-
2
-
-
70349661312
-
Modeldriven business process security requirement specification
-
Special Issue on Secure Web Services
-
C. Wolter, M. Menzel, A. Schaad, P. Miseldine, and C. Meinel, "Modeldriven business process security requirement specification," Journal of Systems Architecture Special Issue on Secure Web Services, 2008.
-
(2008)
Journal of Systems Architecture
-
-
Wolter, C.1
Menzel, M.2
Schaad, A.3
Miseldine, P.4
Meinel, C.5
-
3
-
-
84859973861
-
Modelling security goals in business processes
-
978-3-88579-221-5. GI LNI, Berlin, Germany, 1008
-
C. Wolter, M. Menzel, and C. Meinel, "Modelling security goals in business processes," in Proc. GI Modellierung 2008, no. ISBN 978-3-88579-221-5. GI LNI, Berlin, Germany, 1008.
-
Proc. GI Modellierung 2008
, Issue.ISBN
-
-
Wolter, C.1
Menzel, M.2
Meinel, C.3
-
4
-
-
38049132539
-
Modeling of task-based authorization constraints in bpmn
-
C. Wolter and A. Schaad, "Modeling of task-based authorization constraints in bpmn," in BPM, 2007, pp. 64-79.
-
(2007)
BPM
, pp. 64-79
-
-
Wolter, C.1
Schaad, A.2
-
5
-
-
34247151648
-
A bpmn extension for the modeling of security requirements in business processes
-
A. Rodríguez, E. Fernández-Medina, and M. Piattini, "A bpmn extension for the modeling of security requirements in business processes," IEICE Transactions, vol. 90-D, no. 4, pp. 745-752, 2007.
-
(2007)
IEICE Transactions
, vol.90-D
, Issue.4
, pp. 745-752
-
-
Rodríguez, A.1
Fernández-Medina, E.2
Piattini, M.3
-
7
-
-
0141862713
-
The meanings of trust,
-
Technical Report, University of Minnesota
-
D. H. McKnight and N. L. Chervany, "The meanings of trust," Technical Report, University of Minnesota, 1996.
-
(1996)
-
-
McKnight, D.H.1
Chervany, N.L.2
-
8
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu and E. J. Coyne, "Role-based access control models," IEEE Computer, vol. 29, pp. 38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
-
9
-
-
0002841051
-
Task-based authorization controls (tbac): A family of models for active and enterprise-oriented autorization management
-
R. K. Thomas and R. S. Sandhu, "Task-based authorization controls (tbac): A family of models for active and enterprise-oriented autorization management," in DBSec, 1997, pp. 166-181.
-
(1997)
DBSec
, pp. 166-181
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
10
-
-
38949168454
-
An attribute-based access control model for web services
-
IEEE Computer Society
-
H. bo Shen and F. Hong, "An attribute-based access control model for web services," in pdcat. IEEE Computer Society, 2006, pp. 74-79.
-
(2006)
pdcat
, pp. 74-79
-
-
bo Shen, H.1
Hong, F.2
-
11
-
-
85045159537
-
Role activation conflict: A study of industrial inspection
-
D. Pugh, "Role activation conflict: A study of industrial inspection." American Sociological Review, vol. 31:835-42, 1966.
-
(1966)
American Sociological Review
, vol.31
, pp. 835-842
-
-
Pugh, D.1
-
12
-
-
70349658168
-
Using quantified trust level to describe authentication requirements in federated identity management
-
I. Thomas, M. Menzel, and C. Meinel, "Using quantified trust level to describe authentication requirements in federated identity management," in Proc SWS, 2008.
-
(2008)
Proc SWS
-
-
Thomas, I.1
Menzel, M.2
Meinel, C.3
-
13
-
-
33845548325
-
Attacking and defending web services
-
Online, Available
-
P. Lindstrom, "Attacking and defending web services, a spire research report," 2004. [Online]. Available: http://forumsystems.com/ papers/Attacking-and-Defending-WS.pdf
-
(2004)
a spire research report
-
-
Lindstrom, P.1
-
15
-
-
33750050331
-
-
John Wiley & Sons, Ltd
-
M. Schumacher, E. Fernandez-Buglioni, D. Hybertson, F. Buschmann, and P. Sommerlad, Security Patterns - Integrating Security and System Engineering. John Wiley & Sons, Ltd, 2006.
-
(2006)
Security Patterns - Integrating Security and System Engineering
-
-
Schumacher, M.1
Fernandez-Buglioni, E.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
17
-
-
84859973861
-
Modelling security goals in business processes
-
978-3-88579-221-5. GI LNI, Berlin, Germany, 1008
-
C. Wolter, M. Menzel, and C. Meinel, "Modelling security goals in business processes," in Proc. GI Modellierung 2008, no. ISBN 978-3-88579-221-5. GI LNI, Berlin, Germany, 1008.
-
Proc. GI Modellierung 2008
, Issue.ISBN
-
-
Wolter, C.1
Menzel, M.2
Meinel, C.3
-
18
-
-
36249002222
-
Reference model for service oriented architecture 1.0
-
February
-
M. MacKenzie, K. Laskey, F. McCabe, P. Brown, and R. Metz, "Reference model for service oriented architecture 1.0," OASIS Committee Specification, February 2006.
-
(2006)
OASIS Committee Specification
-
-
MacKenzie, M.1
Laskey, K.2
McCabe, F.3
Brown, P.4
Metz, R.5
-
19
-
-
34548122074
-
Architectural patterns for enabling application security
-
J. Yoder and J. Barcalow, "Architectural patterns for enabling application security," in PLoP, 1997.
-
(1997)
PLoP
-
-
Yoder, J.1
Barcalow, J.2
-
20
-
-
0003752204
-
-
Oxford University Press
-
C. Alexander, S. Ishikawa, M. Silverstein, M. Jacobsen, I. Fiksdahl-King, and S. Angel, A Pattern Lanuage: Towns - Buildings - Construction. Oxford University Press, 1977.
-
(1977)
A Pattern Lanuage: Towns - Buildings - Construction
-
-
Alexander, C.1
Ishikawa, S.2
Silverstein, M.3
Jacobsen, M.4
Fiksdahl-King, I.5
Angel, S.6
-
21
-
-
70349670676
-
-
M. Schumacher, Security Engineering with Patterns - Origins,Theoretical Model, and New Applications. Springer, Berlin, 2003, no. ISBN 3-540-40731-6.
-
M. Schumacher, Security Engineering with Patterns - Origins,Theoretical Model, and New Applications. Springer, Berlin, 2003, no. ISBN 3-540-40731-6.
-
-
-
-
22
-
-
70349693562
-
-
F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad, and M. Stal, Pattern-Oriented Software Architecture: A System of Pattern. John Wiley & Sons, Ltd, 1996.
-
F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad, and M. Stal, Pattern-Oriented Software Architecture: A System of Pattern. John Wiley & Sons, Ltd, 1996.
-
-
-
-
24
-
-
42449139876
-
A survey on security patterns
-
N. Yoshioka, H. Washizaki, and K. Maruyama, "A survey on security patterns," Progress in Informatics, vol. 5, pp. 35-47, 2008.
-
(2008)
Progress in Informatics
, vol.5
, pp. 35-47
-
-
Yoshioka, N.1
Washizaki, H.2
Maruyama, K.3
-
25
-
-
38949205195
-
Axis2, middleware for next generation web services
-
S. Perera, C. Herath, J. Ekanayake, E. Chinthaka, A. Ranabahu, D. Jayasinghe, S. Weerawarana, and G. Daniels, "Axis2, middleware for next generation web services." in ICWS. IEEE Computer Society, 2006.
-
(2006)
ICWS. IEEE Computer Society
-
-
Perera, S.1
Herath, C.2
Ekanayake, J.3
Chinthaka, E.4
Ranabahu, A.5
Jayasinghe, D.6
Weerawarana, S.7
Daniels, G.8
-
26
-
-
70349658167
-
-
S. A. et. al., Apache rampart : Ws-security module for axis2, 2008. [Online]. Available: http://ws.apache.org/axis2/modules/rampart/1-0/ security-module.html
-
S. A. et. al., "Apache rampart : Ws-security module for axis2," 2008. [Online]. Available: http://ws.apache.org/axis2/modules/rampart/1-0/ security-module.html
-
-
-
-
27
-
-
70349682045
-
Web services policy 1.2 - framework (wspolicy)
-
April 2005, Online, Available
-
S. Bajaj, D. Box, and et. al., "Web services policy 1.2 - framework (wspolicy)," Public Draft Specification, April 2005. [Online]. Available: "http://www.w3.org/Submission/WS-Policy/"
-
Public Draft Specification
-
-
Bajaj, S.1
Box, D.2
and et., al.3
-
28
-
-
24344435004
-
-
Pearson Higher Education
-
J. Rosenberg and D. Remy, Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption. Pearson Higher Education, 2004.
-
(2004)
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
-
-
Rosenberg, J.1
Remy, D.2
-
29
-
-
4744347868
-
Best-practice patterns and tool support for configuring secure web services messaging
-
M. Tatsubori, T. Imamura, and Y. Nakamura, "Best-practice patterns and tool support for configuring secure web services messaging," in ICWS, 2004, pp. 244-251.
-
(2004)
ICWS
, pp. 244-251
-
-
Tatsubori, M.1
Imamura, T.2
Nakamura, Y.3
-
30
-
-
29744447253
-
Business-driven application security: From Modeling to Managing Secure Applications
-
N. Nagaratnam, A. Nadalin, M. Hondo, M. McIntosh, and P. Austel, "Business-driven application security: From Modeling to Managing Secure Applications," IBM Systems Journal, Vol 44, No 4, 2005.
-
(2005)
IBM Systems Journal
, vol.44
, Issue.4
-
-
Nagaratnam, N.1
Nadalin, A.2
Hondo, M.3
McIntosh, M.4
Austel, P.5
-
31
-
-
33750083883
-
Towards a uml 2.0 extension for the modeling of security requirements in business processes
-
A. Rodríguez, E. Fernández-Medina, and M. Piattini, "Towards a uml 2.0 extension for the modeling of security requirements in business processes," in TrustBus, 2006, pp. 51-61.
-
(2006)
TrustBus
, pp. 51-61
-
-
Rodríguez, A.1
Fernández-Medina, E.2
Piattini, M.3
-
32
-
-
38049100950
-
Towards cim to pim transformation: From secure business processes defined in bpmn to use-cases
-
A. Rodriguez, E. Fernandez-Medina, and M. Piattini, "Towards cim to pim transformation: From secure business processes defined in bpmn to use-cases," in BPM, 2007, pp. 408-415.
-
(2007)
BPM
, pp. 408-415
-
-
Rodriguez, A.1
Fernandez-Medina, E.2
Piattini, M.3
-
33
-
-
38049150939
-
Modeling control objectives for business process compliance
-
S. W. Sadiq, G. Governatori, and K. Namiri, "Modeling control objectives for business process compliance," in BPM, 2007, pp. 149-164.
-
(2007)
BPM
, pp. 149-164
-
-
Sadiq, S.W.1
Governatori, G.2
Namiri, K.3
-
35
-
-
0141733117
-
Modelling access policies using roles in requirements engineering
-
R. Crook, D. C. Ince, and B. Nuseibeh, "Modelling access policies using roles in requirements engineering," Information & Software Technology, vol. 45, no. 14, pp. 979-991, 2003.
-
(2003)
Information & Software Technology
, vol.45
, Issue.14
, pp. 979-991
-
-
Crook, R.1
Ince, D.C.2
Nuseibeh, B.3
-
38
-
-
33748417848
-
Integration of risk identification with business process models
-
J. H. Lambert, R. K. Jennings, and N. N. Joshi, "Integration of risk identification with business process models," Syst. Eng., vol. 9, no. 3, pp. 187-198, 2006.
-
(2006)
Syst. Eng
, vol.9
, Issue.3
, pp. 187-198
-
-
Lambert, J.H.1
Jennings, R.K.2
Joshi, N.N.3
-
39
-
-
70349663595
-
-
M. Menzel, C. Wolter, and C. Meinel, Towards the aggregation of security requirements in cross-organisational service compositions, in Proc. 11th BIS, no. ISBN: 978-3-540-79396-3. Springer LNCS, Innsbruck, Austria, May 2008.
-
M. Menzel, C. Wolter, and C. Meinel, "Towards the aggregation of security requirements in cross-organisational service compositions," in Proc. 11th BIS, no. ISBN: 978-3-540-79396-3. Springer LNCS, Innsbruck, Austria, May 2008.
-
-
-
|