Identity Provisions for Cloud Services: Applying OASIS SOA Reference Model

Size: px
Start display at page:

Download "Identity Provisions for Cloud Services: Applying OASIS SOA Reference Model"

Transcription

1 Identity Provisions for Cloud Services: Applying OASIS SOA Reference Model Presented by: Dr Michael Poulin Member & Co editor at SOA RM TC Member of AASCIT (American Association for Science and Technology) OASIS RM for SOA & RAF for SOA Head of EA, Clingstone Ltd.

2 Unexpected and Hidden Problem What is the difference between a File in your company s File Server and the same File, but located in the Cloud File Server? Assumption: your company does not own this Cloud Answer 1: no differences Answer 3: it is not 100% my file any more Answer 2: do not know A treatment of Consumer Identity for in house Applications or Services A treatment of Consumer Identity for Cloud Services A procurement of this problem from the perspective of SOA-RAF - the Reference Architecture Foundation for SOA, the OASIS Specification [Version 1.0 Committee Specification 01, 04 December 2012 ] has led to interesting results 2

3 OASIS RAF for SOA SO Ecosystem <viewpoint> Captures what is meant to realize a SOA-based system in a SOA ecosystem. Stakeholders - involved in the design, development and deployment of SOA-based systems Effective construction of SOA-based systems. <model> Understanding Governance A Generic Model for Governance Governance Applied to SOA Architectural Implications of SOA Governance <viewpoint> <viewpoint> Captures what is meant for people to participate in a SOA ecosystem Stakeholders - all participants in the SOA ecosystem Understanding ecosystem constraints and contexts in which business can be conducted predictably and effectively. OASIS Reference Architecture Foundation for SOA Captures what is meant to own a SOA-based system in a SOA ecosystem Stakeholders - involved in governing, managing, securing, and testing SOA-based systems Processes to ensure governance, management, security, and testing of SOA-based systems feedback direction <position> <model> Landscape Around Architecture," Joint Paper, The Open Group, OASIS, and OMG, July 2009 Management Management Means & Relationships Management & Governance Management & Contracts Management for Monitoring & Reporting Management for Infrastructure Architectural Implications on the Management Model 3

4 SO Ecosystem about Business Aspects of Services SO Ecosystem (OASIS RAF) o is a space in which people, processes and machines act together to deliver business capabilities as services in order to further both their own objectives and the objectives of the larger community o there may not be any single person or organization that is really "in control" or"in charge" ofthe whole ecosystem The OASIS SOA Reference Model defines : Service Oriented Architecture SOA (OASIS RAF) is a paradigm for organizing and utilizing distributed capabilities that may be under the control of different ownership domains. It provides a uniform means to offer, discover, interact with and use capabilities to produce desired effects consistent with measurable preconditions and expectations. The central focus of SOA is the task or business function getting something done, and Services as the mechanism by which needs and capabilities are brought together. Together, these ideas describe an environment in which business functions (realized in the form of services) address business needs. Service body utilizes capabilities or represents a capability implementation to produce specific (real world) effects that fulfil business needs. Both the services and the capabilities may be distributed across ownership domains, with different policies and conditions of use Applications do not need Trust, services do Trust is the private assessment or internal perception of one actor that another actor will perform actions in accordance with an assertion regarding a desired real world effect. Ownership A set of claims, expressed as rights and responsibilities that a stakeholder has in relation to a resource; it may include the right to transfer that ownership, or some subset of rights and responsibilities, to another entity. Service Contract is a derivative from Service Description: An implicit or explicit documented agreement between the service consumer and service provider about the use of the service based on the commitment by a service provider to provide service functionality and results consistent with identified real world effects and the commitment by a service consumer to interact with the service per specific means and per specified policies, where both consumer and provider actions are in the manner described in the service description. 4

5 A Cloud Service is a SOA Service As for a regular SOA Business Service: o A Cloud Service is provided by independent business entity o A Cloud consumers reaches a Cloud Service based on a Service Contract o A Cloud consumers selects a Cloud Service based on an off-line Service Description o A Cloud Provider engages other Cloud Services on demand o A Cloud Provider offers different interfaces of the Cloud consumers depending on the agreement with them o A Cloud Provider competes with other Cloud Providers for the Cloud consumers. o A Cloud Provider charges Cloud consumers for the provided Cloud Services A Cloud Service is not your IT service; it requires a business, rather than technology, management 5

6 A Power of Knowledge SO Ecosystem mimics & models a real world Business. Since we know how SO Ecosystem operates, we can predict with a high level of accuracy the behavioural patterns of Service Providers and Service Consumers 6

7 Back to the Problem: Competing Security Realms I do not want to pay You, or I do not want to pay You more than your competitor charges Security Authority Security Authority Security Realm A Cloud Consumer Security Realm B 7

8 If You are not my Consumer, Why would I Care about your ID? XYZ MNQ ID ABC A propagation of an end-user identity among independent Cloud Services requires special considerations that may be commercially infeasible 8

9 Knight Rules of Service Ownership When work in SO Ecosystem, do as Services do A Service of my Service is not my Service A Supplier of my Supplier is not my Supplier A Partner of my Partner is not my Partner A Consumer of my Consumer is not my Consumer 9

10 What to Do? From Provider World to Consumer World We need to cross the boundaries of Cloud Security Realms Bridging 3 rd party Security Authority Security Gateway Service for the Realm A Security Authority ID 2 Security Authority Security Realm A ID 1 A Cloud Consumer Security Realm B 10

11 Clouds Service Security: how SOA Handles Commercialisation To Take Away: Every Cloud Provider is an independent business. Cloud includes security services of authentication, authorisation, encryption and so forth. Security services are for a cost to Cloud consumers Every Cloud Provider is free to chose a Security Authority and its protected realm Providers of Security Realms are not obliged to agree on any security cooperation, collaboration or federation No Cloud Provider can enforce a consumer to share the same Security Authority & realm A Provider of the Cloud services cannot and is not obliged to deal with any identity information that belongs to a consumer of its consumer. Nonetheless, this identity may be verified if they all consumers and providers are in the same Security Realm A Security Gateway Service can be created in any Security Realm and, being an independent business entity, participate in another Security Realm at the same time A Security Gateway Service can play a role of an intermediary across boundaries of the Security Realms Business Services establish trust regardless Security Authorities and Security Realms A propagation of the end-user s Identity in the chain of Cloud services makes sense only if both end-user and all chained Cloud services belong to the same Cloud Security Realm 11

12 Thank You! 12

FUJITSU Software Interstage Business Operations Platform: A Foundation for Smart Process Applications

FUJITSU Software Interstage Business Operations Platform: A Foundation for Smart Process Applications FUJITSU Software Interstage Business Operations Platform: A Foundation for Smart Process Applications Keith Swenson VP R&D, Chief Architect Fujitsu America, Inc. May 30, 2013 We are a software company

More information

Realizing business flexibility through integrated SOA policy management.

Realizing business flexibility through integrated SOA policy management. SOA policy management White paper April 2009 Realizing business flexibility through integrated How integrated management supports business flexibility, consistency and accountability John Falkl, distinguished

More information

A Service Oriented Security Reference Architecture

A Service Oriented Security Reference Architecture International Journal of Advanced Computer Science and Information Technology (IJACSIT) Vol. 1, No.1, October 2012, Page: 25-31, ISSN: 2296-1739 Helvetic Editions LTD, Switzerland www.elvedit.com A Service

More information

Delivery date: 18 October 2014

Delivery date: 18 October 2014 Genomic and Clinical Data Sharing Policy Questions with Technology and Security Implications: Consensus s from the Data Safe Havens Task Team Delivery date: 18 October 2014 When the Security Working Group

More information

An Introduction to the Technical Considerations of Social Business Version 1.0

An Introduction to the Technical Considerations of Social Business Version 1.0 An Introduction to the Technical Considerations of Social Business Version 1.0 November 2012 Contents An Introduction to the Technical Considerations of Social Business Version 1.0... 1 Acknowledgements...

More information

Federal Enterprise Architecture and Service-Oriented Architecture

Federal Enterprise Architecture and Service-Oriented Architecture Federal Enterprise Architecture and Service-Oriented Architecture Concepts and Synergies Melvin Greer Chief Strategist, SOA / Cloud Computing Certified Enterprise Architect Copyright August 19, 2010 2010

More information

Trust areas: a security paradigm for the Future Internet

Trust areas: a security paradigm for the Future Internet Trust areas: a security paradigm for the Future Internet Carsten Rudolph Fraunhofer Institute for Secure Information Technology SIT Rheinstrasse 75, Darmstadt, Germany Carsten.Rudolph@sit.fraunhofer.de

More information

UPDATING RM-ODP BY INTEGRATION OF SOA AND CLOUD COMPUTING

UPDATING RM-ODP BY INTEGRATION OF SOA AND CLOUD COMPUTING UPDATING RM-ODP BY INTEGRATION OF SOA AND CLOUD COMPUTING MOSTAFA JEBBAR, OTHMAN BENAMMAR and ABDERRAHIM SEKKAKI Department of Mathematics and Computer Science University Hassan II, Aïn Chock, Faculty

More information

Introduction to Service Oriented Architectures (SOA)

Introduction to Service Oriented Architectures (SOA) Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction

More information

Securing Web Services With SAML

Securing Web Services With SAML Carl A. Foster CS-5260 Research Project Securing Web Services With SAML Contents 1.0 Introduction... 2 2.0 What is SAML?... 2 3.0 History of SAML... 3 4.0 The Anatomy of SAML 2.0... 3 4.0.1- Assertion

More information

Server based signature service. Overview

Server based signature service. Overview 1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...

More information

EA, BPM and SOA. Bridging the information gap using the Oracle BPA Suite and an integrated model. Dirk Stähler, Director Strategy and Innovation

EA, BPM and SOA. Bridging the information gap using the Oracle BPA Suite and an integrated model. Dirk Stähler, Director Strategy and Innovation EA, BPM and SOA Bridging the information gap using the Oracle BPA Suite and an integrated model Dirk Stähler, Director Strategy and Innovation OPITZ CONSULTING GmbH Warsaw, 2010/09/14 OPITZ CONSULTING

More information

Service Oriented Architecture

Service Oriented Architecture Service Oriented Architecture Impact on Information Quality PG 945 John Walsh - Personal GROUP 1 software PG 946 Service Oriented Architecture (SOA) Key Concepts Software functionality is a re-usable service

More information

Cloud, security and the mobile enterprise: An end-to-end manageability challenge

Cloud, security and the mobile enterprise: An end-to-end manageability challenge GreHack-2012 19 th October, Grenoble France Cloud, security and the mobile enterprise: An end-to-end manageability challenge Boris Balacheff Dave Penkler seamless, secure, context-aware experiences for

More information

Integration of SOA and Cloud Computing in RM- ODP

Integration of SOA and Cloud Computing in RM- ODP Integration of SOA and Cloud Computing in RM- ODP Mostafa Jebbar, Abedrrahim Sekkaki, Othmane Benamar. Departement of Mathematics and Computer Science University Hassan II, Ain Chock, Faculty of Sciences

More information

Cloud Computing Standards: Overview and ITU-T positioning

Cloud Computing Standards: Overview and ITU-T positioning ITU Workshop on Cloud Computing (Tunis, Tunisia, 18-19 June 2012) Cloud Computing Standards: Overview and ITU-T positioning Dr France Telecom, Orange Labs Networks & Carriers / R&D Chairman ITU-T Working

More information

Service-Oriented Architecture and Software Engineering

Service-Oriented Architecture and Software Engineering -Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based

More information

TMW01 Managing and Deploying BYOD Identity Solutions with a Microsoft PKI

TMW01 Managing and Deploying BYOD Identity Solutions with a Microsoft PKI TMW01 Managing and Deploying BYOD Identity Solutions with a Microsoft PKI Mark B. Cooper President & Founder PKI Solutions Inc. @PKISOLUTIONS Level: Intermediate [ About PKI Solutions Inc. 10 years as

More information

Run-time Service Oriented Architecture (SOA) V 0.1

Run-time Service Oriented Architecture (SOA) V 0.1 Run-time Service Oriented Architecture (SOA) V 0.1 July 2005 Table of Contents 1.0 INTRODUCTION... 1 2.0 PRINCIPLES... 1 3.0 FERA REFERENCE ARCHITECTURE... 2 4.0 SOA RUN-TIME ARCHITECTURE...4 4.1 FEDERATES...

More information

Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT

Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT An Overview Of Future Impact Of Cloud Computing Shiva Chaudhry COMPUTER SCIENCE DEPARTMENT IFTM UNIVERSITY MORADABAD Abstraction: The concept of cloud computing has broadcast quickly by the information

More information

Building the Agile Enterprise. The MK/OMG Press

Building the Agile Enterprise. The MK/OMG Press Brochure More information from http://www.researchandmarkets.com/reports/1757796/ Building the Agile Enterprise. The MK/OMG Press Description: In the last ten years IT has brought fundamental changes to

More information

Software Engineering Reference Framework

Software Engineering Reference Framework Software Engineering Reference Framework Michel Chaudron, Jan Friso Groote, Kees van Hee, Kees Hemerik, Lou Somers, Tom Verhoeff. Department of Mathematics and Computer Science Eindhoven University of

More information

Open S-BPM: Goals and Architecture

Open S-BPM: Goals and Architecture Open S-BPM: Goals and Architecture Albert Fleischmann Werner Schmidt Table of Content 1 Introduction... 2 2 Mission, Vision and Objectives... 2 3 Research and Development Areas... 3 4 Open S-BPM Architecture...

More information

Customer Cloud Architecture for Mobile. http://cloud-council.org/resource-hub.htm#customer-cloud-architecture-for-mobile

Customer Cloud Architecture for Mobile. http://cloud-council.org/resource-hub.htm#customer-cloud-architecture-for-mobile Customer Cloud Architecture for Mobile http://cloud-council.org/resource-hub.htm#customer-cloud-architecture-for-mobile June, 2015 1 Presenters Heather Kreger CTO International Standards, IBM US SC38 mirror

More information

OPENIAM ACCESS MANAGER. Web Access Management made Easy

OPENIAM ACCESS MANAGER. Web Access Management made Easy OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access

More information

Infrastructure as a SERVICE

Infrastructure as a SERVICE It s our opinion infrastructure Infrastructure as a SERVICE More efficient, cheaper infrastructure that can be better controlled and managed Providing infrastructure as a catalogue of services attacks

More information

The Ethics of Cloud Computing A Conceptual Review

The Ethics of Cloud Computing A Conceptual Review The A Conceptual Review Job Timmermans, TU Delft, Department of Philosophy, The Netherlands Bernd Carsten Stahl, De Montfort, Critical Research in Technology, UK Veikko Ikonen, VTT, Finland Engin Bozdag,

More information

TECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES

TECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES REALIZATION OF A RESEARCH AND DEVELOPMENT PROJECT (PRE-COMMERCIAL PROCUREMENT) ON CLOUD FOR EUROPE TECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES ANNEX IV (D) TO THE CONTRACT NOTICE TENDER

More information

ITL BULLETIN FOR JULY 2012. Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance

ITL BULLETIN FOR JULY 2012. Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance ITL BULLETIN FOR JULY 2012 Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance Paul Turner, Venafi William Polk, Computer Security Division, Information

More information

Privacy & Security of Mobile Cloud Computing (MCC)

Privacy & Security of Mobile Cloud Computing (MCC) Privacy & Security of Mobile Cloud Computing (MCC) Manmohan Chaturvedi Principal Advisor Research & Technology Development Beyond Evolution Tech Solutions Pvt. Ltd. MOBILE COMPUTING CHALLENGES Mobile devices

More information

Guiding SOA Evolution through Governance From SOA 101 to Virtualization to Cloud Computing

Guiding SOA Evolution through Governance From SOA 101 to Virtualization to Cloud Computing Guiding SOA Evolution through Governance From SOA 101 to Virtualization to Cloud Computing 3-day seminar The evolution of how companies employ SOA can be broken down into three phases: the initial phase

More information

Comparative Analysis of SOA and Cloud Computing Architectures using Fact Based Modeling

Comparative Analysis of SOA and Cloud Computing Architectures using Fact Based Modeling Comparative Analysis of SOA and Cloud Computing Architectures using Fact Based Modeling Baba Piprani 1, Don Sheppard 2, Abbie Barbir 3 1 MetaGlobal Systems, Canada 2 ConCon Management Services, Canada

More information

Enterprise Service Specification

Enterprise Service Specification Enterprise Service Specification ProPath Office of Information and Technology Table of Contents Enterprise Service Specification Process Map... 1 Process: Enterprise Service Specification... 2 Enterprise

More information

The XACML Enabled Gateway The Entrance to a New SOA Ecosystem

The XACML Enabled Gateway The Entrance to a New SOA Ecosystem The XACML Enabled Gateway The Entrance to a New SOA Ecosystem White Paper Intel SOA Expressway and Axiomatics Policy Server Solution Intel SOA Expressway and Axiomatics Policy Server combined provide a

More information

IBM WebSphere Application Server

IBM WebSphere Application Server IBM WebSphere Application Server SAML 2.0 web single-sign-on 2012 IBM Corporation This presentation describes support for SAML 2.0 web browser Single Sign On profile included in IBM WebSphere Application

More information

Quality Ensuring Development of Software Processes

Quality Ensuring Development of Software Processes Quality Ensuring Development of Software Processes ALEXANDER FÖRSTER,GREGOR ENGELS Department of Computer Science University of Paderborn D-33095 Paderborn, Germany {alfo engels}@upb.de ABSTRACT: Software

More information

Integrating ITSM and Cloud into Enterprise IT Governance

Integrating ITSM and Cloud into Enterprise IT Governance ITSM and Cloud Computing: Integrating ITSM and Cloud into Enterprise IT Governance Presented by: Eric Marks AgilePath Corporation President & CEO Agenda ITSM in Enterprise Governance Context ITSM Integration

More information

Leveraging MITA to Implement Service Oriented Architecture and Enterprise Data Management. Category: Cross Boundary Collaboration

Leveraging MITA to Implement Service Oriented Architecture and Enterprise Data Management. Category: Cross Boundary Collaboration Leveraging MITA to Implement Service Oriented Architecture and Enterprise Data Management Category: Cross Boundary Collaboration Initiation date: August 2011 Completion date: October 2013 Nomination submitted

More information

Establishing a Data-Centric Approach to Encryption

Establishing a Data-Centric Approach to Encryption Establishing a Data-Centric Approach to Encryption Marcia Kaufman, COO and Principal Analyst Sponsored by Voltage Security Voltage Security: Many data breaches occur at companies that already have a data

More information

Introduction to SOA governance and service lifecycle management.

Introduction to SOA governance and service lifecycle management. -oriented architecture White paper March 2009 Introduction to SOA governance and Best practices for development and deployment Bill Brown, executive IT architect, worldwide SOA governance SGMM lead, SOA

More information

EXHIBIT A. Part IV Content Identification 1. the transmission of content, it is important to consider how content can be identified (e.g.

EXHIBIT A. Part IV Content Identification 1. the transmission of content, it is important to consider how content can be identified (e.g. EXHIBIT A Part IV Content Identification 1 As this article has been considering certain intellectual property ramifications relating to the transmission of content, it is important to consider how content

More information

Business Object Document (BOD) Message Architecture for OAGIS Release 9.+

Business Object Document (BOD) Message Architecture for OAGIS Release 9.+ Business Object Document (BOD) Message Architecture for OAGIS Release 9.+ an OAGi White Paper Document #20110408V1.0 Open standards that open markets TM Open Applications Group, Incorporated OAGi A consortium

More information

Protect Everything: Networks, Applications and Cloud Services

Protect Everything: Networks, Applications and Cloud Services Protect Everything: Networks, Applications and Cloud Services Tokens & Users Cloud Applications Private Networks Corporate Network API LDAP / Active Directory SAML RADIUS Corporate Network LDAP / Active

More information

EHR Standards Landscape

EHR Standards Landscape EHR Standards Landscape Dr Dipak Kalra Centre for Health Informatics and Multiprofessional Education (CHIME) University College London d.kalra@chime.ucl.ac.uk A trans-national ehealth Infostructure Wellness

More information

Blue Fire Thames Court 1 Victoria Street Windsor SL4 1YB enquiries@bluefire-uk.com www.bluefire-uk.com

Blue Fire Thames Court 1 Victoria Street Windsor SL4 1YB enquiries@bluefire-uk.com www.bluefire-uk.com Blue Fire Thames Court 1 Victoria Street Windsor SL4 1YB enquiries@bluefire-uk.com www.bluefire-uk.com 1 1. Service Description Blue Fire is a Digital and IT Practice focused on supplying individuals and

More information

The case for service oriented architecture in realising trusted, interoperable, pan-european egovernment services.

The case for service oriented architecture in realising trusted, interoperable, pan-european egovernment services. The case for service oriented architecture in realising trusted, interoperable, pan-european egovernment services. Stephen McGibbon Microsoft EMEA Tel. +445511490070 Email. stephenm@microsoft.com Abstract:

More information

Viewpoint. MNS Viewpoint: Managed Services Challenges and Strategies for MNO. 1 Managed Services Strategy

Viewpoint. MNS Viewpoint: Managed Services Challenges and Strategies for MNO. 1 Managed Services Strategy MNS Viewpoint: Managed Services Challenges and Strategies for MNO 1 Managed Services Strategy 1. Market trends Over the last years, new trends have redefined the telecoms market, including mass-market

More information

Developing Business Architecture with TOGAF

Developing Business Architecture with TOGAF Developing Business Architecture with TOGAF Building Business Capability 2013 Las Vegas, NV Armstrong Process Group, Inc. www.aprocessgroup.com Objectives Introduce The Open Group Architecture Framework

More information

Master Data Management (MDM)

Master Data Management (MDM) the way we do it Master Data Management (MDM) Mastering the Information Ocean Mastery of information gives business control In the modern business, the volume of information is increasing and the value

More information

Service-Oriented Computing and Service-Oriented Architecture

Service-Oriented Computing and Service-Oriented Architecture Service-Oriented Computing and Service-Oriented Architecture Week 3 Lecture 5 M. Ali Babar Lecture Outline Service-Oriented Computing (SOC) Service-Oriented Architecture (SOA) Designing service-based systems

More information

Microsoft SOA Roadmap

Microsoft SOA Roadmap Microsoft SOA Roadmap Application Platform for SOA and BPM Thomas Reimer Enterprise Technology Strategist, SOA and BPM Microsoft Corporation (EMEA) Trends and Roadmap THE FUTURE OF DYNAMIC IT Market Trends

More information

Table of Contents. 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8

Table of Contents. 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8 Table of Contents 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8 3 SOA in Verizon The IT Workbench Platform... 10 3.1 Technology... 10 3.2 Processes

More information

SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS

SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) VERSION 2.1 SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS 1 TABLE OF CONTENTS INTRODUCTION... 3 About The Service-Oriented Modeling Framework

More information

Cloud-based Identity and Access Control for Diagnostic Imaging Systems

Cloud-based Identity and Access Control for Diagnostic Imaging Systems Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology

More information

SOA + BPM = Agile Integrated Tax Systems. Hemant Sharma CTO, State and Local Government

SOA + BPM = Agile Integrated Tax Systems. Hemant Sharma CTO, State and Local Government SOA + BPM = Agile Integrated Tax Systems Hemant Sharma CTO, State and Local Government Nothing Endures But Change 2 Defining Agility It is the ability of an organization to recognize change and respond

More information

1 Publishable summary

1 Publishable summary 1 Publishable summary The 4CaaSt research project is creating an advanced Platform as a Service (PaaS). This cloud platform supports the optimized and elastic hosting of internet-scale multi-tier applications.

More information

NIST s Guide to Secure Web Services

NIST s Guide to Secure Web Services NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:

More information

Implementing a Phased Approach to Master Data Management

Implementing a Phased Approach to Master Data Management Implementing a Phased Approach to Master Data Management Writer: Tyler Graham Published: April 2010 Applies to: SQL Server 2008 R2 Master Data Services Summary: This article provides common ways to approach

More information

The Need for Service Catalog Design in Cloud Services Development

The Need for Service Catalog Design in Cloud Services Development The Need for Service Catalog Design in Cloud Services Development The purpose of this document: Provide an overview of the cloud service catalog and show how the service catalog design is an fundamental

More information

TWX-21 Business System Cloud for Global Corporations

TWX-21 Business System Cloud for Global Corporations TWX-21 Business System Cloud for Global Corporations 8 TWX-21 Business System Cloud for Global Corporations Hidenori Kiuchi Yasuyuki Suzuki Sho Obayashi Manabu Naganuma Seiichiro Hayashi Taku Tozawa OVERVIEW:

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

OpenHRE Security Architecture. (DRAFT v0.5)

OpenHRE Security Architecture. (DRAFT v0.5) OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2

More information

Open Group SOA Governance. San Diego 2009

Open Group SOA Governance. San Diego 2009 Open Group SOA Governance San Diego 2009 SOA Governance Aspects A comprehensive view of SOA Governance includes: People Organizational structures Roles & Responsibilities Processes Governing processes

More information

A Framework for Virtual Enterprise Support Services

A Framework for Virtual Enterprise Support Services A Framework for Virtual Enterprise Support Services Vaggelis Ouzounis, Volker Tschammer ECCO Electronic Commerce Center of Competence, GMD-Fokus, Kaiserin-Augusta-Allee 31, D-10589, Berlin, Germany Tel:

More information

NCTA Cloud Architecture

NCTA Cloud Architecture NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,

More information

IBM Software IBM Business Process Management Suite. Increase business agility with the IBM Business Process Management Suite

IBM Software IBM Business Process Management Suite. Increase business agility with the IBM Business Process Management Suite IBM Software IBM Business Process Management Suite Increase business agility with the IBM Business Process Management Suite 2 Increase business agility with the IBM Business Process Management Suite We

More information

Open Source Innovation Conference

Open Source Innovation Conference Open Source Innovation Conference Open Source as Competitive Advantage Joe Dickman Senior Vice President, Vizuri Applied Engineering Management Corporation Agenda Introductions Use of Open Source Technologies

More information

Master Data Management (MDM)

Master Data Management (MDM) Business Information Management the way we see it Master Data Management (MDM) Mastering the Information Ocean Business Information Management the way we see it Mastery of information gives business control

More information

Solutions Master Data Governance Model and Mechanism

Solutions Master Data Governance Model and Mechanism www.pwc.com Solutions Master Data Governance Model and Mechanism Executive summary Organizations worldwide are rapidly adopting various Master Data Management (MDM) solutions to address and overcome business

More information

D6.1: Service management tools implementation and maturity baseline assessment framework

D6.1: Service management tools implementation and maturity baseline assessment framework D6.1: Service management tools implementation and maturity baseline assessment framework Deliverable Document ID Status Version Author(s) Due FedSM- D6.1 Final 1.1 Tomasz Szepieniec, All M10 (31 June 2013)

More information

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable

More information

Service Oriented Architecture and Its Advantages

Service Oriented Architecture and Its Advantages ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:

More information

IT Audit and Compliance

IT Audit and Compliance Problem IT Audit and Compliance IT audit is about the formal verification and validation of the quality and effectiveness of IT controls to support the overall business control objectives. From a security

More information

Validating Enterprise Systems: A Practical Guide

Validating Enterprise Systems: A Practical Guide Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise

More information

Web Services - Consultant s View. From IT Stategy to IT Architecture. Agenda. Introduction

Web Services - Consultant s View. From IT Stategy to IT Architecture. Agenda. Introduction Web Services - A Consultant s View From IT Stategy to IT Architecture Hans-Peter Hoidn, Timothy Jones, Jürg Baumann, Oliver Vogel February 12, 2003 Copyright IBM Corporation 2002 Agenda Introduction I.

More information

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO

More information

Green Power Accounting Workshop: Concept Note For discussion during Green Power Accounting Workshop in Mexico City, May 13th 2011

Green Power Accounting Workshop: Concept Note For discussion during Green Power Accounting Workshop in Mexico City, May 13th 2011 Introduction As more companies and government organizations prepare greenhouse gas (GHG) inventories that reflect the emissions directly and indirectly associated with their operations, they increasingly

More information

Module 6. e-business and e- Commerce

Module 6. e-business and e- Commerce Module 6 e-business and e- Commerce 6.1 e-business systems 6.2 e-commerce systems 6.3 Essential e- commerce processes 6.4 Electronic payment processes 6.5 e-commerce application trends 6.6 Web store requirements

More information

journey to a hybrid cloud

journey to a hybrid cloud journey to a hybrid cloud Virtualization and Automation VI015SN journey to a hybrid cloud Jim Sweeney, CTO GTSI about the speaker Jim Sweeney GTSI, Chief Technology Officer 35 years of engineering experience

More information

SOA Enabled Workflow Modernization

SOA Enabled Workflow Modernization Abstract Vitaly Khusidman Workflow Modernization is a case of Architecture Driven Modernization (ADM) and follows ADM Horseshoe Lifecycle. This paper explains how workflow modernization fits into the ADM

More information

Eval-Source. Apparancy Business Process Platform. Analyst Review

Eval-Source. Apparancy Business Process Platform. Analyst Review Eval-Source Apparancy Business Process Platform Analyst Review Solution Background Business Process (BP) and Business Process Management (BPM) are complex practices that are composed of structured activities/tasks,

More information

Two-Factor Authentication

Two-Factor Authentication WHITE PAPER: TWO-FACTOR AUTHENTICATION: A TCO VIEWPOINT........................................ Two-Factor Authentication Who should read this paper This whitepaper is directed at IT, Security, and Compliance

More information

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts. Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao Guocui.gao@tufts.edu Mentor:

More information

Digital Documents, Compliance and the Cloud

Digital Documents, Compliance and the Cloud A Perspective on Navigating the Complexities Associated with Digital Document Transmission and Security for the Modern Enterprise. What are Digital (Electronic) Documents The Rise of the e-document Definition

More information

Overview of major concepts in the service oriented extended OeBTO

Overview of major concepts in the service oriented extended OeBTO Modelling business policies and behaviour based on extended Open edi Business Transaction Ontology (OeBTO) Introduction Model Driven Development (MDD) provides a basis for the alignment between business

More information

Cyber Essentials Questionnaire

Cyber Essentials Questionnaire Cyber Essentials Questionnaire Introduction The Cyber Essentials scheme is recommended for organisations looking for a base level Cyber security test where IT is a business enabler rather than a core deliverable.

More information

ETSI TS 132 375 V7.0.0 (2007-06) Technical Specification

ETSI TS 132 375 V7.0.0 (2007-06) Technical Specification TS 132 375 V7.0.0 (2007-06) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Telecommunication management; Security services

More information

The data centre in 2020

The data centre in 2020 INSIDE TRACK Analyst commentary with a real-world edge The data centre in 2020 Dream the impossible dream! By Tony Lock, January 2013 Originally published on http://www.theregister.co.uk/ There has never

More information

Enterprise Service Provisioning

Enterprise Service Provisioning Enterprise Service Provisioning ProPath Office of Information and Technology Table of Contents Enterprise Service Provisioning Process Map... 1 Process: Enterprise Service Provisioning... 2 Enterprise

More information

Professional Cloud Solutions and Service Practices

Professional Cloud Solutions and Service Practices Emerging Technologies Professional Cloud Solutions and Service Practices The Shift to a Service-on-Demand Business Operating Model and Working Practices By Mark Skilton, CEO, Digital Ecosystem practices,

More information

White Paper. Automating the Virtual Data Center. Communication for the open minded. Mark Townsend, Director of Solutions Management

White Paper. Automating the Virtual Data Center. Communication for the open minded. Mark Townsend, Director of Solutions Management White Paper Automating the Virtual Data Center Mark Townsend, Director of Solutions Management Enterasys (a division of Siemens Enterprise Communications) Communication for the open minded Siemens Enterprise

More information

What s New In ITIL V3?

What s New In ITIL V3? What s New In ITIL V3? George Spalding VP, Global Events Pink Elephant Pink Elephant Leading The Way In IT Management Best Practices The ITIL Books (V2) T h e B u s i n e s s Planning To Implement Service

More information

Outline SOA. Properties of SOA. Service 2/19/2016. Definitions. Comparison of component technologies. Definitions Component technologies

Outline SOA. Properties of SOA. Service 2/19/2016. Definitions. Comparison of component technologies. Definitions Component technologies Szolgáltatásorientált rendszerintegráció Comparison of component technologies Simon Balázs, BME IIT Outline Definitions Component technologies RPC, RMI, CORBA, COM+,.NET, Java, OSGi, EJB, SOAP web services,

More information

VOL. 2, NO. 3, March 2012 ISSN 2222-9833 ARPN Journal of Systems and Software 2009-2011 AJSS Journal. All rights reserved

VOL. 2, NO. 3, March 2012 ISSN 2222-9833 ARPN Journal of Systems and Software 2009-2011 AJSS Journal. All rights reserved Five Aspects of Application Integration Requirements Fazilat Hojaji MS of Information Technology Engineering, Amirkabir University of Technology Computer Engineering & IT Department Hafez ST,Tehran, Iran

More information

Securing Data in Oracle Database 12c

Securing Data in Oracle Database 12c Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes

More information

Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1

Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1 Fidelis XPS Power Tools Gaining Visibility Into Your Cloud: Cloud Services Security February 2012 PAGE 1 PAGE 1 Introduction Enterprises worldwide are increasing their reliance on Cloud Service providers

More information

TECHNICAL SPECIFICATION: SECURE LEGISLATION-AWARE STORAGE SOLUTION

TECHNICAL SPECIFICATION: SECURE LEGISLATION-AWARE STORAGE SOLUTION REALIZATION OF A RESEARCH AND DEVELOPMENT PROJECT (PRE-COMMERCIAL PROCUREMENT) ON CLOUD FOR EUROPE TECHNICAL SPECIFICATION: SECURE LEGISLATION-AWARE STORAGE SOLUTION ANNEX IV (C) TO THE CONTRACT NOTICE

More information

A MORE FLEXIBLE MULTI-TENANT SOA FOR SAAS

A MORE FLEXIBLE MULTI-TENANT SOA FOR SAAS A MORE FLEXIBLE MULTI-TENANT SOA FOR SAAS Eric H. Nielsen, Ph.D. VP Platform Architecture CA Technologies e.h.nielsen@ieee.org For IEEE Software Technology Conference STC 2014 April 3, 2014 Long Beach,

More information

IBM WebSphere Application Server

IBM WebSphere Application Server IBM WebSphere Application Server OAuth 2.0 service provider and TAI 2012 IBM Corporation This presentation describes support for OAuth 2.0 included in IBM WebSphere Application Server V7.0.0.25. WASV70025_OAuth20.ppt

More information