Developing Proactive Security Dimensions for SOA

Developing Proactive Security Dimensions for SOA

Hany F. EL Yamany, David S. Allison, Miriam A.M. Capretz
ISBN13: 9781466629196|ISBN10: 1466629193|EISBN13: 9781466629202
DOI: 10.4018/978-1-4666-2919-6.ch041
Cite Chapter Cite Chapter

MLA

Yamany, Hany F. EL, et al. "Developing Proactive Security Dimensions for SOA." IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2013, pp. 900-922. https://doi.org/10.4018/978-1-4666-2919-6.ch041

APA

Yamany, H. F., Allison, D. S., & Capretz, M. A. (2013). Developing Proactive Security Dimensions for SOA. In I. Management Association (Ed.), IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications (pp. 900-922). IGI Global. https://doi.org/10.4018/978-1-4666-2919-6.ch041

Chicago

Yamany, Hany F. EL, David S. Allison, and Miriam A.M. Capretz. "Developing Proactive Security Dimensions for SOA." In IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 900-922. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2919-6.ch041

Export Reference

Mendeley
Favorite

Abstract

Security is one of the largest challenges facing the development of a Service-Oriented Architecture (SOA). This is due to the fact that SOA security is the responsibility of both the service consumer and service provider. In recent years, many solutions have been implemented, such as the Web Services Security Standards, including WS-Security and WS-SecurityPolicy. However, those standards are insufficient for the promising new generations of Web 2.0 applications. In this research, we describe an Intelligent SOA Security (ISOAS) framework and introduce four of its services: Authentication and Security Service (NSS), the Authorization Service (AS), the Privacy Service (PS) and the Service of Quality of Security Service (SQoSS). Furthermore, a case study is presented to examine the behavior of the described security services inside a market SOA environment.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.