Modeling security concerns in service-oriented architectures

Monday, 19 July 2004, 2:35 PM EST

Business stakeholders depend on the IT organization to provide solutions to their business requirements. For both financial and market-driven reasons, stakeholders want to shorten the investment in time and money it takes to deliver IT solutions. They also want to increase the value they derive from IT solutions by maximizing the requirements coverage each software project provides. Because so many of those projects today involve Web services, it is very important that we have better tools and techniques for the rapid and successful implementation of those business requirements using SOA. We consider modeling to be especially important because of its ability to separate concerns and present a unified view of those concerns. Security in service implementations is a major concern because many applications operate across organizational boundaries. The purpose of this paper is to provide a set of primitive modeling elements that allow the business stakeholders to specify the intent of security within the requirements process.

By Simon Johnston at IBM developerWorks.

[ Read more ]




Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //