soa-security-2010-farkas

soa-security-2010-farkas - Service-Oriented Architecture...

Info iconThis preview shows pages 1–11. Sign up to view the full content.

View Full Document Right Arrow Icon
Computer Science and Engineering 1 Service-Oriented Architecture Security Security
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Reading Reading 1. T. Erl, SOA Design Patterns, Chapter 13 2. F. A. Cummins: Building the Agile Enterprise with SOA, BPM, and MBM, Chapter 6 3. G. McGraw, Software Security and SOA: Danger, Will Robinson!, IEEE Security and Privacy, 2006, http://www.cigital.com/papers/download/bsi12-soa.doc.pdf 4. Organization for the Advancement of Structured Information Standards (OASIS), http://www.oasis-open.org/ (SOA, Security, WS, XML, etc.) 5. World Wide Web Consortium (W3C), http://www.w3.org/ (Web design and applications, Web architecture, Semantic Web, XML, WS, etc.) Computer Science and Engineering 2
Background image of page 2
Computer Science and Engineering 3 SOA Security Components SOA Security Components 1. Software-level (single service) security 2. Business-level (service composition) security 3. Network-level security
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security Concerns Expanded number of service points Expanded number of users Perimeter security is not sufficient Dynamic service relationships Access across trust domains Electronic documents Indirect access via service invocation
Background image of page 4
Computer Science and Engineering 5 Web Services Web Services Goal Goal : enable autonomous and distributed entities to collaborate efficiently, reliably, cost-effectively, and comply with regulations Characteristics Characteristics : open and heterogeneous environment, loose coupling, code reuse, standard-based interfaces, Support for Support for : Automated processing – Web with a meaning Express business logic
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Computer Science and Engineering 6 Secure SOA Development Secure SOA Development Inherent Security of Web Services Security granularity Security Software Software Security
Background image of page 6
Computer Science and Engineering 7 WS Security Standards OASIS OASIS Web Services Security (WSS) Web Services Security (WSS) Integrity and authentication: sign SOAP msgs. Confidentiality: encrypt SOAP msgs. Attach security tokens Security tokens Security tokens Security Assertion Markup Language (SAML) assertions Kerberos tickets User credentials X.509 certificate Custom defined tokens
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Computer Science and Engineering 8 Software Security Software Security
Background image of page 8
Computer Science and Engineering 9 SOA Applications SOA Applications Aggregated services each component is vulnerable What is the level of security provided by the aggregate? Trust management Security Patterns (REFERENCE #1) Security Patterns (REFERENCE #1) Exception Shielding Message Screening Trusted subsystem Service Perimeter Guard
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Computer Science and Engineering 10 Secure Software Development Secure Software Development Develop software that is free of flaws Develop software that is free of flaws Software engineering – functional requirements Security, reliability, QoS – non-functional requirements
Background image of page 10
Image of page 11
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 47

soa-security-2010-farkas - Service-Oriented Architecture...

This preview shows document pages 1 - 11. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online