Filters








2,812 Hits in 4.5 sec

Secure Enterprise SOA

Markus Schumacher, Dominik Witte
2007 Datenschutz und Datensicherheit - DuD  
As most developers are no security experts, only the use of existing and proven security functions ensures a proper level of security (see for example Security Patterns [12] ).  ...  It provides confidentiality and integrity protection for messages by means of encryption and digital signatures. Interoperability Interoperability is a crucial point in Enterprise SOA.  ... 
doi:10.1007/s11623-007-0217-7 fatcat:db3hkt5hkfgixh4ljtdm7fkmxa

Security Issues in a SOA-Based Provenance System [chapter]

Victor Tan, Paul Groth, Simon Miles, Sheng Jiang, Steve Munroe, Sofia Tsasakou, Luc Moreau
2006 Lecture Notes in Computer Science  
Provenance presents some unique security requirements of its own, which are additionally dependent on the architectural and environmental context that a provenance system operates in.  ...  Recent work has begun exploring the characterization and utilization of provenance in systems based on the Service Oriented Architecture (such as Web Services and Grid based environments).  ...  Acknowledgements This research is funded in part by the EU Provenance project as part of the European Community's Sixth Framework Program (IST511085).  ... 
doi:10.1007/11890850_21 fatcat:6zcgmfia4ffxrbcso4mutpbbzq

Enabling Mainframe Assets to Services for SOA

Latha Sadanandam
2010 International journal of computer and communication technology  
The strategy is to form a framework to integrate z/OS assets in distributed environment using SOA approach, to enable optimal business agility and flexibility.  ...  Web services technology is an ideal technology choice for implementing a SOA. Web services can be implemented in any programming language.  ...  All trademarks and registered trademarks used in this paper are the properties of their respective owners / companies.  ... 
doi:10.47893/ijcct.2010.1058 fatcat:hs56dwhor5hr3nylnntvzta2pa

Developing Educational Mobile Application Architecture using SOA

Z. Al -Khanjari, Z. Al-Kindi, E. Al-Kindi, N. Kraiem
2015 International Journal of Multimedia and Ubiquitous Engineering  
architectures called Service-Oriented Architecture (SOA).  ...  In this paper, Service-Oriented Architecture for post result mobile application is used to integrate a set of services that have been implemented in a web server with the existing post result application  ...  , reliability, availability, and performance to the SOA world.  ... 
doi:10.14257/ijmue.2015.10.9.25 fatcat:mrume7fwcffi7p5yvvadru7yte

Securing business operations in an SOA [article]

Theo Dimitrakos, David Brossard, Pierre de Leusse
2012 arXiv   pre-print
They include advances in identity federation; distributed usage and access management; context-aware secure messaging, routing and transformation; and (security) policy governance for service-oriented  ...  Service-oriented infrastructures pose new challenges in a number of areas, notably with regard to security and dependability.  ...  Acknowledgements The authors acknowledge Srijith Krishnan Nair and Afnan Ullah Khan at BT Research for their significant contribution to the development and improvement of the work presented in this paper  ... 
arXiv:1203.0429v1 fatcat:pn45fvjtcffppfcglkehj6p5pi

Security for distributed SOA at the tactical edge

R. William Maule, William C. Lewis
2010 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE  
Service-Oriented Architecture (SOA) presents new paradigms for security and information assurance. Security processes for legacy systems are not sufficient to secure a distributed SOA.  ...  This paper addresses some of the challenges encountered when testing SOA in live Fleet operations and in controlled laboratory experiments.  ...  At a minimum, security issues are very significant for any SOA in which all data must be encrypted and secured, and for SOAs which must support large numbers of simultaneous users.  ... 
doi:10.1109/milcom.2010.5680146 fatcat:mefjtt2jh5a4nltnj6ntldzlpm

Tracing where and who provenance in Linked Data: A calculus

Mariangiola Dezani-Ciancaglini, Ross Horne, Vladimiro Sassone
2012 Theoretical Computer Science  
Linked Data provides some sensible guidelines for publishing and consuming data on the Web.  ...  Data published on the Web has no inherent truth, yet its quality can often be assessed based on its provenance. This work introduces a new approach to provenance for Linked Data.  ...  A type system ensures the integrity of the policy of each location. Such policies can improve the reliability of Linked Data.  ... 
doi:10.1016/j.tcs.2012.06.020 fatcat:6dydy7woirbmvkkda55zawifw4

Security Requirements for the Deployment of Services Across Tactical SOA [chapter]

Vasileios Gkioulos, Stephen D. Wolthusen
2017 Lecture Notes in Computer Science  
In this article we approach the security aspect of tactical SOA, focusing on the specifics of the services while operating under the constrains and requirements of modern battlefields.  ...  TACTICS, aims to enable NCW and NEC, through the integration of information sources, effectors and services.  ...  Acknowledgments The results described in this work were obtained as part of the European Defence  ... 
doi:10.1007/978-3-319-65127-9_10 fatcat:aymztd2bqna4veypv7xqjku4pq

Detection of SOA Patterns [chapter]

Anthony Demange, Naouel Moha, Guy Tremblay
2013 Lecture Notes in Computer Science  
The goal of this study is to detect patterns in SOA systems to assess their design and their Quality of Service (QoS).  ...  However, systems based on these architectures (called SOA systems) evolve rapidly due to the addition of new functionalities, the modification of execution contexts and the integration of legacy systems  ...  The authors would like to thank the FraSCAti core team, and in particular Philippe Merle, for the validation of the results on FraSCAti and their valuable discussions on these results.  ... 
doi:10.1007/978-3-642-45005-1_9 fatcat:zbga2ro4rjemhpjfew4dybdctm

Making SOA work in a healthcare company

Jay Blanton, Steve Leski, Brian Nicks, Traian Tirzaman
2009 Proceeding of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications - OOPSLA '09  
Making SOA work in a large and diverse healthcare company is not just about bridging the gap between business and IT.  ...  Educating our IT project teams in the fundamentals of SOA design and development has involved special approaches and a commitment to mentoring and continuous education in the enterprise.  ...  • A SOA reference architecture tailored to Health Net, including logical, implementation and deployment views. • Data, integration and security architectures in support of SOA.  ... 
doi:10.1145/1639950.1639953 dblp:conf/oopsla/BlantonLNT09 fatcat:6xz5cffo7bdehcjj3y3rb4dhyy

Finance Sector: Requirements for High Assurance within Spatial SOA Based Grid Infrastructures

P C Donachy, R H Perrott, T J Harmer, F Sharkey
2007 10th IEEE High Assurance Systems Engineering Symposium (HASE'07)  
A use case from the Finance Sector is presented, which has deep implications in terms of high availability, security and spatial awareness in a SOA environment.  ...  Finally the requirements for a high assurance framework to manage the lifecycle of applications and services deployed within such SOA based Grid infrastructures is presented.  ...  However, Grid and SOA presents an alternative technology to provide shared access to heterogeneous resources in a secure, reliable and scalable manner.  ... 
doi:10.1109/hase.2007.45 dblp:conf/hase/DonachyPHS07 fatcat:yca65wdcynhizkcqx3cf4ye5he

A Distributed-SOA Model for Unified Communication Services

Shrikant Kanaparti
2008 2008 IEEE International Conference on Web Services  
Also discuss the possible ecosystem based on this approach, and the business model that could probably emerge using such a model.  ...  In this architecture, we explore the benefits of the Open Services Gateway Initiative (OSGi) framework for providing us with an ideal service execution platform on the servers, with subscriber client devices  ...  Communications Services Architecture An SOA approach has been a proven model in the enterprise world, and the advantages that it brings in for a major establishment are perhaps well known.  ... 
doi:10.1109/icws.2008.127 dblp:conf/icws/Kanaparti08 fatcat:lcx6ght2uvbebmrmkkfzcgzs4m

Critical Success Factors in SOA Implementation

John Erickson, Keng Siau
2008 Americas Conference on Information Systems  
Seemingly, almost every company has implemented, is in the midst of implementing or is seriously considering a SOA project.  ...  A Delphi study forms the research method, and inputs regarding SOA critical success factors are requested from a panel of experts.  ...  (2006) suggested a way of handling XML-based data in an SOA or service environment.  ... 
dblp:conf/amcis/EricksonS08 fatcat:3nr2utofabfrpbuuxfotmboita

Semantic Web Services for Satisfying SOA Requirements [chapter]

Sami Bhiri, Walid Gaaloul, Mohsen Rouached, Manfred Hauswirth
2008 Lecture Notes in Computer Science  
Service oriented modeling is gaining acceptance among academia and industry as a computing paradigm for business and systems integration.  ...  Nevertheless, they fail in satisfying SOA requirements. Semantic Web services initiatives have then emerged with the objective of providing the foundation to overcome these requirements.  ...  SFI/02/CE1/I131, and by SUPER project funded by the EU under grant no. FP6-026850.  ... 
doi:10.1007/978-3-540-89784-2_15 fatcat:5t6qisjhpbeplcfw6zprgycqj4

The MIDAS Cloud Platform for Testing SOA Applications

Steffen Herbold, Alberto De Francesco, Jens Grabowski, Patrick Harms, Lom M. Hillah, Fabrice Kordon, Ariele-Paolo Maesano, Libero Maesano, Claudia Di Napoli, Fabio De Rosa, Martin A. Schneider, Nicola Tonellotto (+2 others)
2015 2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST)  
While Service Oriented Architectures (SOAs) are for many parts deployed online, and today often in a cloud, the testing of the systems still happens mostly locally.  ...  Through this, we provide methods for functional testing, security testing, and usage-based testing of service orchestrations.  ...  In fact, it provides advanced solutions concerning the possibility to achieve computing elasticity, to tackle data storage reliability, persistency, and fault tolerance. A.  ... 
doi:10.1109/icst.2015.7102636 dblp:conf/icst/HerboldFGHHKMMN15 fatcat:a345z7j5zzcdzbjxg3xkvogxnu
« Previous Showing results 1 — 15 out of 2,812 results