Skip to main content

Aspects of General Security & Trust

  • Conference paper
  • First Online:

Abstract

Organisations increasingly engage in business collaborations with different partners in different locations. Such enterprises want to capitalise on and offer their existing internal capabilities as services to its customers. Service-oriented architectures let them do so. SOA by definition is loosely coupled, highly granular, and often widely distributed and multi-step. They can combine internal and external services. However, exposing sensitive services through an SOA gives rise to serious security concerns. In particular, it is important to rethink identity and access management. Neither aspect is a new IT management challenge but SOA amplifies them with scale and complexity. The management of user identities, their credentials and other attributes, as well as controlling their access to the business services need to be defined, managed, controlled, and enforced. Identity silos must be bridged.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. S. Braynov, M. Jadiwala, Representation and analysis of coordinated attacks, in Proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering (ACM, New York, 2003), pp. 43–51

    Chapter  Google Scholar 

  2. D. Brossard, T. Dimitrakos, M. Colombo, Common Capabilities for Trust & Security in Service Oriented Infrastructures, eChallenges 2008

    Google Scholar 

  3. P. Deans, R. Wiseman, Service oriented infrastructure: technology and standards for integration. BT Technology Journal 26(1), 71–78 (2008)

    Google Scholar 

  4. P. Deans, R. Wiseman, Service-oriented infrastructure: proof of concept demonstrator. BT Technology Journal 26(2) (2009)

    Google Scholar 

  5. T. Dimitrakos, TrustCoM Scientific and Technological Roadmap. Restricted TrustCoM deliverable available upon request. Contact: theo.dimitrakos@bt.com

    Google Scholar 

  6. T. Dimitrakos, I. Djordjevic, A note on the anatomy of federation. BT Technology Journal 23(4), 89–106 (2005). Special Issue on Identity Management

    Article  Google Scholar 

  7. T. Dimitrakos, P. Kearney, D. Golby, Towards a trust and contract management framework for dynamic virtual organisations, in eAdoption and the Knowledge Economy (IOS Press, Amsterdam, 2004)

    Google Scholar 

  8. T. Dimitrakos, D. Brossard, P. de Leusse, Securing business operations in an SOA. BT Technology Journal 26(2) (2009)

    Google Scholar 

  9. Distributed Access Control in a Service-Oriented Infrastructure, a BEinGRID Security Whitepaper, available from Gridipedia

    Google Scholar 

  10. I. Djordjevic, Use case/Requirements elicitation for BE09, Grid Trust Deliverable, British Telecom, December 2006

    Google Scholar 

  11. C. Geuer-Pollmann, How to make a federation manageable, in Proc. of Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, 19–21 Sept. 2005

    Google Scholar 

  12. Federation Management & Identity Brokerage in a Service-Oriented Infrastructure, a BEinGRID Security Whitepaper, available from Gridipedia

    Google Scholar 

  13. Managing, Contextualizing, & Exposing Enterprise Services: a service-oriented Governance Gateway, a BEinGRID Security Whitepaper, available from Gridipedia

    Google Scholar 

  14. OASIS, XACML 2.0 Core: eXtensible Access Control Markup Language (XACML) Version 2.0

    Google Scholar 

  15. OASIS, XACML 3.0 Administration and Delegation Profile, WD 19, 10 Oct. 2007: XACML v3.0 (DRAFT) Administration and Delegation Profile Version 1.0

    Google Scholar 

  16. OASIS, XACML 3.0 Core Specification (DRAFT), WD 6, 18 May 2008: eXtensible Access Control Markup Language (XACML) Version 3.0 (Core Specification and Schemas)

    Google Scholar 

  17. Securing the Service-Oriented Infrastructure: exposing web services with XML Security Gateways, a BEinGRID Security Whitepaper, available from Gridipedia

    Google Scholar 

  18. L. Titkov, D1.1.1—Requirements Analysis & Technology Evaluation for General Security and Trust

    Google Scholar 

  19. http://www.axiomatics.com

  20. http://www.beingrid.eu/be2.html

  21. http://www.beingrid.eu/be9.html

  22. http://www.beingrid.eu/be25.html

  23. http://www.beingrid.eu/be21travelcrm.html

  24. http://en.wikipedia.org/wiki/Abstract_factory_pattern

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to David Brossard .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Brossard, D., Dimitrakos, T., Gaeta, A., Mouton, S. (2010). Aspects of General Security & Trust. In: Dimitrakos, T., Martrat, J., Wesner, S. (eds) Service Oriented Infrastructures and Cloud Service Platforms for the Enterprise. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04086-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04086-3_4

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04085-6

  • Online ISBN: 978-3-642-04086-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics