Description |
1 online resource (272 pages) : illustrations. |
Series |
IBM redbooks |
|
IBM redbooks.
|
Bibliography |
Includes bibliographical references and index. |
Summary |
With the emergence of service-oriented architecture (SOA), the options for accessing the existing IBM Customer Information Control System (CICS) assets have become more varied than ever. With this variety comes the complexity of securing these assets. This IBM Redbooks publication is intended for IT architects who are involved in the process of selecting, planning, and designing a secure SOA solution that makes use of CICS assets. This book introduces SOA and the options available for transforming CICS assets into SOA solutions. It then discusses the principles of security, followed by the different security technologies. The book then reviews each technology individually, discussing the security options that are available, the security architectures such as basic authentication, firewalls, and the use of Secure Sockets Layer (SSL) and public key infrastructure (PKI). |
Subject |
Client/server computing.
|
|
CICS (Computer system)
|
|
Service-oriented architecture (Computer science)
|
|
Web services.
|
|
Computer network architectures.
|
|
Architecture client-serveur (Informatique) |
|
CICS (Système informatique) |
|
Architecture orientée service (Informatique) |
|
Services Web. |
|
Réseaux d'ordinateurs -- Architectures. |
|
CICS (Computer system) |
|
Client/server computing |
|
Computer network architectures |
|
Service-oriented architecture (Computer science) |
|
Web services |
Added Author |
Delmenico, Tony, author.
|
|
Havercan, Peter, author.
|
|
Rees, Mary, author.
|
|
Webb, Steven, author.
|
|
Weiss, Rob, author.
|
Other Form: |
Print version: Securing access to CICS within an SOA. 2nd ed. [United States?] : IBM, International Technical Support Organization, 2006 0738496715 (DLC) 2007281032 (OCoLC)181424227 |
|