메뉴 건너뛰기




Volumn , Issue , 2009, Pages 41-48

Security requirements specification in service-oriented business process management

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACT LEVELS; BUSINESS PROCESS; BUSINESS PROCESS MANAGEMENT; BUSINESS PROCESS MODELLING; MODEL DRIVEN APPROACH; ORGANISATIONAL LEVEL; SECURITY ELEMENTS; SECURITY MECHANISM; SECURITY MODEL; SECURITY PATTERNS; SECURITY REQUIREMENTS; SECURITY RISKS; SERVICE ORIENTED; SERVICE-BASED SYSTEMS; SOFTWARE COMPONENT; TECHNICAL LEVELS; WORK-FLOWS;

EID: 70349683196     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2009.90     Document Type: Conference Paper
Times cited : (99)

References (39)
  • 3
    • 84859973861 scopus 로고    scopus 로고
    • Modelling security goals in business processes
    • 978-3-88579-221-5. GI LNI, Berlin, Germany, 1008
    • C. Wolter, M. Menzel, and C. Meinel, "Modelling security goals in business processes," in Proc. GI Modellierung 2008, no. ISBN 978-3-88579-221-5. GI LNI, Berlin, Germany, 1008.
    • Proc. GI Modellierung 2008 , Issue.ISBN
    • Wolter, C.1    Menzel, M.2    Meinel, C.3
  • 4
    • 38049132539 scopus 로고    scopus 로고
    • Modeling of task-based authorization constraints in bpmn
    • C. Wolter and A. Schaad, "Modeling of task-based authorization constraints in bpmn," in BPM, 2007, pp. 64-79.
    • (2007) BPM , pp. 64-79
    • Wolter, C.1    Schaad, A.2
  • 5
    • 34247151648 scopus 로고    scopus 로고
    • A bpmn extension for the modeling of security requirements in business processes
    • A. Rodríguez, E. Fernández-Medina, and M. Piattini, "A bpmn extension for the modeling of security requirements in business processes," IEICE Transactions, vol. 90-D, no. 4, pp. 745-752, 2007.
    • (2007) IEICE Transactions , vol.90-D , Issue.4 , pp. 745-752
    • Rodríguez, A.1    Fernández-Medina, E.2    Piattini, M.3
  • 7
    • 0141862713 scopus 로고    scopus 로고
    • The meanings of trust,
    • Technical Report, University of Minnesota
    • D. H. McKnight and N. L. Chervany, "The meanings of trust," Technical Report, University of Minnesota, 1996.
    • (1996)
    • McKnight, D.H.1    Chervany, N.L.2
  • 8
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • R. S. Sandhu and E. J. Coyne, "Role-based access control models," IEEE Computer, vol. 29, pp. 38-47, 1996.
    • (1996) IEEE Computer , vol.29 , pp. 38-47
    • Sandhu, R.S.1    Coyne, E.J.2
  • 9
    • 0002841051 scopus 로고    scopus 로고
    • Task-based authorization controls (tbac): A family of models for active and enterprise-oriented autorization management
    • R. K. Thomas and R. S. Sandhu, "Task-based authorization controls (tbac): A family of models for active and enterprise-oriented autorization management," in DBSec, 1997, pp. 166-181.
    • (1997) DBSec , pp. 166-181
    • Thomas, R.K.1    Sandhu, R.S.2
  • 10
    • 38949168454 scopus 로고    scopus 로고
    • An attribute-based access control model for web services
    • IEEE Computer Society
    • H. bo Shen and F. Hong, "An attribute-based access control model for web services," in pdcat. IEEE Computer Society, 2006, pp. 74-79.
    • (2006) pdcat , pp. 74-79
    • bo Shen, H.1    Hong, F.2
  • 11
    • 85045159537 scopus 로고
    • Role activation conflict: A study of industrial inspection
    • D. Pugh, "Role activation conflict: A study of industrial inspection." American Sociological Review, vol. 31:835-42, 1966.
    • (1966) American Sociological Review , vol.31 , pp. 835-842
    • Pugh, D.1
  • 12
    • 70349658168 scopus 로고    scopus 로고
    • Using quantified trust level to describe authentication requirements in federated identity management
    • I. Thomas, M. Menzel, and C. Meinel, "Using quantified trust level to describe authentication requirements in federated identity management," in Proc SWS, 2008.
    • (2008) Proc SWS
    • Thomas, I.1    Menzel, M.2    Meinel, C.3
  • 13
    • 33845548325 scopus 로고    scopus 로고
    • Attacking and defending web services
    • Online, Available
    • P. Lindstrom, "Attacking and defending web services, a spire research report," 2004. [Online]. Available: http://forumsystems.com/ papers/Attacking-and-Defending-WS.pdf
    • (2004) a spire research report
    • Lindstrom, P.1
  • 17
    • 84859973861 scopus 로고    scopus 로고
    • Modelling security goals in business processes
    • 978-3-88579-221-5. GI LNI, Berlin, Germany, 1008
    • C. Wolter, M. Menzel, and C. Meinel, "Modelling security goals in business processes," in Proc. GI Modellierung 2008, no. ISBN 978-3-88579-221-5. GI LNI, Berlin, Germany, 1008.
    • Proc. GI Modellierung 2008 , Issue.ISBN
    • Wolter, C.1    Menzel, M.2    Meinel, C.3
  • 19
    • 34548122074 scopus 로고    scopus 로고
    • Architectural patterns for enabling application security
    • J. Yoder and J. Barcalow, "Architectural patterns for enabling application security," in PLoP, 1997.
    • (1997) PLoP
    • Yoder, J.1    Barcalow, J.2
  • 21
    • 70349670676 scopus 로고    scopus 로고
    • M. Schumacher, Security Engineering with Patterns - Origins,Theoretical Model, and New Applications. Springer, Berlin, 2003, no. ISBN 3-540-40731-6.
    • M. Schumacher, Security Engineering with Patterns - Origins,Theoretical Model, and New Applications. Springer, Berlin, 2003, no. ISBN 3-540-40731-6.
  • 22
    • 70349693562 scopus 로고    scopus 로고
    • F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad, and M. Stal, Pattern-Oriented Software Architecture: A System of Pattern. John Wiley & Sons, Ltd, 1996.
    • F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad, and M. Stal, Pattern-Oriented Software Architecture: A System of Pattern. John Wiley & Sons, Ltd, 1996.
  • 26
    • 70349658167 scopus 로고    scopus 로고
    • S. A. et. al., Apache rampart : Ws-security module for axis2, 2008. [Online]. Available: http://ws.apache.org/axis2/modules/rampart/1-0/ security-module.html
    • S. A. et. al., "Apache rampart : Ws-security module for axis2," 2008. [Online]. Available: http://ws.apache.org/axis2/modules/rampart/1-0/ security-module.html
  • 27
    • 70349682045 scopus 로고    scopus 로고
    • Web services policy 1.2 - framework (wspolicy)
    • April 2005, Online, Available
    • S. Bajaj, D. Box, and et. al., "Web services policy 1.2 - framework (wspolicy)," Public Draft Specification, April 2005. [Online]. Available: "http://www.w3.org/Submission/WS-Policy/"
    • Public Draft Specification
    • Bajaj, S.1    Box, D.2    and et., al.3
  • 29
    • 4744347868 scopus 로고    scopus 로고
    • Best-practice patterns and tool support for configuring secure web services messaging
    • M. Tatsubori, T. Imamura, and Y. Nakamura, "Best-practice patterns and tool support for configuring secure web services messaging," in ICWS, 2004, pp. 244-251.
    • (2004) ICWS , pp. 244-251
    • Tatsubori, M.1    Imamura, T.2    Nakamura, Y.3
  • 30
    • 29744447253 scopus 로고    scopus 로고
    • Business-driven application security: From Modeling to Managing Secure Applications
    • N. Nagaratnam, A. Nadalin, M. Hondo, M. McIntosh, and P. Austel, "Business-driven application security: From Modeling to Managing Secure Applications," IBM Systems Journal, Vol 44, No 4, 2005.
    • (2005) IBM Systems Journal , vol.44 , Issue.4
    • Nagaratnam, N.1    Nadalin, A.2    Hondo, M.3    McIntosh, M.4    Austel, P.5
  • 31
    • 33750083883 scopus 로고    scopus 로고
    • Towards a uml 2.0 extension for the modeling of security requirements in business processes
    • A. Rodríguez, E. Fernández-Medina, and M. Piattini, "Towards a uml 2.0 extension for the modeling of security requirements in business processes," in TrustBus, 2006, pp. 51-61.
    • (2006) TrustBus , pp. 51-61
    • Rodríguez, A.1    Fernández-Medina, E.2    Piattini, M.3
  • 32
    • 38049100950 scopus 로고    scopus 로고
    • Towards cim to pim transformation: From secure business processes defined in bpmn to use-cases
    • A. Rodriguez, E. Fernandez-Medina, and M. Piattini, "Towards cim to pim transformation: From secure business processes defined in bpmn to use-cases," in BPM, 2007, pp. 408-415.
    • (2007) BPM , pp. 408-415
    • Rodriguez, A.1    Fernandez-Medina, E.2    Piattini, M.3
  • 33
    • 38049150939 scopus 로고    scopus 로고
    • Modeling control objectives for business process compliance
    • S. W. Sadiq, G. Governatori, and K. Namiri, "Modeling control objectives for business process compliance," in BPM, 2007, pp. 149-164.
    • (2007) BPM , pp. 149-164
    • Sadiq, S.W.1    Governatori, G.2    Namiri, K.3
  • 35
    • 0141733117 scopus 로고    scopus 로고
    • Modelling access policies using roles in requirements engineering
    • R. Crook, D. C. Ince, and B. Nuseibeh, "Modelling access policies using roles in requirements engineering," Information & Software Technology, vol. 45, no. 14, pp. 979-991, 2003.
    • (2003) Information & Software Technology , vol.45 , Issue.14 , pp. 979-991
    • Crook, R.1    Ince, D.C.2    Nuseibeh, B.3
  • 38
    • 33748417848 scopus 로고    scopus 로고
    • Integration of risk identification with business process models
    • J. H. Lambert, R. K. Jennings, and N. N. Joshi, "Integration of risk identification with business process models," Syst. Eng., vol. 9, no. 3, pp. 187-198, 2006.
    • (2006) Syst. Eng , vol.9 , Issue.3 , pp. 187-198
    • Lambert, J.H.1    Jennings, R.K.2    Joshi, N.N.3
  • 39
    • 70349663595 scopus 로고    scopus 로고
    • M. Menzel, C. Wolter, and C. Meinel, Towards the aggregation of security requirements in cross-organisational service compositions, in Proc. 11th BIS, no. ISBN: 978-3-540-79396-3. Springer LNCS, Innsbruck, Austria, May 2008.
    • M. Menzel, C. Wolter, and C. Meinel, "Towards the aggregation of security requirements in cross-organisational service compositions," in Proc. 11th BIS, no. ISBN: 978-3-540-79396-3. Springer LNCS, Innsbruck, Austria, May 2008.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.