Previous Page  110 / 152 Next Page
Information
Show Menu
Previous Page 110 / 152 Next Page
Page Background

Single Window Systems

In the OIC Member States

100

techniques used for all traffic from point-to-point. SWs must develop and maintain sophisticated

user authorizations system for both end-users and service providers.

Why does it matter?

Security is closely linked to the need for trust and is growing in importance sue to increase public

awareness. It is even more crucial when there is a direct linkage to the financial activities, i.e.

payment activities.

Policy Options

1. Re-use of Services

The re-use of services is the linking of individual services to one or more new or pre-existing

services. A service generally contains most or all of the presentation and process logic, and it may

also have same or similar data set. The majority of business processes in a SW application and

server layer are provided by services that were previously deployed and could therefore be re-

used. Re-use can reach up to 80 % but is more likely to be at maximum 20% in most

organisations.

72

2. Multiply Number of Solution Providers

Allow multiple independent providers of solutions to supply hardware, services and software

components that can be integrated in the SW Architecture, seamlessly on a platform of choice.

This approach supports incremental transformation through a step-by-step introduction of

components that may originate from various end users IT systems. Transforming the functionality

into the service components must be driven by proper business process analysis.

3. Prioritise Interoperability of IT Architecture

Interoperability is the only way to resolve system-to-system connectivity. There needs to be a

drive for continuous improvement of interoperability between the SW and the IT systems of the

other users. . SW system must be flexible and adoptable to provide full interconnectivity and

interoperability with the stakeholders’ IT systems.

The SW stakeholders (agencies, customs, port etc.) must have absolute autonomy to select the

architecture (where possible) for their IT solutions, and to develop it, without being dependent

on the SW architecture system. Using Service Oriented Architecture pattern is one option to

overcome interoperability challenges.

4. Internationally Recognised Security Standards

The security should be focusing on authenticity, integrity, confidentiality, non-repudiation of

origin according to internationally recognised standards, such as ISO/IEC 27005:2011

Information security risk management.

72

http://www.davidchappell.com/HTML_email/Opinari_No16_8_06.html