Free Essay

Soa Security Development Framework

In:

Submitted By WOODSMK4
Words 2857
Pages 12
SOA Security Development Framework
September 25, 2013

SOA Security Development Framework Development frameworks are an important part of a Service Oriented Architecture. Developing Service Oriented Architecture applications from an enterprise architecture standpoint necessitates that all these development frameworks be documented and inserted in the reference guides delivered to each designer. With the traditional stovepipe application tactic, all of the applications are fabricated with their individually implanted security. Part of security for these applications is to necessitate the user to sign in to achieve access. Then the application would regulate what an authenticated user was certified to use by restricting the functionality through different apparatuses, including screen masks, database record locks, and distinct roles. Within a Service Oriented Architecture application development model, the required security has to be designed so that it can provide authentication services and authorization services to any of the Service Oriented Architecture components in the Service Oriented Architecture that requires them. According to the studies that are available it is projected that ninety percent of the external attacks on applications will be because of security vulnerabilities and misconfigured systems. Even though it is not possible to develop applications that will be one hundred percent secure there are useful approaches recommended for analyzing threats, susceptibilities, and risk (Achkoski, Trajkovik, & Dojchinovski, 2011). Then the security mechanisms for a Service Oriented Architecture based system can be implemented. Therefore to improve security throughout the entire system the security solutions should try to decrease the cost for incident response, application outage, fixing malfunctioning systems, and reputation damage (Achkoski, Trajkovik, & Dojchinovski, 2011). Originally the services in Service Oriented Architecture were related with a stack technology which encompassed SOAP, WSDL, and UDDI (O'neill, 2009). Then several of the grassroots developers started showing a fondness for lightweight Representational State Transfer (REST) services instead of the more heavyweight SOAP messages which resulted in REST being accepted as a part of Service Oriented Architecture (O'neill, 2009). The effect of all of this is that Service Oriented Architecture now includes the original SOAP/REST/UDDI stack, REST services, and the Cloud (O'neill, 2009). Meaning that, from a security professional’s perspective, all of these services will have to be secured. Service Oriented Architecture security framework will be required to provide particular capabilities. These capabilities are constituent authentication services, constituent role and service privileges identification services, service authorization services, service validation services, security pass-through services, and security detection and enforcement policy configuration services (Sweeney, 2010). On top of that the Service Oriented Architecture framework will also need to be supported by an Identity Management and Provisioning Framework that will provide the Service Oriented Architecture with the following capabilities, Constituency setup and configuration services, role creation and configuration services, constituent Service Oriented Architecture user profile setup and configuration services, legacy application security provisioning services, Legacy application security synchronization services, user provisioning services, Service Oriented Architecture user profile management services (Sweeney, 2010). There will be service components in the Service Oriented Architecture security framework that will operate in each of the layers of the Service Oriented Architecture framework. The Channel Layer security service is where user authentication and role identification will occur. The security framework at the channel layer will define all of the mechanisms and specifications that will be required to support authentication for all users across all channels (Sweeney, 2010). On top of this security framework will also stipulate the authentication criteria and devices for providing services through channel mediators and for using protected services from outside bodies. Different channels may require different authentication mechanisms for constituents in one channel that enter through another channel. In a typical organization there are five general categories for authentication scenarios from a Service Oriented Architecture perspective. That means that there should be at least five authentication frameworks defined for the channel layer (Sweeney, 2010). cation mechanisms for constituents f the mechanisms and specifications that will be required to authen The key is that no matter which channel that a constituent invokes the authentication in or which framework is used once the constituent has been authenticated the roles associated with that particular authenticated constituent in the Service Oriented Architecture security profile system will now be available for any component through that channel as long as the security framework session continues to be active (Sweeney, 2010). Then there is the Business Process and Business Service Authorization Services. Even though the User authentication and service privilege identification are modules and criteria that are quantified in relation to their design and use in the Channel layer of the SOA enterprise architecture framework. Service approvals are modules and criteria that are identified in relation to their strategy and use in the Business Process and Business Service layers of the SOA enterprise architecture framework. Under this methodology, each separate Business Process or Business Service supervises the approval of the service it executes, not the channel. There are three explanations why this method is required. The first is that if the service requests are hard-coded into the Channel layer then there will not be a way to certify whether the services are still certified for the role (Sweeney, 2010). The second reason is that there is the possibility that further prerequisite data that limit utilization of the service. An instance of this might be with a subscriber role being approved to add a family member, certain accounts might want to limit their staff from adding their family members through the account’s human resources system, which will send the updated data to the health insurer through one of the insurer’s account constituent channels (Sweeney, 2010). Integrating this reasoning at the Presentation layer of the channel will possibly have substantial performance repercussions. Then the third explanation why this method is required is because if it was performed at the channel layer it would be have to be performed every time a user authenticates. By invoking the authorization at the Process or Service layer, it will only be instituted when it is being used. Then there is the Integration Layer Security Services, there will be numerous occasions where the integration layer will be required to authenticate to the legacy system’s security on the back-end before it will be possible for the request or replies from the integration layer to be processed. The reason for this is because most if not all of these systems will have their own exclusive format and structure that will be required to authenticate the user. This could be group or individual specific authentication mechanisms. Quite possibly these credentials will be different from those used at the channel layer. However, enterprise SOA security framework can provide centralized services so that authentication can be provided at the legacy application on the back end. Simply put the enterprise SOA security framework will have to provide the capability of integrating back-end legacy security with the Enterprise SOA Provisioning Framework and leverage services from that framework to obtain the necessary credential data and processes (Sweeney, 2010). When it comes to trends in Service Oriented Architecture security framework it has to be mentioned that a fundamental challenge for Service Oriented Architecture applications is guaranteeing security of those applications through numerous computers which are typically connecting using unsecured networks. This Means that several of the features that make Service Oriented Architecture an attractive standard like web service configuration, communications transmitted as clear text and comparative independence of common web services clash with customary security models (Cotfas, Palaghita, & Vintila, 2010). If communications among web services are transmitted lacking the use of an encryption mechanism, all data together with the defining meta-data can be captured by an invader. Security of service oriented architecture applications is still a concern and numerous criteria are presently being established: WS-Authorization, WS-Privacy, WS-Trust, WS-Federation, WS-Policy, and WS- SecureConversation (Cotfas, Palaghita, & Vintila, 2010). When it comes to Security for a Service Oriented Architecture it does not matter what environment an organization is using the leading step in the analysis of that security has to be defining the set of requirements. On top of defining those requirements, the organization must have a set of cost versus threat parameters for the organization. Otherwise, they will not have the capability of implementing security in a Service Oriented Architecture (Hinton, Hondo, & Hutchison, 2005). The more an organization can define the threats to its organization, the better it will be capable to evaluate the advantage of countermeasures to safeguard itself. To do this organizations will need to answer these questions. “Who needs to have access to what information? How is access to data provided? Is it direct or brokered? Is there a need for data to be available to external partners as well as internal consumers? Are there different requirements on data in transit? In process? At rest” (Hinton, Hondo, & Hutchison, 2005)? Because a lot of software developers consider of security as a process that happens during the following phase a lot of business applications hit obstructions at deployment. Therefore, the next question that an organization should be asking themselves is what piece security logic will provide them with the best return on investment (Hinton, Hondo, & Hutchison, 2005). The same way that Service Oriented Architecture is about the transformation of business. The security for Service Oriented Architecture is about the transformation of security. What this means is that the specific security will need to be integrated into the complete business service decomposition. Therefore, application developers and business analysts will be obligated to team up with each other when it comes to the necessities in perspective of the business applications. Since each business application will have to describe the scope of the security service, developers and business analyst will need to work together to decide when so they can decide when the agility the require is provided by the common security services (Hinton, Hondo, & Hutchison, 2005). The implementation of Service Oriented Architecture now exists in almost every industry. The problem is that developers do not always secure the Service Oriented Architecture services and architectures. When you combine that with protocols that are allowed through the firewall like SOAP over port 80 which is common in web service environments then Service Oriented Architecture can become a security disaster waiting to happen (National Security Agency, n.d.). This means that particular attention should be paid to the security framework involved with Service Oriented Architecture in order to prevent the security disaster waiting when security gets overlooked by developers. The Knowledge that Service Oriented Architecture and Web Services do not combine well because the implementation of security in a Service Oriented Architecture environment is a intricate and error-prone undertaking for designers, security has to be in the forethought of Service Oriented Architecture development. The reason implementation of security is so intricate, and error-prone is because designers have to work with the enormous amount of WS*, WS-I, SAML and XACML standards for web service security (Layer 7 Technologies, 2013). There are also integration issues that exist among their services and a number of current enterprise security infrastructures that they have the desire to leverage. These include security infrastructure like SAML tokens, virus scanners, HSM's, Kerberos, SSO cookies, LDAP, CA authorities, and SSL termination devices (Layer 7 Technologies, 2013). Not to mention having to handle lifespan concerns through test and production. XML firewalls on the other hand make security definition and implementation in Service Oriented Architecture easy by giving designers and architects the capability to outline and administer security strategy across an easy graphical policy language (Layer 7 Technologies, 2013). Outlining policies for validation, fine-grained authorization, identity federation, data encryption, data signing, data redaction, data validation, API protection, and throttling amid additional Service Oriented Architecture security operations can all be made from an individual policy supervision console and then imposed reliably through distributed services and if so preferred the client applications that request them (Layer 7 Technologies, 2013). With that being said the way that so many organizations are embracing Service Oriented Architecture because it increases application elasticity, makes integration more controllable, lowers development costs, and enhanced alignment of technology systems to business processes. What they are doing is creating issues that need to be worked out dealing with security. The fact is the very thing that makes Service Oriented Architecture so popular is the very thing that increases the security risk. One of the methods for handling this problem in the new infrastructures environment that has been applied in an organizations Service Oriented Architecture is to look at it from the attacker’s perspective, then model the expanse an occurrence could spread from a compromised server (Clark, 2010). Once that has been figured out plan an alleviation strategy to control and halt the spread (Clark, 2010). Engineering elastic schemes such as Service Oriented Architecture is a physical security challenge, although it is not an unmanageable task as long as you take the right steps from the beginning (Clark, 2010). After the Service Oriented Architecture environment has been built and the security protocols have been instituted the security aspect will need to be tested. Because of this and the fact that so many security specification factors have evolved and will continue evolving in the future the obvious requirement would be to identify a test tool strategy (Naidu & Vussainsagar, 2009). For this purpose, there are several commercial and open source products available. In the commercial realm for testing, there are Green Hat Tester, Mercury products, Parasoft SOAtest, AdventNet QEngine, Borland SilkPerformer SOA edition LISA WS – Testing (Naidu & Vussainsagar, 2009). In the open source realm for testing, there is SOAP UI, Push To Test TESTMAKER and WS-I tools. All of these tools provide outstanding support for functional, interoperability, regression and performance testing some of them will even support the testing of WS-Security including X509, SAML, Username security tokens, XML Signature and Encryption (Naidu & Vussainsagar, 2009). The problem is that there are not many tools out there that will support testing past the WSSecurity. In order to test past the WSSecurity a non-normative approach will need to be used to test the security aspect because if they were tested individually they would register as working fine. The approach to use is divided into three different steps. The first step is the test assertion documents, which means the security specifications used by the web service in the Service Oriented Architecture needs to be thoroughly analyzed. Then a table should be prepared identifying essential, elective and suggested components that the specification has defined (Naidu & Vussainsagar, 2009). Along with the test assertion XMl document using the defined table should be prepared. The second step is to capture SOAP messages which is accomplished by identifying or developing a simple SOAP monitor tool, then initiate the request, along with capturing the SOAP messages with the SOAP monitoring tool (Naidu & Vussainsagar, 2009). The third and final step is to generate a test result report which will compare the TAD with the Captured SOAP request, response, and generate a result report (Naidu & Vussainsagar, 2009). An example company that is working in the area of Service Oriented Architecture security framework is Raythoen. They are working with open frameworks and their security that deliver approaches for scheme development and incorporation in which systems bundle functionality as interoperable services for customers like the Department of Defense (Raytheon, 2009).

References
Achkoski, J., Trajkovik, V., & Dojchinovski, M. (2011). An Intelligence Information System Based on Service-Oriented Architecture: A Survey of Security Issues. Information & Security, 27(1), 91-110. Retrieved from http://search.proquest.com/docview/1017670790?accountid=8289
Clark, C. (2010, January 19). Why traditional security doesn't work for SOA. Retrieved from Techworld: http://www.techworld.com.au/article/331125/why_traditional_security_doesn_t_work_soa/
Cotfas, L., Palaghita, D., & Vintila, B. (2010). Audit techniques for service oriented architecture applications. Informatica Economica, 14(1), 128-136. Retrieved from http://search.proquest.com/docview/1433237130?accountid=8289
Hinton, H., Hondo, M., & Hutchison, B. (2005, November). Security Patterns within a Service-Oriented Architecture. Retrieved from http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&ved=0CEcQFjAB&url=http%3A%2F%2Fwww.ii.uib.no%2Ftrac%2FeSysBio_Master%2Fexport%2F196%2Fm2%2Fdoc%2FSOA%2FSecuritySOA_%282%29.pdf&ei=uB5HUpinFcnk4APqq4HIDg&usg=AFQjCNHZd3lILssE2hcaJcQpgANnMwN5hg&
Layer 7 Technologies. (2013). SOA Security. Retrieved from Layer 7 Technologies: http://www.layer7tech.com/solutions/service-security
Naidu, J., & Vussainsagar, U. K. (2009, October 28). Service Oriented Architecture Testing: An Approach for Testing Security Aspects of SOA Based Application. Retrieved from slideshare: http://www.slideshare.net/jaipalnaidu/soa-testing-an-approach-for-testing-security-aspects-of-soa-based-application
National Security Agency. (n.d.). Service Oriented Architecture Security Vulnerabilities-Web Services. Retrieved from National Security Agency/Central Security Service: http://www.nsa.gov/ia/_files/factsheets/soa_security_vulnerabilities_web.pdf
Raytheon company; raytheon to provide service-oriented architecture-compatible, cross-domain security solution. (2009). Defense & Aerospace Week, 70. Retrieved from http://search.proquest.com/docview/199636926?accountid=8289
Sweeney, R. (2010). SOA Security Development Framework. In R. Sweeney, Service Oriented Architecture Applying an Enterprise Architecture Approach (pp. 331-341). Hoboken: John Wiley & Sons.
O'neill, M. (2009, March 12). SOA Security: The Basics. Retrieved from NetworkWorld: http://www.networkworld.com/news/2009/031209-soa-security-the.html

Similar Documents

Free Essay

Service Oriented Architecture

...Defining SOA Service oriented architecture is a reliable software architecture that generates many positives for business activities. This software design principle is implemented into many organizations to connect multiple clients with the wide range of business functions. Service oriented architecture is becoming more popular among enterprises that will eventually become enthused by the benefits and importance this application has to offer. SOA is essentially a cluster of services that take part in communication with one another. It’s important to become acquainted with the definition of services. First of all the service portion of the architecture includes the key components of software code that’s shared throughout the architecture. The service part of SOA is referred to the self reliant function that does not need to obtain dependence from other services. SOA can be used in conjunction with web services. The primary functions of both SOA and web services are to make the SOA more mainstream for users with productive initiatives, in result that will make it more useful for web services. Web services are centrally concerned with technology specifications, while the service oriented architecture pinpoints the software importances. Service oriented architecture is a viable asset to the technology world for bringing value to those businesses that participate in applying this form of architecture. The corporate society benefits with the utilization of SOA which...

Words: 3865 - Pages: 16

Free Essay

Applied Soa

...Applied SOA Service-Oriented Architecture and Design Strategies Mike Rosen Boris Lublinsky Kevin T. Smith Marc J. Balcer Wiley Publishing, Inc. Applied SOA Applied SOA Service-Oriented Architecture and Design Strategies Mike Rosen Boris Lublinsky Kevin T. Smith Marc J. Balcer Wiley Publishing, Inc. Applied SOA: Service-Oriented Architecture and Design Strategies Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright  2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-22365-9 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: The publisher and...

Words: 218699 - Pages: 875

Free Essay

Gilette and P&G

...company’s ability to design, construct, and evolve its mission-critical software solutions. In particular, few new systems are designed from the ground up. Rather, a software architect’s task is commonly that of extending the life of an existing solution by describing new business logic that manipulates an existing repository of data, presenting existing data and transactions through new channels such as an Internet browser or handheld devices, integrating previously disconnected systems supporting overlapping business activities, and so on. Service Oriented Architecture (SOA) SOA is a way of designing a software system to provide services to either end-user applications or other services through published and discoverable interfaces. In many cases, services provide a better way to expose discrete business functions and therefore an excellent way to develop applications that support business processes. SOA architecture adheres to the Four Tenets of Service Orientation. Service Orientation (SO) is an architectural paradigm that employs the following four principles: 1. Boundaries are explicit 2. Share Schema and Contract, Not Types 3. Policy defines Service Compatibility 4. Services Are Autonomous Principle 1 – Boundaries are Explicit In this, services interact by exchanging messages. Each message...

Words: 1541 - Pages: 7

Free Essay

With the Development of Technology, More and More Robots Are Used in Various Fields,

...University of Mumbai B.E Information Technology Scheme of Instruction and Evaluation Third Year -Semester VI Scheme of Instructions Sr. Subjects Lect/ No 1 Information and Network Security Middleware and Enterprise Integration Technologies Software Engineering Data Base Technologies Programming for Mobile and Remote Computers Information Technology for Management of Enterprise TOTAL Week 4 Scheme of Examinations Theory T/W Practical Oral Total Hours Marks Marks Marks Marks Marks 3 100 25 -25 150 Pract/ Week 2 Tut/ Week -- 2 4 2 -- 3 100 25 -- 25 150 3 4 5 4 4 4 2 2 2 ---- 3 3 3 100 100 100 25 25 25 --25 25 25 -- 150 150 150 6 4 24 10 1 1 3 -- 100 600 25 150 -25 25 125 150 900 INFORMATION AND NETWORK SECURITY CLASS T.E. ( INFORMATION TECHNOLOGY) HOURS PER LECTURES : WEEK TUTORIALS : PRACTICALS EVALUATION SYSTEM: THEORY PRACTICAL ORAL TERM WORK : SEMESTER VI 04 -02 HOURS 3 ---- MARKS 100 25 25 1. Introduction What is Information Security? Security Goals. 2. Cryptography Crypto Basic, Classic Cryptography, Symmetric Key Cryptography: Stream Ciphers, A5/1, RC4, Block Ciphers, Feistel Cipher, DES, Triple DES, AES, Public Key Cryptography: Kanpsack, RSA, Defiie-Hellman, use of public key crypto- Signature and Non-repudiation, Confidentiality and Non-repudiation, Public Key Infrastructure, Hash Function: The Birthday Problem, MD5, SHA-1, Tiger Hash, Use of Hash Function. 3. Access...

Words: 3868 - Pages: 16

Free Essay

5510

...REGULATORY GUIDE 90 Example Statement of Advice (SOA) for a limited financial advice scenario for a new client August 2005 REGULATORY GUIDE 90: EXAMPLE STATEMENT OF ADVICE What this guide is about This guide explains how and why we have developed an example Statement of Advice (SOA). The example SOA was developed in consultation with stakeholders, and we acknowledge their valuable contribution throughout the process. 1 2 This guide: (a) sets out the purpose of the example SOA (Section 1); (b) outlines the framework in which the example SOA was developed (Section 2); and (c) explains why certain information has been included, or not included, in the example SOA (Section 3). Note: For the example SOA, see Appendix B. For details of the financial advice scenario on which the example SOA is based, see Appendix A. This guide should be read in conjunction with guidance we have issued on how we will administer the SOA requirements, including: 3 (a) Policy Statement 175 Licensing: Financial product advisers— conduct and disclosure [PS 175]; (b) Licensing: The scope of the licensing regime: Financial product advice and dealing—An ASIC guide (November 2001, reissued May 2005); (c) Policy Statement 167 Licensing: Discretionary powers [PS 167]; (d) Policy Statement 168 Disclosure: Product Disclosure Statements (and other disclosure obligations) [PS 168]; (e) Media Release [MR 04-062] FSR disclosure to be clear, concise and effective (10...

Words: 11432 - Pages: 46

Free Essay

Disarmament and Nuclear Non-Proliferation

...Regime, which includes nuclear disarmament as one of the principle integral parts, have always been the issue in difficult and controversial discussions attended by all members of international community. Nuclear disarmament, which has eventually become the safeguard and a key condition of the Nuclear Nonproliferation Regime’s successful performance, have always been an effective factor reducing the risk of unleashing a nuclear war and reinforcing the confidence of nuclear-free countries that the threat to their security is contained. The logic of nuclear disarmament is to curtail the lethal nuclear arms race and to provide for better predictability and transparency in this field. The aforementioned factors altogether enable defining the nuclear disarmament as the process crucial to global strategic stability. The nuclear factor within the current political environment, which represents a sophisticated tangle of different political processes and tendencies in development of international relations, plays an utmost important role, since the global...

Words: 3354 - Pages: 14

Free Essay

Testing

...10 XML Interview questions and answers for Java Programmer by Javin Paul on January 27th, 2013 | Filed in: Core Java Tags: XML XML Interview questions are very popular in various programming job interviews, including Java interviews for web developer. XML is a matured technology and often used as standard for transporting data from one platform other. XML Interview questions contains questions from various XML technologies like XSLT which is used to transform XML files, XPATH, XQuery and fundamentals of XML e.g. DTD or Schema. In this article we will see 10 frequently asked XML Interview questions and answersfrom above topics. These questions are mostly asked in various Java interviews but they are equally useful in other programming interviews like C, C++, Scala or any other programming language. Since XML is not tied with any programming language   and like SQL its one of the desired skill in programmer, it make sense to practice some XML questions before appearing in any technical job interview. XML Interview Questions and Answers Here is my list of some common and frequently asked Interview questions on XML technologies. Questions on this list is not very tough but touches some important areas of XML technologies e.g. DTD, XML Schema, XSLT transformations, XPATH evaluation, XML binding, XML parsers and fundamentals of XML e.g. namespace, validation, attribute, elements etc. Question 1: What is XML ? Answer : XML stands for Extensible Markup language which means you...

Words: 12773 - Pages: 52

Premium Essay

It Planning

...project (or an initiative), a strategic planning process identifies the main alternatives, the key business/technical issues involved in each alternative, and helps in evaluation and selection of the most viable alternatives before initiating the project. To succeed, the strategic planning process must explore a large number of people, process and technology issues and eliminate surprises. This is not easy because the task of eservices planning in the digital age is considerably complicated due to the changing business and technical landscape and an ever-growing body of knowledge. This short tutorial gives a quick overview of the vast body of knowledge that entails a typical strategic ICT planning process and presents a conceptual framework for further exploration of this important area. 1. An Example – eServices for a City Ms Fran Kuye is mayor of a city with one million inhabitants, located in a developing country.She wants to use the knowledge gained from her MPA (Master of Public Administration) to transform her city to a “Digital City” that heavily relies on eservices to support its citizens. Her overall goal is to develop a 2 year plan that includes the following:    First year, start with informational services on the web that deliver the information to the citizens over the Internet instead of printing forms and brochures that are mailed to the citizens. Second year, start with “transactional services”, where some of the services are delivered online...

Words: 5384 - Pages: 22

Premium Essay

Library Mgt System

...EBONYI STATE UNIVERSITY ABAKALIKI TITLE INTEGRATED LIBRARY MANAGEMENT SYSTEM BY NAME: REG_NO: LEVEL: DEPARTMENT: TO: DR. MRS ALO DATE: 7TH MAY, 2013 DEDICATION This work is solely dedicated to God almighty. ACKNOWLEDGMENT I want to appreciate my friends and family members for their support all through the incubation period of this project. As you stood by me so shall God stand by you all, whenever and wherever. Thank you all. Table of Contents DEDICATION 2 ACKNOWLEDGMENT 3 ABSTRACT 6 CHAPTER ONE 7 INTRODUCTION 7 1.1 BACKGROUNG OF STUDY 7 1.2 PROBLEM STATEMENT 7 1.3 AIM AND OBJECTIVES 8 1.3 SIGNIFICANCE OF STUDY 8 1.5 SCOPE OF STUDY 8 CHAPTER TWO 9 LITERATURE REVIEW 9 2.1 Aspects of Next-Generation ILS 10 CHAPTER THREE 13 METHODODLOGY AND SYSTEM ANALYSIS 13 3.1 RESEARCH METHODOLOGY 13 3.1.1 Project Methodology 13 3.3 DATA ANALYSIS 15 3.3.1 LIMITATIONS OF THE EXISTING SYSTEM 15 3.3.2 DATA FLOW OF THE PROPOSED SYSTEM 16 3.5 SYSTEM SPECIFICATION 17 CHAPTER FOUR 18 SYSTEM DESIGN 18 4.1 INPUT AND OUTPUT FORMS 18 4.1.1 DATA TABLES 18 4.1.2 DISPLAY FORMS 19 4.2 CONCLUSION 21 REFERENCES 22 ABSTRACT The adoption of integrated library systems (ILS) became prevalent in the 1980s and 1990s as libraries began or continued to automate their processes. These systems enabled library staff to work, in many cases, more efficiently than they had in the past. However, these systems were also restrictive—especially as the nature of the work...

Words: 4154 - Pages: 17

Premium Essay

Jobless Growth

...Discussion Paper 99 JOBLESS GROWTH IN INDIAN MANUFACTURING: A KALDORIAN APPROACH Michele Alessandrini* November 2009 Abstract Despite the remarkable economic performance in the last twenty-five years, India maintains a high discrepancy between the rate of growth of the economy and the rate of growth of employment. Labour elasticity to output has decreased over time and the capability of the Indian economy to generate employment seems to be limited. As a result, more than 60 percent of Indian workers are still employed in agriculture and 94 percent of total labour force can be found in the unregistered segment of the economy. This paper analyzes the jobless growth problem in India in terms of a Kaldorian framework where the linkages between agriculture and industry enter the labour demand through the changes in the terms of trade between the two sectors. Moreover, we investigate the role of the unorganized sector in influencing the growth of the registered employment. Using a dynamic panel dataset on registered manufacturing from the 15 major Indian states over the period 1980-2004, our System-GMM estimates show that states with a higher growth of demand for industrial goods originating from agriculture also exhibit a higher growth of employment. In addition, in those states where the weight of the unregistered manufacturing has risen over time, the jobless growth problem has worsened. Keywords: India, jobless growth, manufacturing, intersectoral terms...

Words: 13030 - Pages: 53

Premium Essay

Cloud Computing

...IIIT, Hyderabad Cloud Computing for E-Governance A white paper Abstract The worldwide revolution in Internet is changing our lives in terms of the way we work, learn and interact. These changes naturally should reflect the way government functions in terms of the organization of the government, its relationship with its citizens, institutions and businesses and cooperation with other governments. Also, the increasing generalization of technology access by citizen and organizations brings expectations and demands on government. At the same time, governments are also proactive in this domain and are planning new ways of interacting, improving services, optimizing processes and revitalizing democracy by spending amount on IT. It aims to deliver more interactive services to citizens and businesses through E-Governance. For this, cloud computing may lead to significant cost savings. It entails use over the Internet of computing hardware and software infrastructure and applications that are remotely hosted. In this white paper, we describe how this newly emerged paradigm of cloud computing can be helpful for E-Governance. IIIT, Hyderabad January 2010 CLOUD COMPUTING FOR E-GOVERNANCE January 1, 2010 Table of Contents Executive Summary....................................................................................................................................... 3 1. E-Governance Requirements .......................................................................

Words: 4341 - Pages: 18

Premium Essay

Test Paper

...g Easier! Making Everythin ™ mputing Cloud Co Learn to: • Recognize the benefits and risks of cloud services • Understand the business impact and the economics of the cloud • Govern and manage your cloud environment • Develop your cloud services strategy Judith Hurwitz Robin Bloor Marcia Kaufman Fern Halper Get More and Do More at Dummies.com ® Start with FREE Cheat Sheets Cheat Sheets include • Checklists • Charts • Common Instructions • And Other Good Stuff! To access the Cheat Sheet created specifically for this book, go to www.dummies.com/cheatsheet/cloudcomputing Get Smart at Dummies.com Dummies.com makes your life easier with 1,000s of answers on everything from removing wallpaper to using the latest version of Windows. Check out our • Videos • Illustrated Articles • Step-by-Step Instructions Plus, each month you can win valuable prizes by entering our Dummies.com sweepstakes. * Want a weekly dose of Dummies? Sign up for Newsletters on • Digital Photography • Microsoft Windows & Office • Personal Finance & Investing • Health & Wellness • Computing, iPods & Cell Phones • eBay • Internet • Food, Home & Garden Find out “HOW” at Dummies.com *Sweepstakes not currently available in all countries; visit Dummies.com for official rules. Cloud Computing FOR DUMmIES ‰ Cloud Computing FOR DUMmIES ‰ by Judith Hurwitz, Robin Bloor, Marcia Kaufman, and Dr. Fern Halper Cloud Computing For Dummies® Published by Wiley Publishing...

Words: 96278 - Pages: 386

Free Essay

Websphere Service Registry and Repository , Used for Soa Governance on Bpm

...Sample integration scenarios SOA governance Chris Dudley Laurent Rieu Martin Smithson Tapan Verma Byron Braswell ibm.com/redbooks International Technical Support Organization WebSphere Service Registry and Repository Handbook March 2007 SG24-7386-00 Note: Before using this information and the product it supports, read the information in “Notices” on page xv. First Edition (March 2007) This edition applies to Version 6, Release 0, Modification 0.1 of IBM WebSphere Service Registry and Repository (product number 5724-N72). © Copyright International Business Machines Corporation 2007. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii The team that wrote this redbook. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii Become a published author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi Part 1. SOA overview . . . . . . . . . ....

Words: 163740 - Pages: 655

Premium Essay

Paper Case Study Nantonia 

...Paper Case study Nantonia  ICT Strategy & Planning Master : ICT in Business Location : University, Leiden Course : ICT Strategy & Planning Assignment : Paper Case study Nantonia Date : 3 June 2011 Name : Suraj Soerdjbali Studentnr : Teacher : ------------------------------------------------- Part 1 The business model: 1. Partners: Natepco is a subsidiary of Natonia Energy Holdings. Which on their turn have a joint venture with Prime Energy Group and Government of Natonia 2. Key activities: The key activities of Natepco are exploration and production 3. Key resources: The key resources of Natepco are sell crude oil to commodity markets and gas (LHG) to power/electricity producers 4. Value Proposition: crude oil and gas (LHG) 5. Relationship: Their Brand, retaining customers 6. Distribution and acquisition channel: Traders, electricity producers 7. Customers: willing market in local industry 8. Cost structure: Manufacturing, exploration, maintenance 9. Revenue streams: The IT systems being used within the business model: * Partners: Prime Energy Group is in consideration of implementing SAP * Key activities: VAX/Compaq systems are used for drilling applications, HP systems are used for running applications for maintenance en procurement. Offshore platforms uses email application and application access * Key resource: IBM systems for finance The business maxims that I found in the case...

Words: 3623 - Pages: 15

Free Essay

Software Based Digital Media Store

... Database and Service oriented framework for supporting / powering large volume of data Project Category NNdfdf Web Services Location of Implementation Sardar Patel Institute of Technology, Munshi Nagar, Andheri(W), Mumbai-400 058 Mumbai-400 058 Number of Team-Members 2 Project Description This project is aimed at efficient accessing of a service oriented framework for supporting a voluminous database. This database is a large media database which would provide the client with media files using these framework services. The performance of these services is improved by adding caching mechanism to the system. Languages Used C, Memcache utility & library, PHP. Abstract Nowadays, efficacious accessibility of data stored in large databases is a major aspect of any system which needs to access data stored in such databases especially over the web. In this project report, we first study an existing service oriented framework for supporting a voluminous database created by Mime360. This database is a large media database which would provide the client with media files using these framework services. The main purpose of this system is to provide accessibility to media files efficiently and...

Words: 7023 - Pages: 29