SlideShare a Scribd company logo
Building Security In
                                                                                                  Editors: John Steven, jsteven@cigital.com
                                                                                                 Gunnar Peterson, gunnar@arctecgroup.net
                                                                                               Deborah A. Frincke, deborah.frincke@pnl.gov




Service-Oriented Security
Indications for Use


I
          n evolutionary terms, the information security field                         grate data from multiple back-end            Gunnar
                                                                                       systems—if you had pricing data              Peterson
          is more than a decade behind software development.                           in Oracle, order data in SAP, and            Arctec Group
                                                                                       customer data in a mainframe, for
          By that, I mean that we haven’t had a single meaning-                        example, you could write separate
                                                                                       data access objects, apply business
          ful change in security architecture in 13 years. De-                         logic in the middle tier, and tie it
                                                                                       all together in a friendly user in-
velopers have evolved, businesses have increasingly bet their                          terface. At this point, Web appli-
                                                                                       cations began to integrate across
entire business models on the Web         the security industry moved as               departments, business units, and
and networks, and both sides have         never before or since to build and           geographic boundaries, with huge
increased their security budgets.         deploy two security mechanisms.              critical chunks of the business now
But what has the security architec-       The first was a network firewall to          connected to the Web. How did
ture (as it’s deployed in the field)      keep the “good stuff” (enterprise            the security people defend this
got to show for all of this? More         data and functionality) separate             vertically and horizontally inte-
firewalls and more Secure Sockets         from the “bad stuff” (the Inter-             grated business architecture? They
Layer (SSL) connections.                  net). The second mechanism was               applied the same exact 1995 secu-
     Why has information security         the SSL to encrypt the link from             rity architecture—network fire-
failed? I think the problem lies          the user’s Web browser to, ideally,          walls and SSL.
with its mission—confidentiality,         the Web server.                                  In the 1999 to 2000 time
integrity, and availability are fine          What happened next was the               frame, businesses started to rely
statements to make, but they don’t        dotcom boom—businesses figured               on Web applications for major
lead anywhere. Because informa-           out that they could make buckets             parts of their revenue. Software
tion security has proven incapable        of money on the Web, developers              developers responded by building
of evolving, it’s time to learn from      began innovating feverishly, Web             applications in different technolo-
a discipline that has mastered in-        applications became more sophis-             gies because the customer didn’t
novation—software development.            ticated and personalized, and so             care (still doesn’t)—the customer
In this installment of Building           on. This led to Java’s Java Server           wanted (still wants) data access and
Security In, we’ll learn what this        Pages (JSPs), Microsoft’s Active             functionality. To integrate these
field can teach us.                       Server Pages (ASPs), and even                disparate technologies, developers
                                          greasier Perl scripts, all in an effort      deployed SOAP and XML so that
Diagnosis                                 to pool enterprise resources and             Microsoft could talk to Java and
Software developers began build-          personalized sessions on Web serv-           Websphere could talk to Weblogic
ing sophisticated Web applications        ers. The security people defended            and so on. Moreover, develop-
in the mid 1990s, using CGI and           this revolutionary new application           ers found they could use SOAP
Perl scripts to connect their users       programming model with their                 and XML to connect business-
to databases and back-end content.        original security architecture—              to-business networks so that part-
Even back then, security people           network firewalls and SSL.                   ners in a supply chain or business
knew immediately that security                Around 1998, developers be-              process could exchange data and
would be an issue—after all, de-          gan building increasingly distrib-           interoperate. SOAP and XML
velopers were publishing back-end         uted three-tier applications that            presented a fundamentally new
content from their core business          separated the business logic, pre-           programming model, but neither
databases and applications onto           sentation, and data access layers.           one had a security model by de-
the Web and letting users post            Among other things, a Web appli-             fault for authentication, authoriza-
content there as well. In response,       cation could now seamlessly inte-            tion, or confidentiality. How did

	        MARCH/APRIL 2009   ■   1540-7993/09/$25.00 © 2009 IEEE   ■   COPublished by the IEEE Computer and Reliability Societies              91
Building Security In



                   Service
                                                                                                       •	 Virtualization. We want Beijing,
                  requester                                                                               Bangalore, and Boston to com-
                                                                                                          municate so that we can chop up
                                                                                                          work and deliver it from where
                   Service                       Security                    Service                      it makes sense.
                  requester Authentication       services   Authentication   provider
                                                                                                       •	 Interoperability. We want our Java
                                                                                                          systems to talk to our .NET
                   Service                        Audit                                                   systems.
                  requester                                                                            •	 Reusability. We want to know how
                                                    Assurance                                             many order, pricing, and customer
                                                                                                          systems one company needs.
Figure 1. Virtualized service interfaces. By decoupling authentication and authorization, such
decisions can be delivered to different locales in the architecture.                                   These are goals to keep in mind
                                                                                                       when building services, so they
                                                                                                       make perfect starting points for
                                              Open standards                                           security goals such as confidential-
                                                                                                       ity, integrity, and availability. The
                  Service                                                     Service                  way we seek to deliver these prop-
                 requester                                                    provider
                                                                                                       erties is through such mechanisms
                                                                                                       as authentication, authorization,
                  Service                        Security                     Service                  and auditing, but the challenge
                 requester    Authentication     services   Authentication    provider                 is deploying these mechanisms
                                                                                                       as widely and flexibly as possible
                  Service                         Audit                       Service
                                                                                                       through services.
                 requester                                                    provider
                                                                                                       Virtualization
                                                     Assurance
                                                                                                       In terms of virtualization, we
                                                                                                       need to be able to authenticate
Figure 2. Standards. Consistent policy enforcement and management translates to better                 users in one place and authorize
security decisions.                                                                                    them in another—for example,
                                                                                                       authenticate in Beijing and autho-
                                                                                                       rize in Bangalore. To paraphrase
 Table 1. Comparing field-level software development                                                   Ross Anderson, we need crypto
 and information security innovations.                                                                 mechanisms that take trust from
                                                                                                       where it exists to where it’s need-
 Relative timeline                 Software                           Security                         ed. Figure 1 shows that authenti-
 ~1995                             CGI/Perl                           Network firewalls, SSL           cation and authorization decisions
 ~1997                             ASP, JSP                           Network firewalls, SSL           are delivered to different locales
 ~1998                             COM, EJB, J2EE                     Network firewalls, SSL           in the architecture.
 ~1999–2000                        SOAP, XML                          Network firewalls, SSL
 ~2001                             SOA, REST                          Network firewalls, SSL           Interoperability
 ~2003                             Web 2.0                            Network firewalls, SSL           Security decisions are business,
                                                                                                       not technical, decisions. Thus,
                                                                                                       wherever possible, security infor-
                    the security people deal with this?          networked applications built on       mation must be standards based,
                    Sing it with me—network fire-                top of that. Clearly, the time has    allowing for consistent autho-
                    walls and SSL.                               come to do something to meet all      rization policy enforcement us-
                        The software world didn’t stop           this innovation and somehow pro-      ing SAML, XACML, and other
                    innovating in 2000, of course. In            tect both its users and developers.   open standards. Figure 2 diagrams
                    the past few years, we’ve seen Web                                                 where standards add the capability
                    services and XML form the basis              Prescription Patterns                 to transmit attributes to make se-
                    of powerful service-oriented archi-          Web 2.0 has no effective security     curity decisions.
                    tectures (SOAs) and simple Repre-            model, so let’s pick up the trail
                    sentational State Transfer (REST)            with the next most recent inno-       Reusability
                    applications. We’ve also seen the            vation, Web services, which have      The perimeter in an SOA is the
                    debut of Web 2.0 and entirely new            three main goals:                     document, not the network; sim-

92	                 IEEE SECURITY  PRIVACY
Building Security In



ilarly, the security model is de-
                                                                                   Central security domain
fined by the security constructs in
the document, not the network
                                                               Subject                                                           Object
firewall. Because security comes                                                             Session
from an operational mindset, the             (a)
inclination is centralized com-
mand and control. Figure 3 shows
three possible ways to deliver se-
curity services.                                               Subject                                                           Object
    Unfortunately, this model
                                             (b)      High-assurance endpoint                                       High-assurance endpoint
makes many assumptions from
which technical and business reali-
ties diverge. In an enterprise today,                                             High-assurance intermediary
you can’t expect to govern both the                                                         Security
subject and the object, as well as the                         Subject                                                           Object
                                                                                            devices
session and data, in one technology          (c)    Medium-assurance endpoint                                     Medium-assurance endpoint
or even one business unit.
    The next logical step is high-
assurance endpoints, but the prob-         Figure 3. Hybrid models. Pure (a) centralized and (b) distributed security models won’t fly in the
lem here is that when you have             enterprise, so (c) a decentralized hybrid of security services is the pragmatic way forward.
100,000 of anything, you end up
with management problems. You
simply don’t have enough security            How about email systems?             curity services a reality, we need
gurus to comprehensively address         They fit the decentralized ser-          to start from scratch—develop a
all the distributed endpoints on an      vice-based model well, their end-        playbook, and then classify, lo-
ongoing basis.                           points are loosely coupled, and          cate, design, and optimize the
    Next, we go to the hybrid mod-       their agreement point is a mes-          controls. Maybe someday soon,
el (remembering that hybrids are         sage, not binary communication.          we’ll catch up with the software
the most resilient plants in nature)     Businesses have already proven           development community.
in Figure 3c. Now we can place           that they can deploy this flexible
various high-assurance intermedi-        model in the real world, and guess       Reference
aries that can provide some security     what else? We’ve actually seen            1.	 M. Tanji et al., Threats in the Age of
services to the endpoints. We can        real, live, security innovation in            Obama, Nimble Books, 2009.
tune the intermediaries for their        the field. The course your email
specific services, say, XML encryp-      follows is mediated by many dif-         Gunnar Peterson is a founder and man-
tion/decryption, and environment,        fering security mechanisms, from         aging principal at Arctec Group, which
say, B2C or B2B. This model is           antivirus tools to spam filters.         supports clients in strategic technology,
predicated on how successful and         This is, I think, what informa-          decision making, and architecture. His
scalable enterprise security mecha-      tion security can leverage in Web        work focuses on distributed systems
nisms have worked in the past,           applications—designing and de-           security architecture, design, process,
such as Active Directory, Light-         ploying decentralized security           and delivery. He maintains an informa-
weight Directory Access Protocol,        services that facilitate the delivery    tion security blog at http://1raindrop.
and Federation, which all leverage       of a specific service.                   typepad.com. Contact him at gunnar@
multiple centers to provide services                                              arctecgroup.net.
to a wide variety of endpoints.

What Next?
I think this last decentralized mod-
                                         T   he real question with security
                                             as a service isn’t about confi-
                                         dentiality, integrity, or availability
el captures information security’s       properties—it’s how to distrib-           Interested in writing for this
best chance to regain some cred-         ute the services that enable those        department? Please contact
ibility and traction in improving        properties. Meshing the two con-          editors John Steven (jsteven@
software security. Web security is       cepts together, how can we deliver        cigital.com), Gunnar Peterson
horribly broken after more than          virtualized, interoperable, and re-       (gunnar@arctecgroup.net), and
a decade of noninnovation, so it’s       usable authentication, authoriza-         Deborah A. Frincke (deborah.
time to just admit it and look to        tion, and auditing? To move away          frincke@pnl.gov).
other models.                            from the static past and make se-

	                                                                                                   www.computer.org/security                93

More Related Content

What's hot

Protecting Data in the Cloud
Protecting Data in the CloudProtecting Data in the Cloud
Protecting Data in the Cloud
Neil Readshaw
 
Cloud email demystified
Cloud email demystifiedCloud email demystified
Cloud email demystified
PSD Solutions .....
 
PCTY 2012, Cloud security (real life) v. Ulf Feger
PCTY 2012, Cloud security (real life) v. Ulf FegerPCTY 2012, Cloud security (real life) v. Ulf Feger
PCTY 2012, Cloud security (real life) v. Ulf Feger
IBM Danmark
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
Amazon Web Services
 
Tech editors conf tucker yen-jacoby revised final for may 24 2012
Tech editors conf tucker yen-jacoby revised final  for may 24 2012Tech editors conf tucker yen-jacoby revised final  for may 24 2012
Tech editors conf tucker yen-jacoby revised final for may 24 2012
Cisco Public Relations
 
Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4
Arrow ECS UK
 
A Hitchhiker's Guide to the Inter-Cloud
A Hitchhiker's Guide to the Inter-CloudA Hitchhiker's Guide to the Inter-Cloud
A Hitchhiker's Guide to the Inter-Cloud
GovCloud Network
 
Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012
Mahbubul Alam
 
State-of-the-Art in Web Services Federation
State-of-the-Art in Web Services FederationState-of-the-Art in Web Services Federation
State-of-the-Art in Web Services Federation
Oliver Pfaff
 
Engineering Interoperable and Reliable Systems
Engineering Interoperable and Reliable SystemsEngineering Interoperable and Reliable Systems
Engineering Interoperable and Reliable Systems
Rick Warren
 
Cloud risk management
Cloud risk managementCloud risk management
Cloud risk management
Prachyanun Nilsook
 
Connectivity for a Smarter Planet
Connectivity for a Smarter PlanetConnectivity for a Smarter Planet
Connectivity for a Smarter Planet
Prolifics
 
#EMC #DOCUMENTUM -content-management-in-action
#EMC #DOCUMENTUM -content-management-in-action#EMC #DOCUMENTUM -content-management-in-action
#EMC #DOCUMENTUM -content-management-in-action
Mountaha
 
Oded Tsur - Ca Cloud Security
Oded Tsur - Ca Cloud SecurityOded Tsur - Ca Cloud Security
Oded Tsur - Ca Cloud Security
CSAIsrael
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
Neha Dhawan
 
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott DavisMassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
MassTLC
 
Gestão de Redes de Alta Performance
Gestão de Redes de Alta Performance Gestão de Redes de Alta Performance
Gestão de Redes de Alta Performance
Impacta Eventos
 

What's hot (17)

Protecting Data in the Cloud
Protecting Data in the CloudProtecting Data in the Cloud
Protecting Data in the Cloud
 
Cloud email demystified
Cloud email demystifiedCloud email demystified
Cloud email demystified
 
PCTY 2012, Cloud security (real life) v. Ulf Feger
PCTY 2012, Cloud security (real life) v. Ulf FegerPCTY 2012, Cloud security (real life) v. Ulf Feger
PCTY 2012, Cloud security (real life) v. Ulf Feger
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
Tech editors conf tucker yen-jacoby revised final for may 24 2012
Tech editors conf tucker yen-jacoby revised final  for may 24 2012Tech editors conf tucker yen-jacoby revised final  for may 24 2012
Tech editors conf tucker yen-jacoby revised final for may 24 2012
 
Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4
 
A Hitchhiker's Guide to the Inter-Cloud
A Hitchhiker's Guide to the Inter-CloudA Hitchhiker's Guide to the Inter-Cloud
A Hitchhiker's Guide to the Inter-Cloud
 
Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012
 
State-of-the-Art in Web Services Federation
State-of-the-Art in Web Services FederationState-of-the-Art in Web Services Federation
State-of-the-Art in Web Services Federation
 
Engineering Interoperable and Reliable Systems
Engineering Interoperable and Reliable SystemsEngineering Interoperable and Reliable Systems
Engineering Interoperable and Reliable Systems
 
Cloud risk management
Cloud risk managementCloud risk management
Cloud risk management
 
Connectivity for a Smarter Planet
Connectivity for a Smarter PlanetConnectivity for a Smarter Planet
Connectivity for a Smarter Planet
 
#EMC #DOCUMENTUM -content-management-in-action
#EMC #DOCUMENTUM -content-management-in-action#EMC #DOCUMENTUM -content-management-in-action
#EMC #DOCUMENTUM -content-management-in-action
 
Oded Tsur - Ca Cloud Security
Oded Tsur - Ca Cloud SecurityOded Tsur - Ca Cloud Security
Oded Tsur - Ca Cloud Security
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
 
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott DavisMassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
 
Gestão de Redes de Alta Performance
Gestão de Redes de Alta Performance Gestão de Redes de Alta Performance
Gestão de Redes de Alta Performance
 

Viewers also liked

Canada
CanadaCanada
Educational technologies
Educational technologiesEducational technologies
Educational technologies
Lachlan Hayman
 
9 20-3 презентация1
9 20-3 презентация19 20-3 презентация1
9 20-3 презентация1
Елена Уварова
 
Akhir
AkhirAkhir
comparatives and superlatives - grammar exercises
comparatives and superlatives - grammar exercises comparatives and superlatives - grammar exercises
comparatives and superlatives - grammar exercises
Елена Уварова
 
Educational technologies
Educational technologiesEducational technologies
Educational technologies
Lachlan Hayman
 
9 19-5
9 19-59 19-5
Present perfect
Present perfectPresent perfect
Present perfect
Елена Уварова
 
Present simple
Present simplePresent simple
9 13-18 present simple
9 13-18 present simple9 13-18 present simple
9 13-18 present simple
Елена Уварова
 
The united kingdom of great britain and northern
The united kingdom of great britain and northernThe united kingdom of great britain and northern
The united kingdom of great britain and northern
Елена Уварова
 
15 3-12 possessiveadjectives-120510073533-phpapp01
15 3-12 possessiveadjectives-120510073533-phpapp0115 3-12 possessiveadjectives-120510073533-phpapp01
15 3-12 possessiveadjectives-120510073533-phpapp01
Елена Уварова
 
Educational technologies
Educational technologiesEducational technologies
Educational technologies
Lachlan Hayman
 
3 11 how
3 11 how3 11 how
Time
TimeTime
Sale of-goods-law
Sale of-goods-lawSale of-goods-law
Sale of-goods-law
Sandeep Dabhi
 
9 20-4
9 20-49 20-4
E markting-email marketing
E markting-email marketingE markting-email marketing
E markting-email marketinghruskys
 

Viewers also liked (18)

Canada
CanadaCanada
Canada
 
Educational technologies
Educational technologiesEducational technologies
Educational technologies
 
9 20-3 презентация1
9 20-3 презентация19 20-3 презентация1
9 20-3 презентация1
 
Akhir
AkhirAkhir
Akhir
 
comparatives and superlatives - grammar exercises
comparatives and superlatives - grammar exercises comparatives and superlatives - grammar exercises
comparatives and superlatives - grammar exercises
 
Educational technologies
Educational technologiesEducational technologies
Educational technologies
 
9 19-5
9 19-59 19-5
9 19-5
 
Present perfect
Present perfectPresent perfect
Present perfect
 
Present simple
Present simplePresent simple
Present simple
 
9 13-18 present simple
9 13-18 present simple9 13-18 present simple
9 13-18 present simple
 
The united kingdom of great britain and northern
The united kingdom of great britain and northernThe united kingdom of great britain and northern
The united kingdom of great britain and northern
 
15 3-12 possessiveadjectives-120510073533-phpapp01
15 3-12 possessiveadjectives-120510073533-phpapp0115 3-12 possessiveadjectives-120510073533-phpapp01
15 3-12 possessiveadjectives-120510073533-phpapp01
 
Educational technologies
Educational technologiesEducational technologies
Educational technologies
 
3 11 how
3 11 how3 11 how
3 11 how
 
Time
TimeTime
Time
 
Sale of-goods-law
Sale of-goods-lawSale of-goods-law
Sale of-goods-law
 
9 20-4
9 20-49 20-4
9 20-4
 
E markting-email marketing
E markting-email marketingE markting-email marketing
E markting-email marketing
 

Similar to 04812167

10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT
Idan Hershkovich
 
489 493
489 493489 493
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
IJIR JOURNALS IJIRUSA
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
Vivek Maurya
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
IRJET Journal
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
IRJET Journal
 
Why Integrating Network Technology & Security Makes Sense Now
Why Integrating Network Technology & Security Makes Sense NowWhy Integrating Network Technology & Security Makes Sense Now
Why Integrating Network Technology & Security Makes Sense Now
Abaram Network Solutions
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
ijaprr
 
Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computing
Mandar Pathrikar
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
IRJET Journal
 
A New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudA New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the Cloud
NETSCOUT
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks
Abaram Network Solutions
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
ijaprr_editor
 
Social Media Jamaica
Social Media JamaicaSocial Media Jamaica
Social Media Jamaica
Jermaine High-Definition
 
J3602068071
J3602068071J3602068071
J3602068071
ijceronline
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
 

Similar to 04812167 (20)

10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT
 
489 493
489 493489 493
489 493
 
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
 
Why Integrating Network Technology & Security Makes Sense Now
Why Integrating Network Technology & Security Makes Sense NowWhy Integrating Network Technology & Security Makes Sense Now
Why Integrating Network Technology & Security Makes Sense Now
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computing
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
 
A New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudA New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the Cloud
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
Social Media Jamaica
Social Media JamaicaSocial Media Jamaica
Social Media Jamaica
 
J3602068071
J3602068071J3602068071
J3602068071
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 

Recently uploaded

clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 

04812167

  • 1. Building Security In Editors: John Steven, jsteven@cigital.com Gunnar Peterson, gunnar@arctecgroup.net Deborah A. Frincke, deborah.frincke@pnl.gov Service-Oriented Security Indications for Use I n evolutionary terms, the information security field grate data from multiple back-end Gunnar systems—if you had pricing data Peterson is more than a decade behind software development. in Oracle, order data in SAP, and Arctec Group customer data in a mainframe, for By that, I mean that we haven’t had a single meaning- example, you could write separate data access objects, apply business ful change in security architecture in 13 years. De- logic in the middle tier, and tie it all together in a friendly user in- velopers have evolved, businesses have increasingly bet their terface. At this point, Web appli- cations began to integrate across entire business models on the Web the security industry moved as departments, business units, and and networks, and both sides have never before or since to build and geographic boundaries, with huge increased their security budgets. deploy two security mechanisms. critical chunks of the business now But what has the security architec- The first was a network firewall to connected to the Web. How did ture (as it’s deployed in the field) keep the “good stuff” (enterprise the security people defend this got to show for all of this? More data and functionality) separate vertically and horizontally inte- firewalls and more Secure Sockets from the “bad stuff” (the Inter- grated business architecture? They Layer (SSL) connections. net). The second mechanism was applied the same exact 1995 secu- Why has information security the SSL to encrypt the link from rity architecture—network fire- failed? I think the problem lies the user’s Web browser to, ideally, walls and SSL. with its mission—confidentiality, the Web server. In the 1999 to 2000 time integrity, and availability are fine What happened next was the frame, businesses started to rely statements to make, but they don’t dotcom boom—businesses figured on Web applications for major lead anywhere. Because informa- out that they could make buckets parts of their revenue. Software tion security has proven incapable of money on the Web, developers developers responded by building of evolving, it’s time to learn from began innovating feverishly, Web applications in different technolo- a discipline that has mastered in- applications became more sophis- gies because the customer didn’t novation—software development. ticated and personalized, and so care (still doesn’t)—the customer In this installment of Building on. This led to Java’s Java Server wanted (still wants) data access and Security In, we’ll learn what this Pages (JSPs), Microsoft’s Active functionality. To integrate these field can teach us. Server Pages (ASPs), and even disparate technologies, developers greasier Perl scripts, all in an effort deployed SOAP and XML so that Diagnosis to pool enterprise resources and Microsoft could talk to Java and Software developers began build- personalized sessions on Web serv- Websphere could talk to Weblogic ing sophisticated Web applications ers. The security people defended and so on. Moreover, develop- in the mid 1990s, using CGI and this revolutionary new application ers found they could use SOAP Perl scripts to connect their users programming model with their and XML to connect business- to databases and back-end content. original security architecture— to-business networks so that part- Even back then, security people network firewalls and SSL. ners in a supply chain or business knew immediately that security Around 1998, developers be- process could exchange data and would be an issue—after all, de- gan building increasingly distrib- interoperate. SOAP and XML velopers were publishing back-end uted three-tier applications that presented a fundamentally new content from their core business separated the business logic, pre- programming model, but neither databases and applications onto sentation, and data access layers. one had a security model by de- the Web and letting users post Among other things, a Web appli- fault for authentication, authoriza- content there as well. In response, cation could now seamlessly inte- tion, or confidentiality. How did MARCH/APRIL 2009 ■ 1540-7993/09/$25.00 © 2009 IEEE ■ COPublished by the IEEE Computer and Reliability Societies 91
  • 2. Building Security In Service • Virtualization. We want Beijing, requester Bangalore, and Boston to com- municate so that we can chop up work and deliver it from where Service Security Service it makes sense. requester Authentication services Authentication provider • Interoperability. We want our Java systems to talk to our .NET Service Audit systems. requester • Reusability. We want to know how Assurance many order, pricing, and customer systems one company needs. Figure 1. Virtualized service interfaces. By decoupling authentication and authorization, such decisions can be delivered to different locales in the architecture. These are goals to keep in mind when building services, so they make perfect starting points for Open standards security goals such as confidential- ity, integrity, and availability. The Service Service way we seek to deliver these prop- requester provider erties is through such mechanisms as authentication, authorization, Service Security Service and auditing, but the challenge requester Authentication services Authentication provider is deploying these mechanisms as widely and flexibly as possible Service Audit Service through services. requester provider Virtualization Assurance In terms of virtualization, we need to be able to authenticate Figure 2. Standards. Consistent policy enforcement and management translates to better users in one place and authorize security decisions. them in another—for example, authenticate in Beijing and autho- rize in Bangalore. To paraphrase Table 1. Comparing field-level software development Ross Anderson, we need crypto and information security innovations. mechanisms that take trust from where it exists to where it’s need- Relative timeline Software Security ed. Figure 1 shows that authenti- ~1995 CGI/Perl Network firewalls, SSL cation and authorization decisions ~1997 ASP, JSP Network firewalls, SSL are delivered to different locales ~1998 COM, EJB, J2EE Network firewalls, SSL in the architecture. ~1999–2000 SOAP, XML Network firewalls, SSL ~2001 SOA, REST Network firewalls, SSL Interoperability ~2003 Web 2.0 Network firewalls, SSL Security decisions are business, not technical, decisions. Thus, wherever possible, security infor- the security people deal with this? networked applications built on mation must be standards based, Sing it with me—network fire- top of that. Clearly, the time has allowing for consistent autho- walls and SSL. come to do something to meet all rization policy enforcement us- The software world didn’t stop this innovation and somehow pro- ing SAML, XACML, and other innovating in 2000, of course. In tect both its users and developers. open standards. Figure 2 diagrams the past few years, we’ve seen Web where standards add the capability services and XML form the basis Prescription Patterns to transmit attributes to make se- of powerful service-oriented archi- Web 2.0 has no effective security curity decisions. tectures (SOAs) and simple Repre- model, so let’s pick up the trail sentational State Transfer (REST) with the next most recent inno- Reusability applications. We’ve also seen the vation, Web services, which have The perimeter in an SOA is the debut of Web 2.0 and entirely new three main goals: document, not the network; sim- 92 IEEE SECURITY PRIVACY
  • 3. Building Security In ilarly, the security model is de- Central security domain fined by the security constructs in the document, not the network Subject Object firewall. Because security comes Session from an operational mindset, the (a) inclination is centralized com- mand and control. Figure 3 shows three possible ways to deliver se- curity services. Subject Object Unfortunately, this model (b) High-assurance endpoint High-assurance endpoint makes many assumptions from which technical and business reali- ties diverge. In an enterprise today, High-assurance intermediary you can’t expect to govern both the Security subject and the object, as well as the Subject Object devices session and data, in one technology (c) Medium-assurance endpoint Medium-assurance endpoint or even one business unit. The next logical step is high- assurance endpoints, but the prob- Figure 3. Hybrid models. Pure (a) centralized and (b) distributed security models won’t fly in the lem here is that when you have enterprise, so (c) a decentralized hybrid of security services is the pragmatic way forward. 100,000 of anything, you end up with management problems. You simply don’t have enough security How about email systems? curity services a reality, we need gurus to comprehensively address They fit the decentralized ser- to start from scratch—develop a all the distributed endpoints on an vice-based model well, their end- playbook, and then classify, lo- ongoing basis. points are loosely coupled, and cate, design, and optimize the Next, we go to the hybrid mod- their agreement point is a mes- controls. Maybe someday soon, el (remembering that hybrids are sage, not binary communication. we’ll catch up with the software the most resilient plants in nature) Businesses have already proven development community. in Figure 3c. Now we can place that they can deploy this flexible various high-assurance intermedi- model in the real world, and guess Reference aries that can provide some security what else? We’ve actually seen 1. M. Tanji et al., Threats in the Age of services to the endpoints. We can real, live, security innovation in Obama, Nimble Books, 2009. tune the intermediaries for their the field. The course your email specific services, say, XML encryp- follows is mediated by many dif- Gunnar Peterson is a founder and man- tion/decryption, and environment, fering security mechanisms, from aging principal at Arctec Group, which say, B2C or B2B. This model is antivirus tools to spam filters. supports clients in strategic technology, predicated on how successful and This is, I think, what informa- decision making, and architecture. His scalable enterprise security mecha- tion security can leverage in Web work focuses on distributed systems nisms have worked in the past, applications—designing and de- security architecture, design, process, such as Active Directory, Light- ploying decentralized security and delivery. He maintains an informa- weight Directory Access Protocol, services that facilitate the delivery tion security blog at http://1raindrop. and Federation, which all leverage of a specific service. typepad.com. Contact him at gunnar@ multiple centers to provide services arctecgroup.net. to a wide variety of endpoints. What Next? I think this last decentralized mod- T he real question with security as a service isn’t about confi- dentiality, integrity, or availability el captures information security’s properties—it’s how to distrib- Interested in writing for this best chance to regain some cred- ute the services that enable those department? Please contact ibility and traction in improving properties. Meshing the two con- editors John Steven (jsteven@ software security. Web security is cepts together, how can we deliver cigital.com), Gunnar Peterson horribly broken after more than virtualized, interoperable, and re- (gunnar@arctecgroup.net), and a decade of noninnovation, so it’s usable authentication, authoriza- Deborah A. Frincke (deborah. time to just admit it and look to tion, and auditing? To move away frincke@pnl.gov). other models. from the static past and make se- www.computer.org/security 93