메뉴 건너뛰기




Volumn , Issue , 2008, Pages 125-134

Secure workflow development from early requirements analysis

Author keywords

[No Author keywords available]

Indexed keywords

ELECTRONIC COMMERCE; MANAGEMENT; REQUIREMENTS ENGINEERING; WEB SERVICES;

EID: 58449093195     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ECOWS.2008.13     Document Type: Conference Paper
Times cited : (15)

References (33)
  • 1
    • 58449112691 scopus 로고    scopus 로고
    • Business Process Execution Language for Web Services 1.1, May 2003.
    • Business Process Execution Language for Web Services 1.1, May 2003.
  • 2
    • 58449104675 scopus 로고    scopus 로고
    • Web Services Trust Language (WS-Trust), February 2005.
    • Web Services Trust Language (WS-Trust), February 2005.
  • 3
    • 58449096975 scopus 로고    scopus 로고
    • Web Services Federation Language (WS-Federation) 1.1, December 2006.
    • Web Services Federation Language (WS-Federation) 1.1, December 2006.
  • 4
    • 58449117372 scopus 로고    scopus 로고
    • Web Services Security: SOAP Message Security (WS-Security) 1.1, February 2006.
    • Web Services Security: SOAP Message Security (WS-Security) 1.1, February 2006.
  • 5
    • 58449130971 scopus 로고    scopus 로고
    • Web Services Business Process Execution Language 2.0, April 2007.
    • Web Services Business Process Execution Language 2.0, April 2007.
  • 6
    • 58449110813 scopus 로고    scopus 로고
    • WS-BPEL Extension for People (BPEL4People) 1.0, June 2007.
    • WS-BPEL Extension for People (BPEL4People) 1.0, June 2007.
  • 7
    • 33644973176 scopus 로고    scopus 로고
    • Applying the Tropos Methodology for Analysing Web Services Requirements and Reasoning about Qualities of Services
    • M. Aiello and P. Giorgini. Applying the Tropos Methodology for Analysing Web Services Requirements and Reasoning about Qualities of Services. CEPIS Upgrade - The European journal of the informatics professional, 5(4):20-26, 2004.
    • (2004) CEPIS Upgrade - The European journal of the informatics professional , vol.5 , Issue.4 , pp. 20-26
    • Aiello, M.1    Giorgini, P.2
  • 9
    • 0036721855 scopus 로고    scopus 로고
    • Towards Requirements-Driven Information Systems Engineering: The Tropos Project
    • September
    • J. Castro, M. Kolp, and J. Mylopoulos. Towards Requirements-Driven Information Systems Engineering: The Tropos Project. Information Systems, 27(6):365-389, September 2002.
    • (2002) Information Systems , vol.27 , Issue.6 , pp. 365-389
    • Castro, J.1    Kolp, M.2    Mylopoulos, J.3
  • 14
    • 36649031341 scopus 로고    scopus 로고
    • From Early Requirements Analysis towards Secure Workflows
    • Technical Report DIT-07-036, University of Trento, May
    • G. Frankova, F. Massacci, and M. Seguran. From Early Requirements Analysis towards Secure Workflows. Technical Report DIT-07-036, University of Trento, May 2007.
    • (2007)
    • Frankova, G.1    Massacci, F.2    Seguran, M.3
  • 27
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting Security Requirements with Misuse Cases
    • January
    • G. Sindre and A. Opdahl. Eliciting Security Requirements with Misuse Cases. Requirements Engineering, 10(1):34-44, January 2005.
    • (2005) Requirements Engineering , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.2
  • 29
    • 77952351793 scopus 로고    scopus 로고
    • TCG Specification Architecture Overview Revision 1.2
    • Trusted Computing Group, April
    • Trusted Computing Group. TCG Specification Architecture Overview Revision 1.2, April 2003.
    • (2003)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.