Security Models and Service Bus
Using SOA-enabling applications and creating fine-grained services significantly increases the number of services for you to manage. Composite applications and services consume these additional services, which are distributed across the enterprise for orchestration or to provide high-level services or functionality to meet IT and business needs. The permissions to access to these services must conformto the security policies of the enterprise. If services are not secure, discerning legitimate requests from rogue access attempts is a daunting task. Unauthorized access to a service may result in degraded service performance or even in unavailability.
KeywordsSecurity Policy Business Service Security Model Access Control Policy Proxy Service
Unable to display preview. Download preview PDF.