Security of Service Networks

  • Theo Dimitrakos
  • David Brossard
  • Pierre de Leusse
  • Srijith K. Nair

Abstract

The way enterprises conduct business today is changing greatly. The enterprise has become more pervasive with a mobile workforce, outsourced data centers, different engagements with customers and distributed sites [19.1, 2]. In addition, companies seeking to optimize their processes across their supply chains are implementing integration strategies that include their customers and suppliers rather than looking inward. This increases the need for securing end-to-end transactions between business partners and the customer [19.3].

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 19.1.
    The long nimbus, from The Economist, Oct 23rd (2008)Google Scholar
  2. 19.2.
    W.G. Glass: BTs Matrix Architecture, BT Technol. J. 26(2), 86–96 (2008)MathSciNetGoogle Scholar
  3. 19.3.
    Seeley 2007, Web Services news, SearchWebServices.com, February 2007Google Scholar
  4. 19.4.
    P. Deans, R. Wiseman: Service oriented infrastructure: technology and standards for integration, BT Technol. J. 26(1), 71–78 (2008)Google Scholar
  5. 19.5.
    P. Deans, R. Wiseman: Service-Oriented Infrastructure: Proof of Concept Demonstrator, BT Technol. J. 26(2), 87–104 (2009)Google Scholar
  6. 19.6.
    T. Dimitrakos, P. Kearney, D. Goldby: Towards a Trust and Contract Management Framework for Dynamic Virtual Organisations. In: eAdoption and the Knowledge Economy, ed. by P. Cunningham, M. Cunningham (IOS Press, Amsterdam 2004)Google Scholar
  7. 19.7.
    J. Wittgreffe, P. Warren: Editorial, BT Technol. J. 26(2), pp. (2008)Google Scholar
  8. 19.8.
    C. Gresty, T. Dimitrakos, G. Thanos, P. Warren: Meeting Customer Needs, BT Technol. J. 26(1), 11–24 (2008)Google Scholar
  9. 19.9.
    D.W. Cearley et al: Gartner’s Positions on the Five Hottest IT Topics and Trends in 2005. Gartner Research Report, May 2005. ID Number: G00125868.Google Scholar
  10. 19.10.
    T. Dimitrakos et al.: TrustCoM – A rust and Contract Management Framework enabling Secure Collaborations in Dynamic Virtual Organisations, ERCIM News No. 59 (2004)Google Scholar
  11. 19.11.
    T. Dimitrakos: TrustCoM Scientific and Technological Roadmap. Restricted TrustCoM deliverable available upon request. Contact: theo.dimitrakos@bt.comGoogle Scholar
  12. 19.12.
    BEinGRID project resources: Website www.beingrid.eu – Gridipedia repository www.gridipedia.eu
  13. 19.13.
    BEinGRID consortium: Better Business Using Grid Solutions. Eighteen Successful Case Studies from BEinGRID. Booklet available at: http://www.beingrid.eu/casestudies.html. See also BEinGRID industry days website: http://www.beingrid.eu/beingridindustrydays.html
  14. 19.14.
    A. Maierhofer, T. Dimitrakos, L. Titkov, D. Brossard: Extendable and Adaptive Message-Level Security Enforcement Framework, ICNS 2006, IEEE Comp. Soc. (2006) p. 72Google Scholar
  15. 19.15.
    T. Dimitrakos, I. Djordjevic: A note on the anatomy of federation, BT Technol. J. 23(4), 89–106 (2005)CrossRefGoogle Scholar
  16. 19.16.
  17. 19.17.
    T. Dimitrakos, D. Brossard, P. de Leusse: Securing Business Operations in SOA, BT Technol. J. 26(2), 105–125 (2009)Google Scholar
  18. 19.18.
    TrustCoM consortium: Final TrustCoM Reference implementation and associated tools and user manual, available at http://www.eu-trustcom.com/
  19. 19.19.
    OASIS. XACML 3.0 Core Specification (DRAFT), WD 6, 18 May 2008: eXtensible Access Control Markup Language (XACML) Version 3.0 (Core Specification and Schemas)Google Scholar
  20. 19.20.
    OASIS. XACML 3.0 Administration and Delegation Profile, WD 19, 10 Oct 2007: XACML v3.0 (DRAFT) Administration and Delegation Profile Version 1.0Google Scholar
  21. 19.21.
    OASIS. XACML 2.0 Core: eXtensible Access Control Markup Language (XACML) Version 2.0Google Scholar
  22. 19.22.
    T. Dimitrakos, D. Brossard: Improvements in policy driven computer systems, European patent application submission, March 31st, 2008Google Scholar
  23. 19.23.
    TrustCoM consortium: TrustCoM Framework for Trust, Security and Contract Management V4, available at http://www.eu-trustcom.com/
  24. 19.24.
    P. de Leusse, P. Periorellis, P. Watson, A. Maierhofer: Secure & Rapid Composition of Infrastructure Services in the Cloud, The Second International Conference on Sensor Technologies and Applications, SENSORCOMM 2008, Cap Esterel, IEEE Computer Society (2008)Google Scholar
  25. 19.25.
    P. de Leusse, P. Periorellis, P. Watson, T. Dimitrakos: A semi autonomic infrastructure to manage non functional properties of a service, UK e-Science All Hands Meeting 2008, Edinburgh (2008)Google Scholar
  26. 19.26.
    P. de Leusse, P. Periorellis, T. Dimitrakos, P. Watson: An Architecture for Non Functional Properties Management in Distributed Computing, 3rd Int. Conference on Software and Data Technologies (ICSOFT 2008) (2008)Google Scholar
  27. 19.27.
    P. de Leusse, P. Periorellis, P. Watson: Enterprise Service Bus: An overview, in Technical Reports, ed. by S.o.C. Science, Newcastle University (2007)Google Scholar
  28. 19.28.
    BT’s 21st Century Network. Information site at http://www.btplc.com/21CN/
  29. 19.29.
    Burton Group: Analyst resources and publications on Identity as a Service (IaaS): http://www.burtongroup.com/Research/Topics/IdentityAsAService.aspx
  30. 19.30.
    Fischer International: Identity Management as a Service: A simple solution to a complex problem, whitepaper available at http://www.fischerinternational.com/press/white_papers.htm

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Theo Dimitrakos
    • 1
  • David Brossard
    • 1
  • Pierre de Leusse
    • 1
  • Srijith K. Nair
    • 1
  1. 1.British Telecom PP13Martlesham Heath, IpswichUK

Personalised recommendations