Policy Chain for Securing Service Oriented Architectures

نویسندگان

  • Wihem Arsac
  • Annett Laube
  • Henrik Plate
چکیده

Service Providers using Service Oriented Architecture in order to deliver in-house services as well as on-demand and cloud services have to deal with two interdependent challenges: (1) to achieve, maintain and prove compliance with security requirements stemming from internal needs, 3rd party demands and international regulations and (2) to manage requirements, policies and security configuration in a cost-efficient manner. The deficiencies of current processes and tools force these service providers to trade off profitability against security and compliance. This paper summarizes a novel approach of a policy chain, which links high-level, abstract and declarative security policies on one side and low-level, imperative, and technical security configuration settings on the other side. The paper describes detailed an architecture linking several applications and models via state-machines in order to provide a toolset supporting service providers to build such a holistic policy chain at design time, and to maintain and leverage it during sys-

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Reference Architecture for Automation of Inter-Organizational Process-Oriented Collaboration

In today’s competitive, dynamic, and changing business environment, being able to collaborate globally within and beyond the enterprise borders is critical. Inter-Organizational Collaborations (IOCs) have been proposed as a response to the characteristics of highly competitive global business environments. So far, a number of reference models, frameworks, and ad hoc architectures related to som...

متن کامل

Peer Group-Based Dependency Management in Service-Oriented Peer-to-Peer Architectures

Dependency management in service-Oriented peer-to-Peer architectures aims at handling functional dependencies between a public service hosted by a service providing peer and all consumer peers that rely on that service. The analysis of dependencies on consumer peers is important for supporting the adaptation of a public service. The uncoordinated adaptation of public services potentially leads ...

متن کامل

Securing Collaborative Business Processes: A Methodology for Security Management in Service-Based Infrastructure

In order to secure collaborative business processes, we present a methodological approach that early integrates security and risk management throughout the design process of service-oriented architectures. We develop our methodology based on two complementary axes: the first being the business needs while the second, is ensuring a consistent security between partners at the runtime. The informa...

متن کامل

Integral Security Model for the Exchange of Objects in Services Oriented Architecture

Nowadays, security approaches and solutions for SOA focus mainly on messages and data, but they forget the code security (both service code and exchanged code). Moreover, some security aspects (e.g. validity, correctness...) are usually forgotten. We state that any security approach will be incomplete if the security of both data (messages) and code (service code) is not addressed in a general ...

متن کامل

Towards a Framework for Policy-Oriented Enterprise Management

Service-oriented architectures have brought significant progress for more flexible realization of business processes integrating functionality from heterogeneous sources. While more and more businesses adopt the new technology it becomes obvious that many questions are still not addressed to make it keep its promises, especially in the area of human efforts involved in business process composit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012