Home > SOA Glossary > Service Interaction Security Patterns

Service Interaction Security Patterns

Service Interaction Security Patterns represent the following set of patterns from the SOA Design Patterns catalog:

Data Confidentiality

(Hogg, Smith, Chong, Hollander, Kozaczynski, Brader, Delgado, Taylor, Wall, Slater, Imran, Cibraro, Cunningham)

How can data within a message be protected so that it is not disclosed to unintended recipients while in transit?

Data Origin Authentication (Hogg, Smith, Chong, Hollander, Kozaczynski, Brader, Delgado, Taylor, Wall, Slater, Imran, Cibraro, Cunningham)

How can a service verify that a message originates from a known sender and that the message has not been tampered with in transit?

Direct Authentication (Hogg, Smith, Chong, Hollander, Kozaczynski, Brader, Delgado, Taylor, Wall, Slater, Imran, Cibraro, Cunningham)

How can a service verify the credentials provided by a consumer?

Brokered Authentication (Hogg, Smith, Chong, Hollander, Kozaczynski, Brader, Delgado, Taylor, Wall, Slater, Imran, Cibraro, Cunningham)

How can a service efficiently verify consumer credentials if the consumer and service do not trust each other or if the consumer requires access to multiple services?

These patterns were first printed in the SOA Design Patterns book and summarized versions of the patterns are published at the SOA Patterns community patterns site.

See also: