18.04.2013 Views

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

338 <strong>B2B</strong> <strong>Integration</strong> — A <strong>Practical</strong> <strong>Guide</strong> <strong>to</strong> <strong>Collaborative</strong> E-<strong>commerce</strong><br />

11.9.1. Authentication<br />

Authentication is a security requirement that ensures each entity involved<br />

in the usage of a Web service — the requester, the provider, and the<br />

broker (if there is one) — is what it actually claims <strong>to</strong> be. Authentication<br />

involves accepting credentials from the entity and validating them<br />

against an authority. While Web services for EAI should have one level<br />

of authentication and rarely make use of encryption, Web services for<br />

<strong>B2B</strong>i may involve multiple levels of authentication and should always<br />

use encryption. Of course, there will always be a tradeoff between<br />

robust security and performance.<br />

11.9.2. Authorization<br />

Authorization is a security requirement that determines whether the<br />

reques<strong>to</strong>r has been granted access <strong>to</strong> the Web service by the service<br />

provider. Basically, authorization confirms the service reques<strong>to</strong>r's<br />

credentials — checks that the service reques<strong>to</strong>r is entitled <strong>to</strong> perform<br />

the operation, which may range from invoking the Web service <strong>to</strong><br />

executing a certain part of its functionality.<br />

11.9.3. Data protection<br />

Data protection is a security requirement that ensures that the Web<br />

service request and response have not been tampered with en route.<br />

Data protection requires securing both data integrity and privacy. It is<br />

worth mentioning that data protection does not guarantee the identity<br />

of the message sender. In the case of <strong>B2B</strong>i projects, the messages<br />

corresponding <strong>to</strong> Web service request and response should always be<br />

encrypted, using one or more of the following: cryp<strong>to</strong>graphy, digital<br />

signatures, secured socket layer (SSL), and so on. The use of SSL<br />

should be avoided, as far as possible, for Web services used within the<br />

corporate network for EAI projects.<br />

11.9.4. Non-repudiation<br />

Non-repudiation guarantees that the sender of a message is the same as<br />

the crea<strong>to</strong>r of the message. This is very useful for Web services used in

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!