X

Newsroom

Infosys at Practical Realization of Service Oriented Architecture Event


Event Details  |  Overview

Event Details

Session 1

Methodologies for realizing Web Services-based SOA
(Top Down, Bottom Up, Meet in the Middle, Model Driven Approaches)


Speaker: Mohit Chawla, Infosys Technologies
                  Shaurabh Bharti, Infosys Technologies
Date: April 18, 2006
Time: 13:45 to 14:45 IST
Venue: Hotel Royal Orchid, Bangalore, India

Session 2

SOA security including Enterprise Identity management, Web Services Security, Message level security, federated identity and XML firewalls

Speaker: Anshuk PalChaudhuri, Infosys Technologies
                  Abhishek Chatterjee, Infosys Technologies
Date: April 19, 2006
Time: 13:45 to 14:45 IST
Venue: Hotel Royal Orchid, Bangalore, India

 

Overview
Know more about Infosys' Architecture Services & Web Services Center of Excellence.

More on Practical Realization of Service Oriented Architecture .

Session Overview

Session 1:
Methodologies for realizing Web Services based SOA (Top Down, Bottom Up, Meet in the Middle, Model Driven Approaches)

Web Services is the primary technology to implement SOA. It has been successfully used to deliver large IT products. Though SOA caters to the needs of business, opinions differ on how exactly it should be realized using web services. Top-Down approach puts business logic over the IT development process and maintains a direct coupling between business processes and services, giving it the aspects of a centralized system. However, the actual advantage of web services is realized by the way it helps legacy systems talk to new systems with disparate properties. Bottom-up approach not only helps wrapping older systems with a service layer; it also puts the developer's point of view in the system.

Model Driven Architectures (MDAs) are direct approach to application design and implementation using various system models. BPEL orchestrates different services into a process and achieve multiple goals with set of simpler services. We would also throw light on the advantages and best practices in the development of such SOA systems.

In this session, we address issues pertaining to both methods, as well as their roles in developing better SOA systems.

Speakers

Mohit Chawla works at the Web Services Center of Excellence (WSCoE) at Infosys Technologies. With specific interest in SOA and web services implementations using emerging WS-* standards, he has worked on SOA-based enablement of legacy systems and also actively participated in publishing papers in leading international conferences on Web services technology.

Shaurabh Bharti works at the WSCoE at Infosys Technologies. His research interests include Semantic Web, Web Service Standards, Web Services Description Language, etc. His research has been published in leading journals and conferences for Web Services including ICWS (International Conference of Web Services) and IJWSP (International Journal for Web Services Practices).

Session Overview

Session 2: SOA security including Enterprise Identity management, Web Services Security, Message level security, federated identity and XML firewalls

In a distributed SOA environment comprising of many loosely coupled services, the issue of Security deserves special consideration due to the inapplicability of conventional mechanisms like SSL. The services involved in an SOA implementation may provide independent security features. In a service-oriented distributed environment where there are cross-domain interactions over a network, web services must have a way of knowing the credentials of the service request at a message level to provide a role-based access to the client requesting the service.

Further, a key consideration has been the universally accepted standards stack. This growing demand for securing services has resulted in new standards like WS-Security, XML Security, SAML and WS-Federation. With the help of these standards, existing security mechanisms are embedded into Services. Mechanisms like Username Tokens, Binary certificates, SSO and so on are extended to service levels.

Standards like WS-Security and others are building blocks that are used in conjunction with other Services and application-specific protocols to accommodate a wide variety of security models and encryption technologies. Implementing these standards does not mean that an application cannot be attacked or that the security cannot be compromised. Extending the concepts to message level security, it is also essential to consider SOA-relevant security issues like federated identity and XML-based DoS attack preventions.

This session would cover all the relevant and practical aspects of SOA security.

Speaker Profile

Anshuk Pal Chaudhuri works at the WSCoE at Infosys Technologies. He has substantial experience in defining standards for SOA and Web services. His focus areas include Syndeo - a web services management framework. His research has been published in different international journals. His research focuses on the areas of WS-Security and different open source products. He is also working on different binding frameworks for XML.

Abhishek Chatterjee works at the WSCoE at Infosys Technologies. He has strong experience in designing applications using service-oriented concepts with latest Web service standards. His focus areas include implementation of service-oriented concepts using web services in Apache Axis1.1 and Microsoft .Net Framework 1.1. Abhishek has been actively working on web services security including protection against intrusion and denial of service attacks and binary XML.

 

Share the page

  • Tweet
  • Share on Facebook
  • Share on LinkedIn
  • Google+