I last wrote about the Security Module in October 2006. Now that we have established the general framework, or the infrastructure of the system, and indeed I have begun building the parts into a usable system, I now want to formally start the software development. As I noted in the October 2006 posting the security module would be the first item of development, therefore, I can now declare on Tuesday September 18, 2007 that we are indeed in development.
A few of the bits that we will be using as our infrastructure are Google Apps for People, Ideas and Objects, and Java Web Start and Java Swing. So lets start with that and build from there.
Google Apps for People, Ideas & Objects.
www.people-ideas-objects.com is the domain (and company name) that has been selected for this project. This is now operational on Google Apps and I am very pleased with the fit and finish. Key to their offering is the ability to integrate a Single Sign On (SSO) for the entire domain. Once the user is logged in through Google apps they will have access to the collaborative environment and application specific functionality. Recently Google announced the closing of their acquisition, Postini. Google will now offer a level of security that is in my opinion second to none.
With Postini Solutions, you can secure all of your electronic communications - email, instant messaging and the web – and manage your company's communication policies from one central location. Postini Solutions can also make it easy to meet your archiving and encryption needs.
Best of all, it's all 100% hosted, so there's no hardware or software to install or maintain. Whether you're looking to transition from or enhance your existing messaging infrastructure for better control, Postini enables you to provide employees the tools they need to be productive while reducing the cost and complexity of managing those tools.
I can now say unequivocally
People, Ideas & Objects has the most secure communications of all ERP systems. ;-) To my way of thinking, lets up the standard to a higher level.
As I noted in the
security module definition last October, Sun's new Solaris Z File System (ZFS) and elliptical encryption would be used for all of the data and information on the server side of the system. ZFS provides a level of journal-ling that will add real value to the users of this system. Apple have integrated Sun's ZFS in their next operating system (Leopard) release. Sold as the "time machine" feature, it enables a user to look at the various iterations of the file from the beginning to the most current version. The user will then have tools that will enable them to select the best version of the file. Secondly ZFS is 128 bit, just as IPv6, allowing for an unlimited addressing capability.
These points will be the first elements that will be developed. Google Apps for
People, Ideas & Objects will be upgraded with the Postini functionality, and the Solaris based server side will implement ZFS and
Sun's elliptical encryption as base for all operations from the Operating Systems, Java, Network, Database and File.
Java Web Start and Java SwingIntegration of Single Sign On (SSO) between Google Apps and the server side will provide the secure collaboration environment and the secure "Cloud" based operations. This will all be wrapped in a package that the user will be able to access anywhere and anytime with any capable computer. For the initial downloading, Java Web Start, Swing and other components of the
People, Ideas & Objects application will be a minor issue with the bandwidth that is available today. The "environment" this creates is one that meets the highest level of security for any and all programming environments. Java was selected for its adherence to strong
typing and inherent
security model. No other programming environment comes with this standard of security. Even
Microsoft's .net environment cautions the user about the inherently weak security model.
Java DBEmbedded within Java Web Start and Java Swing client environment is Java DB, a relational database with a small footprint. Originally developed by IBM it was open sourced and made the default client side database for use in Java environments. This database will hold the environment and other variables of each user, and much of the client specific data the user has used, cached, collaborated or searched from their user account. Recall that we have selected the
Ingress Database for the "Clouds" database. All the data from the Java DB will be replicated with the Ingress database. Additional search facilities of the server side or "cloud" environment have not been resolved at this time. Recall I was looking into the use of
Enterprise Search and security firms to assist in this area.
This area is complex and daunting, however, the need for bullet proof systems in terms of reliability and security are necessary for the enterprise. Particularly in the manner and method that they are being used here. Much of this architecture has not been implemented in any industry. Lastly I would point out that if a user were to access their system on a public terminal or a machine in which they have only temporary use of, the application and data would be inaccessible to any prying eyes after the user had left. With encryption and Java, the systems variables would be persistent only in encrypted form.
IPv6Recall we have instituted the IPv6 protocol as part of the
Technical Vision for all Internet communications for
People, Ideas & Objects. IPv6 is available to us through our ability to secure a Tier 1 vendor of bandwidth. Almost all computers are capable of handling the protocol. The security model of IPv6 adds elements of security at the protocol level and includes these
technologies.
SpecificationThese specifications will be encapsulated into one Web Service where the user, upon authorization and integration into the system, will have seamless access to their information. The reason this is the first module being built is that everything will need to be built upon it. To retrofit this level of security to a current application would be more problematic and costly then it would be worth. I am pleased that I can specify this level of security at relatively little cost. (A reflection of how systems have developed in the past few years.)
The primary issue of what needs to be resolved is the restrictions on use of high-level encryption systems in countries that are unable to access and use the high level encryption algorithms. The work around may involve limiting the users to the countries that are authorized to use these types of systems. Our focus being Calgary, Texas and Aberdeen Scotland, limited issues with the systems use outside of these three countries will limit the risk of using these algorithms.
Thankfully much of today's technological development environment closely replicates Leggo, define it, get the parts and build it. Where we go after the security specification will be to adopt the data model from the Public Petroleum Data Model (PPDM), tune it and test it, and from there we can start building the
Petroleum Lease Marketplace functionality.
Technorati Tags: Genesys, Security, Development, Java