Skip to main content
Mobile
  • Finance, Accounting & Economics
  • Global Business Management
  • Management, Leadership & Organisation
  • Marketing & Sales
  • Strategy
  • Technology & Operations
HS Talks HS Talks
Subjects  
Search
  • Notifications
    Notifications

    No current notifications.

  • User
    Welcome Guest
    You have Limited Access The Business & Management Collection
    Login
    Get Assistance
    Login
    Forgot your password?
    Login via your organisation
    Login via Organisation
    Get Assistance
Finance, Accounting & Economics
Global Business Management
Management, Leadership & Organisation
Marketing & Sales
Strategy
Technology & Operations
Practice paper

Securing a service-oriented architecture (SOA) environment

Nataraj Nagaratnam, Anthony Nadalin and Sridhar Muppidi
Journal of Business Continuity & Emergency Planning, 1 (2), 129-145 (2007)
https://doi.org/10.69554/LTFS6880

Abstract

Securing access to information is important for any business. Security becomes even more critical for implementations structured according to service-oriented architecture (SOA) principles, due to loose coupling of services and applications and their possible operations across trust boundaries. To enable a business so that its processes and applications are flexible, changes should be expected — both to process and application logic, as well as to the policies associated with them. Merely securing the perimeter with firewalls or routers is not sufficient for a flexible on demand business. Security must be factored into the SOA life cycle, reflecting that security is a business requirement, not just a technology attribute. This approach helps enable the capability to secure services. Another characteristic of SOA security is about rendering and using security functionality itself as security services. This paper discusses the SOA life cycle and security. It presents an SOA security model that captures the essence of security services and securing services. These approaches to SOA security are discussed in the context of scenarios, and observed patterns. The paper also introduces a reference model to address the requirements, patterns of deployment and usage, and an approach to integrated security management for SOA.

Keywords: service-oriented architecture; SOA; SOA security; security services; policy management; business security

The full article is available to subscribers to the journal.

Already a subscriber? Login or review other options.

Citation

Nagaratnam, Nataraj, Nadalin, Anthony and Muppidi, Sridhar (2007, January 1). Securing a service-oriented architecture (SOA) environment. In the Journal of Business Continuity & Emergency Planning, Volume 1, Issue 2. https://doi.org/10.69554/LTFS6880.

Options

  • Download PDF
  • Share this page
    Share This Article
    Messaging
    • Outlook
    • Gmail
    • Yahoo!
    • WhatsApp
    Social
    • Facebook
    • X
    • LinkedIn
    • VKontakte
    Permalink
cover image, Journal of Business Continuity & Emergency Planning
Journal of Business Continuity & Emergency Planning
Volume 1 / Issue 2
© Henry Stewart
Publications LLP

The Business & Management Collection

  • ISSN: 2059-7177
  • Contact Us
  • Request Free Trial
  • Recommend to Your Librarian
  • Subscription Information
  • Match Content
  • Share This Collection
  • Embed Options
  • View Quick Start Guide
  • Accessibility

Categories

  • Finance, Accounting & Economics
  • Global Business Management
  • Management, Leadership & Organisation
  • Marketing & Sales
  • Strategy
  • Technology & Operations

Librarian Information

  • General Information
  • MARC Records
  • Discovery Services
  • Onsite & Offsite Access
  • Federated (Shibboleth) Access
  • Usage Statistics
  • Promotional Materials
  • Testimonials

About Us

  • About HSTalks
  • Editors
  • Contact Information
  • About the Journals

HSTalks Home

Follow Us On:

HS Talks
  • Site Requirements
  • Copyright & Permissions
  • Terms
  • Privacy
  • Sitemap
© Copyright Henry Stewart Talks Ltd

Personal Account Required

To use this function, you need to be signed in with a personal account.

If you already have a personal account, please login here.

Otherwise you may sign up now for a personal account.

HS Talks

Cookies and Privacy

We use cookies, and similar tools, to improve the way this site functions, to track browsing patterns and enable marketing. For more information read our cookie policy and privacy policy.

Cookie Settings

How Cookies Are Used

Cookies are of the following types:

  • Essential to make the site function.
  • Used to analyse and improve visitor experience.

For more information see our Cookie Policy.

Some types of cookies can be disabled by you but doing so may adversely affect functionality. Please see below:

(always on)

If you block these cookies or set alerts in your browser parts of the website will not work.

Cookies that provide enhanced functionality and personalisation. If not allowed functionality may be impaired.

Cookies that count and track visits and on website activity enabling us to organise the website to optimise the experience of users. They may be blocked without immediate adverse effect.