EXPERIMENTAL RESEARCH AND CAPABILITY VALUATION ON SECURITY OF SOA-SCA BASED SDO
Peng Xu, Zhiyi Fang, Hang Su, Chuyi Wei
2008
Abstract
By using technologies such as encryption, decryption, message digest, and digital signature and so on, this paper designed respective solutions for some security problems of SDO (Service Data Objects) data model, a concrete business processes based on SOA-SCA (Service Component Architecture) as well as security solutions for data confidentiality, integrity and non-repudiation of SDO data model based on the business processes. In addition, the design goals of security solution were analyzed in detail. Finally, the solution was achieved by using development tools WID (WebSphere Integration Developer) and WPS (WebSphere Process Server). The test and capability analysis for this realization was performed too.
References
- Ben MargolisandJoseph Sharpe, 2007. SOA for the Business Developer: Concepts, BPEL, and SCA, MC Press, First Edition.
- Matt Bishop, 2004. Introduction to Computer Security, Addison-Wesley Professional
- Wenbo Mao, 2003 .Modern Cryptography: Theory and Practice, Prentice Hall PTR
- Abdul Allam, Ali Arsanjani, 2008. “Service-Oriented Modeling and Architecture”, Technical paper of IBM Global Services. Version 2. 14-34.
- Murdoch Mactaggart, 2001. Introduction to Encryption, IBM developerworks, China
- Raghavan Srinivas, 2000. Security's Evolvement and Idea of Java, IBM developerworks, China
Paper Citation
in Harvard Style
Xu P., Fang Z., Su H. and Wei C. (2008). EXPERIMENTAL RESEARCH AND CAPABILITY VALUATION ON SECURITY OF SOA-SCA BASED SDO . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 337-341. DOI: 10.5220/0001929203370341
in Bibtex Style
@conference{secrypt08,
author={Peng Xu and Zhiyi Fang and Hang Su and Chuyi Wei},
title={EXPERIMENTAL RESEARCH AND CAPABILITY VALUATION ON SECURITY OF SOA-SCA BASED SDO},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={337-341},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001929203370341},
isbn={978-989-8111-59-3},
}
in EndNote Style
TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - EXPERIMENTAL RESEARCH AND CAPABILITY VALUATION ON SECURITY OF SOA-SCA BASED SDO
SN - 978-989-8111-59-3
AU - Xu P.
AU - Fang Z.
AU - Su H.
AU - Wei C.
PY - 2008
SP - 337
EP - 341
DO - 10.5220/0001929203370341