Trust Management and Security Access Controls in High Payload System Architecture
نویسنده
چکیده
Enterprise services are commonly deployed on Internet facing applications and Mobile Apps. There is a need to have an Infrastructure and Application Framework to protect the information flow web layer and mobile apps. Trust management is being recognized in the industry along with Federated Single Sign on to cater the need of data protection at rest and in transits. Web layer need to be very light to have better performance. However, there are multiple products and services are available to measure and control security problems. In Web based architecture still companies are maintain credentials and access level in the database. As a matter of fact connectivity to database needs to have a secure channel and database manages the information that is being access via web layer (browsers, Webservice, Restful APIs etc). In multiple scenarios Service registry acts as metadata repository for external partners interface with Webservice using WS – Security or Security Assertion Markup Language (SAML). Web Services Trust Language (WS – Trust) plays a vital role in providing secure messaging and adds on to security token exchange within different trust domains for better credentials management. Web and Application Layer need to have WS Trust association to handle request and response of security tokens, managing trusts within the extended Enterprise Architecture and establishing trust relationships within Intra Organization and external partners, vendors and suppliers. This paper addresses the fit/gap and design approach to integrate Trust management model and Security Access Control with Database. Proposed Trust model illustrate the optimal security model and Asymmetric/ Symmetric Cryptography. This Trust management architecture model enhances the existing models in the current Database systems. Strategic model approach guarantee the enterprise wide security controls for PHI / PI datasets in database as well as complete data model and data at rest. This paper also illustrates the modeling technique and implement of open source Data repositories, metamodel and design and performance constraints in Data Architecture.
منابع مشابه
High Level Security Trust Zones for Private Clouds
The vulnerability of Cloud Computing Systems (CCSs) to Advanced Persistent Threats (APTs) is significant. So a cloud architecture reference model that incorporates a wide range of security controls and best practices, and a cloud security assessment model – Cloud-Trust – that estimates high level security metrics to quantify the degree of confidentiality and integrity offered by a CCS or cloud ...
متن کاملTrust Models and NetShield Architecture for Securing Grid Computing*
Highly shared resources over multiple grid platforms make insecurity and privacy abuse major obstacles hindering general-purpose Grid applications. A scalable grid system demands the allocation and release of resources dynamically. A distributed Grid security (GridSec) architecture is introduced to meet these demands. The architecture is built with distributed firewalls, packet filters, securit...
متن کاملInformation Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملInformation Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملSupporting heterogeneous middleware security policies in WebCom
With the growing interest in service-oriented architectures, achieving seamless interoperability between heterogeneous middleware technologies has become increasingly important. While much work investigating functional interoperability between different middleware architectures has been reported, little practical work has been done on providing a unified and/or interoperable view of security be...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012