SOA and Identity management

  • December 08, 2010 08 Dec'10

    Gartner asks how security will come to cloud computing

    Cloud computing security will take the same route as SOA governance and XML gateways, says a noted Gartner analyst.

  • December 07, 2010 07 Dec'10

    Q&A: SOA authentication, security tokens, SAML and more

    Security in an SOA environment must primarily address access control. It must be 'baked in.' We talked with Ross Altman, Research VP at Gartner, about authenticating Web services.

  • October 08, 2008 08 Oct'08

    JBoss, CA Wily moves target SOA performance management

    Red Hat's JBoss, CA, and IBM update monitoring and management tools to deal with rising service-oriented architecture complexity.

  • August 28, 2008 28 Aug'08

    Weak encryption creates SOA vulnerabilities

    Brian Chess, co-founder and chief scientist of Fortify Software Inc., discusses why weak encryption creates SOA security concerns and how to go about identifying these issues before they are cause for greater business concern.

  • July 02, 2008 02 Jul'08

    Microsoft SOA strategy: A failure to communicate?

    Microsoft follows the road-less-traveled and nowhere is it more apparent than in its strategy for SOA, which some see as muddled while others think it's on target, but not well communicated.

  • July 01, 2008 01 Jul'08

    SOA adoption marked by broad failure and wild success

    Burton Group has presented its SOA Report Card, finding most users are getting it wrong because they focus too much on IT and integration and not enough on the business.

  • April 30, 2008 30 Apr'08

    SLA management latest entry in Tibco's SOA portfolio

    Unplanned demand spikes are a modern app dev pain point caused by ease of integration. Tibco has now added SLA management to its SOA platform in order to combat the problem.

  • April 29, 2008 29 Apr'08

    SOA provides a test for QA, HP finds

    SOA is changing the role of quality assurance professionals as they transition from checking out applications to testing interdependent services, composite applications, and the variety of regression scenarios, says HP's Tim Hall.

  • February 05, 2008 05 Feb'08

    SOA needs RIA – Burton Group

    Even if your SOA application brings an amazing amount of functionality and data to the Web browser, it still needs to provide a RIA interface to improve the user experiences, Burton analysts says.

  • January 04, 2008 04 Jan'08

    Boubez: SOA virtualization, SLAs and access control policy

    In part 1 of this interview with Toufic Boubez, chief technology officer for XML networking vendor Layer 7 Technologies Inc., he said the WS-Policy standard work at W3C is complete and that standard is being implemented. In part 2, he explains that ...

  • December 26, 2007 26 Dec'07

    The top SOA stories of 2007, part 1

    Microsoft, business issues, a lack of qualified architects, and management/governance confusion rank among the top SOA stories of 2007.

  • October 26, 2007 26 Oct'07

    SOA management requires smart choices - Forrester

    Architects have many choices when it comes to SOA management, which is still immature and blurred with SOA governance, advises Randy Heffner, vice president at Forrester Research.

  • August 29, 2007 29 Aug'07

    SOA policy beyond Java and .NET

    Refusing to join the debate over which is best for SOA development, Java or .NET, Miko Matsumura, vice president and deputy CTO for Software AG, says, "For service development, both platforms have a lot of good stuff." But looking beyond service ...

  • July 09, 2007 09 Jul'07

    SOA development seen as three-way split

    Three distinctly different ways of implementing service-oriented architecture (SOA) are emerging: one using Web services standards, another reliant upon existing middleware and one experimenting with REST and Web 2.0.

  • June 06, 2007 06 Jun'07

    Microsoft, Liberty join for Web services identity interop

    Liberty Alliance, Microsoft and VeriSign join Concordia Project in effort to bring interoperability to competing identity management technologies.