<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Jugoslav Achkoski</style></author><author><style face="normal" font="default" size="100%">Metodija Dojchinovski</style></author><author><style face="normal" font="default" size="100%">Vladimir Trajkovik</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">An Intelligence Information System based on Service-Oriented Architecture: A Survey of Security Issues</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">access control</style></keyword><keyword><style  face="normal" font="default" size="100%">auditing</style></keyword><keyword><style  face="normal" font="default" size="100%">authentication</style></keyword><keyword><style  face="normal" font="default" size="100%">authorization</style></keyword><keyword><style  face="normal" font="default" size="100%">federated identity confidentiality</style></keyword><keyword><style  face="normal" font="default" size="100%">integrity</style></keyword><keyword><style  face="normal" font="default" size="100%">model</style></keyword><keyword><style  face="normal" font="default" size="100%">security assertion markup language</style></keyword><keyword><style  face="normal" font="default" size="100%">se¬curity solution</style></keyword><keyword><style  face="normal" font="default" size="100%">signature</style></keyword><keyword><style  face="normal" font="default" size="100%">SOA</style></keyword><keyword><style  face="normal" font="default" size="100%">XML Encryption</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">27</style></volume><pages><style face="normal" font="default" size="100%">91-110</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Security is an important requirement for a service-oriented architecture (SOA), since SOA in principle considers services spread widely on different locations and diverse operational platforms. The main challenge for SOA security still drifts around ‘clouds’ and there is still a lack of suitable frameworks for security models based on consistent and convenient methods. In this paper, we propose security solutions for an Intelligence Information System completely based on SOA. Contemporary security architectures and security protocols are still evolving. SOA-based systems are characterized with differences in security implementation as encryption, access control, security monitoring, security management through disparate domains etc. Domains have services as endpoints in the information systems, which usually form composite services. The workflow which is established through composite services is extending on different endpoints in different domains. The paper’s main aim is to provide a contribution in developing suitable security solutions to Intelligence Information Systems using web service security standards in order to reach appropriate level of information security considering authentication, authorization, privacy, integrity, trust, federated identities, confidentiality and more. The paper reflects an approach in which useful information provided by the services is sent out directly from the creators of information to the consumers of information. We introduce security and logging system that can be used as verification and validation middleware</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record></records></xml>