메뉴 건너뛰기




Volumn 55, Issue 4, 2009, Pages 211-223

Model-driven business process security requirement specification

Author keywords

Access control; Business process; Model transformation; Security annotations; Web service security

Indexed keywords

BUSINESS PROCESS; BUSINESS PROCESS MODELLING; MANUAL FASHIONS; MODEL TRANSFORMATION; MODEL-DRIVEN; POLICY CONSTRAINTS; PROCESS MODELS; SECURITY ANNOTATIONS; SECURITY GOALS; SECURITY IMPLEMENTATIONS; SECURITY POLICIES; SERVICE-ORIENTED ARCHITECTURES; TARGET LANGUAGES; WEB SERVICE SECURITY;

EID: 63949084590     PISSN: 13837621     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.sysarc.2008.10.002     Document Type: Article
Times cited : (102)

References (34)
  • 1
    • 33748417848 scopus 로고    scopus 로고
    • Integration of risk identification with business process models
    • Lambert J.H., Jennings R.K., and Joshi N.N. Integration of risk identification with business process models. Syst. Eng. 9 3 (2006) 187-198
    • (2006) Syst. Eng. , vol.9 , Issue.3 , pp. 187-198
    • Lambert, J.H.1    Jennings, R.K.2    Joshi, N.N.3
  • 2
    • 38049132539 scopus 로고    scopus 로고
    • Modeling of task-based authorization constraints in BPMN
    • BPM, Springer
    • Wolter C., and Schaad A. Modeling of task-based authorization constraints in BPMN. BPM. Lecture Notes in Computer Science vol. 4714 (2007), Springer 64-79
    • (2007) Lecture Notes in Computer Science , vol.4714 , pp. 64-79
    • Wolter, C.1    Schaad, A.2
  • 3
    • 33750083883 scopus 로고    scopus 로고
    • Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini, Towards a UML 2.0 extension for the modeling of security requirements in business processes, in: TrustBus, 2006, pp. 51-61.
    • Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini, Towards a UML 2.0 extension for the modeling of security requirements in business processes, in: TrustBus, 2006, pp. 51-61.
  • 5
    • 33748067444 scopus 로고    scopus 로고
    • A model-checking approach to analysing organisational controls in a loan origination process
    • SACMAT'06, ACM, New York, NY, USA
    • Schaad A., Lotz V., and Sohr K. A model-checking approach to analysing organisational controls in a loan origination process. SACMAT'06. ACM Symposium on Access Control Models and Technologies (2006), ACM, New York, NY, USA 139-149
    • (2006) ACM Symposium on Access Control Models and Technologies , pp. 139-149
    • Schaad, A.1    Lotz, V.2    Sohr, K.3
  • 6
    • 33846674492 scopus 로고    scopus 로고
    • Introduction to the octave approach
    • Carnegie Mellon Software Engineering Institute, Pittsburgh, PA, USA
    • Alberts C., Dorofee A., Stevens J., and Woody C. Introduction to the octave approach. Networked Systems Survivability Program (2003), Carnegie Mellon Software Engineering Institute, Pittsburgh, PA, USA
    • (2003) Networked Systems Survivability Program
    • Alberts, C.1    Dorofee, A.2    Stevens, J.3    Woody, C.4
  • 7
    • 29744447253 scopus 로고    scopus 로고
    • Business-driven application security: from modeling to managing secure applications
    • Nagaratnam N., Nadalin A., Hondo M., McIntosh M., and Austel P. Business-driven application security: from modeling to managing secure applications. IBM Syst. J. 44 4 (2005)
    • (2005) IBM Syst. J. , vol.44 , Issue.4
    • Nagaratnam, N.1    Nadalin, A.2    Hondo, M.3    McIntosh, M.4    Austel, P.5
  • 8
    • 0038825675 scopus 로고    scopus 로고
    • Task-role-based access control model
    • Oh S., and Park S. Task-role-based access control model. Inform. Syst. 28 6 (2003) 533-562
    • (2003) Inform. Syst. , vol.28 , Issue.6 , pp. 533-562
    • Oh, S.1    Park, S.2
  • 10
    • 63849344981 scopus 로고    scopus 로고
    • P van der Aalst, Dumas Marlon, ter Hofstede, Arthur H.M. Translating BPMN to BPEL
    • BPM-06-02, 2006
    • Chun Ouyang, Wil M.P van der Aalst, Dumas Marlon, ter Hofstede, Arthur H.M. Translating BPMN to BPEL, in BPM Center Report BPM-06-02, 2006.
    • in BPM Center Report
    • Chun, O.1    Wil, M.2
  • 14
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • Sandhu R.S., and Coyne E.J. Role-based access control models. IEEE Comput. 29 (1996) 38-47
    • (1996) IEEE Comput. , vol.29 , pp. 38-47
    • Sandhu, R.S.1    Coyne, E.J.2
  • 15
    • 63949085114 scopus 로고    scopus 로고
    • Roshan K. Thomas, Ravi S. Sandhu, Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented autorization management, in: DBSec, 1997, pp. 166-181.
    • Roshan K. Thomas, Ravi S. Sandhu, Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented autorization management, in: DBSec, 1997, pp. 166-181.
  • 16
    • 38949168454 scopus 로고    scopus 로고
    • An attribute-based access control model for web services
    • IEEE Computer Society pp. 74-79
    • Shen H.b., and Hong F. An attribute-based access control model for web services. PDCAT (2006), IEEE Computer Society pp. 74-79
    • (2006) PDCAT
    • Shen, H.b.1    Hong, F.2
  • 18
    • 63949084817 scopus 로고    scopus 로고
    • and hierarchical role based access control (RBAC) profile of XACML v2.0. OASIS Standard
    • Anne Anderson, Core and hierarchical role based access control (RBAC) profile of XACML v2.0. OASIS Standard, 2005.
    • (2005)
    • Anne Anderson, C.1
  • 19
    • 63949088520 scopus 로고    scopus 로고
    • Jothy Rosenberg, David Remy, Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption, year = 2004, isbn = 0672326515, publisher = Pearson Higher Education.
    • Jothy Rosenberg, David Remy, Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption, year = 2004, isbn = 0672326515, publisher = Pearson Higher Education.
  • 20
    • 63949086372 scopus 로고    scopus 로고
    • Mordechai Ben-Ari, Principles of the Spin Model Checker
    • Mordechai Ben-Ari, Principles of the Spin Model Checker.
  • 24
    • 84944044323 scopus 로고    scopus 로고
    • Till Mossakowski, Michael Drouineaud, Karsten Sohr, A temporal-logic extension of role-based access control covering dynamic separation of duties, in: TIME, 2003, pp. 83-90.
    • Till Mossakowski, Michael Drouineaud, Karsten Sohr, A temporal-logic extension of role-based access control covering dynamic separation of duties, in: TIME, 2003, pp. 83-90.
  • 25
    • 0003697514 scopus 로고
    • Center for the Study of Language and Information, Stanford, CA, USA
    • Goldblatt R. Logics of Time Computation (1987), Center for the Study of Language and Information, Stanford, CA, USA
    • (1987) Logics of Time Computation
    • Goldblatt, R.1
  • 26
    • 4744347868 scopus 로고    scopus 로고
    • Best-practice patterns and tool support for configuring secure web services messaging
    • IEEE Computer Society pp. 244-251
    • Tatsubori M., Imamura T., and Nakamura Y. Best-practice patterns and tool support for configuring secure web services messaging. ICWS (2004), IEEE Computer Society pp. 244-251
    • (2004) ICWS
    • Tatsubori, M.1    Imamura, T.2    Nakamura, Y.3
  • 27
    • 63949084283 scopus 로고    scopus 로고
    • A business process-centered approach for modeling enterprise architectures
    • Torben Schreiter, Guido Laures, A business process-centered approach for modeling enterprise architectures, in: Proceedings of EMISA, 2006.
    • (2006) Proceedings of EMISA
    • Schreiter, T.1    Laures, G.2
  • 28
    • 0041880193 scopus 로고    scopus 로고
    • Vijayalakshmi Atluri, Secureflow: A secure web-enabled workflow management system
    • Wei kuang Huang, Vijayalakshmi Atluri, Secureflow: a secure web-enabled workflow management system, in: ACM Workshop on Role-Based Access Control, 1999, pp. 83-94.
    • (1999) ACM Workshop on Role-Based Access Control , pp. 83-94
    • Wei kuang Huang1
  • 32
    • 33646699357 scopus 로고    scopus 로고
    • Security ontology for annotating resources
    • Anya Kim, Jim Luo, Myong H. Kang, Security ontology for annotating resources, in: OTM Conferences, vol. 2, 2005, pp. 1483-1499.
    • (2005) OTM Conferences , vol.2 , pp. 1483-1499
    • Kim, A.1    Luo, J.2    Kang, M.H.3
  • 33
    • 0242371001 scopus 로고    scopus 로고
    • Grit Denker, Lalana Kagal, Tim Finin, Massimo Paolucci, Katia Sycara, Security for daml web services: annotation and matchmaking, in: The SemanticWeb - ISWC 2003, 2870/2003, 2005, pp. 335-350.
    • Grit Denker, Lalana Kagal, Tim Finin, Massimo Paolucci, Katia Sycara, Security for daml web services: annotation and matchmaking, in: The SemanticWeb - ISWC 2003, 2870/2003, 2005, pp. 335-350.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.