HOME

TheInfoList



OR:

Pertaining to web services, Secure-Adaptive Architecture (SAA) refers to a particular approach towards the security management issues inherent in data transfer over
computer network A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections ar ...
s, relating to certain services, such as
micropayment A micropayment is a financial transaction involving a very small sum of money and usually one that occurs online. A number of micropayment systems were proposed and developed in the mid-to-late 1990s, all of which were ultimately unsuccessful. A s ...
s.


Minimalist approach

In SAA, personal information (such as an
end-user In product development, an end user (sometimes end-user) is a person who ultimately uses or is intended to ultimately use a product. The end user stands in contrast to users who support or maintain the product, such as sysops, system administrato ...
's name, banking information, or personal identity numbers such as
Social Security number In the United States, a Social Security number (SSN) is a nine-digit number issued to U.S. citizens, permanent residents, and temporary (working) residents under section 205(c)(2) of the Social Security Act, codified as . The number is issued t ...
s) is not retained. This has two main benefits: For the end-user, the chance of
identity theft Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term ''identity theft'' was c ...
and fraud is considerably reduced. For the
service provider A service provider (SP) is an organization that provides services, such as consulting, legal, real estate, communications, storage, and processing services, to other organizations. Although a service provider can be a sub-unit of the organization t ...
, it means that direct communication with the end-user's
financial institution Financial institutions, sometimes called banking institutions, are business entities that provide services as intermediaries for different types of financial monetary transactions. Broadly speaking, there are three major types of financial inst ...
is unnecessary.


Security techniques

SAA uses "best in class" proven security techniques to ensure the safe transfer of data through network resources. These include protocols such as
SSL SSL may refer to: Entertainment * RoboCup Small Size League, robotics football competition * ''Sesame Street Live'', a touring version of the children's television show * StarCraft II StarLeague, a Korean league in the video game Natural language ...
communications,
client-side Client-side refers to operations that are performed by the client in a client–server relationship in a computer network. General concepts Typically, a client is a computer application, such as a web browser, that runs on a user's local comp ...
authentication Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicat ...
and
AES AES may refer to: Businesses and organizations Companies * AES Corporation, an American electricity company * AES Data, former owner of Daisy Systems Holland * AES Eletropaulo, a former Brazilian electricity company * AES Andes, formerly AES Gener ...
encryption.


Monitoring

SAA requires consistent and pervasive, real-time monitoring of network resources to ensure security.


See also

*
Adaptive architecture Within reconfigurable computing, an Adaptive architecture is a system which changes its structure, behaviour or resources according to demand. The adaptation made is usually lways?to non-functional characteristics rather than functional ones. ...
{{DEFAULTSORT:Secure-Adaptive Architecture Web services