Enhanced Security Framework for Composite Applications
First Claim
Patent Images
1. A method comprising:
- applying a security framework to a business process, the security framework comprising;
a definition phase identifying security objectives of a composite application,a realization phase implementing security patterns that accomplish the identified security objectives, anda declaration phase implementing the identified security objectives using security annotations within the composite application that are based on the security patterns;
conducting an external policy negotiation to specify a common policy between the composite application and an external service based on applying the security framework;
enforcing the common policy for each interaction between the composite application and the external service; and
regulating access by the external service to local services and objects based on the security objectives.
2 Assignments
0 Petitions
Accused Products
Abstract
Automatic secure application composition, in applying a security framework is applied to a business process. An external policy negotiation is conducted to specify a common policy between the composite application and an external service based on applying the security framework, the common policy is enforced for each interaction between the composite application and the external service, and access by the external service to local services and objects is regulated based on the security objectives.
63 Citations
13 Claims
-
1. A method comprising:
-
applying a security framework to a business process, the security framework comprising; a definition phase identifying security objectives of a composite application, a realization phase implementing security patterns that accomplish the identified security objectives, and a declaration phase implementing the identified security objectives using security annotations within the composite application that are based on the security patterns; conducting an external policy negotiation to specify a common policy between the composite application and an external service based on applying the security framework; enforcing the common policy for each interaction between the composite application and the external service; and regulating access by the external service to local services and objects based on the security objectives. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer program product, tangibly embodied in a machine readable medium, the computer program product comprising instructions that, when read by a machine, operate to cause a data processing apparatus to:
-
apply a security framework to a business process, the security framework comprising; a definition phase identifying security objectives of a composite application, a realization phase implementing security patterns that accomplish the identified security objectives, and a declaration phase implementing the identified security objectives using security annotations within the composite application that are based on the security patterns; conduct an external policy negotiation to specify a common policy between the composite application and an external service based on applying the security framework; enforce the common policy for each interaction between the composite application and the external service; and regulate access by the external service to local services and objects based on the security objectives.
-
-
13. A system comprising an enterprise configured to:
-
apply a security framework to a business process, the security framework comprising; a definition phase identifying security objectives of a composite application, a realization phase implementing security patterns that accomplish the identified security objectives, and a declaration phase implementing the identified security objectives using security annotations within the composite application that are based on the security patterns; conduct an external policy negotiation to specify a common policy between the composite application and an external service based on applying the security framework; enforce the common policy for each interaction between the composite application and the external service; and regulate access by the external service to local services and objects based on the security objectives.
-
Specification