Model-Based Design Environment for Clinical Information Systems
|
|
|
- Brianna Ray
- 10 years ago
- Views:
Transcription
1 Model-Based Design Environment for Clinical Information Systems Janos Mathe, Sean Duncavage, Jan Werner, Akos Ledeczi, Bradley Malin, Janos Sztipanovits Vanderbilt University TRUST Review, October 11, 2007
2 Summary EMR is an integrative project with three main goals: Build a credible testbed for EMR research Contribute to solving privacy and security challenges of EMR systems applications Use EMR application testbeds for the integration, testing and evaluation of new technologies on the following core TRUST research areas: o o o o Model-based design for security and privacy Formal modeling, verifying and enforcing privacy and security policies Security and privacy technologies for sensor networks Public policy to technology interactions 2
3 Patient Portal Research Area Secrecy Non-repudiation Integrity Secrecy Non-repudiation Integrity Privacy Dynamic Non-repudiation Authorization Secrecy Rights Delegation Goal: systems design satisfying high-level requirements stated for privacy, secrecy, integrity, non-repudiation, dynamic access control, rights delegation Last year focus establishing a credible testbed for Patient Portals formal modeling of Patient Portal designs formal modeling of access control and privacy policies -driven control of information flows in Patient Portals 3
4 Behind the Patient Portals: Workflows and Services Appointments Messaging EMR access Health Answer Secretary Appointment Health Question Health Question Doctor Patient Health Answer Nurse Health Question Data Request Data Answer Data Answer Data Request Data Answer Data Request EMR HIPPA Local 4-Eyes-Principle 4
5 Building a Credible Testbed Architectural Framework: SOA Reliance on existing standards SOAP, WSDL, WS- Security, XACML Exploiting open-source implementation of integration platforms (Active BPEL, Apache ODE) External Internal Request Decision Point Repository Decision Point S1 Response Enforcement Point Oracle BPEL (Apache ODE) Enforcement Point S2 Sn WS-Security, XACML, XKMS, SAML, SSL, SELinux Standards do not guide integration of security technologies with applications 5
6 Testbed considerations How to work with the Medical School? They have many, complex, real, live systems that one cannot play with Many legacy systems, no clear overarching architecture The selected platform has to be viable for a wide range of future systems SOA can fulfill this role Proven standards-based technology successfully applied in many different domains It enables experimentation with different techniques to deal with security/privacy issues By building on the existing massive infrastructure we can focus on interesting research issues and not on the technical details of the really complex machinery behind it Focus: how to build applications How to specify security/privacy requirements and How to tie them to the underlying standard technologies Because the standards do not provide guidance on how to integrate security/privacy technologies with applications Value added: Mature, proven, model-based tool environment Automatic generation of many required artifacts New components for policy specification/evaluation 6
7 Abstraction Layers Domain specific modeling abstractions expressed in formally defined DSML-s. TRUST research focus SOA-based, standard, business process modeling platform SOA-based, standard, execution platform (simulation/fast proto.tng) 7
8 Architecture BPEL Execution Platform CIS Domain Workflow Models Activities Coordination Service Models Interface Data Privacy Models Privacy Security Org. Models Org. structure Roles Domain specific modeling abstractions expressed in formally defined DSML-s Model Transf. Model Transf. Model Transf. Model Transf. SOA design BPEL4WS WSDL XACML + XSD XML Conf. Decision Pt. BPEL Modeling Platform External Enforcement Point Standard SOA-based business process modeling platform System level Repos. Decision Pt. BPEL Process Manager Internal Enforcement Point Config. Engine Standard SOA-based BPEL execution platform (simulation and fast prototyping) S1 S2 Sn
9 MICIS Architecture Metamodel Modeling Environment Metamodel Editor Metamodels 1. Model Editor User Models 1. Modeling environment Metamodels define the domain specific modeling language and define the abstract syntax of domain models User models represent a specific CIS instance through a set of modeling abstractions EE Execution Environment P VT Using Generic Modeling Environment (GME) Front End Execution Engine Process Manager XACML Set Formula (Prolog Solver) Decision Point
10 MICIS Architecture Metamodel Modeling Environment Metamodel Editor Metamodels 1. Model Editor User Models 2. s Transform user models into BPEL deployment code Create XACML policy decision points Using EE Execution Environment P VT GREAT Builder Object Network (BON) interface Front End Execution Engine Process Manager XACML Set Formula (Prolog Solver) Decision Point
11 MICIS Architecture Metamodel Modeling Environment Metamodel Editor Metamodel s 1. Model Editor User Models 3. Execution Environment BPEL execution engine execution engine Web server for user interaction Using EE 2. P VT OracleBPEL AciveBPEL SunXACML Execution Environment 3. Front End Execution Engine Process Manager XACML Set Formula (Prolog Solver) Decision Point
12 Verification/Enforcement w/ Prolog T n MiniUML-in MetaGME DSML in T 0 T MiniUML 0 Design Model in DSML T 1 T 1 T 1 T m Prolog Prolog representation of the MiniUML domain Prolog Prolog representation of the DSML domain Prolog Prolog representation of the Design model Generate domain Generate domain 12
13 MICIS Modeling Abstractions Design Environment (GME) Combined View Control Flow View Component View Service models capture business logic Control flow Data flow Data Flow View
14 MICIS Modeling Abstractions Data models Specify the information in the CIS Represent patient information and system state variables Simple and compound data types in hierarchy
15 MICIS Modeling Abstractions Deployment models Servers and workstations Service deployment Secure sessions Access control
16 MICIS Modeling Abstractions Clinic-level View Person-level view Department-Level View Organizational models Specify human coordination within CIS Roles, groups of roles and people within clinics Interaction between roles
17 MICIS Modeling Abstractions x x x x models Static policies that can be evaluated based on system specifications Dynamic policies that must be evaluated at run-time
18 Models Static policy models Dynamic policy models Ex: Check if the patient A Role whose record is being retrieved is under a certain age B Rol e x? = Ex: A service s workflow and an invoked service have to have matching roles x x x
19 MICIS Example Above: a simple service that checks the user s credentials and authorizes access to other services Symbol Guide
20 MICIS Demo
21 Conclusions Metamodel MICIS forms a testbed for EMR research Helping to solve privacy and security challenges of EMR systems applications It can be used for the integration, testing and evaluation of new technologies Modeling Environment Metamodel Editor Model Editor Future work Metamodels User Models Prolog-based policy management EE Execution Environment P VT Choice of policy languages: XACML, Prolog, OCL,??? Front End Execution Engine Process Manager XACML Set Formula (Prolog Solver) How to structure policies Static vs. dynamic Decision Point Analysis/verification tools
Run-time Service Oriented Architecture (SOA) V 0.1
Run-time Service Oriented Architecture (SOA) V 0.1 July 2005 Table of Contents 1.0 INTRODUCTION... 1 2.0 PRINCIPLES... 1 3.0 FERA REFERENCE ARCHITECTURE... 2 4.0 SOA RUN-TIME ARCHITECTURE...4 4.1 FEDERATES...
Introduction to Service-Oriented Architecture for Business Analysts
Introduction to Service-Oriented Architecture for Business Analysts This course will provide each participant with a high-level comprehensive overview of the Service- Oriented Architecture (SOA), emphasizing
Guiding Principles for Technical Architecture
This document is a statement of the principles that will guide the technical development of the Kuali Student system. It will serve as a reference throughout the full lifecycle of the project. While these
A Service Oriented Security Reference Architecture
International Journal of Advanced Computer Science and Information Technology (IJACSIT) Vol. 1, No.1, October 2012, Page: 25-31, ISSN: 2296-1739 Helvetic Editions LTD, Switzerland www.elvedit.com A Service
Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies
Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies 3-day seminar Give Your Business the Competitive Edge SOA has rapidly seized the momentum and center stage because
Service-Oriented Architecture and its Implications for Software Life Cycle Activities
Service-Oriented Architecture and its Implications for Software Life Cycle Activities Grace A. Lewis Software Engineering Institute Integration of Software-Intensive Systems (ISIS) Initiative Agenda SOA:
Architectural Requirements for an SOA Based on Web Services. Jim Bole VP, Engineering Infravio, Inc. April 23, 2003
Architectural Requirements for an SOA Based on Web s Jim Bole VP, Engineering Infravio, Inc. April 23, 2003 Agenda! Web s is an integration technology! Web s role in an SOA! Unique Features and Challenges
Oracle SOA Reference Architecture
http://oraclearchworld.wordpress.com/ Oracle SOA Reference Architecture By Kathiravan Udayakumar Introduction to SOA Service Oriented Architecture is a buzz word in IT industry for few years now. What
Introduction to CASA: An Open Source Composite Application Editor
B S X Introduction to CASA: An Open Source Composite Application Editor Tientien Li, Ph.D. and Jun Qian Sun Microsystems, Inc. TS-8683 2007 JavaOne SM Conference Session TS-8683 Introduction to CASA An
Federated Service Oriented Architecture for Effects-Based Operations
Federated Service Oriented Architecture for Effects-Based Operations Intelligence and Information Systems Matt Brown (720) 88-4014 [email protected] Customer Success Is Our Mission is a trademark of
SPML (Service Provisioning Markup Language) and the Importance of it within the Security Infrastructure Framework for ebusiness
Interoperability Summit 2002 SPML (Service Provisioning Markup Language) and the Importance of it within the Security Infrastructure Framework for ebusiness Gavenraj Sodhi Senior Technology Analyst Provisioning
Entitlements Access Management for Software Developers
Entitlements Access Management for Software Developers Market Environment The use of fine grained entitlements and obligations control for access to sensitive information and services in software applications
White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution
White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations
Unifying IT Vision Through Enterprise Architecture
Unifying IT Vision Through Enterprise Architecture A model for Strategic Alignment Northeast Ohio Information Technology & Enterprise Architects (NEO-ITEA) Presentation To: Integrate 2010: Uniting the
Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy [email protected] CTO, Forum Systems
Core Feature Comparison between XML / SOA Gateways and Web Application Firewalls Jason Macy [email protected] CTO, Forum Systems XML Gateway vs Competitive XML Gateways or Complementary? and s are Complementary
Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies
Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies 3-day seminar Give Your Business the Competitive Edge SOA has rapidly seized the momentum and center stage because
Leveraging Service Oriented Architecture (SOA) to integrate Oracle Applications with SalesForce.com
Leveraging Service Oriented Architecture (SOA) to integrate Oracle Applications with SalesForce.com Presented by: Shashi Mamidibathula, CPIM, PMP Principal Pramaan Systems [email protected] www.pramaan.com
Introduction to UDDI: Important Features and Functional Concepts
: October 2004 Organization for the Advancement of Structured Information Standards www.oasis-open.org TABLE OF CONTENTS OVERVIEW... 4 TYPICAL APPLICATIONS OF A UDDI REGISTRY... 4 A BRIEF HISTORY OF UDDI...
Authentication and Authorization Systems in Cloud Environments
Authentication and Authorization Systems in Cloud Environments DAVIT HAKOBYAN Master of Science Thesis Stockholm, Sweden 2012 TRITA-ICT-EX-2012:203 Abstract The emergence of cloud computing paradigm offers
Reusing Existing * Java EE Applications from Oracle SOA Suite
Reusing Existing * Java EE Applications from Oracle SOA Suite Guido Schmutz Technology Manager, Oracle ACE Director for FMW & SOA Trivadis AG, Switzerland Abstract You have a lot of existing Java EE applications.
Copyright 2012, Oracle and/or its affiliates. All rights reserved.
1 OTM and SOA Mark Hagan Principal Software Engineer Oracle Product Development Content What is SOA? What is Web Services Security? Web Services Security in OTM Futures 3 PARADIGM 4 Content What is SOA?
An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
A Service-Oriented approach dedicated to Internet based Business Process Networks: Building a MDA based collaborative platform with opensource
A Service-Oriented approach dedicated to Internet based Business Process Networks: Building a MDA based collaborative platform with opensource solutions EBM WebSourcing Jean-Pierre LORRE R&D Manager ObjectWeb
Open Source egovernment Reference Architecture Osera.modeldriven.org. Copyright 2006 Data Access Technologies, Inc. Slide 1
Open Source egovernment Reference Architecture Osera.modeldriven.org Slide 1 Caveat OsEra and the Semantic Core is work in progress, not a ready to use capability Slide 2 OsEra What we will cover OsEra
ActiveVOS Server Architecture. March 2009
ActiveVOS Server Architecture March 2009 Topics ActiveVOS Server Architecture Core Engine, Managers, Expression Languages BPEL4People People Activity WS HT Human Tasks Other Services JMS, REST, POJO,...
Presentation Outline. Key Business Imperatives Service Oriented Architecture Defined Oracle SOA Platform 10.1.3 SOA Maturity/Adoption Model Demo Q&A
Presentation Outline Key Business Imperatives Service Oriented Architecture Defined Oracle SOA Platform 10.1.3 SOA Maturity/Adoption Model Demo Q&A Key Business Imperatives Increased Competition Requires
The OMA Perspective On SOA in Telecoms
The OMA Perspective On SOA in Telecoms Adopting SOA for Telecom Workshop, Open Standards Forum 2008 Ditton Manor, 30 September 3 October 2008 Musa Unmehopa» Chairman OMA Architecture Working Group» Distinguished
Jitterbit Technical Overview : Microsoft Dynamics CRM
Jitterbit allows you to easily integrate Microsoft Dynamics CRM with any cloud, mobile or on premise application. Jitterbit s intuitive Studio delivers the easiest way of designing and running modern integrations
Oracle SOA Suite 11g: Essential Concepts Student Guide
Oracle SOA Suite 11g: Essential Concepts Student Guide D58786GC20 Edition 2.0 August 2011 D73588 Author Iris Li Technical Contributors and Reviewers Gary Barg Pete Daly Joe Greenwald David Mills David
Motivation Definitions EAI Architectures Elements Integration Technologies. Part I. EAI: Foundations, Concepts, and Architectures
Part I EAI: Foundations, Concepts, and Architectures 5 Example: Mail-order Company Mail order Company IS Invoicing Windows, standard software IS Order Processing Linux, C++, Oracle IS Accounts Receivable
BPEL + Business Rules
Dial-in: 888.283.3946 or +1.210.795.4773 passcode: bpel Press *1 at end to ask verbal questions During conf, use chat feature to ask questions The Oracle BPEL Process Manager BPEL + Business Feature Preview
Beeple, B-Pel, Beepul? Understanding BPEL and Its Role in SOA
Beeple, B-Pel, Beepul? Understanding BPEL and Its Role in SOA presented by John Jay King King Training Resources [email protected] Download this paper and code examples from: http://www.kingtraining.com
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
The OMG BPM Standards
The OMG BPM Standards Derek Miers CEO, BPM Focus +44 (20) 8742 8500 UK Office +44 (7703) 178 500 UK Cell +1 (714) 600 9010 US Cell [email protected] A BPM Definition Business Process Management is primarily
Christoph Bussler. B2B Integration. Concepts and Architecture. With 165 Figures and 4 Tables. IIIBibliothek. Springer
Christoph Bussler B2B Integration Concepts and Architecture With 165 Figures and 4 Tables IIIBibliothek Springer Contents Part I Introduction to Business-to-Business Integration.... 1 1 History 3 1.1 Why
Intalio BPM. The first and only complete Open Source Business Process Management System
Intalio BPM The first and only complete Open Source Business Process Management System Presenter Jason Howlett Process Expert Employee for Intalio EMEA Based in England Enabling Intalio customers to build
CloudCERT (Testbed framework to exercise critical infrastructure protection)
WP2. CONCEPTUAL MODELLING AND ARCHITECTURE CloudCERT (Testbed framework to exercise critical infrastructure protection) With the financial support of the Prevention, Preparedness and Consequence Management
Building the European Biodiversity. Observation Network (EU BON)
Enterprise Application Integration Building the European Biodiversity through Service-Oriented Architecture Observation Network (EU BON) EU BON Project Building the European Biodiversity Network Presentation
Converting Java EE Applications into OSGi Applications
Converting Java EE Applications into OSGi Applications Author: Nichole Stewart Date: Jan 27, 2011 2010 IBM Corporation THE INFORMATION CONTAINED IN THIS REPORT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY.
WebSphere Business Modeler
Discovering the Value of SOA WebSphere Process Integration WebSphere Business Modeler Workshop SOA on your terms and our expertise Soudabeh Javadi Consulting Technical Sales Support WebSphere Process Integration
SOA GOVERNANCE MODEL
SOA GOVERNANCE MODEL Matjaz B. Juric University of Ljubljana, Slovenia [email protected] Eva Zupancic University of Ljubljana, Slovenia Abstract: Service Oriented Architecture (SOA) has become
A standards-based approach to application integration
A standards-based approach to application integration An introduction to IBM s WebSphere ESB product Jim MacNair Senior Consulting IT Specialist [email protected] Copyright IBM Corporation 2005. All rights
Federal Enterprise Architecture and Service-Oriented Architecture
Federal Enterprise Architecture and Service-Oriented Architecture Concepts and Synergies Melvin Greer Chief Strategist, SOA / Cloud Computing Certified Enterprise Architect Copyright August 19, 2010 2010
How To Understand A Services-Oriented Architecture
Introduction to Service Oriented Architecture CSCI-5828 Foundations of Software Engineering Ming Lian March 2012 Executive Summary This Executive Summary gives the straight word to the fresh that have
An Open Policy Framework for Cross-vendor Integrated Governance
An Open Policy Framework for Cross-vendor Integrated Governance White Paper Intel SOA Expressway An Open Policy Framework for Cross-vendor Integrated Governance Intel SOA Expressway delivers a pluggable
Introduction to MATLAB Gergely Somlay Application Engineer [email protected]
Introduction to MATLAB Gergely Somlay Application Engineer [email protected] 2012 The MathWorks, Inc. 1 What is MATLAB? High-level language Interactive development environment Used for: Numerical
What You Need to Know About Transitioning to SOA
What You Need to Know About Transitioning to SOA written by: David A. Kelly, ebizq Analyst What You Need to Know About Transitioning to SOA Organizations are increasingly turning to service-oriented architectures
Cesario Di Sarno. Security Information and Event Management in Critical Infrastructures
Cesario Di Sarno Ph.D. Student in Information Engineering University of Naples «Parthenope» Security Information and Event Management in Critical Infrastructures Fai della Paganella 11 Febbraio 2014 Critical
Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102
Cloud Standards Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102 2011 IBM Corporation Agenda Overview on Cloud Standards Identity and Access Management Discussion 2 Overview on Cloud
SOA for Healthcare: Promises and Pitfalls
SOA for Healthcare: Promises and Pitfalls Dennis B. Smith [email protected] SOA in Health Care Conference: Value in a Time of Change Chicago, IL USA June 3, 2009 Agenda Healthcare IT Challenges SOA: The
HP Systinet. Software Version: 10.01 Windows and Linux Operating Systems. Concepts Guide
HP Systinet Software Version: 10.01 Windows and Linux Operating Systems Concepts Guide Document Release Date: June 2015 Software Release Date: June 2015 Legal Notices Warranty The only warranties for HP
The Oracle Fusion Development Platform
The Oracle Fusion Development Platform Juan Camilo Ruiz Senior Product Manager Development Tools 1 The preceding is intended to outline our general product direction. It is intended for information purposes
Revel8or: Model Driven Capacity Planning Tool Suite
Revel8or: Model Driven Capacity Planning Tool Suite Liming Zhu 1,2, Yan Liu 1,2, Ngoc Bao Bui 1,2,Ian Gorton 3 1 Empirical Software Engineering Program, National ICT Australia Ltd. 2 School of Computer
The OMII Software Distribution
The OMII Software Distribution Justin Bradley, Christopher Brown, Bryan Carpenter, Victor Chang, Jodi Crisp, Stephen Crouch, David de Roure, Steven Newhouse, Gary Li, Juri Papay, Claire Walker, Aaron Wookey
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)
E-Business Suite Oracle SOA Suite Integration Options
Specialized. Recognized. Preferred. The right partner makes all the difference. E-Business Suite Oracle SOA Suite Integration Options By: Abhay Kumar AST Corporation March 17, 2014 Applications Software
Strategic Information Security. Attacking and Defending Web Services
Security PS Strategic Information Security. Attacking and Defending Web Services Presented By: David W. Green, CISSP [email protected] Introduction About Security PS Application Security Assessments
Digital Signature Web Service Interface
1 2 Digital Signature Web Service Interface 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 1 Introduction This document describes an RPC interface for a centralized
IBM WebSphere ILOG Rules for.net
Automate business decisions and accelerate time-to-market IBM WebSphere ILOG Rules for.net Business rule management for Microsoft.NET and SOA environments Highlights Complete BRMS for.net Integration with
Identity, Privacy, and Data Protection in the Cloud XACML. David Brossard Product Manager, Axiomatics
Identity, Privacy, and Data Protection in the Cloud XACML David Brossard Product Manager, Axiomatics 1 What you will learn The issue with authorization in the cloud Quick background on XACML 3 strategies
The Way to SOA Concept, Architectural Components and Organization
The Way to SOA Concept, Architectural Components and Organization Eric Scholz Director Product Management Software AG Seite 1 Goals of business and IT Business Goals Increase business agility Support new
Service Governance and Virtualization For SOA
Service Governance and Virtualization For SOA Frank Cohen Email: [email protected] Brian Bartel Email: [email protected] November 7, 2006 Table of Contents Introduction 3 Design-Time Software
Guiding Principles for Modeling and Designing Reusable Services
Guiding Principles for Modeling and Designing Reusable Services Max Dolgicer Managing Director International Systems Group, Inc. [email protected] http://www.isg-inc.com Agenda The changing notion
Securing Web Services From Encryption to a Web Service Security Infrastructure
Securing Web Services From Encryption to a Web Service Security Infrastructure Kerberos WS-Security X.509 TLS Gateway OWSM WS-Policy Peter Lorenzen WS-Addressing Agent SAML Policy Manager Technology Manager
Oracle BPEL Nuts and Bolts
Oracle BPEL Nuts and Bolts Paper 743 presented by John Jay King King Training Resources [email protected] Download this paper from: http://www.kingtraining.com Copyright @ 2009, John Jay King 1/68
Business Rule Standards -- Interoperability and Portability
Rule Standards -- Interoperability and Portability April 2005 Mark H. Linehan Senior Technical Staff Member IBM Software Group Emerging Technology [email protected] Donald F. Ferguson IBM Fellow Software
WEB SERVICES SECURITY
WEB SERVICES SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Analyses on functional capabilities of BizTalk Server, Oracle BPEL Process Manger and WebSphere Process Server for applications in Grid middleware
Analyses on functional capabilities of BizTalk Server, Oracle BPEL Process Manger and WebSphere Process Server for applications in Grid middleware R. Goranova University of Sofia St. Kliment Ohridski,
Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures
Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures Sven Feja 1, Ralph Herkenhöner 2, Meiko Jensen 3, Andreas Speck 1, Hermann de Meer 2, and Jörg Schwenk 3
Convergent services in the service oriented architecture Natalya Yashenkova
Convergent services in the service oriented architecture Natalya Yashenkova The article describes how service oriented architecture and the standard OSS solutions can close the gap between the process
NIST s Guide to Secure Web Services
NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:
<Insert Picture Here> Building a Complex Web Application Using ADF and Siebel
Building a Complex Web Application Using ADF and Siebel Nishit Rao Group Product Manager Fusion Middleware Oracle Dhiraj Soni Technical Architect GIT Apps Engineering Oracle The following
An Oracle White Paper November 2009. Oracle Primavera P6 EPPM Integrations with Web Services and Events
An Oracle White Paper November 2009 Oracle Primavera P6 EPPM Integrations with Web Services and Events 1 INTRODUCTION Primavera Web Services is an integration technology that extends P6 functionality and
A SOA Based Framework for the Palestinian e-government Integrated Central Database
Islamic University of Gaza Deanery of Higher Studies Faculty of Information Technology Information Technology Program A SOA Based Framework for the Palestinian e-government Integrated Central Database
Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact
Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact Robert C. Broeckelmann Jr., Enterprise Middleware Architect Ryan Triplett, Middleware Security Architect Requirements
GRID COMPUTING Techniques and Applications BARRY WILKINSON
GRID COMPUTING Techniques and Applications BARRY WILKINSON Contents Preface About the Author CHAPTER 1 INTRODUCTION TO GRID COMPUTING 1 1.1 Grid Computing Concept 1 1.2 History of Distributed Computing
Agenda. Fusion Middleware Release 12 Fusion Applications
A Technical Roadmap for Oracle Fusion Middleware, E-Business Suite Release 12, and Oracle Fusion Middleware John Stouffer Independent Consultant [email protected] www.justadba.com John Stouffer Connection
How To Compare The Cost Of Business Process Management (Bpm) To Open Source Software (Bmp)
Open Source Business Process Management Suites Trends and Advantages Executive Summary This paper explains open source BPM and its benefits. Focused and in-depth description of two major open source BPM
BUILDING FLEXIBLE ENTERPRISE PROCESSES USING ORACLE BUSINESS RULES AND BPEL PROCESS MANAGER. An Oracle White Paper Jan 2005
BUILDING FLEXIBLE ENTERPRISE PROCESSES USING ORACLE BUSINESS RULES AND BPEL PROCESS MANAGER An Oracle White Paper Jan 2005 BUILDING FLEXIBLE ENTERPRISE PROCESSES USING ORACLE BUSINESS RULES AND BPEL PROCESS
XACML and Access Management. A Business Case for Fine-Grained Authorization and Centralized Policy Management
A Business Case for Fine-Grained Authorization and Centralized Policy Management Dissolving Infrastructures A recent Roundtable with CIOs from a dozen multinational companies concurred that Identity &
