Databases Reference
In-Depth Information
Defining Security and
Management Policies
In this chapter, we will investigate how service-oriented computing makes security
and monitoring more complicated before exploring how to secure our service
infrastructure and monitor it.
Security and management challenges in
the SOA environment
Moving to service-oriented architecture brings with it a number of benefits that we
have explored throughout this topic, such as improved reuse, strong encapsulation
of business services, and the ability to rapidly construct new composite services and
applications. However, there is one area in which SOA makes life much harder,
and that is in the area of security and management. By security, we mean the
process of ensuring that individuals and applications can only access the information
and invoke the processing which is allowed to them. By management, we mean
the task of ensuring that a system is capable of delivering the required services
when requested.
Search WWH ::




Custom Search