Security Model for Service-Oriented Architecture(SOA)

سال انتشار: 1390
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 1,472

فایل این مقاله در 8 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

SASTECH05_177

تاریخ نمایه سازی: 22 مرداد 1391

چکیده مقاله:

The security threats of SOA include threats to services in general. Services can provid functionalities to users that were not available before the service was in place. In addition, services can exist beyond the organization’s security perimeter. Since services use standards, a possible adversary can use flaws in these standards to attack the service. These threats prevented by introducing security principles into the SOA model. These principles include secure interaction, distributed identities and distributed policies. Secure interaction provides confidentiality and integrity of messages between service providers, service registry and the service client. Distributed identities are used as the basis to provide authentication, authorization, integrity and non-repudiation. Distributed policies are used for authorization and availability. A service client can be authorized to access a service provider, or can be authorized access the service registry.In summary, the proposed model promotes security of SOA as we have eliminated principles that do not belong to SOA. Instead, we have added principles of security to the foundational principles of SOA. The proposed model is based on the existing concepts and principles of SOA as well as CIA. The reusability principle has to be excluded from the concept of SOA because this principle creates contradictory results and unnecessary interdependencies. Lastly, the environment we refer to is an attractive and collaborative service environment aiming to response to all requisites of enterprise Agility

کلیدواژه ها:

Service-oriented Architecture (SOA) ، Confidentiality Integrity Availability (CIA) ، security principles ، policies

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • -Maclinovsky, A. (2007, November 15). A Formal SOA Security Model. ...
  • -Maclinovsky, A. (2007, November 15). Security Model Details. Message posted ...
  • Kingkarn K. (2008). An Integrated Model for SOA Governance. Unpublished ...
  • Pajevski, M. (2004). A Security Model For S ervice- Oriented ...
  • IBM. (2007, November). Understanding SOA Security - Design and Imp ...
  • Peterson, G. (2008, February 9). Security in SOA - It's ...
  • [Haf09] Hafher, M. Breu, R. Security Engineering for S ervic ...
  • Mitra, T. (n.d.). Layered architecture view. In Documenting software architecture, ...
  • نمایش کامل مراجع