Jump to content

Collaboration-oriented architecture

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by 86.143.162.4 (talk) at 20:44, 6 July 2007 (Web Reference for HSBC, citation for Authentication reference). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

This is a term used in the areas of information security, IT security, network security and computer security.

Collaboration Oriented Architecture is a concept used to describe the design of a computer system that is designed to collaborate, or use services, from systems that are outside of your locus of control. Collaboration Oriented Architecture will often utilise Service Oriented Architecture to deliver the technical framework and the

Collaboration Oriented Architecture is the ability to collaborate between systems that are based on the Jericho Forum principles or “Commandments”[1].

Bill Gates and Craig Mudie (Microsoft) [2][3] clearly articulated the need for people to work outside of their organisations in a secure and collaborative manner in their opening keynote to the RSA Security Conference in February 2007.

Successful implementation of a Collaboration Oriented Architecture implies the ability to successfully inter-work securely over the Internet and will typically mean the adoption of the principles of de-perimeterisation.

Origin of the term

The term Collaboration Oriented Architecture was defined and developed in a meeting of the Jericho Forum at a meeting held at HSBC on the 6th July 2007.

Authentication in a Collaboration Oriented Architecture

Working in a collaborative multi-sourced environment implies the need for authentication, authorisation and accountability which must interoperate / exchange outside of your locus / area of control[4]

  • People/systems must be able to manage permissions of resources and rights of users they don't control
  • There must be capability of trusting an organisation, which can authenticate individuals or groups, thus eliminating the need to create separate identities
  • In principle, only one instance of person / system / identity may exist, but privacy necessitates the support for multiple instances, or once instance with multiple facets
  • Systems must be able to pass on security credentials /assertions
  • Multiple loci (areas) of control must be supported

References

  1. Jericho Forum Commandments – PDF File
  2. Bill Gates, Craig Mundie: RSA Conference 2007. Transcript of keynote discussion between Microsoft Chairman Bill Gates and Chief Research & Strategy
  3. Bill Gates Webcast, Bill Gates and Craig Mundie Keynote at RSA Conference 2007: Advancing Trust in Today’s Connected World
  4. Jericho Forum Commandment #8 – PDF File