Building Trust and Security in Web Services
The yearning to componentize software development, where software is "assembled" like an automobile, where each component interacts with the other components in an unambiguous and streamlined fashion is very old and deep rooted. For, the most significant challenges in software development are maintaining and changing software pieces which perform redundant functions and integrating such components with one another.
As the industry started to mature, significant research has taken place to find ways of architecting software components as building blocks that are seamlessly integrated, irrespective of where those components reside or how they are implemented. CORBA and COM arrived on the scene addressing these issues and providing a sound architecture for distributed computing. While these very interesting developments were going on, the Internet revolution took place simultaneously as more and more businesses started to register their presence on the web. E-business and e-commerce have seen tremendous growth in the past 7 years where major business functions are taking place through the medium of internet and some businesses are run entirely on the Internet. As a result more and more business software processes had to interact with their business counterparts over the Internet. The eventual convergence of these two paradigm shifts in the software development resulted in the birth of Web Services.
Web Services are fundamental building blocks of software that are deployed in heterogeneous software and hardware platforms, that describe and publish their behavior to potential consumers (UDDI), based on a software contract (WSDL) interact with consumers by receiving and sending (XML) messages through a common protocol (SOAP). The scenario where a software component can dynamically detect, contract and utilize services provides a strong semantic connection to the web and may truly revolutionize the web. But the prospect of unprecedented inter-connectivity comes with huge challenges of security and raises serious questions on ethics and legalities.
Some of the challenges are
Security: How to prevent unauthorized access to critical information, code or a business process? Moreover the pertinent question is how to prevent misuse of critical information, code or a business process, gained by authorized access.
Trust and Verification: What should be the parameters that enables establishing trust between a potential consumer and a provider? Even if 'trust' is established how can the consumer 'verify' the trust?
Ownership and Responsibility: How to enforce ownership rights and accountability? When there is a software failure who owns up for it ?
...The 18th Amendment was passed in 1919 and took effect in 1920. The amendment forbade the making, selling, and transportation of alcohol (“Al Capone” History.com 1). Prohibition was during the Progressive Era, which was an attempt by people to correct all of society’s ills, and alcohol was an important issue. All of the gangsters knew there was a new way to make millions of dollars, and they didn’t mind breaking the law. They found a business to capitalize on and it worked quite well as Prohibition official soon called Chicago ‘the wettest city in the United States. Capone’s empire expanded during Prohibition which is shown in Rosenberg’s writing, …only 26-years old, [Capone] was now in charge of a very large crime organization that included brothels, nightclubs, dance halls, race tracks, gambling establishments, restaurants, speakeasies, breweries, and distilleries.
In 1920, the Congress of the United States ratified the Eighteenth Amendment, which was a ban across the United States on the sale, production, importation, and transportation of all alcoholic beverages. During this time, also known as the Prohibition-era, many citizens smuggled and transported alcohol, a process referred to as bootlegging. The illegal activity brought much stress and challenges for law enforcement agencies of the area; they struggled to continuously keep alcohol off the streets. One man that caused a majority of the stress and stands out for his bootlegging empire is Al Capone. According to many historians and biographers, Al Capone was, perhaps, one of the most notorious and ruthless gangsters of the Prohibition-era based on his involvement in smuggling and bootlegging liquor, as well as his criminal activities.
Alcohol is illegal! “The reign of tears is over. The slums will soon be a memory. We will turn our prisons into factories and our jails into storehouses and corncribs. Men will walk upright now; women will smile and children will laugh. Hell will be forever rent” (Thorton 9). The Eighteenth Amendment of the Constitution went into effect on January 16, 1920, with three-fourths vote from congress (Boorstin 994). The National Prohibition of Alcohol was adopted to solve social problems, reduce the crime rate, stop corruption and minimize the tax burden created by prisons. Some immediate results of the amendment included organized crime and the corruption of public officials. As time went on, the stock market crashed, the Great Depression began, and people no longer viewed Prohibition as a question of moral values and standards, but as economics. Because of the economic repercussions that our country endured during the thirteen years of Prohibition, the Eighteenth Amendment was finally repealed. (Thorton 1).
Once in Chicago, Capone went to work for Yale's old mentor, John Torrio, who also became godfather to his son. Torrio saw Capone's potential, his combination of physical strength and intelligence, and took him under his wing. In January 1920, the 18th Amendment of the Prohibition Act came into force, which made the brewing, distilling and distribution of alcohol completely illegal. The era of Prohibition was underway, and Chicago's criminal underworld, including Johnny Torrio who was prepared to make bootlegging alcohol a very profitable business. Around the end of 1920 Capone's father tragically died, but Capone was doing well in Chicago venture and did not go astray. At just 22 years of age Capone became Torrio's partner in his Chicago businesses, and was Torrio's number-two man helping to mange the bootlegging, saloons, gambling houses, and even the brothels. Capone now had greater responsibilities and was given the opportunity to expand the operation to the Chicago suburb of Cicero.
A framework is a set of classes that supports reuse at larger granularity. It defines an object-oriented abstract design for a particular kind of application which enables not only source code reuse, but also design reuse [Johnson & Foote, 1988]. The framework abstract structure can be filled with classes from its own library or application-specific ones, providing flexibility for the developer to adapt its behavior to each application. Besides flexibility, a good framework also increases the team productivity and makes application maintenance easier [Fayad et al. 1999].
Women do not breastfeed long enough. Although healthcare workers try to promote the breast method, many women do not continue with it. Breastfeeding does come with challenges; however, the phrase “breast is best” is the role of the nurse in conjunction with education. A mother a...
During the early 20th century, the Prohibition era flourished as a result of the 18th Amendment being passed in 1919. The illegalization of alcohol created a public outrage, resulting in a revolution of bootlegging as people scoured for alcohol. This rapid monopolization of the prohibition era led to the thriving time period of organized crime. A notorious criminal that many people know of today – Al Capone – dominated this prominent change within society. Capone’s criminal ways and multi-millionaire business influenced the way the public interpreted not only prohibition, but also crime and the justice system in general. Gangster Al Capone played a significant role during the Prohibition era by revolutionizing whiskey bootlegging, becoming America’s most notorious mobster by controlling his business through manipulation and fear, and paving a pathway that many crime organizations follow today.
I believe trust consists of three factors. The first is that an individual should try their best to keep a promise. This is important because a broken promise could jeopardize friendship, trust, or reputation. The second is that one should also aspire to be truthful. Truthfulness is important because it gives me a sense of security that I am telling the truth and not getting reprimanded for telling a lie. Those that are told the truth are also given a sense of security because they feel like they are worth being told what is true. The third factor is that an individual should be considerate of others privacy. This is important because it allows people’s confidential information to remain undisclosed. I demonstrated truthfulness at a south Texas PGA junior golf tournament some years ago. I was checking my score with my opponent whom was also my scorekeeper. I noticed that he had made a mistake when he had written a stroke less than what I really made on one of the holes. I let him now about this error and he corrected it. I ended up finishing second place in that tournament missing first place by three strokes. ...
Trust has several definitions, but in this case I will use Merriam-Webster’s definition of trust being an “assured reliance
Component Based Architecture creates a system that is easily extensible, promotes software reuse and intuitively understandable. A component often relates to an object in Object Orientated Programming. The RUP provides a systematic way to build this kind of system, focusing on producing an early executable architecture before committing full resources on a project.
When there is mutual trust there is a higher probability an outcome will be positive when information is timely and correct. The help and support of others will help build mutual trust. A strong foundation of trust can help ensure success. If you are a doubter, trusting others may be a challenge.
Implement physical security: - “Physical security protects people, data, equipment, systems, facilities and company assets” (Harris,
Nowadays, the information is the most treasured asset in an organization, due to it along with the experience represents the input necessary to take appropriate decisions and consequently to have success in the business. Almost all the information and knowledge related with the processes business, goods and services offered by a company, is processed, managed and stored through technology and information systems, thus the security of information has become increasingly important and plays a critical role in the enterprise government.
This report aim to explain how is achieved risk control through strategies and through security management of information.