Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

A Practitioner’s Perspective: An SOA Approach

By Ram Mohan Contributi
December 1, 2006
Figure 1: Message-Level Security in a Web service-based SOA

Web services-based, service-oriented architecture (SOA) environment has opened up a whole new world of opportunities for enterprise security.

An identity-enabled SOA facilitates the establishment of a trust relationship among the three entities by providing a mechanism to resolve identities across organizational boundaries. It also supports comprehensive, end-to-end auditing of transactions not only between entities, but also among each of the entities like physical and IT security systems. Physical and IT security convergence is no longer a concept; it is a reality and a vital necessity not only for reducing systems integration and implementation costs, but also for improving overall enterprise security management.
 

SOA APPLICATIONS

There are many reasons for using a Web services-based SOA approach for supporting systems integration. Web services-based SOA utilizes platform-independent programming, languages and protocols like Extensible Markup Language (XML), Web Services Description Language (WSDL), and Hyper Text Transfer Protocol (HTTP). WSDL is the standard format for describing a Web service.

An increasing number of physical security systems like the video surveillance system are migrating to the enterprise network. However, there is still a wide range of physical and IT security systems that are based on non-interoperable software applications.

While IP network-centric convergence has brought voice, data and video together on the same network, the Web services-based SOA approach has brought about the convergence of physical and IT security systems by enabling systems integration at the application-level. The Web services-based SOA approach to physical and IT security systems integration provides a level of flexibility that was previously impossible and has many advantages over previous approaches. The key benefits of this approach, however, are code reusability, application-level interoperability, enablement of seamless information exchange and simpler systems integration.

The primary objective of the Web services-based SOA is to provide an interoperable framework for integrating loosely coupled software components associated with location-independent, back-end applications distributed over an enterprise network infrastructure. The Web services-based SOA approach reduces the dependency on proprietary components. It also reduces costs for implementing new systems and applications by facilitating the reuse of existing solution components.

Using the Web services-based SOA approach for integrating disparate, mission-critical systems and applications also significantly reduces monitoring, security event management and incident tracking costs. Physical security systems, such as IP network-based, digital video surveillance systems and intelligent video management systems are also beginning to use Web services to interface with other security systems, such as alarm management systems, smart sensor-based systems, such as perimeter security systems and gunshot detection system, explosives detection system, as well as, physical access control system. This integration enables the creation of an overall enterprise security solution that is responsive and fully capable of intercepting potential security threats and effectively tracking events that occur. A good example of the business benefit of such integration is monitoring the physical movements of personnel and environmental conditions within a data center.

The Web services-based SOA approach can be used for integrating smart sensor-based, data center environment monitoring system as well as digital video surveillance and intelligent video management systems with a mail server. This can help in sending e-mail and paging alerts regarding potential problems such as unusual movement of personnel, or problems discovered in temperature, air flow and other environmental conditions, over the enterprise network to key personnel who are responsible for managing physical and IT security. Since the messages are sent only when there is a potential threat, this can also help in reducing the monitoring and incident tracking costs.
 

Figure 2: Conceptual Solution Architecture of an Integrated Physical and IT Security Infrastructure Implemented Using an ESB-Based SOA

SOA Components and Security Mechanisms

There are two basic types of Web services-based SOA components: providers and consumers. Web services providers and consumers can be edge systems (consumers), which initiates service requests and target systems (providers), which respond to the service request made by the edge system. In a typical Web services-based SOA environment, a target system in one instance may be an edge system in another instance.

A Web services-based SOA is an open environment that is highly decentralized in nature and allows service composition, which may involve many different service providers and consumers distributed across different platforms in the enterprise.

In such an open environment, a message may hop through various intermediaries (e.g., integration middleware) to reach the target system. This has certain security implications. To protect against potential vulnerabilities, the Web services-based SOA security requires a holistic approach that is based on a trust model. The trust model enables Web service providers and consumers - primarily physical and IT security systems - to interact with one another using a set of core services that provide the functionality necessary to support the model.

Figure 1 describes the message-level security mechanism in a Web services-based SOA.

The Web services-based SOA approach that is used for systems integration may involve a composite Web service that is basically built using multiple component Web services. A composite Web service supports a transactional application consisting of business functionality and information from various information sources.
 

Using an Enterprise Service Bus (ESB)

The Web services-based SOA approach provides an application architecture framework. Figure 2 provides conceptual solution architecture of an integrated physical and IT security infrastructure implemented using an ESB-based SOA.

Web services-based SOA or an ESB-based SOA offers lower systems integration costs to meet the demands of evolving enterprises with changing business requirements. These approaches clearly provide the capability to integrate all aspects of physical and IT security, as well as facilities management, based on open standards-based architecture. With Web services-based SOA or an ESB-based SOA, a converged enterprise security environment can be created to enable organizations to effectively protect and manage their businesses.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

About the Author
Ram Mohan is a lead solutions architect in integrated identity and security with the commercial, state and local group of Northrop Grumman Information Technology. With over 18 years of industry experience in IT and telecommunications, he is an active contributor to the initiatives of the Smart Card Alliance Physical Access Council and also worked extensively on planning and developing HSPD-12 initiatives during the past year.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • workforce

    An attacker’s perspective on choosing a red-team or pen-test engagement

    See More
  • Securing New Ground® 2016: The Practitioner Perspective

    See More
  • SEC0820-Entry-Feat-slide1_900px

    Pre-Entry Video Observation (PEVO): A Fresh Approach to an Old Idea

    See More

Related Products

See More Products
  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

  • Physical Security and Safety: A Field Guide for the Practitioner

  • Optimizing Social Media from a B2B Perspective

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing