Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Today's Top SOA Links


‘Real Me’ as-a-Service: Cloud Privacy by Design for E-Health
The risks related to data privacy

Naturally one of the critical areas specified in the Canadian E-Health Cloud strategy document is the risks related to data privacy.

Specifically in section 8, from page 42 through 49, they describe the comprehensive standards, audit and certification frameworks that will be required to protect this next major phase of Cloud adoption.

CHI point to the number one risk issue cited by CIOs – Fears of inadequate data privacy protections, and they describe the various component parts what is required to address these risks including due diligence procedures and state of the art privacy controls.

e-health0620Cloud Privacy By Design – Federated Consent Management

Throughout the document they also identify the technologies needed to achieve compliance with these new capabilities, such as Federated Identity and Consent Management applications, that they describe as new ‘greenfield’ apps for them.

We can see an example of this through the Real Me service from the New Zealand Government. Developed in conjunction with their national postal service they have deployed a novel service for online Identity authentication and related access, with over 40 different government service providers unified into delivery for half a million users.

This implements an ‘iCMS‘ – Extended Authentication Context Management Service, that utilizes a security token service based on WS-Trust Messaging and SAML tokens, Identity open standards from OASIS, enabling:

  • Pseudonymous Authentication, via ‘federated sharing tags’
  • Two-factor authentication through text message to cell phone
  • Verified Data – A secure, privacy-centric data exchange
  • A clear consent model – An extensible data across multiple providers
  • Government Cloud attribute provider: Drivers licence information

These trends will have uniquely dramatic changes to how software architecture is designed and implements, as ‘Cloud SOA’ will emerge by utilizing this plumbing, features the NZL Government such as a “privacy domain bus” for managing exchanges of data between applications.

Read the original blog entry...

About Cloud Best Practices Network
The Cloud Best Practices Network is an expert community of leading Cloud pioneers. Follow our best practice blogs at http://CloudBestPractices.net

Web 2.0 Latest News
One look at the comments section of an April column on digital marketing in TechCrunch, and it becomes obvious that contributor Samuel Scott, the marketing and communications director for data analytics software firm Logz.io, pushed a few hot buttons with his take on marketing tech. S...
The future of data centers looks very exciting. Data Centers are turning out to be increasingly important in today's connected world as we can store and process a lot of consumer and commercial data. Data centers seem to be either becoming huge or very small. In general, marketing clou...
Just as writing has come to mean texting, blogging or any form of digital writing, the cloud today means one or all of the three Cs: computing, connectivity and communication. And just as nearly all thought to putting pen to paper has disappeared, all reference to the natural cloud is ...
Yes, Lori has been reading the Internet again. And what she’s been seeing makes baby Lori angry. It also makes this former test designer and technology editor cry. Really, I weep at both the excuses offered for such testing and the misleading headline. I have read no less than two con...
Does a Content Delivery Network (CDN) protect against Distributed Denial of Service (DDoS) attacks? It’s a good question. A CDN by its very nature will absorb DDoS attacks for the content that it serves and this could be considered protection but, as is often the case, this is only the...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE