Skip to main content
  • 4482 Accesses

Abstract

The way enterprises conduct business today is changing greatly. The enterprise has become more pervasive with a mobile workforce, outsourced data centers, different engagements with customers and distributed sites [19.1, 2]. In addition, companies seeking to optimize their processes across their supply chains are implementing integration strategies that include their customers and suppliers rather than looking inward. This increases the need for securing end-to-end transactions between business partners and the customer [19.3].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 349.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 449.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 599.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. The long nimbus, from The Economist, Oct 23rd (2008)

    Google Scholar 

  2. W.G. Glass: BTs Matrix Architecture, BT Technol. J. 26(2), 86–96 (2008)

    MathSciNet  Google Scholar 

  3. Seeley 2007, Web Services news, SearchWebServices.com, February 2007

    Google Scholar 

  4. P. Deans, R. Wiseman: Service oriented infrastructure: technology and standards for integration, BT Technol. J. 26(1), 71–78 (2008)

    Google Scholar 

  5. P. Deans, R. Wiseman: Service-Oriented Infrastructure: Proof of Concept Demonstrator, BT Technol. J. 26(2), 87–104 (2009)

    Google Scholar 

  6. T. Dimitrakos, P. Kearney, D. Goldby: Towards a Trust and Contract Management Framework for Dynamic Virtual Organisations. In: eAdoption and the Knowledge Economy, ed. by P. Cunningham, M. Cunningham (IOS Press, Amsterdam 2004)

    Google Scholar 

  7. J. Wittgreffe, P. Warren: Editorial, BT Technol. J. 26(2), pp. (2008)

    Google Scholar 

  8. C. Gresty, T. Dimitrakos, G. Thanos, P. Warren: Meeting Customer Needs, BT Technol. J. 26(1), 11–24 (2008)

    Google Scholar 

  9. D.W. Cearley et al: Gartner’s Positions on the Five Hottest IT Topics and Trends in 2005. Gartner Research Report, May 2005. ID Number: G00125868.

    Google Scholar 

  10. T. Dimitrakos et al.: TrustCoM – A rust and Contract Management Framework enabling Secure Collaborations in Dynamic Virtual Organisations, ERCIM News No. 59 (2004)

    Google Scholar 

  11. T. Dimitrakos: TrustCoM Scientific and Technological Roadmap. Restricted TrustCoM deliverable available upon request. Contact: theo.dimitrakos@bt.com

    Google Scholar 

  12. BEinGRID project resources: Website www.beingrid.eu – Gridipedia repository www.gridipedia.eu

  13. BEinGRID consortium: Better Business Using Grid Solutions. Eighteen Successful Case Studies from BEinGRID. Booklet available at: http://www.beingrid.eu/casestudies.html. See also BEinGRID industry days website: http://www.beingrid.eu/beingridindustrydays.html

  14. A. Maierhofer, T. Dimitrakos, L. Titkov, D. Brossard: Extendable and Adaptive Message-Level Security Enforcement Framework, ICNS 2006, IEEE Comp. Soc. (2006) p. 72

    Google Scholar 

  15. T. Dimitrakos, I. Djordjevic: A note on the anatomy of federation, BT Technol. J. 23(4), 89–106 (2005)

    Article  Google Scholar 

  16. UUID, RFC 4122, http://www.ietf.org/rfc/rfc4122.txt

  17. T. Dimitrakos, D. Brossard, P. de Leusse: Securing Business Operations in SOA, BT Technol. J. 26(2), 105–125 (2009)

    Google Scholar 

  18. TrustCoM consortium: Final TrustCoM Reference implementation and associated tools and user manual, available at http://www.eu-trustcom.com/

  19. OASIS. XACML 3.0 Core Specification (DRAFT), WD 6, 18 May 2008: eXtensible Access Control Markup Language (XACML) Version 3.0 (Core Specification and Schemas)

    Google Scholar 

  20. OASIS. XACML 3.0 Administration and Delegation Profile, WD 19, 10 Oct 2007: XACML v3.0 (DRAFT) Administration and Delegation Profile Version 1.0

    Google Scholar 

  21. OASIS. XACML 2.0 Core: eXtensible Access Control Markup Language (XACML) Version 2.0

    Google Scholar 

  22. T. Dimitrakos, D. Brossard: Improvements in policy driven computer systems, European patent application submission, March 31st, 2008

    Google Scholar 

  23. TrustCoM consortium: TrustCoM Framework for Trust, Security and Contract Management V4, available at http://www.eu-trustcom.com/

  24. P. de Leusse, P. Periorellis, P. Watson, A. Maierhofer: Secure & Rapid Composition of Infrastructure Services in the Cloud, The Second International Conference on Sensor Technologies and Applications, SENSORCOMM 2008, Cap Esterel, IEEE Computer Society (2008)

    Google Scholar 

  25. P. de Leusse, P. Periorellis, P. Watson, T. Dimitrakos: A semi autonomic infrastructure to manage non functional properties of a service, UK e-Science All Hands Meeting 2008, Edinburgh (2008)

    Google Scholar 

  26. P. de Leusse, P. Periorellis, T. Dimitrakos, P. Watson: An Architecture for Non Functional Properties Management in Distributed Computing, 3rd Int. Conference on Software and Data Technologies (ICSOFT 2008) (2008)

    Google Scholar 

  27. P. de Leusse, P. Periorellis, P. Watson: Enterprise Service Bus: An overview, in Technical Reports, ed. by S.o.C. Science, Newcastle University (2007)

    Google Scholar 

  28. BT’s 21st Century Network. Information site at http://www.btplc.com/21CN/

  29. Burton Group: Analyst resources and publications on Identity as a Service (IaaS): http://www.burtongroup.com/Research/Topics/IdentityAsAService.aspx

  30. Fischer International: Identity Management as a Service: A simple solution to a complex problem, whitepaper available at http://www.fischerinternational.com/press/white_papers.htm

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Dimitrakos, T., Brossard, D., de Leusse, P., Nair, S. (2010). Security of Service Networks. In: Stavroulakis, P., Stamp, M. (eds) Handbook of Information and Communication Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04117-4_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04117-4_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04116-7

  • Online ISBN: 978-3-642-04117-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics