Securing business operations in an SOA
نویسندگان
چکیده
Service-oriented infrastructures pose new challenges in a number of areas, notably with regard to security and dependability. BT has developed a combination of innovative security solutions and governance frameworks that can address these challenges. They include advances in identity federation; distributed usage and access management; context-aware secure messaging, routing and transformation; and (security) policy governance for service-oriented architectures. This paper discusses these developments and the steps being taken to validate their functionality and performance. IT and communication service providers and their corporate customers are increasingly introducing Service-Oriented Architectures (SOAs) to cut costs, enhance their agility and reduce time-to-market. Service-Oriented Infrastructures (SOIs) amplify such benefits. In contrast to traditional infrastructures, in which resources that were scaled to meet peak demand were dedicated to particular applications on a permanent basis, SOIs exploit virtualisation to the full, allocating resources to applications in a way that constantly matches supply with demand. Simultaneously, the ways in which organisations manage their affairs are changing. Their workforces are much more mobile, for example, and suppliers and outsourcing partners play much bigger roles in the delivery of their products and services. Increasingly, organisations also want customers to be able to serve themselves, interacting directly with corporate IT systems to make purchases, report faults and so on. To support such new ways of doing business, organisations must make their IT systems available beyond their corporate networks. It isn't just a matter of allowing customers, suppliers and partners to log on and use whichever IT systems they need to complete their tasks. Increasingly, those who work together will also want to integrate their infrastructures and applications so that policies and data relevant to their relationships can flow securely between them in accordance with their agreements. Together, these developments pose new challenges in the areas of security and compliance. On the one hand, the incidence of attacks that exploit networked computing power and collaboration technology to gain access to corporate IT systems, steal information and cause damage has been increasing. It is reasonable to expect the problem to grow further as the use of distributed SOIs becomes commonplace. On the other hand, factors such as distributed ownership can make attacks particularly difficult to detect and address: as noted in [1], malicious intent is often only recognisable as an emerging property of the network. This is an issue that clearly needs to be addressed. Once threats have been identified, an immediate and …
منابع مشابه
Business Driven SOA-Service Candidate Identification
Service Oriented Architecture (SOA) is nothing new. Using SOA in the company’s IT-Landscape gives the ability to drive IT-Evolution through business and to enable better business operations through a more flexible, agile and low maintenance IT. Hence it’s amazing that an SOA landscape is quite rare in globally operating companies. IT-Landscapes of global companies are often historically grown a...
متن کاملOracle SOA vs. IBM SOA White Paper
The Service-Oriented Architecture (SOA) model has become the cornerstone of business computing. Its ability to greatly accelerate the development of business-critical applications promotes business agility, decreases time-to-value and total cost of ownership (TCO), and greatly increases the efficiency and strategic value of IT. Beyond mere application development, it has become the favored appr...
متن کاملBusiness Process Improvement by Applying Reference Process Models in SOA - a Scenario-based Analysis
Several factors may force enterprises to modify their business processes: they are threatened by competition; they need to develop new process solutions to fulfil customer needs; they have to react to organizational change; and more. In order to efficiently change business processes, reference models as sources of to-be business processes that are to bring about economic improvements can be use...
متن کاملSecuring Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining
Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are ...
متن کاملA Service Oriented Security Reference Architecture
Nowadays, service-oriented architecture (SOA) is used as an efficient solution to integrate distributed applications in an enterprise. In a SOA-based environment, security is one of the most important issues that must be considered on account of loosely coupled nature of SOA. However, there are several approaches and technologies for securing services such as WS-Security, SAML, and etc. SOA bri...
متن کاملService-Oriented Business-IT Alignment: A SOA Governance Model
The concept of Service Oriented Architecture (SOA) has had a significant impact not only on software engineering but on the analysis of an organization’s business layer as well. It contributes to developing information systems that are compatible with the needs of agile organizations. This fact brings us to investigate the new approach of Business-IT Alignment (BITA) by utilizing SOA features. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Security and Communication Networks
دوره 3 شماره
صفحات -
تاریخ انتشار 2010