메뉴 건너뛰기




Volumn 51, Issue 12, 2009, Pages 1712-1738

The practical application of a process for eliciting and designing security in web service systems

Author keywords

Application information security; Design methodology; Software process; Web Services Security

Indexed keywords

BEST PRACTICE; DESIGN METHODOLOGY; DISTRIBUTED SOFTWARE; INTER-ENTERPRISE; INTER-ORGANIZATIONAL INFORMATION SYSTEM; REFERENCE SOLUTION; RISK ANALYSIS AND MANAGEMENT; SECURITY ARCHITECTURE; SECURITY PATTERNS; SECURITY REQUIREMENTS; SECURITY RISK ASSESSMENTS; SECURITY STANDARDS; SOFTWARE PROCESS; WEB SERVICE SECURITY; WEB SERVICE SYSTEMS; WEB SERVICES SECURITY;

EID: 70349473097     PISSN: 09505849     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.infsof.2009.05.004     Document Type: Article
Times cited : (19)

References (55)
  • 1
    • 17044391834 scopus 로고    scopus 로고
    • Trustworthy web services: actions for now
    • Zhang J. Trustworthy web services: actions for now. IEEE IT Pro 7 1 (2005) 32-36
    • (2005) IEEE IT Pro , vol.7 , Issue.1 , pp. 32-36
    • Zhang, J.1
  • 3
    • 11044225410 scopus 로고    scopus 로고
    • WS-NonexistentStandards
    • Vinoski S. WS-NonexistentStandards. IEEE Internet Comput. 8 6 (2004) 94-96
    • (2004) IEEE Internet Comput. , vol.8 , Issue.6 , pp. 94-96
    • Vinoski, S.1
  • 9
    • 70349473689 scopus 로고    scopus 로고
    • K. Leune, M. Papazaglou, Specification and querying of security constraints in the EFSOC framework, in: International Conference on Service Oriented Computing, Willem-Jan van den Heuvel, New York City, USA
    • K. Leune, M. Papazaglou, Specification and querying of security constraints in the EFSOC framework, in: International Conference on Service Oriented Computing, Willem-Jan van den Heuvel, New York City, USA.
  • 11
    • 18944368586 scopus 로고    scopus 로고
    • Towards a model-based and incremental development process for service-based systems
    • Innsbruck, Austria
    • M. Deubler et al., Towards a model-based and incremental development process for service-based systems, in: The IASTED Conference on Software Engineering (IASTED SE 2004), Innsbruck, Austria, 2004.
    • (2004) The IASTED Conference on Software Engineering (IASTED SE
    • Deubler, M.1
  • 12
    • 33749040692 scopus 로고    scopus 로고
    • Model-driven security based on a web services security architecture
    • IEEE Computer Society, Orlando, Florida, USA
    • Nakamura Y., et al. Model-driven security based on a web services security architecture. IEEE International Conference on Services Computing (SCC'05) (2005), IEEE Computer Society, Orlando, Florida, USA
    • (2005) IEEE International Conference on Services Computing (SCC'05)
    • Nakamura, Y.1
  • 13
    • 29744447253 scopus 로고    scopus 로고
    • Business-driven application security: from modeling to managing secure applications
    • Nagaratnam N., et al. Business-driven application security: from modeling to managing secure applications. IBM Syst. J. 44 4 (2005) 847-867
    • (2005) IBM Syst. J. , vol.44 , Issue.4 , pp. 847-867
    • Nagaratnam, N.1
  • 14
    • 68249145249 scopus 로고    scopus 로고
    • Web service engineering - advancing a new software engineering
    • Springer, Sydney, Australia
    • Breu M., et al. Web service engineering - advancing a new software engineering. 5th International Conference on Web Engineering (ICWE'05) (2005), Springer, Sydney, Australia
    • (2005) 5th International Conference on Web Engineering (ICWE'05)
    • Breu, M.1
  • 16
    • 70349477498 scopus 로고    scopus 로고
    • IEEE, IEEE Std 1471-2000, IEEE Recommended Practice for Architectural Description of Software-Intensive Systems - Description, 2000.
    • IEEE, IEEE Std 1471-2000, IEEE Recommended Practice for Architectural Description of Software-Intensive Systems - Description, 2000.
  • 19
    • 70349473665 scopus 로고    scopus 로고
    • Understanding SOA Security Design and Implementation
    • IBM
    • A. Buecker et al., Understanding SOA Security Design and Implementation, in: IBM Redbooks, IBM, 2007.
    • (2007) IBM Redbooks
    • Buecker, A.1
  • 22
    • 2642549597 scopus 로고    scopus 로고
    • McGraw-Hill, Berkeley, California
    • O'Neill M., et al. Web Services Security (2003), McGraw-Hill, Berkeley, California
    • (2003) Web Services Security
    • O'Neill, M.1
  • 23
    • 70349468822 scopus 로고    scopus 로고
    • Security and privacy for web databases and services
    • Springer-Verlag, Heraklion, Crete, Greece
    • Ferrari E., and Thuraisingham B. Security and privacy for web databases and services. Extending Database Technology (EDBT'04) (2004), Springer-Verlag, Heraklion, Crete, Greece
    • (2004) Extending Database Technology (EDBT'04)
    • Ferrari, E.1    Thuraisingham, B.2
  • 24
    • 1942532238 scopus 로고    scopus 로고
    • XML-Based Specification for Web Services Document Security
    • Bhatti R., et al. XML-Based Specification for Web Services Document Security. IEEE Comput. 37 4 (2004) 41-49
    • (2004) IEEE Comput. , vol.37 , Issue.4 , pp. 41-49
    • Bhatti, R.1
  • 27
    • 0345529051 scopus 로고    scopus 로고
    • S. Chang, Q. Chen, M. Hsu, Managing security policy in large distributed web services environment, in: 27th Annual International Computer Software and Applications Conference COMPSAC'03, Dallas, Texas, 2003
    • S. Chang, Q. Chen, M. Hsu, Managing security policy in large distributed web services environment, in: 27th Annual International Computer Software and Applications Conference (COMPSAC'03), Dallas, Texas, 2003.
  • 28
    • 35048865250 scopus 로고    scopus 로고
    • IBM and Microsoft, Security in a Web Services World
    • IBM and Microsoft, Security in a Web Services World: A Proposed Architecture and Roadmap, 2002.
    • (2002) A Proposed Architecture and Roadmap
  • 29
    • 70349476086 scopus 로고    scopus 로고
    • WS-I, Basic Security Profile Version 1.0, Working Group Draft, 2004
    • WS-I, Basic Security Profile Version 1.0, Working Group Draft, 2004.
  • 30
    • 70349460733 scopus 로고    scopus 로고
    • LibertyAllianceProject, Liberty ID-FF Architecture, Overview, v1.2, 2003.
    • LibertyAllianceProject, Liberty ID-FF Architecture, Overview, v1.2, 2003.
  • 31
    • 70349476085 scopus 로고    scopus 로고
    • W3C, Web Services Architecture, 2004.
    • W3C, Web Services Architecture, 2004.
  • 32
    • 33747165057 scopus 로고    scopus 로고
    • Architectural styles and the design of network-based software architectures
    • University of California, Irvine
    • R.T. Fielding, Architectural styles and the design of network-based software architectures, in: Software Research Group, University of California, Irvine, 2000.
    • (2000) Software Research Group
    • Fielding, R.T.1
  • 34
    • 0024012763 scopus 로고
    • A spiral model of software development and enhancement
    • Boehm B.W. A spiral model of software development and enhancement. IEEE Comput. (1988) 61-72
    • (1988) IEEE Comput. , pp. 61-72
    • Boehm, B.W.1
  • 38
    • 0029408391 scopus 로고
    • The 4 + 1 view model of software architecture
    • Krutchen P. The 4 + 1 view model of software architecture. IEEE Softw. (1995) 42-50
    • (1995) IEEE Softw. , pp. 42-50
    • Krutchen, P.1
  • 39
    • 84944688537 scopus 로고    scopus 로고
    • Developing secure networked web-based systems using model-based risk assessment and UMLSec
    • IEEE Computer Society, Chiangmai, Thailand
    • S.H. Houmb, J. Jürjens, Developing secure networked web-based systems using model-based risk assessment and UMLSec, in: 10th Asian-Pacific Software Engineering Conference (APSEC'03), IEEE Computer Society, Chiangmai, Thailand, 2003.
    • (2003) 10th Asian-Pacific Software Engineering Conference (APSEC'03)
    • Houmb, S.H.1    Jürjens, J.2
  • 40
    • 70349458810 scopus 로고    scopus 로고
    • OMG, UML Profile for Modeling Quality of Service and Fault Tolerance Characteristics and Mechanisms
    • OMG, UML Profile for Modeling Quality of Service and Fault Tolerance Characteristics and Mechanisms, 2004.
    • (2004)
  • 41
    • 70349477476 scopus 로고    scopus 로고
    • WS-I, Security Challenges, Threats and Countermeasures, Versión 1.0, 2005, WS-I
    • WS-I, Security Challenges, Threats and Countermeasures, Versión 1.0, 2005, WS-I.
  • 42
    • 0038226150 scopus 로고    scopus 로고
    • Attack modelling for information security and survivability
    • Software Engineering Institute
    • A.P. Moore, R.J. Ellison, R.C. Linger, Attack modelling for information security and survivability, in: Survivable Systems, Software Engineering Institute, 2001.
    • (2001) Survivable Systems
    • Moore, A.P.1    Ellison, R.J.2    Linger, R.C.3
  • 44
    • 17844409254 scopus 로고    scopus 로고
    • Requirements reuse for improving information systems security: a practitioner's approach
    • Toval A., et al. Requirements reuse for improving information systems security: a practitioner's approach. Require. Eng. J. 6 4 (2001) 205-219
    • (2001) Require. Eng. J. , vol.6 , Issue.4 , pp. 205-219
    • Toval, A.1
  • 45
    • 70349457651 scopus 로고    scopus 로고
    • Security patterns and security requirements for web services
    • Rosado G., et al. Security patterns and security requirements for web services. Internet Res. 16 5 (2006)
    • (2006) Internet Res. , vol.16 , Issue.5
    • Rosado, G.1
  • 47
    • 77953975902 scopus 로고    scopus 로고
    • An advisor for web services security policies
    • ACM Press, Fairfax, VA, USA
    • K. Bhargavan et al., An advisor for web services security policies, in: 2005 Workshop on Secure Web Services, ACM Press, Fairfax, VA, USA, 2005, pp. 1-9.
    • (2005) 2005 Workshop on Secure Web Services , pp. 1-9
    • Bhargavan, K.1
  • 48
    • 70349477690 scopus 로고    scopus 로고
    • Acquiring evolving technologies: Web services standards
    • Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA
    • H.L. Levinson, L. O'Brien, Acquiring evolving technologies: web services standards, in: Acquisition Support Program, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, 2006, p. 64.
    • (2006) Acquisition Support Program , pp. 64
    • Levinson, H.L.1    O'Brien, L.2
  • 49
    • 70349477475 scopus 로고    scopus 로고
    • C.J. Alberts et al, OCTAVE Framework, Version 1.0, in: Networked Systems Survivability Program, Carnegie Mellon, SEI, 1999, p. 84
    • C.J. Alberts et al., OCTAVE Framework, Version 1.0, in: Networked Systems Survivability Program, Carnegie Mellon, SEI, 1999, p. 84.
  • 50
    • 84973181231 scopus 로고
    • Principles of participatory action research
    • McTaggart R. Principles of participatory action research. Adult Educ. Quart. 41 3 (1991)
    • (1991) Adult Educ. Quart. , vol.41 , Issue.3
    • McTaggart, R.1
  • 51
  • 52
    • 0001939240 scopus 로고    scopus 로고
    • Action research
    • Avison D., et al. Action research. Commun. ACM 42 1 (1999) 94-97
    • (1999) Commun. ACM , vol.42 , Issue.1 , pp. 94-97
    • Avison, D.1
  • 53
    • 70349457650 scopus 로고
    • Guidelines for Planning Action Research Projects
    • N. Padak, G. Padak, Guidelines for Planning Action Research Projects, 1994.
    • (1994)
    • Padak, N.1    Padak, G.2
  • 54
    • 0346301645 scopus 로고    scopus 로고
    • What is participatory action research?
    • Wadsworth Y. What is participatory action research?. Action Res. Int. 2 (1998)
    • (1998) Action Res. Int. , vol.2
    • Wadsworth, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.