign On profile included in IBM WebSphere Application
More informationQuality Ensuring Development of Software Processes
Quality Ensuring Development of Software Processes ALEXANDER FÖRSTER,GREGOR ENGELS Department of Computer Science University of Paderborn D-33095 Paderborn, Germany {alfo engels}@upb.de ABSTRACT: Software
More informationIntegrating ITSM and Cloud into Enterprise IT Governance
ITSM and Cloud Computing: Integrating ITSM and Cloud into Enterprise IT Governance Presented by: Eric Marks AgilePath Corporation President & CEO Agenda ITSM in Enterprise Governance Context ITSM Integration
More informationLeveraging MITA to Implement Service Oriented Architecture and Enterprise Data Management. Category: Cross Boundary Collaboration
Leveraging MITA to Implement Service Oriented Architecture and Enterprise Data Management Category: Cross Boundary Collaboration Initiation date: August 2011 Completion date: October 2013 Nomination submitted
More informationEstablishing a Data-Centric Approach to Encryption
Establishing a Data-Centric Approach to Encryption Marcia Kaufman, COO and Principal Analyst Sponsored by Voltage Security Voltage Security: Many data breaches occur at companies that already have a data
More informationIntroduction to SOA governance and service lifecycle management.
-oriented architecture White paper March 2009 Introduction to SOA governance and Best practices for development and deployment Bill Brown, executive IT architect, worldwide SOA governance SGMM lead, SOA
More informationEXHIBIT A. Part IV Content Identification 1. the transmission of content, it is important to consider how content can be identified (e.g.
EXHIBIT A Part IV Content Identification 1 As this article has been considering certain intellectual property ramifications relating to the transmission of content, it is important to consider how content
More informationBusiness Object Document (BOD) Message Architecture for OAGIS Release 9.+
Business Object Document (BOD) Message Architecture for OAGIS Release 9.+ an OAGi White Paper Document #20110408V1.0 Open standards that open markets TM Open Applications Group, Incorporated OAGi A consortium
More informationProtect Everything: Networks, Applications and Cloud Services
Protect Everything: Networks, Applications and Cloud Services Tokens & Users Cloud Applications Private Networks Corporate Network API LDAP / Active Directory SAML RADIUS Corporate Network LDAP / Active
More informationEHR Standards Landscape
EHR Standards Landscape Dr Dipak Kalra Centre for Health Informatics and Multiprofessional Education (CHIME) University College London d.kalra@chime.ucl.ac.uk A trans-national ehealth Infostructure Wellness
More informationBlue Fire Thames Court 1 Victoria Street Windsor SL4 1YB enquiries@bluefire-uk.com www.bluefire-uk.com
Blue Fire Thames Court 1 Victoria Street Windsor SL4 1YB enquiries@bluefire-uk.com www.bluefire-uk.com 1 1. Service Description Blue Fire is a Digital and IT Practice focused on supplying individuals and
More informationThe case for service oriented architecture in realising trusted, interoperable, pan-european egovernment services.
The case for service oriented architecture in realising trusted, interoperable, pan-european egovernment services. Stephen McGibbon Microsoft EMEA Tel. +445511490070 Email. stephenm@microsoft.com Abstract:
More informationViewpoint. MNS Viewpoint: Managed Services Challenges and Strategies for MNO. 1 Managed Services Strategy
MNS Viewpoint: Managed Services Challenges and Strategies for MNO 1 Managed Services Strategy 1. Market trends Over the last years, new trends have redefined the telecoms market, including mass-market
More informationDeveloping Business Architecture with TOGAF
Developing Business Architecture with TOGAF Building Business Capability 2013 Las Vegas, NV Armstrong Process Group, Inc. www.aprocessgroup.com Objectives Introduce The Open Group Architecture Framework
More informationMaster Data Management (MDM)
the way we do it Master Data Management (MDM) Mastering the Information Ocean Mastery of information gives business control In the modern business, the volume of information is increasing and the value
More informationService-Oriented Computing and Service-Oriented Architecture
Service-Oriented Computing and Service-Oriented Architecture Week 3 Lecture 5 M. Ali Babar Lecture Outline Service-Oriented Computing (SOC) Service-Oriented Architecture (SOA) Designing service-based systems
More informationMicrosoft SOA Roadmap
Microsoft SOA Roadmap Application Platform for SOA and BPM Thomas Reimer Enterprise Technology Strategist, SOA and BPM Microsoft Corporation (EMEA) Trends and Roadmap THE FUTURE OF DYNAMIC IT Market Trends
More informationTable of Contents. 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8
Table of Contents 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8 3 SOA in Verizon The IT Workbench Platform... 10 3.1 Technology... 10 3.2 Processes
More informationSERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) VERSION 2.1 SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS 1 TABLE OF CONTENTS INTRODUCTION... 3 About The Service-Oriented Modeling Framework
More informationCloud-based Identity and Access Control for Diagnostic Imaging Systems
Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology
More informationSOA + BPM = Agile Integrated Tax Systems. Hemant Sharma CTO, State and Local Government
SOA + BPM = Agile Integrated Tax Systems Hemant Sharma CTO, State and Local Government Nothing Endures But Change 2 Defining Agility It is the ability of an organization to recognize change and respond
More information1 Publishable summary
1 Publishable summary The 4CaaSt research project is creating an advanced Platform as a Service (PaaS). This cloud platform supports the optimized and elastic hosting of internet-scale multi-tier applications.
More informationNIST s Guide to Secure Web Services
NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:
More informationImplementing a Phased Approach to Master Data Management
Implementing a Phased Approach to Master Data Management Writer: Tyler Graham Published: April 2010 Applies to: SQL Server 2008 R2 Master Data Services Summary: This article provides common ways to approach
More informationThe Need for Service Catalog Design in Cloud Services Development
The Need for Service Catalog Design in Cloud Services Development The purpose of this document: Provide an overview of the cloud service catalog and show how the service catalog design is an fundamental
More informationTWX-21 Business System Cloud for Global Corporations
TWX-21 Business System Cloud for Global Corporations 8 TWX-21 Business System Cloud for Global Corporations Hidenori Kiuchi Yasuyuki Suzuki Sho Obayashi Manabu Naganuma Seiichiro Hayashi Taku Tozawa OVERVIEW:
More informationCS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
More informationOpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
More informationOpen Group SOA Governance. San Diego 2009
Open Group SOA Governance San Diego 2009 SOA Governance Aspects A comprehensive view of SOA Governance includes: People Organizational structures Roles & Responsibilities Processes Governing processes
More informationA Framework for Virtual Enterprise Support Services
A Framework for Virtual Enterprise Support Services Vaggelis Ouzounis, Volker Tschammer ECCO Electronic Commerce Center of Competence, GMD-Fokus, Kaiserin-Augusta-Allee 31, D-10589, Berlin, Germany Tel:
More informationNCTA Cloud Architecture
NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,
More informationIBM Software IBM Business Process Management Suite. Increase business agility with the IBM Business Process Management Suite
IBM Software IBM Business Process Management Suite Increase business agility with the IBM Business Process Management Suite 2 Increase business agility with the IBM Business Process Management Suite We
More informationOpen Source Innovation Conference
Open Source Innovation Conference Open Source as Competitive Advantage Joe Dickman Senior Vice President, Vizuri Applied Engineering Management Corporation Agenda Introductions Use of Open Source Technologies
More informationMaster Data Management (MDM)
Business Information Management the way we see it Master Data Management (MDM) Mastering the Information Ocean Business Information Management the way we see it Mastery of information gives business control
More informationSolutions Master Data Governance Model and Mechanism
www.pwc.com Solutions Master Data Governance Model and Mechanism Executive summary Organizations worldwide are rapidly adopting various Master Data Management (MDM) solutions to address and overcome business
More informationD6.1: Service management tools implementation and maturity baseline assessment framework
D6.1: Service management tools implementation and maturity baseline assessment framework Deliverable Document ID Status Version Author(s) Due FedSM- D6.1 Final 1.1 Tomasz Szepieniec, All M10 (31 June 2013)
More informationSecuring and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable
More informationService Oriented Architecture and Its Advantages
ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:
More informationIT Audit and Compliance
Problem IT Audit and Compliance IT audit is about the formal verification and validation of the quality and effectiveness of IT controls to support the overall business control objectives. From a security
More informationValidating Enterprise Systems: A Practical Guide
Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise
More informationWeb Services - Consultant s View. From IT Stategy to IT Architecture. Agenda. Introduction
Web Services - A Consultant s View From IT Stategy to IT Architecture Hans-Peter Hoidn, Timothy Jones, Jürg Baumann, Oliver Vogel February 12, 2003 Copyright IBM Corporation 2002 Agenda Introduction I.
More informationINTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN
INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO
More informationGreen Power Accounting Workshop: Concept Note For discussion during Green Power Accounting Workshop in Mexico City, May 13th 2011
Introduction As more companies and government organizations prepare greenhouse gas (GHG) inventories that reflect the emissions directly and indirectly associated with their operations, they increasingly
More informationModule 6. e-business and e- Commerce
Module 6 e-business and e- Commerce 6.1 e-business systems 6.2 e-commerce systems 6.3 Essential e- commerce processes 6.4 Electronic payment processes 6.5 e-commerce application trends 6.6 Web store requirements
More informationjourney to a hybrid cloud
journey to a hybrid cloud Virtualization and Automation VI015SN journey to a hybrid cloud Jim Sweeney, CTO GTSI about the speaker Jim Sweeney GTSI, Chief Technology Officer 35 years of engineering experience
More informationSOA Enabled Workflow Modernization
Abstract Vitaly Khusidman Workflow Modernization is a case of Architecture Driven Modernization (ADM) and follows ADM Horseshoe Lifecycle. This paper explains how workflow modernization fits into the ADM
More informationEval-Source. Apparancy Business Process Platform. Analyst Review
Eval-Source Apparancy Business Process Platform Analyst Review Solution Background Business Process (BP) and Business Process Management (BPM) are complex practices that are composed of structured activities/tasks,
More informationTwo-Factor Authentication
WHITE PAPER: TWO-FACTOR AUTHENTICATION: A TCO VIEWPOINT........................................ Two-Factor Authentication Who should read this paper This whitepaper is directed at IT, Security, and Compliance
More informationTufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao Guocui.gao@tufts.edu Mentor:
More informationDigital Documents, Compliance and the Cloud
A Perspective on Navigating the Complexities Associated with Digital Document Transmission and Security for the Modern Enterprise. What are Digital (Electronic) Documents The Rise of the e-document Definition
More informationOverview of major concepts in the service oriented extended OeBTO
Modelling business policies and behaviour based on extended Open edi Business Transaction Ontology (OeBTO) Introduction Model Driven Development (MDD) provides a basis for the alignment between business
More informationCyber Essentials Questionnaire
Cyber Essentials Questionnaire Introduction The Cyber Essentials scheme is recommended for organisations looking for a base level Cyber security test where IT is a business enabler rather than a core deliverable.
More informationETSI TS 132 375 V7.0.0 (2007-06) Technical Specification
TS 132 375 V7.0.0 (2007-06) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Telecommunication management; Security services
More informationThe data centre in 2020
INSIDE TRACK Analyst commentary with a real-world edge The data centre in 2020 Dream the impossible dream! By Tony Lock, January 2013 Originally published on http://www.theregister.co.uk/ There has never
More informationEnterprise Service Provisioning
Enterprise Service Provisioning ProPath Office of Information and Technology Table of Contents Enterprise Service Provisioning Process Map... 1 Process: Enterprise Service Provisioning... 2 Enterprise
More informationProfessional Cloud Solutions and Service Practices
Emerging Technologies Professional Cloud Solutions and Service Practices The Shift to a Service-on-Demand Business Operating Model and Working Practices By Mark Skilton, CEO, Digital Ecosystem practices,
More informationWhite Paper. Automating the Virtual Data Center. Communication for the open minded. Mark Townsend, Director of Solutions Management
White Paper Automating the Virtual Data Center Mark Townsend, Director of Solutions Management Enterasys (a division of Siemens Enterprise Communications) Communication for the open minded Siemens Enterprise
More informationWhat s New In ITIL V3?
What s New In ITIL V3? George Spalding VP, Global Events Pink Elephant Pink Elephant Leading The Way In IT Management Best Practices The ITIL Books (V2) T h e B u s i n e s s Planning To Implement Service
More informationOutline SOA. Properties of SOA. Service 2/19/2016. Definitions. Comparison of component technologies. Definitions Component technologies
Szolgáltatásorientált rendszerintegráció Comparison of component technologies Simon Balázs, BME IIT Outline Definitions Component technologies RPC, RMI, CORBA, COM+,.NET, Java, OSGi, EJB, SOAP web services,
More informationVOL. 2, NO. 3, March 2012 ISSN 2222-9833 ARPN Journal of Systems and Software 2009-2011 AJSS Journal. All rights reserved
Five Aspects of Application Integration Requirements Fazilat Hojaji MS of Information Technology Engineering, Amirkabir University of Technology Computer Engineering & IT Department Hafez ST,Tehran, Iran
More informationSecuring Data in Oracle Database 12c
Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
More informationFidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1
Fidelis XPS Power Tools Gaining Visibility Into Your Cloud: Cloud Services Security February 2012 PAGE 1 PAGE 1 Introduction Enterprises worldwide are increasing their reliance on Cloud Service providers
More informationTECHNICAL SPECIFICATION: SECURE LEGISLATION-AWARE STORAGE SOLUTION
REALIZATION OF A RESEARCH AND DEVELOPMENT PROJECT (PRE-COMMERCIAL PROCUREMENT) ON CLOUD FOR EUROPE TECHNICAL SPECIFICATION: SECURE LEGISLATION-AWARE STORAGE SOLUTION ANNEX IV (C) TO THE CONTRACT NOTICE
More informationA MORE FLEXIBLE MULTI-TENANT SOA FOR SAAS
A MORE FLEXIBLE MULTI-TENANT SOA FOR SAAS Eric H. Nielsen, Ph.D. VP Platform Architecture CA Technologies e.h.nielsen@ieee.org For IEEE Software Technology Conference STC 2014 April 3, 2014 Long Beach,
More informationIBM WebSphere Application Server
IBM WebSphere Application Server OAuth 2.0 service provider and TAI 2012 IBM Corporation This presentation describes support for OAuth 2.0 included in IBM WebSphere Application Server V7.0.0.25. WASV70025_OAuth20.ppt
More information