Model driven Security of Service Oriented Systems based on Security as a Service



Similar documents
Meeting EHR Security Requirements: Authentication as asecurity Service

Developers Integration Lab (DIL) System Architecture, Version 1.0

SECTISSIMO: A Platform-independent Framework for Security Services

Policy Driven Practices for SOA

The Way to SOA Concept, Architectural Components and Organization

Government's Adoption of SOA and SOA Examples

Business-Driven Software Engineering Lecture 3 Foundations of Processes

Requirement Management with the Rational Unified Process RUP practices to support Business Analyst s activities and links with BABoK

Service-Oriented Architecture and Software Engineering

SOA Governance and the Service Lifecycle

Table of Contents. 1 Executive Summary SOA Overview Technology Processes and Governance... 8

How service-oriented architecture (SOA) impacts your IT infrastructure

A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems

Case Study: Adoption of SOA at the IRS

Future Internet Architecture

API Architecture. for the Data Interoperability at OSU initiative

The Tropos and MaSE Agent-Oriented Software Engineering Methodologies. Msury Mahunnah, Tallinn University of Technology

Introduction to Service-Oriented Architecture for Business Analysts

Developing SOA solutions using IBM SOA Foundation

A Software Development Platform for SOA

Realizing business flexibility through integrated SOA policy management.

Tomáš Müller IT Architekt 21/04/2010 ČVUT FEL: SOA & Enterprise Service Bus IBM Corporation

Redbook Overview Patterns: SOA Design with WebSphere Message Broker and WebSphere ESB

An Oracle White Paper October Maximize the Benefits of Oracle SOA Suite 11g with Oracle Service Bus

Developing the Architectural Framework for SOA Adoption

Independent Insight for Service Oriented Practice. An SOA Roadmap. John C. Butler Chief Architect. A CBDI Partner Company.

Outsourcing security in service ecosystems with evolving security deployment as a service

Service Oriented Architecture Based Integration. Mike Rosen CTO, AZORA Technologies, Inc.

SOA Governance Essentials

Secure Document Circulation Using Web Services Technologies

Federal Enterprise Architecture and Service-Oriented Architecture

SOA in the pan-canadian EHR

Introduction to ESB and Petals ESB

OMG SOA Workshop - Burlingame Oct 16-19, 2006 Integrating BPM and SOA Using MDA A Case Study

Business Process Management Enabled by SOA

EHR Business Process Models for Care Coordination and MU

Contents Huntcliff, Suite 1350, Atlanta, Georgia, 30350, USA

Tool support for Collaborative Software Quality Management

Amit Sheth & Ajith Ranabahu, Presented by Mohammad Hossein Danesh

Approach to Service Management

Architectural Decisions as Service Realization Methodology in Model-Driven SOA Construction

XML Signatures in an Enterprise Service Bus Environment

Singapore s National Electronic Health Record

Enterprise SOA Strategy, Planning and Operations with Agile Techniques, Virtualization and Cloud Computing

Dr.M.G.R. Educational and Research Institute, Chennai, India. Dr.M.G.R. Educational and Research Institute, Chennai, India

SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS

Methods and tools for data and software integration Enterprise Service Bus

Enterprise Service Bus

Architecture. Reda Bendraou

ITU-T Kaleidoscope Conference Innovations in NGN. Managing NGN using the SOA Philosophy. Y. Fun Hu University of Bradford

Towards Collaborative Requirements Engineering Tool for ERP product customization

Model-driven Software Development (MDSE) for the Cloud

Service Oriented Architecture 1 COMPILED BY BJ

Cloud Deployment Models

Service Oriented Architecture: A driving force for paperless healthcare system

How To Deploy A Banking System In Java On A Server With A Bank On A Network (E-Banking) On A Microsoft Server (Ebt) On An Ebt (Eb) On The Network (Jee) On Your

SOA-14: Continuous Integration in SOA Projects Andreas Gies

Managing SOA Security and Operations with SecureSpan

Enterprise Application Deployment: Amodel driven approach

SOA Planning Guide The Value Enablement Group, LLC. All rights reserved.

Orchestrating an SOA with Rules

Architectural view model for an integration platform

A Modeling Language for Activity-Oriented Composition of Service-Oriented Software Systems

Enterprise SOA Service activity monitoring

Sentinet for BizTalk Server SENTINET

Data-Aware Service Choreographies through Transparent Data Exchange

Model Driven and Service Oriented Enterprise Integration---The Method, Framework and Platform

Corresponding Author

An Oracle White Paper Dec Oracle Access Management Security Token Service

Service Oriented Architecture and Its Advantages

EnergySync and AquaSys. Technology and Architecture

Delivering value to the business with IAM

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

Family: Iterative Enhancement Origin: Ivar Jacobson, James Rumbaugh, Grady Booch, 1996 Defines process framework that is adaptable to

Microsoft SOA Roadmap

Five best practices for deploying a successful service-oriented architecture

Enterprise Service Bus Defined. Wikipedia says (07/19/06)

SOA REFERENCE ARCHITECTURE

SigMo Platform based approach for automation of workflows in large scale IT-Landscape. Tarmo Ploom 2/21/2014

Seamless adaptive multi- cloud management of service- based applications. European Open Cloud Collaboration Workshop, May 15, 2014, Brussels

Air Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I Systems Integration

Service Oriented Architecture and the DBA Kathy Komer Aetna Inc. New England DB2 Users Group. Tuesday June 12 1:00-2:15

Monitoring services in Service Oriented Architecture 1

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management

JOURNAL OF OBJECT TECHNOLOGY

Security Best Practices for Microsoft Azure Applications

AquaLogic Service Bus

CSCI 5828 Spring 2010 Foundations of Software Engineering. - Arpit Sud

How To Build A Financial Messaging And Enterprise Service Bus (Esb)

How To Understand A Services-Oriented Architecture

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

MODELING VIRTUAL ORGANIZATION ARCHITECTURE WITH THE VIRTUAL ORGANIZATION BREEDING METHODOLOGY

CMS & ehr - An Update

Dagstuhl seminar on Service Oriented Computing. Service design and development. Group report by Barbara Pernici, Politecnico di Milano

BMC Software Inc. Technical Disclosure Publication Document Application Integration Manager (AIM) Author. Vincent J. Kowalski.

SOA GOVERNANCE MODEL

SOA and Cloud in practice - An Example Case Study

The Central Role of Registries

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur

Oracle SOA Suite: The Evaluation from 10g to 11g

Transcription:

Japan-Austria Joint Workshop on ICT October 18-19 2010, Tokyo, Japan SECTET Model driven Security of Oriented Systems based on Security as a Basel Katt, Ruth Breu, Mukhtiar Memon and Michael Hafner Research Group Quality Engineering University of Innsbruck

Quality Engineering Selected Projects Slide2

Quality Engineering Laura Bassi Lab Living Models for Collaborative Systems Industry Partners Slide3

Agenda Motivation OrientedSystems Challenges Healthcare Scenario SECTET : Model based configuration of Oriented Systems Model Driven Security (MDS) Security as a (SeAAS) Architecture Conclusion Slide4

Oriented Systems Independent partners offer and call services Collaboration across enterprises and systems New generation of cooperative applications Electronic health record, traffic management, energy trading, etc. Slide5

Challenges Collaborative systems based on SOA Dynamically composed, languageandtechnologyindependent and Agile and dynamically evolving systems Standards only address basic security requirements Solve these requirements at a low technical level Security enforcement at the service end points Places significant processing burden on service nodes Renders maintenance and management cumbersome Slide6

Goals The gap between domain experts and software engineers Maintainability and configurabl ity ity of security services Ability to re configure after deployment due to requirement changes or mechanisms updates Support of multiple security architectures for each requirement Enforcement Enforcing complex security requirements Consistent enforcement of security policies in enterprise level solutions Performance Security services involve performance costly functions Slide7

Example Distributed Electronic Health Record (EHR) HealthNetwork Tyrol Slide8

Example Healthcare Scenario EHR represents a consolidated virtual medical record Distributed across various careproviders 1 A General Practitioner 2 Electronic Health Record Patient Records Public Healthcare Provider 3 Referral Diagnosis 4 Virtual Electronic Health Record Patient Records 3 rd Party Institution Patient Electronic Medical Record 5 B Patient Records Radiography Specialist Private Healthcare Provider Slide9

Example Healthcare Scenario Inter organizational workflows s that can be offered or called by each partner Functional interaction between different stakeholders khld (roles) Security requirements Non repudiation and authentication Slide10

SECTET Model Based Configuration of Oriented Systems Security Requirements Business Security Policies (UML Diagrams) 1. MDS: Models configure services of a security architecture 2. SeAAS: Security architecture is based on security as a service paradigm Slide11

SECTET Methodology Model Driven Security (MDS) Traditional MDS approach SECTET MDS approach Slide12

SECTET Model Driven Security Process Two procedures are considered in SECTET MDS approach Architectural pattern refinement Security policy model transformations Two artifacts are generated Security policy configuration Security service process configuration Define abstract security policy define/select abstract archietctural pattern define platform Independent policy model transform to platform specific pattern transform to platform specific policy generate process configuration generate policy configuration deploy configurations Slide13

Model Driven Security (MDS) Benefits Integrate security concerns in the early stage of system development Enrich functional models with security extensions that represent abstract security policies Generatedeclarative security policies and process configurations Separate tasks between: domain experts, security experts and the system administration Support multiple security patterns for each requirement Enhance management and configurabilty of the architecture Slide14

Security Enhanced Functional Models <<domainrole>> RadiographySepcialist <<domainrole>> PrimaryPhysician <<domainrole>> Patient <<partnerrole>> PathologyLab 1 * <<domainrole>> RadiographySepcialist <<partnerrole>> Clinic 1 * Role Model <<domainrole>> PrimaryPhysician <<document>> PatientMedicalRecord 1 <<document>> Radiography <<document>> Prescription Document Model <<document>> Referral <<interface>> MedicalSystem + CreatePMR + ReferToSpecialist() + ViewPMR + UpdatePMR Interface Model Slide15

Abstract Security Models Layer Abstract Authentication Policy Security Architectural Patterns Security Policy Model Platform Specific Architecture Instant Security Policy Slide16

Model Deriven Security Architectural Patterns Security Pattern Refinement Example: Authentication 1) Platform-independent refinement to security architectural pattern 2) Platform-specific refinement to target architecture Slide17

Model Deriven Security Security Policies Slide18

Runtime Platform Model Transformations Source Models Security Policy Models Platform-specific Pattern architecture Transformation Templates Generated Code Slide19 <wsp:policy xmlns:wsp="http://. /policy" <wsp:exactlyone> <sp:asymmetricbinding> <sp:initiatortoken> <sp:x509token sp:includetoken= ".../AlwaysToRecipient"> <sp:wssx509v3token10 /> </sp:initiatortoken> <sp:recipienttoken>.. <sp:algorithmsuite> <sp:tripledesrsa15 />... <sp:includetimestamp /> </sp:signedencryptedsupportingtokens> <sp:signedelements> <sp:xpath xmlns:env=".../">//env:body/*[1]</sp:xpath>.. <sp:contentencryptedelements> <sp:xpath xmlns:env="...e/ e/">//env:body/*[1]</sp:xpath> </sp:contentencryptedelements> </wsp:exactlyone> </wsp:policy> <bpws:process exitonstandardfault="yes" name="nrp" > <bpws:partnerlinks> <bpws:partnerlink p myrole="nro" name="localnrolink" partnerlinktype="tns:nrprocess"/> </bpws:partnerlinks> <bpws:invoke operation="requestnro" partnerlink="remotenrolink" porttype="tns:nro" inputvariable="evidencerequest"/> <bpws:receive operation="receivenro" partnerlink="localnrrlink" porttype="tns:nrr" variable="receiveevidence"> </bpws:sequence> </bpws:process>

SECTET Methodology SeAAS Reference Architecture Features: Benefits Dedicated shared services in a security domain Decoupled from service endpoints SeAAS security compositions engine Out of bound protocol execution Message oriented integration with ESB WS based Standards Better performance Response Request SeAAS Component Token Validation Request Enterprise Bus (ESB) Authentication SeAAS Engine Endpoints Security s Policy Repository Primitive Security s Encryption Signature Easy deployment/management Token Validation Response Compliance Configurable security components Non Logging Repudiation Security service composition Loosely coupled components Extendable architecture Time Stamping Key Repository Authorization Security Monitoring Slide20

Complex Security s Executions Security workflow for complex security service Security WS interface for Inter Domain interactions Client Application (Radiography Specialist) (Request) Access to EHR (Response) Grant/Deny Access Healthcare s (Clinic) Authorization Non-repudiation Non-repudiation Authorization Logging SeAAS Engine Monitoring Monitoring SeAAS Engine Logging Security Compliance Authentication WS Interface Security Token WS Interface Security Token Authentication Security Compliance SeAAS Component (Domain 1) SeAAS Component (Domain 2) Out-of-band Authentication Process Slide21

SECTET Methodology SeAAS Implementation The delivery of security functionality over infrastructure components in a service oriented manner Slide22

SECTET An Overview Vision The systemic realizationof security criticalinterorganizational cooperations based on generic, composable security servcies. Components An extensible domain specific language A reference architecture based on Security As a (SeAAS) A multi level transformation framework for Model Driven Security From Platform Independent Models Model DrivenSecurityProcess Abstract Patterns Specific Patterns 1 2a 2c Business Messages Security Protocol Messages Security Policy 2b 4 to Code Artefacts SeAAS Infrastructure

Conclusion Collaborative systems based on SOA are heterogeneous, agile and dynamically evolving The best practice for SOA security is based on Endpoint security Traditional MDS approach to close the business code gap is Applied in one step Inflexible and supports one security pattern Proposed SECTET framework is based on two main concepts SeAAS methodology for the design of the reference architecture (RA) Enhanced MDS methodology for the configuration of security services Slide24

Future Work Investigating further security services like security monitoring, identity management, and usage control Developing the formal foundation of the refinement process and security composition ii Deploying and testing an EHR system developedby our industrial partner, ITHicoserve Slide25

Slide26 Thank you for your attention! www. sectissimo.info