A policy Management System for Business Collaboration Supervisor: Jian Yang Student ID: 40188949 Name: Young Bo Choi 1.

Slides:



Advertisements
Similar presentations
Policy Specification, Analysis and Transformation International Technology Alliance in Network and Information Sciences A scenario based demo will illustrate.
Advertisements

Abstraction Layers Why do we need them? –Protection against change Where in the hourglass do we put them? –Computer Scientist perspective Expose low-level.
East Ayrshire Libraries Acceptable Use Policy and Filtering.
A Successful RHIO Implementation
CS 415 N-Tier Application Development By Umair Ashraf July 2nd,2013 National University of Computer and Emerging Sciences Lecture # 7 N-Tier Architecture.
PlanetLab Federation Development Aaron Klingaman Princeton University.
Enterprise development reference architecture (EDRA) -Deepti Seelamsetti.
Title of Presentation Author 1, Author 2, Author 3, Author 4 Abstract Introduction This is my abstract. This is my abstract. This is my abstract. This.
Agenda Introduction New Features in Map Suite Web Edition 3.0 Demonstration Where to Get Help and Learn More Q&A 2.
Design Aspects. User Type the URL address on the cell phone or web browser Not required to login.
Online Magazine Bryan Ng. Goal of the Project Product Dynamic Content Easy Administration Development Layered Architecture Object Oriented Adaptive to.
2007 Adobe Systems Incorporated. All Rights Reserved. 1 Model for the Old Web -> Client Server Server Client.
SWIM and Next Gen Enterprise Architecture Artifacts
The Open Grid Service Architecture (OGSA) Standard for Grid Computing Prepared by: Haoliang Robin Yu.
Brighton and Sussex NHS LKS is part of Brighton and Sussex University Hospitals NHS Trust KnowledgeShare a web-based tool to facilitate collaboration and.
Securing Enterprise Applications Rich Cole. Agenda Sample Enterprise Architecture Sample Enterprise Architecture Example of how University Apps uses Defense.
NETAuthenticator is…... a NAV add-on that allows for authorization of external access Secure and controlled access to Dynamics NAV data online Maintenance.
Hospital Management System
What is inside a cloud? An architectural map of the cloud Landscape Presented by: Omer Iltaf 1 st Semester BCM.
Online Social Networking By: Sylvia Engdahl ©2007.
Managing Quality Of Life For Communities Deryk Van Brunt, Dr.PH Clinical Professor, UC Berkeley President, Healthy Communities Foundation Chairman, eMedicine.
SOS EGEE ‘06 GGF Security Auditing Service: Draft Architecture Brian Tierney Dan Gunter Lawrence Berkeley National Laboratory Marty Humphrey University.
DAT602 Database Application Development Lecture 12 C/S Model Database Application.
Florida Information Protection Act of 2014 (FIPA).
Electronic Clinic System Prepared By: Salsabeel Ahmad AL-Taha and Maram Fathi Balatia Supervisor : Dr.Aladdin Masri.
Secure Systems Research Group - FAU Using patterns to compare web services standards E. Fernandez and N. Delessy.
Submission No. 17 An Affective Agent (AA) for Predicting Composite Emotions AAMAS Demo 2015 Submission No. 17 Demo site:
LMS Integrations Agenda The Past: LAMS 1.0 Integrations Now: Integration Architecture LAMS 2.0 / Moodle 1.7 Integration The Future:
Alcatel-Lucent CDC Workshop, Coaching & Knowledge Transfer Architecture.
Chapter No 4 Query optimization and Data Integrity & Security.
Web Site Redesign for ULAA (Union of Liberian Associations in the Americas) Isaac G. Nyenaweh Software Development, Database & Digital Media.
L. A. S. E. R Local Authority Security Enterprise Reporting System Architecture.
Introduction Database integral part of our day to day life Collection of related database Database Management System : software managing and controlling.
The Nation’s First Statewide Health Information Exchange AcademyHealth National Health Policy Conference State Health Research and Policy Interest Group.
Dynamic and Selective Combination of Extension in Component-based Applications Eddy Truyen, Bart Vanhaute, Wouter Joosen, Pierre Verbaeten, Bo N. Jørgensen.
Ke Li. Agenda Introduction User Identification Features of the Tutorial What I Have Learned Demo.
Lesson 2: Web Development Teams
To provide easy access to important hospital data for patients, doctors, and staff Provide a way to pay hospital bill online Provide a way to rate and.
What Your Website Should Do For You. Web Service Companies.
CSC Proprietary 1 Registering your Car On-line with your eID Card Daniel Frauman – Principal June 2, 2004.
Web Services Security Patterns Alex Mackman CM Group Ltd
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
Clinical Engineering Web site Clinical Engineering Virtual Toolkit Senior Design III – Spring 2007 James E. Meyer.
4/26/2017 Use Cloud-Based Load Testing Service to Find Scale and Performance Bottlenecks Randy Pagels Sr. Developer Technology Specialist © 2012 Microsoft.
Evaluating Web Service Composition Methods with the help of a Business Application By: Anand Ratnakar Shikhare Submitted to: Professor Dr. Eduard Heindl.
This is Not a Book About …. Author: Illustrator: Class: Date:
 sohamRe is a web browser based Reinsurance management system for Reinsurance Companies.  sohamRe provide all of the business functions necessary for.
 Please get your composition book and get to work on the handout. Agenda  Critical Lens Introduction Practice on own Review as a class  Critical Lens.
The Exchange Network Node Mentoring Workshop User Management on the Exchange Network Joe Carioti February 28, 2005.
Interaction classes Record context Custom lookups.
Contoso Online services Bing Amazon etc. Enterprise applications Interactive client apps Trading partners.
DEVRY CIS 407 A (All iLabs 1 to 7) Check this A+ tutorial guideline at For more classes.
Structure of a web application
Prof. Bhavani Thuraisingham The University of Texas at Dallas
Florida Information Protection Act of 2014 (FIPA)
The Open Grid Service Architecture (OGSA) Standard for Grid Computing
Beyond the BDC\BCS Model
Requirements for Client-facing Interface to Security controller draft-ietf-i2nsf-client-facing-interface-req-00 Rakesh Kumar Juniper networks.
2017 Real Questions
CTU – Health HSS110 Final Presentation
Beginning Object-Oriented Web Design
Architectural Roadmap
Introduction to Databases Transparencies
מונחים בסיסיים במודל השכבות
IS 651: Distributed Systems Web Technologies
Project Change Control
Social Abstractions for Information agents
ASP.NET MVC Imran Rashid CTO at ManiWeber Technologies.
<Add authors and affiliation>
SO-Architectural Roadmap
Presentation transcript:

A policy Management System for Business Collaboration Supervisor: Jian Yang Student ID: Name: Young Bo Choi 1

Abstract Business collaborate to stay competitive. Business Collaboration can use web services. Businesses adheres their own policies. Security policies do not match perfectly. Inconsistencies can be unacceptable. Businesses identify security policies. 2

Medical Online Booking System consists of two web applications. exemplify the two authorization models demonstrate business collaboration. do medical online booking securely. 3

Agenda Composite Service With Agent Authorization Model. A Hospital Web Application. A Hospital WCF Web Services. An Insurance Web Application. Conclusion. 4

Composite Service With Agent The way business interact affects security policy. 5

Authorization Model Insurance and hospital’s Authorization Models Hospital Insurance 6

A Hospital Web Application Goal: Illustrate hospital’s authorization Model Is built using 3-Layer Architecture in ASP.NET: - Database Layer - Middle Layer - Presentation Layer 7

Database Layer 8

Middle Layer 9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

A Hospital WCF Web Services. 30

A Hospital WCF Web Services. 31

An Insurance Web Application. Goal 1: Illustrate Insurance’s authorization Model Goal 2: Provide Online Booking Services. Is built using 3-Layer Architecture in ASP.NET: - Database Layer - Middle Layer - Presentation Layer 32

Database Layer 33

Middle Layer 34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

Conclusion Businesses can have authorization policy conflicts. A service can be exposed to the unintended user. Inconsistenices in Authorization policy need to be considered. 49