Professional Documents
Culture Documents
com/ Page 1 of 5
Tushar Jain tusjain@yahoo.com, tusjain@gmail.com
Table of Content
1. Pattern Name...........................................................................................2
2. Also Known As..........................................................................................2
3. Class Name..............................................................................................2
4. Intent .....................................................................................................2
5. Motivation (Forces) ...................................................................................2
6. Applicability .............................................................................................2
7. Structure & Implementation.......................................................................2
8. Participants..............................................................................................4
9. Collaboration............................................................................................4
10. Consequences ..........................................................................................4
11. Sample Code............................................................................................5
12. Known Uses .............................................................................................5
13. Related Patterns .......................................................................................5
14. Reference ................................................................................................5
http://architecture-soa-bpm-eai.blogspot.com/ Page 1 of 5
http://architecture-soa-bpm-eai.blogspot.com/ Page 2 of 5
Tushar Jain tusjain@yahoo.com, tusjain@gmail.com
1. Pattern Name
SecureMyData
2. Also Known As
In house encryption & decryption service
3. Class Name
Architectural: SaaS
4. Intent
In SaaS environment security of customer specific data in multi
tenant as well as non multi tenant environment is one of the most
crucial concerns.
5. Motivation (Forces)
Alleviation of data security breach of customer data
6. Applicability
This pattern is applicable in SaaS environment.
http://architecture-soa-bpm-eai.blogspot.com/ Page 2 of 5
http://architecture-soa-bpm-eai.blogspot.com/ Page 3 of 5
Tushar Jain tusjain@yahoo.com, tusjain@gmail.com
http://architecture-soa-bpm-eai.blogspot.com/ Page 3 of 5
http://architecture-soa-bpm-eai.blogspot.com/ Page 4 of 5
Tushar Jain tusjain@yahoo.com, tusjain@gmail.com
8. Participants
N/A
9. Collaboration
N/A
10. Consequences
a. Increased traffic over network.
b. Additional infrastructure at customer site.
c. Additional implementation of message splitter and aggregator
d. Complex logic at user interface layer.
e. Customer satisfaction
http://architecture-soa-bpm-eai.blogspot.com/ Page 4 of 5
http://architecture-soa-bpm-eai.blogspot.com/ Page 5 of 5
Tushar Jain tusjain@yahoo.com, tusjain@gmail.com
14. Reference
N/A
http://architecture-soa-bpm-eai.blogspot.com/ Page 5 of 5