Analysis of Security and Performance Service in Service Oriented Architecture (SOA) and Data Integration

Erick Fernando, Hetty Rohayani. AH, Pandapotan Siagian, Derist Touriano

Abstract


Nowdays, the use of web services in the world of education is very much particular services and information provided in the form of the transaction until the payment - the payment and security in a system that is built in the form of a website. This system does not yet have a system that is integrated with each other and the security that is necessary to develop a system that leads towards it. Services provided requires an integrated system of all related system, the Service Oriented Architecture (SOA) to be used as an efficient solution for integrating distributed applications. In SOA-based environment that focuses on quality of service called WSARCH (Web Services Architecture). With this paper can then propose a system that uses a Service Oriented Architecture (SOA) with Web Services Architecture to resolve accurately than techniques that have a lower negative impact in terms of service performance and security.

Keywords


Service Oriented Architecture (SOA), Data Integration, Operational, Data, Web Services, Security, Performance , Encryption

References


A.H.Karp and J. Li, "Solving the Transitive Access Problem for Service-Oriented Architecture", IEEE International Conference on Availability, Reliability and Security, DOI 10.1109/ARES.2010.

A. Singhal, T. Winograd and K. Scarfone, "Guide to Secure Web Services", National Institute of Standards and Technology Special Publication. .2007.

D.F. Ferraiolo and D.R. Kuhn. "Role Based Access Control", 15th National Computer Security Conf.: 554-563. 1992.

D.Smith,“Migration of legacy assets to service-oriented architecture environments,” in Proceedings of the 29th International Conference on Software Engineering, 2007, pp. 174-175.

E.Yuan and J. Tong. "Attributed Based Access Control (ABAC) for Web Services", IEEE International Conference on Web Services (ICWS'05). 2005.

G. Zhang and J. Liu, "A Model of Workflow-Oriented Attributed Based Access Control" , I. J. Computer Network & Information Security,1, 47-53.2011.

G. Thies and G. Vossen, “Web-oriented architectures: On the impact of web 2.0 on service-oriented architectures,” in Proceedings of IEEE Asia-Pacific Services Computing Conference, 2008, pp. 1075-1082.

I. Jorstad, S. Dustdar, and D. Thanh, “A service oriented architecture framework for collaborative services,” in Proceedings of the 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise, 2005, pp. 121- 125.

J. C. Estrella, R. T. Toyohara, B. T. Kuehne, T. C. Tavares, R. C. Santana, M. J. Santana, and S. M. Bruschi. “A Performance Evaluation for a QoS-Aware Service Oriented Architecture”. IEEE Congress on Services, pp. 260-267. 6th World Congress on Services, 2010.

J. Tong, "Attribute Based Access Control: New Access Control Approach for Service- Oriented Architectures", Workshop on New Challenges for Access Control, Ottawa, Canada, Apr.2005.

M. Beadley, “Function point counting practices manual, release 4.1,” International Function Point Users Group (IFPUG), 1999.

12. Mohammad Mahdi Shafiei , Homayun Motameni and Javad Vahidi. “Analyzing Access control Models Dynamic Level and Security In Service–Oriented ArchitectureEnvironment“ International Journal of Mechatronics, Electrical and Computer Technology Vol. 4(11), pp. 470-484, ISSN: 2305-0543, Apr. 2014

P.C. Cheng, P.Rohatgi, and C. Keser, "Fuzzy MLS: Experiment on Quantified Risk- Adaptive Access Control", IEEE Symposium on Security and Privacy, PP. 222-230.2007.

Phil Bianco, Rick Kotermanski and Paulo Merson. “Evaluating a Service-Oriented Architecture”, Software Architecture Technology Initiative, Carnegie Mellon University, September 2007

[8] R. S.Sandhu et al, "Role-Based Access Control Models. IEEE Computer", pp. 38-47. 1996.

R Kuhn, American National Standards Institute. 2003.

S. Balasubramaniam, G. Lewis, E. Morris, S. Simanta, and D. Smith, “Challenges for assuring quality of service in a service-oriented environment,” in Proceedings of ICSE Workshop on Principles of Engineering Service Oriented Systems, 2009, pp. 103-106.

T. Uemura, S. Kusumoto, and K. Inoue, “Function point analysis for design specifications based on the unified modeling language,” Journal of Software Maintenance and Evaluation, Vol. 13, 2001, pp. 223-243.


Full Text: PDF

Refbacks

  • There are currently no refbacks.