An Architectural Concept for the CIEAM Enterprise Bus

  • Georg Grossmann
  • Gerald Quirchmayr
  • Markus Stumptner
Conference paper

Abstract

The University of South Australia is investigating the highly complex integration of information systems within the CRC for integrated engineering asset management (CIEAM) and develops techniques and tools to simplify the data exchange between enterprise critical systems. Recent research outcomes include a service oriented integration architecture, an integration toolbox and a service interface for the integration of asset management information systems. In this paper we also propose an extension on the architecture level for enabling a secure data exchange between multiple systems. It allows the secure information sharing internally within an enterprise but also externally with business partners and supports the current trend towards an open service oriented environment by protecting critical asset management data on a shared communication infrastructure.

Keywords

Security architecture Secure integration Secure service oriented architecture Secure asset health management 

References

  1. 1.
    Grossmann G, Stumptner M, Mayer W, Barlow M (2009) A service oriented architecture for data integration in asset management. 4th World Congress on Engineering Asset Management (WCEAM 2009). Springer, pp 785–795Google Scholar
  2. 2.
    Mathew A, Purser M, Ma L, Barlow M (2009) Open standards-based system integration for asset management decision support. 4th World Congress on Engineering Asset Management (WCEAM 2009). Springer, pp 221–228Google Scholar
  3. 3.
    Agt H, Bauhoff G, Cartsburg M, Kumpe D, Kutsche RD, Milanovic N (2009) Metamodeling foundation for software and data integration. 3rd International United Information Systems Conference (UNISCON). SpringerGoogle Scholar
  4. 4.
    Shtelma M, Carlsburg M, Milanovic N (2009) Executable domain specific language for message-based system integration. ACM/IEEE 12th International Conference on Model Driven Engineering Languages and Systems (MODELS). SpringerGoogle Scholar
  5. 5.
    Thiagarajan RK, Mayer W, Stumptner M (2009) A generative framework for service process composition. ICSOC/ServiceWave. LNCS 5900, SpringerGoogle Scholar
  6. 6.
    Delfs H, Knebl H (2007) Introduction to cryptography—principles and applications. Springer, New YorkMATHGoogle Scholar
  7. 7.
    Garfinkel SL (1996) Public key cryptography. IEEE Comput 29(6):101–104CrossRefGoogle Scholar
  8. 8.
    Rivest R, Shamir A, Adelman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126MATHCrossRefGoogle Scholar
  9. 9.
    Salomaa A (1996) Public-key cryptography. Springer, BerlinMATHGoogle Scholar
  10. 10.
    Coppersmith D, Johnson D, Matyas SM (1996) A proposed mode for triple-DES encryption. IBM J Res Develop 40:10CrossRefGoogle Scholar
  11. 11.
    Daemen J, Rijmen V (2005) Rijndael/AES. In: van Tilborg HC (ed) Encyclopedia of cryptography and security. SpringerGoogle Scholar
  12. 12.
    Weaver AC (2006) Secure sockets layer: IEEE Computer. IEEEGoogle Scholar
  13. 13.
    Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theory IT-22:11Google Scholar

Copyright information

© Springer-Verlag London Limited 2012

Authors and Affiliations

  • Georg Grossmann
    • 1
    • 2
  • Gerald Quirchmayr
    • 1
    • 2
    • 3
  • Markus Stumptner
    • 1
    • 2
  1. 1.CRC for Integrated Engineering Asset ManagementBrisbaneAustralia
  2. 2.School of Computer and Information ScienceUniversity of South AustraliaAdelaideAustralia
  3. 3.Department of Distributed and Multimedia SystemsUniversity of ViennaWienAustria

Personalised recommendations