Security Models and Service Bus


Using SOA-enabling applications and creating fine-grained services significantly increases the number of services for you to manage. Composite applications and services consume these additional services, which are distributed across the enterprise for orchestration or to provide high-level services or functionality to meet IT and business needs. The permissions to access to these services must conformto the security policies of the enterprise. If services are not secure, discerning legitimate requests from rogue access attempts is a daunting task. Unauthorized access to a service may result in degraded service performance or even in unavailability.


Security Policy Business Service Security Model Access Control Policy Proxy Service 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© BEA Systems, Inc. 2007

Personalised recommendations