Web Services Security for Collaborative Web Services Security for Collaborative Applications Applications

dankishbeeSecurity

Nov 3, 2013 (3 years and 7 months ago)

64 views

Web Services Security for Collaborative
Web Services Security for Collaborative
Applications
Applications
Mary Ellen Zurko
Mary Ellen Zurko
NextGen
NextGen Security Architect
Security Architect
Lotus Software
Lotus Software
Web Service Application
Architecture
Browser client
Deployed server
Rich client
Web Service 1
Web Service 2
Adaptor
Trust boundary
Web Services Security Standards
Status
Web Services Security Standards
Status
User Proof of Identity
Web Services Security Standards
Status
User Proof of Identity
Protection of
Message Data
Web Services Security Standards
Status
User Proof of Identity
Protection of
Message Data
Services Proof of Identity
Web Services Security Standards
Status
User Proof of Identity
Protection of
Message Data
Services Proof of Identity
Executable Proof of Identity
Web Services Security Standards
Status
User Proof of Identity
Protection of
Message Data
Services Proof of Identity
Executable Proof of Identity
Application Data Security
Web Services Security Standards
Status
User Proof of Identity
Protection of
Message Data
Services Proof of Identity
Executable Proof of Identity
Application Data Security
Protection of Identity Proofs
Web Services Security Standards
Status
User Proof of Identity
Protection of
Message Data
Services Proof of Identity
Executable Proof of Identity
Application Data Security
Protection of Identity Proofs
Transparent Policies
Web Services Security Standards
Status
User Proof of Identity
Protection of
Message Data
Services Proof of Identity
Executable Proof of Identity
Application Data Security
Protection of Identity Proofs
Transparent Policies
Controlled Sharing of Information
plication

Data

Security
Web Services Security Standards
Status
User Proof of Identity
Protection of
Message Data
Services Proof of Identity
Executable Proof of Identity
Application Data Security
Protection of Identity Proofs
Transparent Policies
Controlled Sharing of Information
plication

Data

Security
Consistent
Policies
Web Services Security Standards
Status
User Proof of Identity
Protection of
Message Data
Services Proof of Identity
Executable Proof of Identity
Application Data Security
Protection of Identity Proofs
Transparent Policies
Controlled Sharing of Information
plication

Data

Security
Consistent
Policies
Data from Reliable Sources
Web Services Security Standards
Status
User Proof of Identity
Protection of
Message Data
Services Proof of Identity
Executable Proof of Identity
Application Data Security
Protection of Identity Proofs
Transparent Policies
Controlled Sharing of Information
plication

Data

Security
Consistent
Policies
Data from Reliable Sources
Accountability