TAILIEUCHUNG - SOA End to End Security

SOA End to End Security presents about Security Challenges in SOA, Project Summary, Prototype Development, Transition to Cloud Computing, Demo/Evaluation of the Proposed Solution (Security and Performance), Schedule and Timeline, Future Tasks. | SOA End to End Security Department of Computer Science Purdue University West Lafayette, Indiana Award No. FA8750-10-2-0152 Program Manager: Asher Sinclair, AFRL/RISE 09/27/2011 1 People Involved In the Project Two Faculty Members Ten graduate students 2 Outlines Security Challenges in SOA Problem Overview Project Summary Prototype Development System Architecture and Baseline Scenario Use Case Scenario Service Domain Internals and Implementation SOA Authentication Scheme (CAC/IDM) WS-* Standard Integration Trust Broker Subsystem Service Registry Taint Analysis Subsystem Transition to Cloud Computing Demo/Evaluation of the Proposed Solution (Security and Performance) Schedule and Timeline Future Tasks Discussion Appendixes (Publication) 3 WS-attacks: inline SOAP attacks, replay attacks. Security Challenges in SOA Authentication and authorization may not take place across intended end points Intermediate steps of service execution might expose messages to hostile threats External services are not verified or validated dynamically (Uninformed selection of services by user) User has no control on external service invocation within an orchestration or through a service in another service domain Violations and malicious activities in a trusted service domain remain undetected 4 SOA End to End Security Architecture 5 End to End Security Architecture Description Figure shows problems in end to end SOA security as follow: In this figure the current Air Force infrastructure is shown above the red dashed line. In this architecture, all services are available in the local trusted service domain and everything is under the control of domain A. Client at the edge platform decides to use a service from domain A. He will use his CAC (common access card) to authenticate into the system. The security token is sent to the IDM (identity management system) for validation check. If the user is authorized, IDM gives permission to the requested service (. MX or mail service) for .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.