메뉴 건너뛰기




Volumn 16, Issue 2, 2008, Pages 223-260

Constraint based role based access control in the SECTET-framework: A model-driven approach

Author keywords

Domain specific language; Model driven architecture; Model driven engineering; Service oriented architecture

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER PROGRAMMING LANGUAGES; COMPUTER SIMULATION; CONSTRAINT THEORY; HIERARCHICAL SYSTEMS; WEB SERVICES;

EID: 38349100724     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2008-16206     Document Type: Conference Paper
Times cited : (17)

References (46)
  • 1
    • 67650243926 scopus 로고    scopus 로고
    • Model-driven security for Web services (MDS4WS)
    • M. Alam, M. Hafner and R. Breu, Model-driven security for Web services (MDS4WS), in: INMIC 2004.
    • INMIC 2004
    • Alam, M.1    Hafner, M.2    Breu, R.3
  • 3
    • 33750037935 scopus 로고    scopus 로고
    • A framework for modeling restricted delegation in service oriented architecture
    • M. Alam, M. Hafner, R. Breu and S. Unterthiner, A framework for modeling restricted delegation in service oriented architecture, in: TrustBus, 2006, pp. 142-151.
    • (2006) TrustBus , pp. 142-151
    • Alam, M.1    Hafner, M.2    Breu, R.3    Unterthiner, S.4
  • 4
    • 85036965135 scopus 로고    scopus 로고
    • available at
    • AndroMDA v3.0M3 available at. http://andromda.org/.
    • AndroMDA v3.0M3
  • 7
    • 33746435793 scopus 로고    scopus 로고
    • S. Brahe and K. Østerbye, Business process modeling: Defining domain specific modeling languages by use of uml profiles, in: ECMDA-FA, 2006, pp. 241-255.
    • S. Brahe and K. Østerbye, Business process modeling: Defining domain specific modeling languages by use of uml profiles, in: ECMDA-FA, 2006, pp. 241-255.
  • 8
    • 26444432193 scopus 로고    scopus 로고
    • Web service engineering - advancing a new software engineering discipline
    • R. Breu, M. Breu, M. Hafner and A. Nowak, Web service engineering - advancing a new software engineering discipline, in: ICWE, 2005, pp. 8-18.
    • (2005) ICWE , pp. 8-18
    • Breu, R.1    Breu, M.2    Hafner, M.3    Nowak, A.4
  • 9
    • 26844470176 scopus 로고    scopus 로고
    • Model driven security for inter-organizational workflows in. e-government
    • R. Breu, M. Hafner, B. Weber and A. Nowak, Model driven security for inter-organizational workflows in. e-government, in: TCGOV, 2005, pp. 122-133.
    • (2005) TCGOV , pp. 122-133
    • Breu, R.1    Hafner, M.2    Weber, B.3    Nowak, A.4
  • 10
    • 35048860896 scopus 로고    scopus 로고
    • Actor-centric modeling of user rights
    • R. Breu and G. Popp, Actor-centric modeling of user rights, in: FASE, 2004, pp. 165-179.
    • (2004) FASE , pp. 165-179
    • Breu, R.1    Popp, G.2
  • 11
    • 26844566257 scopus 로고    scopus 로고
    • A flexible role-based delegation model using characteristics of permissions, DEXA 2005
    • D. Gue Park et al., A flexible role-based delegation model using characteristics of permissions, DEXA 2005, LNCS, Vol. 3588, 2005, pp. 310-323.
    • (2005) LNCS , vol.3588 , pp. 310-323
    • Gue Park, D.1
  • 13
    • 33750315310 scopus 로고    scopus 로고
    • Towards a mof/qvt-based domain architecture for model driven security
    • M. Hafner, M. Alam and R. Breu, Towards a mof/qvt-based domain architecture for model driven security, in: MoDELS, 2006, pp. 275-290.
    • (2006) MoDELS , pp. 275-290
    • Hafner, M.1    Alam, M.2    Breu, R.3
  • 15
    • 85037001945 scopus 로고    scopus 로고
    • http://www.eclipse.org/emf/.
  • 18
    • 85036982380 scopus 로고    scopus 로고
    • http://hissa.nist.gov/rbac/paper/node5.html.
  • 19
    • 0142152900 scopus 로고    scopus 로고
    • A new role-based delegation model using sub-role hierarchies
    • H. Lee, Y. Lee and B. Noh, A new role-based delegation model using sub-role hierarchies, in: ISCIS, 2003, pp. 811-818.
    • (2003) ISCIS , pp. 811-818
    • Lee, H.1    Lee, Y.2    Noh, B.3
  • 20
    • 79955143136 scopus 로고    scopus 로고
    • Secureuml: A UML-based modeling language for model-driven security
    • UML, The Unified Modeling Language, 5th International Conference, Dresden, Germany, 2002, J.-M. Jézéquel, H. Hussmann and S. Cook, eds, Springer-Verlag
    • T. Lodderstedt, D.A. Basin and J. Doser, Secureuml: A UML-based modeling language for model-driven security, in: UML - The Unified Modeling Language, 5th International Conference, Dresden, Germany, 2002, J.-M. Jézéquel, H. Hussmann and S. Cook, eds, LNCS, Vol. 2460, Springer-Verlag, 2002, pp. 426-441.
    • (2002) LNCS , vol.2460 , pp. 426-441
    • Lodderstedt, T.1    Basin, D.A.2    Doser, J.3
  • 21
    • 85036997646 scopus 로고    scopus 로고
    • http://www.magicdraw.com/.
  • 23
    • 38149075083 scopus 로고    scopus 로고
    • Model-driven security engineering for the realization of dynamic security requirements in collaborative systems
    • PhD Symposium of IEEE/ACM Models 2006, Genoa, Italy
    • M. Alam, Model-driven security engineering for the realization of dynamic security requirements in collaborative systems, in: PhD Symposium of IEEE/ACM Models 2006, Genoa, Italy, LNCS, Vol. 4364, 2006, pp. 278-287.
    • (2006) LNCS , vol.4364 , pp. 278-287
    • Alam, M.1
  • 24
    • 33750940982 scopus 로고    scopus 로고
    • Modeling permissions in a (U/X)ML World
    • IEE Computer Society, Washington, DC, ISBN: 0-7695-2567-9
    • M. Alam, R. Breu and M. Hafner, Modeling permissions in a (U/X)ML World, in: ARES 2006, IEE Computer Society, Washington, DC, 2006, pp. 685-692. ISBN: 0-7695-2567-9.
    • (2006) ARES 2006 , pp. 685-692
    • Alam, M.1    Breu, R.2    Hafner, M.3
  • 27
    • 33750453781 scopus 로고    scopus 로고
    • SECTET - An extensible framework for the realization of secure inter-organizational workflows
    • M. Hafner, R. Breu, B. Agreiter and A. Nowak, SECTET - An extensible framework for the realization of secure inter-organizational workflows, Journal of Internet Research 24 (2006), 491-506.
    • (2006) Journal of Internet Research , vol.24 , pp. 491-506
    • Hafner, M.1    Breu, R.2    Agreiter, B.3    Nowak, A.4
  • 28
    • 38349165472 scopus 로고    scopus 로고
    • A Security architecture for inter-organizational workflows: Putting WS security standards together
    • 27-28 May, Miami, USA, INSTICC, pp, ISBN: 972-8865-19-8
    • M. Hafner, R. Breu and M. Breu, A Security architecture for inter-organizational workflows: Putting WS security standards together, in: Proc. 7th International Conference on Enterprise Information Systems (ICEIS 2005), 27-28 May 2005, Miami, USA, INSTICC, pp. 128-135. ISBN: 972-8865-19-8.
    • (2005) Proc. 7th International Conference on Enterprise Information Systems (ICEIS 2005) , pp. 128-135
    • Hafner, M.1    Breu, R.2    Breu, M.3
  • 29
    • 33746064515 scopus 로고    scopus 로고
    • Security Engineering with Patterns
    • Springer-Verlag, New York, ISBN: 3-540-40731-6
    • M. Schumacher, Security Engineering with Patterns, LNCS, Vol. 2754, Springer-Verlag, New York, 2003. ISBN: 3-540-40731-6.
    • (2003) LNCS , vol.2754
    • Schumacher, M.1
  • 30
    • 85036996948 scopus 로고    scopus 로고
    • SUN MicroSystems, Java metadata interface, Misc, 2002.
    • SUN MicroSystems, Java metadata interface, Misc, 2002.
  • 31
    • 85036983470 scopus 로고    scopus 로고
    • http://mdr.netbeans.org/.
  • 32
    • 84866552350 scopus 로고    scopus 로고
    • available at
    • OAW 4 EMF Example available at http://www.eclipse.org/gmt/oaw/doc/30_e. mfExam.ple.pdf.
    • OAW 4 EMF Example
  • 33
    • 84883119070 scopus 로고    scopus 로고
    • available at
    • OAW XPAND Language available at http://www.ecl.ipse.org/gmt/oaw/doc/ r20_xPandReference.pdf.
    • Language
    • XPAND, O.A.W.1
  • 35
    • 85037002141 scopus 로고    scopus 로고
    • Object Management Group
    • Object Management Group, http://www.omg.org.
  • 38
    • 23844508158 scopus 로고    scopus 로고
    • Domain specific modeling, Editorial of Software System Model Journal
    • R. France and B. Rumpe, Domain specific modeling, Editorial of Software System Model Journal 4 (2005), 13.
    • (2005) , vol.4 , pp. 13
    • France, R.1    Rumpe, B.2
  • 39
    • 85036990497 scopus 로고    scopus 로고
    • Role Based Access Control RBAC, avialable at csrc.nist.gov/rbac
    • Role Based Access Control (RBAC), avialable at csrc.nist.gov/rbac/.
  • 40
    • 84941160706 scopus 로고    scopus 로고
    • available at
    • SAML 2.0 Specification, available at http://www.oasis-open.org/ committees/tc_home.php?wg_abbrev-security.
    • SAML 2.0 Specification
  • 41
    • 85036996537 scopus 로고    scopus 로고
    • www.sectet.org (will be on air by the end of May 2006).
    • www.sectet.org (will be on air by the end of May 2006).
  • 42
    • 85037001829 scopus 로고    scopus 로고
    • SECTETPL: of access rights, available at
    • SECTETPL: A predicative language for the specification of access rights, available at http://qe-informatik.uibk.ac.at/~muhammad/TechnicalReportSECTETPL. pdf.
    • A predicative language for the specification
  • 43
    • 85036982949 scopus 로고    scopus 로고
    • Web Service Description Language WSDL, available at
    • Web Service Description Language (WSDL), available at http://www.w3.org/TR/wsdl.
  • 44
    • 85036990609 scopus 로고    scopus 로고
    • July 22
    • WSDL First, July 22, 2003, http://webservices.xml.eom/pub/a/ws/2003/07/ 22/wsdlfirst.html.
    • (2003)
    • First, W.S.D.L.1
  • 45
    • 77954394878 scopus 로고    scopus 로고
    • available at
    • XACML 2.0 Specification Set, available at http://www.oasis-open.org/ committees/tc_home. php?wg_abbrev=xacml.
    • XACML 2.0 Specification Set


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.