headerimage The Open Group home page
You are here:  Home > Events > Enterprise Architecture Practitioners Conference Austin
  K. Scott Morrison - VP Engineering & Chief Architect, Layer 7 Technologies  


Scott MorrisonK. Scott Morrison is the VP Engineering and Chief Architect at Layer 7 Technologies, leading a team to develop the next generation of security infrastructure for Web services. An architect and developer of highly scalable, enterprise systems for over 15 years, he has extensive experience across industry sectors as diverse as health, travel and transportation, and financial services. Scott has also been a Director of Architecture and Technology at Infowave Software, a maker of wireless security and acceleration software for mobile devices, and held senior architect positions with IBM. He spent a number of years at theLayer7 world-renowned medical research program of the University of British Columbia, studying neurodegenerative disorders using medical imaging technology. Scott is a dynamic and highly sought-after speaker. He has published over 50 book chapters, magazine articles, and papers in medical, physics, and engineering journals. He is the recent co-author of Java Web Services Unleashed and Professional JMS. Scott is an editor of the WS-I Basic Security Profile, as well as a co-author of the WS-Federation specification.

   
 

Presentation
Architecting SOA Securely
SOA is not just a methodology for integrating systems and data; it's also a means of integrating different legacy security models. It is critical, therefore, that security be a first class construct in any SOA project. Identity, confidentiality, integrity, audit, key management, and reliability are all critical aspects of a successful SOA that must be considered up front for the architecture to be a success. In this talk, you recognize that SOA is an opportunity to make distributed computing more secure. We will discuss how existing security models can be integrated and adapted, preserving investments in these systems. We will learn how secure design patterns, such as defense-in-depth, can be leveraged to build portioned zones of trust within a SOA. We will examine how federation works in SOA, and what impact it has upfront on architecture. And finally, we will study how new standards and emerging infrastructure can play an important role in a secure SOA.

return to program

   
   |   Legal Notices & Terms of Use   |   Privacy Statement   |   Top of Page   Return to Top of Page