Font Size: a A A

The Research On The Application Of SOA Security

Posted on:2010-02-23Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhangFull Text:PDF
GTID:2189360275455789Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
The IT Environment of enterprises has been growing more and more complex with the rapid development of information technology.It needs such a system,which is loosely coupling,cross-platform and programming language unrelated,to react to the changes of surroundings.In order to solve this problem,more and more enterprises pay much attention to SOA,Service Oriented Architecture.SOA,which enables enterprises to integrate their business providing to customers and partners, enhances business agility and also reduces development costs of information systems.As a result of SOA enables enterprises to integrate their business providing to customers and partners and enterprises information has been greatly developed,more and more enterprises have been starting to open their SOA services to customers and business partners.Though the exposure of internal services to web can bring convenience to users,this involves so many enterprises.These enterprises have to reach an agreement on security technologies and security policies.Due to the cross-platform of SOA and openness of web services,systems become more complex. Obviously this brings more security risks to enterprises.Based on SOA features and advantages and SOA basic theory,this paper studied the new security problems of SOA overall architecture at all levels which include external service,transport level,message level,data level and identity management. This paper also summarizes SOA security products in the market.Then from the point view of packaging security into services,it put forward a comprehensive SOA security solution-SOA security service shared model.This paper gives a detailed analysis of the components of this model.These components include applications proxy service,contract management,network firewall services,SOAP message monitor gateway services,XML document security services,identity management services and so on.Finally,combined with concrete examples,this paper describes the procedure of SAML identity certification and SOAP message security process.
Keywords/Search Tags:SOA Security, SAML, SOAP, XML Encryption, XML Signature
PDF Full Text Request
Related items