EXPERIMENTAL RESEARCH AND CAPABILITY VALUATION ON SECURITY OF SOA-SCA BASED SDO

Peng Xu, Zhiyi Fang, Hang Su, Chuyi Wei

Abstract

By using technologies such as encryption, decryption, message digest, and digital signature and so on, this paper designed respective solutions for some security problems of SDO (Service Data Objects) data model, a concrete business processes based on SOA-SCA (Service Component Architecture) as well as security solutions for data confidentiality, integrity and non-repudiation of SDO data model based on the business processes. In addition, the design goals of security solution were analyzed in detail. Finally, the solution was achieved by using development tools WID (WebSphere Integration Developer) and WPS (WebSphere Process Server). The test and capability analysis for this realization was performed too.

References

  1. Ben MargolisandJoseph Sharpe, 2007. SOA for the Business Developer: Concepts, BPEL, and SCA, MC Press, First Edition.
  2. Matt Bishop, 2004. Introduction to Computer Security, Addison-Wesley Professional
  3. Wenbo Mao, 2003 .Modern Cryptography: Theory and Practice, Prentice Hall PTR
  4. Abdul Allam, Ali Arsanjani, 2008. “Service-Oriented Modeling and Architecture”, Technical paper of IBM Global Services. Version 2. 14-34.
  5. Murdoch Mactaggart, 2001. Introduction to Encryption, IBM developerworks, China
  6. Raghavan Srinivas, 2000. Security's Evolvement and Idea of Java, IBM developerworks, China
Download


Paper Citation


in Harvard Style

Xu P., Fang Z., Su H. and Wei C. (2008). EXPERIMENTAL RESEARCH AND CAPABILITY VALUATION ON SECURITY OF SOA-SCA BASED SDO . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 337-341. DOI: 10.5220/0001929203370341


in Bibtex Style

@conference{secrypt08,
author={Peng Xu and Zhiyi Fang and Hang Su and Chuyi Wei},
title={EXPERIMENTAL RESEARCH AND CAPABILITY VALUATION ON SECURITY OF SOA-SCA BASED SDO},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={337-341},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001929203370341},
isbn={978-989-8111-59-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - EXPERIMENTAL RESEARCH AND CAPABILITY VALUATION ON SECURITY OF SOA-SCA BASED SDO
SN - 978-989-8111-59-3
AU - Xu P.
AU - Fang Z.
AU - Su H.
AU - Wei C.
PY - 2008
SP - 337
EP - 341
DO - 10.5220/0001929203370341