Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Multi-level Security for Integrated Financial Mobile Web Services using Federated ESB

Print
PDF
International Journal of Computer Applications
© 2011 by IJCA Journal
Number 1 - Article 1
Year of Publication: 2011
Authors:
Dr. S. Britto R.Kumar
Dr. S. Albert Rabara
10.5120/3948-5292

Dr. Britto S R.Kumar and Dr. Albert S Rabara. Article:Multi-level Security for Integrated Financial Mobile Web Services using Federated ESB. International Journal of Computer Applications 32(10):39-45, October 2011. Full text available. BibTeX

@article{key:article,
	author = {Dr. S. Britto R.Kumar and Dr. S. Albert Rabara},
	title = {Article:Multi-level Security for Integrated Financial Mobile Web Services using Federated ESB},
	journal = {International Journal of Computer Applications},
	year = {2011},
	volume = {32},
	number = {10},
	pages = {39-45},
	month = {October},
	note = {Full text available}
}

Abstract

The Wireless and mobile devices, and their applications often run on different platforms, which can make integration problematic. Enterprise-service-bus (ESB) approach and service-orchestration platforms through mobile agents might offer good solutions. However, the centralized ESB introduces serious limitations and the federated ESB architectural pattern conquers those limitations by partitioning the infrastructure into separate ESBs. Security is one of the greatest concerns, especially when integrating cross-organizational applications. When the technology changes the adaptability of mobile devices, network services and service providers, it is vital to design an integrated architecture for mobile web services. This paper proposes an architecture that provides multi-level Security for integrated financial mobile web services using federated ESBs. This architecture enables service integration, network integration and supports access to financial services from any mobile devices using any mobile technologies.

Reference

  • Bieberstein, N., Bose, S., Fiammante, M., Jones, K., and Shah, R. 2006. Service-Oriented Architecture (SOA) Compass Business Value, Planning, and Enterprise Roadmap. Pearson Education. pp.2.
  • Schmidt, M.T., Hutchison, B., Lambros, P., and Phippen, R. 2005. The Enterprise Service Bus: Making Service-oriented Architecture Real. IBM System Journal. Volume 44, No.4, 781-797.
  • Sam Chung, Davalos, S., Niiyama, C., Daehee Won, Seung-Ho Baeg, and Sangdeok Park. 2009. A UML model-driven business process development methodology for a Virtual Enterprise using SOA & ESB. In IEEE Proceedings of the Asia-Pacific Services Computing Conference (APSCC). 246-253.
  • Jesus Rodriguez and Don Demsak. 2009. Lightweight SOAs:Exploring Patterns and Principles of a New Generation of SOA Solutions. The Architecture Journal, Volume, 22, 32-38.
  • Hérault, C., Thomas, G. and Lalanda, P. 2005. Mediation and enterprise service bus: A position paper. In Proceedings of the First International Workshop on Mediation in Semantic Web Services (MEDIATE). 1-14.
  • Kristijan Dragicevic, Luis Garcés-Erice, Daniel Bauer. 2010. DISCE: A Declarative Inter-ESB Service-Connectivity Configuration Engine. In IEEE Proceedings of International Conference on Web Services. 489-496.
  • Wen Zhu and Walt Melo. 2009. Refactoring J2EE Application for JBI-Based ESB: A Case Study. In IEEE Proceedings of the International Enterprise Distributed Object Computing Conference. 213-217.
  • Yan Liu. 2009. A Process Modeling-Based Approach for Web Service Management. In IEEE Proceedings of the International Conference on Web Services. 928-935.
  • Joris, C., Valentin, D., De Cock, D., Preneel, B. and Vandewalle, J. 2002. On the Security of Today’s Online Electronic Banking Systems. Elseiver Advanced Technology. Computers and Security. Volume 21, No.3. 257-269.
  • Jung, B., Han, I. and Lee, S. 2001. Security Threats to Internet: a Korean multi-industry investigation. Information and Management. Elsevier Science Publishers. Volume 38, Issue 8. 487-498.
  • Ezedin, S. B., Mohamed, E. E. and Hayawi, K. 2006. End-To-End Security Solutions for WLAN: A Performance Analysis for the Underlying Encryption Algorithms in the Lightweight Devices. In Proceedings of IWCMC, Canada, ACM Publications. 1295-1299.
  • Mehul Shah. 2008. Web services Security in SUN™ Java Composite Application Platform Suite (Java CAPS) 6. White Paper. Sun Microsystems Inc. 1-17.
  • Mirtalebi, A., and Khayyambashi, M.R. 2011. Enhancing security of Web service against WSDL threats. In 2nd IEEE Proceedings of the International Conference on Emergency Management and Management Sciences (ICEMMS). 920-923.
  • Xiaohong Li and Ke He. A Unified Threat Model for Assessing Threat in Web Applications. In IEEE Proceedings of the International Conference of Information Security and Assurance (ISA). 142-145.
  • Rahaman, M.A. and Schaad, A. 2007. SOAP-based Secure Conversation and Collaboration. In IEEE Proceedings of the International Conference on Web Services. 471-480.
  • Nordbotten, N.A. 2009. XML and Web Services Security Standards. IEEE Communications. Surveys and Tutorials. Volume 11, No.3. 4-21.
  • Duan, Y., Bao, Y., Pan, L., Yan, B., Xun, J. and Shi, N. 2008. A Secure Web Services Model Based on the Combination of SOAP Registration Info and Token Proxy. In IEEE Proceedings of the International Symposium on Computer Science and Computational Technology (ISCSCT), 15 -20.