- Trending Categories
- Data Structure
- Operating System
- C Programming
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
What are the privacy aspects of SOA in information security?
Service-oriented Architecture (SOA) is an approach of designing software to provide services to applications, or to other services, through published and discoverable interfaces. Each service provide a discrete chunk of business functionality by a loosely coupled (usually asynchronous), message-dependent communication model.
The design of a high-quality software solution, including some other complex structure, needs early architectural decisions assisted by well-understood design methods, structural designs, and styles. These patterns address general service concerns such as scalability, reliability, and security.
There are some aspects of Service-oriented architecture which are as follows −
Architectural versus Implementation Models − As IT professionals goes to deliver applications using Web services, they generally find themselves in the place of appearing up to speed on an architectural model (SOA) and an execution model (Web services) simultaneously.
This consider the utilization of a Model Driven Architecture method that carefully averts commingling the platform-independent model of an application’s structure and behavior with the methods and platforms used to implement that modeled behavior.
System architects employ either domain-specific languages or profiles for Unified Modeling Language (UML) to model the problem of the service domain. The principles that require architects to maintain platform and language problems out of this model also need them to keep implementation-particular security problem out.
Revisiting Security Concerns − The team that developed the RosettaNet family of B2B standards formed concerns that were same to the ones it is only conversed, and made a beginning toward addressing them. The concept was to present a simplified group of options to the business architects the main stakeholders from whom the RosettaNet team gathered data and processing requirements.
These business architects were not versed in the technical elements of the security issues, but they were able to contrast information that required to be passed in a secure method from data that can be sent without security measures.
Generalization of Security Issues − There are some texts on common software security concerns, and several more on specific security executions and technologies. Though, it can be able to address the basic intent that drives security-linked technical executions. Specially, it can be able to define a set of descriptive primitive intents that are simple to understand, and that can be accessed to identify specific technical executions.
In views of execution, there are two main approaches to authorization that are as follows −
Authorization of Individual Parties − Each party can be allocated an explicit group of access rights to functions.
Authorization through Roles − Multiple roles can be produced for each application, and access rights allocated as defined above to those roles instead of individual parties. When each party is authenticated, the credentials supplied for the party include the party’s role, which then identifies whether the party is authorized to access a definite function.
- What are the privacy aspects of RFID in information security?
- What are the aspects of Information Security?
- What is SOA in information security?
- What are the aspects of Security Measurement?
- What are the related terms for Privacy in Information Security?
- What is Privacy in information security?
- What are the principles of Information Privacy?
- What is Internet Privacy in information security?
- What are the features of collections in Information Privacy?
- What are the security services of Information Security?
- What are the Pillars of Information Security?
- What are the goals of Information Security?
- What are the services of Information Security?
- What are the types of Information Security?
- What are the levels of database security in information security?