메뉴 건너뛰기




Volumn 15, Issue 15, 2010, Pages 2916-2936

SeAAs - a reference architecture for security services in SOA

Author keywords

Security as a service; Security requirements; Service oriented architecture

Indexed keywords


EID: 73149108190     PISSN: 0958695X     EISSN: 09486968     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (27)

References (42)
  • 1
    • 44949123778 scopus 로고    scopus 로고
    • A Fair Non-repudiation Service in a Web services Peer-to-peer Environment
    • Agreiter, B. Hafner, M. Breu, R.: "A Fair Non-repudiation Service in a Web services Peer-to-peer Environment"; Computer Standards and Interfaces, 30(6), 372-378, 2008.
    • (2008) Computer Standards and Interfaces , vol.30 , Issue.6 , pp. 372-378
    • Agreiter, B.1    Hafner, M.2    Breu, R.3
  • 2
    • 73149094681 scopus 로고    scopus 로고
    • Modeling and Enforcing Advanced Access Control Policies in Healthcare Systems with SECTET
    • Nashville, USA
    • Alam, M. Hafner, M. Memon, M. Hung, P.: "Modeling and Enforcing Advanced Access Control Policies in Healthcare Systems with SECTET"; In MOTHIS'07: MODELS 2007, Nashville, USA, 2007.
    • (2007) Mothis'07: Models , pp. 2007
    • Alam, M.1    Hafner, M.2    Memon, M.3    Hung, P.4
  • 3
    • 84867470361 scopus 로고    scopus 로고
    • Arge ELGA, Arbeitsgemeinschaft Elektronische Gesundheitsakte
    • Arge ELGA: Arbeitsgemeinschaft Elektronische Gesundheitsakte; http://www.arge-elga.at/
  • 7
    • 33745471209 scopus 로고    scopus 로고
    • Model Driven Security: From UML Models to Access Control Infrastructures
    • Basin, D. Doser, J. Torsten, L.: "Model Driven Security: From UML Models to Access Control Infrastructures"; ACM Trans. Softw. Eng. Methodol., 15(1), 39-91, 2006.
    • (2006) Acm Trans. Softw. Eng. Methodol , vol.15 , Issue.1 , pp. 39-91
    • Basin, D.1    Doser, J.2    Torsten, L.3
  • 9
    • 3042690008 scopus 로고    scopus 로고
    • From the Editors: Whose Data are These, Anyway?
    • Donner, M.: "From the Editors: Whose Data are These, Anyway?"; IEEE Security and Privacy, 2(3), 5-6, 2004.
    • (2004) Ieee Security and Privacy , vol.2 , Issue.3 , pp. 5-6
    • Donner, M.1
  • 11
    • 33750453781 scopus 로고    scopus 로고
    • SECTET: An Extensible Framework for the Realization of Secure Inter-organizational Workflows
    • Emerald
    • Hafner, M. Breu, R. Agreiter, B. Nowak, A.: "SECTET: An Extensible Framework for the Realization of Secure Inter-organizational Workflows"; Journal of Internet Research, 16(5), 491-506, Emerald, 2006
    • (2006) Journal of Internet Research , vol.16 , Issue.5 , pp. 491-506
    • Hafner, M.1    Breu, R.2    Agreiter, B.3    Nowak, A.4
  • 15
    • 1142264879 scopus 로고    scopus 로고
    • W3C Recommendation, 10 December 2002, Technical Report, W3C
    • Imamura, T.: "XML Encryption Syntax and Processing"; W3C Recommendation, 10 December 2002, Technical Report, W3C, 2002.
    • (2002) Xml Encryption Syntax and Processing
    • Imamura, T.1
  • 20
    • 0036836682 scopus 로고    scopus 로고
    • An Intensive Survey of Fair Non- Repudiation Protocols
    • Kremer, S. Markowitch, O. Zhou, J.: "An Intensive Survey of Fair Non- Repudiation Protocols"; Computer Communications, 25, 1606-1621, 2002.
    • (2002) Computer Communications , vol.25 , pp. 1606-1621
    • Kremer, S.1    Markowitch, O.2    Zhou, J.3
  • 21
    • 17744394269 scopus 로고    scopus 로고
    • Specification and Design of Advanced Authentication and Authorization Services
    • Lopez, J. Montenegroa, J. Vivasa, J. et. al.: "Specification and Design of Advanced Authentication and Authorization Services"; Computer Standards and Interfaces, 27(5),467-478, 2005.
    • (2005) Et. Al , vol.27 , Issue.5 , pp. 467-478
    • Lopez, J.1    Montenegroa, J.2    Vivasa, J.3
  • 24
    • 79953880038 scopus 로고    scopus 로고
    • SECTISSIMO: A Platform-Independent Framework for Security Services
    • Toulouse, France
    • Memon, M. Hafner, M. Breu, R.: "SECTISSIMO: A Platform-Independent Framework for Security Services"; In ModSec'08: MODELS 2008, Toulouse, France, 2008.
    • (2008) Modsec'08: Models 2008
    • Memon, M.1    Hafner, M.2    Breu, R.3
  • 25
    • 74549184607 scopus 로고    scopus 로고
    • McAfee
    • McAfee.: "Security as a Service"; 2008, http://www.mcafee.com/us/ocal_content/solution_briefs/sb_saas_0709.pdf
    • (2008) Security As a Service
  • 26
    • 84867467241 scopus 로고    scopus 로고
    • "Microsoft Windows live onecare"; 2006
    • "Microsoft Windows live onecare"; 2006, http://onecare.live.com/standard/enus/3/default.htm.
  • 29
    • 65249159522 scopus 로고    scopus 로고
    • Service-oriented Security Indications for Use
    • Peterson, G.: "Service-oriented Security Indications for Use"; IEEE Security and Privacy, 7(2), 91-93, 2009.
    • (2009) Ieee Security and Privacy , vol.7 , Issue.2 , pp. 91-93
    • Peterson, G.1
  • 35
    • 84867467239 scopus 로고    scopus 로고
    • Apache-ServiceMix: An Open Source ESB
    • "Apache-ServiceMix: An Open Source ESB"; http://servicemix.apache.org
  • 36
    • 84867467240 scopus 로고    scopus 로고
    • Symantec. Symantec names Genesis Norton 360; 2006
    • Symantec. Symantec names Genesis Norton 360; 2006, http://www.symantec.com/about/news/release/article.jsp?prid=20060531_01.
  • 37
    • 84867467237 scopus 로고    scopus 로고
    • "Web Services Notification (WSN) Specifications"; 2006
    • "Web Services Notification (WSN) Specifications"; 2006, http://docs.oasisopen.org/wsn.
  • 39
    • 73149093583 scopus 로고    scopus 로고
    • OASIS TC
    • OASIS TC.: "WS-SecurityPolicy"; 2007, http://docs.oasis-open.org.
    • (2007) Ws-securitypolicy
  • 40
    • 73149092029 scopus 로고    scopus 로고
    • OASIS TC
    • OASIS TC.: "WS-Trust Sepcifications"; 2005, http://docs.oasis-open.org.
    • (2005) Ws-trust Sepcifications
  • 41
    • 73149110318 scopus 로고    scopus 로고
    • In ACISP'99: Proc. of the 4th Australasian Conf. on Information Security and Privacy, London, UK, Springer
    • Zhou, J. Deng, R. H. Bao, F.: "Evolution of Fair Non-repudiation with TTP"; In ACISP'99: Proc. of the 4th Australasian Conf. on Information Security and Privacy, London, UK, 1999. Springer.
    • (1999) Evolution of Fair Non-repudiation With Ttp
    • Zhou, J.1    Deng, R.H.2    Bao, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.