oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Service Oriented Architecture in Network Security - a novel Organisation in Security Systems  [PDF]
Michael Hilker,Christoph Schommer
Computer Science , 2008,
Abstract: Current network security systems are a collection of various security components, which are directly installed in the operating system. These check the whole node for suspicious behaviour. Armouring intrusions e.g. have the ability to hide themselves from being checked. We present in this paper an alternative organisation of security systems. The node is completely virtualized with current virtualization systems so that the operating system with applications and the security system is distinguished. The security system then checks the node from outside and the right security components are provided through a service oriented architecture. Due to the running in a virtual machine, the infected nodes can be halted, duplicated, and moved to other nodes for further analysis and legal aspects. This organisation is in this article analysed and a preliminary implementation showing promising results are discussed.
A Goal Question Metric Approach for Evaluating Security in a Service Oriented Architecture Context  [PDF]
Meryem Kassou,Laila Kjiri
International Journal of Computer Science Issues , 2012,
Abstract: For interactions to be possible within the Service Oriented Architecture (SOA) ecosystem, each actor must be enough confident of other actors to engage safely in the interactions. Therefore, the establishing of objective metrics tailored to the context of SOA that show security of a system and lead to enhancements is very attractive. The purpose of our paper is to present a GQM (Goal Question Metric) approach based on Standard security metrics and on SOA maturity that can be a support for organizations to assess SOA Security and to ensure the safety of their SOA based collaborations
A Goal Question Metric Approach for Evaluating Security in a Service Oriented Architecture Context  [PDF]
Meryem Kassou,Laila Kjiri
Computer Science , 2013,
Abstract: For interactions to be possible within the Service Oriented Architecture (SOA) ecosystem, each actor must be enough confident of other actors to engage safely in the interactions. Therefore, the establishing of objective metrics tailored to the context of SOA that show security of a system and lead to enhancements is very attractive. The purpose of our paper is to present a GQM (Goal Question Metric) approach based on Standard security metrics and on SOA maturity that can be a support for organizations to assess SOA Security and to ensure the safety of their SOA based collaborations
Audit Techniques for Service Oriented Architecture Applications  [PDF]
Liviu Adrian COTFAS,Dragos PALAGHITA,Bogdan VINTILA
Informatica Economica Journal , 2010,
Abstract: The Service Oriented Architecture (SOA) approach enables the development of flexible distributed applications. Auditing such applications implies several specific challenges related to interoperability, performance and security. The service oriented architecture model is described and the advantages of this approach are analyzed. We also highlight several quality attributes and potential risks in SOA applications that an architect should be aware when designing a distributed system. Key risk factors are identified and a model for risk evaluation is introduced. The top reasons for auditing SOA applications are presented as well as the most important standards. The steps for a successful audit process are given and discussed.
Designing and implementing the logical security framework for e-commerce based on service oriented architecture  [PDF]
Ashish Kr. Luhach,Sanjay K Dwivedi,C K Jha
Computer Science , 2014,
Abstract: Rapid evolution of information technology has contributed to the evolution of more sophisticated E- commerce system with the better transaction time and protection. The currently used E-commerce models lack in quality properties such as logical security because of their poor designing and to face the highly equipped and trained intruders. This editorial proposed a security framework for small and medium sized E-commerce, based on service oriented architecture and gives an analysis of the eminent security attacks which can be averted. The proposed security framework will be implemented and validated on an open source E-commerce, and the results achieved so far are also presented.
Multi Channel Architecture Model Based on Service Oriented Integration  [PDF]
Ion LUNGU,Davian POPESCU,Anda VELICANU
Informatica Economica Journal , 2008,
Abstract: The volume of data and numerous applications developed within a company can often generate a redundancy difficult to control. In the same time, the homogeneous or heterogeneous management systems of the companies become overcharged for obtaining useful information from databases. For this reason, the organizations develop specialized systems for the integration of existing applications and data. To achieve these systems, there are used a number of technologies, methods and architectures such as SOA architecture. In this article, are presented the components of SOA architecture, its advantages and a solution for integrating applications at the Presentation Tier.
Solutions for 3 Security Problems and its Application in SOA-FCA Service Components Based SDO  [PDF]
Nannan Wang, Zhiyi Fang, Kaige Yan, Yu Tang, Xingchao An
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2010, DOI: 10.4236/ijcns.2010.310109
Abstract: Service-Oriented Architecture (SOA), which is an open architecture, provides developers with more freedom. However, its security problem goes from bad to worse. By taking an insurance business in Formal Concept Analysis (SOA-FCA) Service Components based Service Data Object (SDO) data model transfer with proxy as an example, the security issue of SDO data model was analyzed in this paper and this paper proposed a mechanism to make sure that the confidentiality, integrity, and non-repudiation of SDO data model are preserved by applying encryption/decryption, digest, digital signature and so on. Finally, this mechanism was developed and its performance was evaluated in SOA-FCA Service Components.
SERVICE ORIENTED ARCHITECTURE  [PDF]
Stanculea Liana
Annals of the University of Oradea : Economic Science , 2009,
Abstract: Service-oriented architecture (SOA) supply methods for systems development and integration where work interoperable services. A SOA suppose application functionality distribution in distinct units called services that communicate with each other. This ser
Developing Distributed System With Service Resource Oriented Architecture
Hermawan Hermawan,Riyanarto Sarno
TELKOMNIKA : Indonesian Journal of Electrical Engineering , 2012, DOI: 10.11591/telkomnika.v10i2.693
Abstract: Service Oriented Architecture is a design paradigm in software engineering with which a distributed system is built for an enterprise. This paradigm aims at providing the system as a service through a protocol in web service technology, namely Simple Object Access Protocol (SOAP). However, SOA is service level agreements of webservice. For this reason, this reasearch aims at combining SOA with Resource Oriented Architecture in order to expand scalability of services. This combination creates Sevice Resource Oriented Architecture (SROA) with which a distributed system is developed that integrates services within project management software. Following this design, the software is developed according to a framework of Agile Model Driven Development which can reduce complexities of the whole process of software development.
Web Services Security Architectures for Secure Service Oriented Analysis and Design
D.Shravani #1 , Dr.P.Suresh Varma*2 , Dr.B.Padmaja Rani #3 , K.Venkateswar Rao*4M.Upendra Kumar#5
International Journal of Computer Trends and Technology , 2011,
Abstract: This paper discusses the research methodology on Web Services Security Architectures for Secure Service Oriented Analysis and Design. Initially we discuss about the Research Methodology for Designing Dependable Agile Layered Security Architecture Solutions for Web Services Security Architectures. Finally we discuss an implementation case study of ensuring data security architecture on Web Services Cloud
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.