Securing business operations in an SOA

نویسندگان

  • Pierre de Leusse
  • David Brossard
  • Nektarios Georgalas
چکیده

Service-oriented infrastructures pose new challenges in a number of areas, notably with regard to security and dependability. BT has developed a combination of innovative security solutions and governance frameworks that can address these challenges. They include advances in identity federation; distributed usage and access management; context-aware secure messaging, routing and transformation; and (security) policy governance for service-oriented architectures. This paper discusses these developments and the steps being taken to validate their functionality and performance. IT and communication service providers and their corporate customers are increasingly introducing Service-Oriented Architectures (SOAs) to cut costs, enhance their agility and reduce time-to-market. Service-Oriented Infrastructures (SOIs) amplify such benefits. In contrast to traditional infrastructures, in which resources that were scaled to meet peak demand were dedicated to particular applications on a permanent basis, SOIs exploit virtualisation to the full, allocating resources to applications in a way that constantly matches supply with demand. Simultaneously, the ways in which organisations manage their affairs are changing. Their workforces are much more mobile, for example, and suppliers and outsourcing partners play much bigger roles in the delivery of their products and services. Increasingly, organisations also want customers to be able to serve themselves, interacting directly with corporate IT systems to make purchases, report faults and so on. To support such new ways of doing business, organisations must make their IT systems available beyond their corporate networks. It isn't just a matter of allowing customers, suppliers and partners to log on and use whichever IT systems they need to complete their tasks. Increasingly, those who work together will also want to integrate their infrastructures and applications so that policies and data relevant to their relationships can flow securely between them in accordance with their agreements. Together, these developments pose new challenges in the areas of security and compliance. On the one hand, the incidence of attacks that exploit networked computing power and collaboration technology to gain access to corporate IT systems, steal information and cause damage has been increasing. It is reasonable to expect the problem to grow further as the use of distributed SOIs becomes commonplace. On the other hand, factors such as distributed ownership can make attacks particularly difficult to detect and address: as noted in [1], malicious intent is often only recognisable as an emerging property of the network. This is an issue that clearly needs to be addressed. Once threats have been identified, an immediate and …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Business Driven SOA-Service Candidate Identification

Service Oriented Architecture (SOA) is nothing new. Using SOA in the company’s IT-Landscape gives the ability to drive IT-Evolution through business and to enable better business operations through a more flexible, agile and low maintenance IT. Hence it’s amazing that an SOA landscape is quite rare in globally operating companies. IT-Landscapes of global companies are often historically grown a...

متن کامل

Oracle SOA vs. IBM SOA White Paper

The Service-Oriented Architecture (SOA) model has become the cornerstone of business computing. Its ability to greatly accelerate the development of business-critical applications promotes business agility, decreases time-to-value and total cost of ownership (TCO), and greatly increases the efficiency and strategic value of IT. Beyond mere application development, it has become the favored appr...

متن کامل

Business Process Improvement by Applying Reference Process Models in SOA - a Scenario-based Analysis

Several factors may force enterprises to modify their business processes: they are threatened by competition; they need to develop new process solutions to fulfil customer needs; they have to react to organizational change; and more. In order to efficiently change business processes, reference models as sources of to-be business processes that are to bring about economic improvements can be use...

متن کامل

Securing Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining

Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are ...

متن کامل

A Service Oriented Security Reference Architecture

Nowadays, service-oriented architecture (SOA) is used as an efficient solution to integrate distributed applications in an enterprise. In a SOA-based environment, security is one of the most important issues that must be considered on account of loosely coupled nature of SOA. However, there are several approaches and technologies for securing services such as WS-Security, SAML, and etc. SOA bri...

متن کامل

Service-Oriented Business-IT Alignment: A SOA Governance Model

The concept of Service Oriented Architecture (SOA) has had a significant impact not only on software engineering but on the analysis of an organization’s business layer as well. It contributes to developing information systems that are compatible with the needs of agile organizations. This fact brings us to investigate the new approach of Business-IT Alignment (BITA) by utilizing SOA features. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Security and Communication Networks

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2010