Web Services Quality Model V2.0 Business Value Quality Group Business Value Quality Cost Suitability Effect Service Measurement Quality Group Service Level.

Slides:



Advertisements
Similar presentations
PRESENTATION TITLE Name of Presenter Company Affiliation IHE Affiliation.
Advertisements

Web Services Security Requirements Stephen T. Whitlock Security Architect Boeing.
REDCap Executive Overview
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
0 Web Service Security JongSu Bae. 1  Introduction 2. Web Service Security 3. Web Service Security Mechanism 4. Tool Support 5. Q&A  Contents.
E-Business Risks Chapter Seven. E-Business Models EDI Web pages The online environment Distributed e-business and intranets Supply chain linkage Collaborative.
Chapter 19: Network Management Business Data Communications, 4e.
Chapter 17 Controls and Security Measures
Information System Security Engineering and Management Risk Analysis and System Security Engineering Homework (#2, #3) Dr. William Hery
1 Network Security Derived from original slides by Henric Johnson Blekinge Institute of Technology, Sweden From the book by William Stallings.
Risks, Controls and Security Measures
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
Security expenditure should be determined by security risk. What is the financial risk to UNC of undetected modification of bioresearch data? theft and.
Henric Johnson1 Network Security /. 2 Outline Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork.
Bazara Barry1 Security on Networks and Information Systems Bazara I. A. Barry Department of Computer Science – University of Khartoum
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Secure Electronic Transactions (SET). SET SET is an encryption and security specification designed to protect credit card transactions on the Internet.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Security and DICOM Lawrence Tarbox, Ph.D. Chair, DICOM Working Group 14 Siemens Corporate Research.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
CS 4720 Security CS 4720 – Web & Mobile Systems. CS 4720 The Traditional Security Model The Firewall Approach “Keep the good guys in and the bad guys.
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
REDCap Executive Overview Institute for Clinical and Translational Science (ICTS) University of Iowa Heath Davis, Fred McClurg,
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
1 Presented by July-2013, IIM Indore. 2  RFID = Radio Frequency IDentification.  RFID is ADC (Automated Data Collection) technology that:-  uses radio-frequency.
1 WSQDL (Web Service Quality Description Language) 16 th April, 2007 Youngkon Lee Korea Polytechnic University.
© Synergetics Portfolio Security Aspecten.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Dimensions of E – Commerce Security
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Web Security : Secure Socket Layer Secure Electronic Transaction.
Listen to Your Meters! Pradeep Murthy SunTec Business Solutions.
PKI Forum Business Panel March 6, 2000 Dr. Ray Wagner Sr. Director, Technology Research.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Introduction to Web Services Quality Model And Collaboration Issues for EERP Sojung Kim WSQM TC National Information society Agency.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Copyright © 2003 Jorgen Thelin / Cape Clear Software 1 A Web Services Security Framework Jorgen Thelin Chief Scientist Cape Clear Software Inc.
Database security Diego Abella. Database security Global connection increase database security problems. Database security is the system, processes, and.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
CSC 386 – Computer Security Scott Heggen. Agenda The Foundations of Computer Security.
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Cloud service for clinical trials
Threat Modeling for Cloud Computing
Chapter 9: Security © Len Bass, Paul Clements, Rick Kazman, distributed under Creative Commons Attribution License.
Radiology Option for Audit Trail and Node Authentication Robert Horn
Chapter 17 Risks, Security and Disaster Recovery
Who Uses Encryption? Module 7 Section 3.
Using eSignature for Signing IBM Contracts
Systems Design Chapter 6.
CS 465 Terminology Slides by Kent Seamons Last Updated: Sep 7, 2017.
Secure Electronic Transactions (SET)
IBM GTS Storage Security and Compliance overview.
Process flow Kindly note: This presentation is automated – please do not click any of your mouse buttons or keyboard keys.
Electronic Payment Security Technologies
Presentation transcript:

Web Services Quality Model V2.0 Business Value Quality Group Business Value Quality Cost Suitability Effect Service Measurement Quality Group Service Level Measurement Quality Performance Stability System Information Quality Group System Information Quality Group Interoperability Quality Conformability Interoperability Business Process Quality Message Reliability Transactionality Collaborability Manageability Quality Introspection Control Notification Security Quality Confidentiality Integrity Authentication Access control Non-repudiation Accessibility Audit trail Privacy Brand Value

Business Value Quality Group is the collection of quality attributes that can be referred to define Business Value of the Web Services. Service Measurement Group is the collection of quality attributes that can be measured by user while using Web Services. System Information Quality Group is the collection of information about Web Services system functions that can be checked before using Web Services.

Business Value Quality –Cost includes price, penalty/compensation, billing –Suitability check if Web Services meets user’s requirements on BLA –Effect indicates the outcome from Web Services in business –Brand Value evaluated by a survey or a customer review Service Level Measurement Quality –Performance indicates how quickly Web Services process user’s request. divided into ‘response time’ and ‘throughput’ –Stability indicates the consistency of Web Services under various conditions. divided into availability, accessibility, and successability

Interoperability Quality –Conformability indicates the level of compliance of Web Services to standard –Interoperability indicates the level of compliance of Web Services to the interoperability profile defined by WS-I Business Process Quality –Message Reliability indicates if a reliable message is supported for the business process –Transactionality refers to the ability to process the tasks on the business process as a single logical unit –Collaborability refers to the attribute for the multiple Web Services to interoperate and support a single business transaction

Manageability Quality –Introspection separate Web Services and its resource, and see if the status information can be obtained –Control is about the control and manageability of Web Services resource –Notification check if the change of resource or Web Services status can be delivered Security Quality –Confidentiality prevents an access from outside. Uses an encryption –Integrity prevents illegally modifying data after interception. –Authentication identify oneself to others. Single sign-on needed in Web Services environment –Access Control assign resource privileges to selected users –Non-repudiation prevent the denial of sending/receiving on each end. Uses digital signature –Audit Trial leave a log for services attack attempt and later use it for anaysis –Privacy is about privacy protection and its related service between Web Services user and provider