03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

11.1 Patterns for e-business<br />

Patterns for e-business are a group of reusable assets developed to facilitate<br />

and speed up the process of solution design for e-business applications. Their<br />

purpose is to capture and publish e-business artifacts that have been used,<br />

tested and proven. The information captured by them is assumed to fit the<br />

majority, or an 80/20 situation.<br />

Depending on the pattern used, we can talk about logical (based on conceptual<br />

modules and building blocks) or physical/runtime architectures. Patterns are<br />

usually used as a generic type of solution that can address a family of problems.<br />

It needs tailoring to make them an effective solution and they must be<br />

customized to include all the aspects of the IT environment where the solution<br />

will be used.<br />

A number of different patterns has been developed and is still being extended for<br />

e-buiness applications. The Patterns for e-business layered asset model is<br />

shown in Figure 11-1.<br />

Customer requirements<br />

Composite patterns<br />

Business patterns<br />

Integration patterns<br />

Any methodology<br />

Application patterns<br />

Runtime patterns<br />

Product mappings<br />

<strong>IBM</strong> Software infrastructure blueprint<br />

Open Standards<br />

Figure 11-1 Patterns for e-business layered asset model<br />

11.1.1 Business patterns<br />

This is the CIO’s view of the business problem. It defines business processes<br />

and rules, actors of the system, user roles, existing and future support modules<br />

as “architectural” building blocks.<br />

350 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!