메뉴 건너뛰기




Volumn 18, Issue 10, 2006, Pages 1255-1275

Refactoring service-based systems: How to avoid trusting a workflow service

Author keywords

Grid; Pattern; Refactoring; Security; Service based architectures; Web services; Workflow

Indexed keywords

COMPUTER APPLICATIONS; COMPUTER SYSTEMS; CONSTRAINT THEORY; SECURITY OF DATA;

EID: 33747510016     PISSN: 15320626     EISSN: 15320634     Source Type: Journal    
DOI: 10.1002/cpe.997     Document Type: Conference Paper
Times cited : (8)

References (27)
  • 1
    • 22144449959 scopus 로고    scopus 로고
    • Delivering a grid enabled Distributed Aircraft Maintenance Environment (DAME)
    • Nottingham, U.K. EPSRC: Swindon, [27 February 2005]
    • Jackson T, Austin J, Fletcher M, Jessop M. Delivering a Grid enabled Distributed Aircraft Maintenance Environment (DAME). Proceedings of the UK e-Science All Hands Meeting 2003, Nottingham, U.K. EPSRC: Swindon, 2003. Available at: http://www.nesc.ac.uk/events/ahm2003/AHMCD/ [27 February 2005].
    • (2003) Proceedings of the UK E-science All Hands Meeting 2003
    • Jackson, T.1    Austin, J.2    Fletcher, M.3    Jessop, M.4
  • 3
    • 0038315923 scopus 로고    scopus 로고
    • BEA Systems, International Business Machines Corporation, Microsoft Corporation, SAP AG, Siebel Systems, 5 May [27 February 2005]
    • Andrews T et al. Business Process Execution Language for Web Services, BEA Systems, International Business Machines Corporation, Microsoft Corporation, SAP AG, Siebel Systems, 5 May 2003. ftp://www6.software.ibm.com/software/developer/library/ws-bpel.pdf [27 February 2005].
    • (2003) Business Process Execution Language for Web Services
    • Andrews, T.1
  • 4
    • 0003474971 scopus 로고
    • Standardising on workflow-management - The OMG workflow management facility
    • Schulze W, Bussler C, Meyer-Wegener K. Standardising on workflow-management - the OMG workflow management facility. ACM SIGGROUP Bulletin 1988; 19(1):24-30.
    • (1988) ACM SIGGROUP Bulletin , vol.19 , Issue.1 , pp. 24-30
    • Schulze, W.1    Bussler, C.2    Meyer-Wegener, K.3
  • 13
    • 0033329699 scopus 로고    scopus 로고
    • Modelling, specifying and implementing workflow security in cyberspace
    • Gudes E, Olivier M, Riet RPvd. Modelling, specifying and implementing workflow security in cyberspace. Journal of Computer Security 1999; 7(4):287-315.
    • (1999) Journal of Computer Security , vol.7 , Issue.4 , pp. 287-315
    • Gudes, E.1    Olivier, M.2    Riet, R.Pvd.3
  • 18
    • 24644502219 scopus 로고    scopus 로고
    • A Z patterns catalogue 1: Specification and refactorings, v0.1
    • University of York
    • Stepney S, Polack F, Toyn I. A Z Patterns Catalogue 1: Specification and refactorings, v0.1. Technical Report YCS-2003-349, University of York, 2003.
    • (2003) Technical Report , vol.YCS-2003-349
    • Stepney, S.1    Polack, F.2    Toyn, I.3
  • 22
    • 33747485978 scopus 로고    scopus 로고
    • Blakley B, Heath C (eds.). The Open Group, [27 February 2005]
    • Blakley B, Heath C (eds.). Security Design Patterns. The Open Group, 2004. Available at: http://www.opengroup.org/publications/catalog/g031.htm [27 February 2005]; 102.
    • (2004) Security Design Patterns , pp. 102
  • 23
    • 35248874836 scopus 로고    scopus 로고
    • RFC client: A pattern for the client-side implementation of a pipelined request/respone protocol
    • Urbana, IL, [27 February 2005]
    • Heuser M, Fernandez EB. RFC Client: A pattern for the client-side implementation of a pipelined request/respone protocol. Proceedings of the Pattern Languages of Programs 1999 (PLoP 99), Urbana, IL, 1999. Available at: http://st-www.cs.uiuc.edu/~plop/plop99/proceedings/ [27 February 2005].
    • (1999) Proceedings of the Pattern Languages of Programs 1999 (PLoP 99)
    • Heuser, M.1    Fernandez, E.B.2
  • 24
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • Oakland, CA, 1987. IEEE Computer Society Press: Washington, DC
    • Clark DD, Wilson DR. A comparison of commercial and military computer security policies. Proceedings of the 1987 IEEE Symposium on Security and Privacy, Oakland, CA, 1987. IEEE Computer Society Press: Washington, DC, 1987; 184-194.
    • (1987) Proceedings of the 1987 IEEE Symposium on Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.