0% found this document useful (0 votes)
44 views3 pages

E Solution

The document outlines the key components of a security and access control system including establishing trust between parties through authentication of users and authorization according to user profiles. It also discusses user profiling, search and delivery functions, workflow management, collaboration tools, event notification services, content management, data analysis, data integration, transaction processing, and catalog management. Additionally, it provides an overview of relevant technology standards around areas such as security, privacy, workflows, and data formatting.

Uploaded by

indoexchange
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views3 pages

E Solution

The document outlines the key components of a security and access control system including establishing trust between parties through authentication of users and authorization according to user profiles. It also discusses user profiling, search and delivery functions, workflow management, collaboration tools, event notification services, content management, data analysis, data integration, transaction processing, and catalog management. Additionally, it provides an overview of relevant technology standards around areas such as security, privacy, workflows, and data formatting.

Uploaded by

indoexchange
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

COMPONENTS

Security and Access Control


Establish trust between parties, by providing three key services:
• Establishment of information access boundaries
Manage who can see and do what – and when – in an e-Solution.
• Authentication of remote users
Ensure that a user or program that is attempting to access the platform over
the net is who the user claims to be.
• Authorization according to user profile
Determine what application resources the user has access to.

Include intelligent logging and reporting features that identify security faults as well
as otherwise invisible unauthorized attempts to access the system.

User Profiling
Share individual profile across application boundaries. Provide Profile Management,
Personalization, Organizational Hierarchy, and Behavior Tracking services.

Search and Deliver


Allow users to easily locate information that they want. Provide 2 techniques of
searching:
• Content Based Search
Search based on what it contains.
• Parametric Based Search
Search based on how the content is organized. Common types of Parametric
Based Search are searching by Alphabetical Order, Information Hierarchy,
Keyword, Fuzzy Logic, and by Natural Language.

Workflow Management
Acts as a vehicle to pass a process from one stakeholder to another according to a
predefined set of business rules. Consist of three basic modules:
• Workflow definition module
Visually model the application workflow.
• Business rules definition module
Define the business rules that govern workflow decisions that are made by
the component.
• Workflow engine
Intercept requests for pages and determines where each process must move
to next in order to match both the process and business rules definition.

Collaboration
Let users confidentially share information and collaborate in real-time to provide the
most complete and competitive services available.
Event Notification
Notify users of important occurrences. Monitor the status of processes, register
individual events, and automatically communicate clear, well-designed information in
real-time. Several types of Event Notification:
• Application to users
• Message Broadcast
• Message to Email, Fax, and Pager
• Message Boards
• News Groups

Content Management

• Publishing Based on Metadata


• Rich Views Based on Metadata
• Subscription and Notification Services
• Approval and Workflow Processes
• Check In/Check Out Mechanism
• Versioning Mechanism

Data Analysis

Data/Message Integration

Transaction Processing

Cataloging Management
TECHNOLOGY STANDARDS
Technology Standards to be followed to maintain inter-operability, system security,
and cohesive cross-enterprise processes:

Unified Modeling Language (UML)


A language for specifying, visualizing, constructing, and documenting the artifacts of
software systems, as well as for business modeling and other non-software systems.

Privacy and Security


There are several aspects of security: authorization, authentication, privacy, and
integrity. Authorization refers to a user’s list of credentials that determine what the
user is capable of doing when authenticated. Authentication verifies that the user is
who he is claming to be. Privacy and integrity refer to protecting the users’ data from
exploitation and interference.
• Public Key Infrastructure (PKI)
Security mechanism using a standardized set of transactions that use
asymmetric public key cryptography, a more secure and potentially more
functional mechanism for limiting access to digital resources.
• Digital Certificates
Verify the identity of the sender, place a tamper-resistant seal on a message,
and provide proof that a transaction has occurred.
• Digital Signatures
An electronic signature that can be used by someone to authenticate the
identity of the sender of a message or o the signer of a document.

Workflow Technologies
• WFMC (Workflow Management Coalition)
Interoperability standards for vendors of workflow systems.
• SWAP (Simple Workflow Access Protocol)
Standardize how workflow-based systems would interact with each other over
large networks, especially the Internet. Scope is limited to the interactions
and requirements between a requester and a workflow service.

Extensible Markup Language (XML)


An extension to HTML that provides a more precise definition of data and provides
more meaningful search results across multiple platforms.

Unlike HTML, which is being used to convert text stream into the presentation of a
page, XML’s goal is to convert text stream into a data object with a complex inner
data structure and leave the presentation separate.

You might also like