메뉴 건너뛰기




Volumn , Issue , 2005, Pages 10-19

Web services enterprise aecurity architecture: A case study

Author keywords

Security; Software architecture; Software development process; Web services

Indexed keywords

CRITICAL TASKS; INTEGRATING SECURITY; SECURITY ARCHITECTURE; SECURITY FACTORS; SECURITY REQUIREMENTS; SECURITY SOFTWARE; SECURITY STANDARDS; SOFTWARE DEVELOPMENT PROCESS; THREE STAGES; WEB SERVICES SECURITY; WEB SERVICES SECURITY TECHNOLOGIES;

EID: 77954341505     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1103022.1103025     Document Type: Conference Paper
Times cited : (12)

References (33)
  • 2
    • 0037240812 scopus 로고    scopus 로고
    • Misuse Cases: Use cases with hostile intent
    • I. Alexander, "Misuse Cases: Use Cases with Hostile Intent", IEEE Computer Software, vol.20, pp. 58-66, 2003.
    • (2003) IEEE Computer Software , vol.20 , pp. 58-66
    • Alexander, I.1
  • 3
    • 1942532238 scopus 로고    scopus 로고
    • XML-based specification for web services document security
    • R. Bhatti, E. Bertino, A. Ghafoor, and J. B. D. Joshi, "XML-Based Specification for Web Services Document Security", IEEE Computer, vol.37, pp. 41-49, 2004.
    • (2004) IEEE Computer , vol.37 , pp. 41-49
    • Bhatti, R.1    Bertino, E.2    Ghafoor, A.3    Joshi, J.B.D.4
  • 9
    • 2942757657 scopus 로고    scopus 로고
    • Engineering security requirements
    • D. G. Firesmith, "Engineering Security Requirements", Journal of Object Technology, vol.2, pp. 53-68, 2003.
    • (2003) Journal of Object Technology , vol.2 , pp. 53-68
    • Firesmith, D.G.1
  • 14
    • 77954321317 scopus 로고    scopus 로고
    • IDC, 2005. See: http://www.idc.com/getdoc.jsp?containerId=prUS00190705].
    • (2005)
  • 15
    • 4544368101 scopus 로고    scopus 로고
    • Authorization service for web services and its implementation
    • San Diego, California, USA
    • S. Indrakanti, V. Varadharajan, and M. Hitchens, "Authorization Service for Web Services and its Implementation", Proc. ICWS'04, San Diego, California, USA, 2004.
    • (2004) Proc. ICWS'04
    • Indrakanti, S.1    Varadharajan, V.2    Hitchens, M.3
  • 25
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modeling security threats
    • B. Schneier, "Attack Trees: Modeling Security Threats", Dr. Dobb's Journal, 1999.
    • (1999) Dr. Dobb's Journal
    • Schneier, B.1
  • 26
    • 77954339399 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sydney, Australia
    • G. Sindre and A. L. Opdahl, "Eliciting Security Requirements with Misuse Cases", Proc. TOOLS-37'00, Sydney, Australia, 2000.
    • (2000) Proc. TOOLS-37'00
    • Sindre, G.1    Opdahl, A.L.2
  • 29
    • 17844409254 scopus 로고    scopus 로고
    • Requirements reuse for improving information systems security: A practitioner's approach
    • A. Toval, J. Nicolás, B. Moros, and F. García, "Requirements Reuse for Improving Information Systems Security: A Practitioner's Approach", Requirements Engineering Journal, vol.6, pp. 205-219, 2001.
    • (2001) Requirements Engineering Journal , vol.6 , pp. 205-219
    • Toval, A.1    Nicolás, J.2    Moros, B.3    García, F.4
  • 30
    • 4344569744 scopus 로고    scopus 로고
    • Risk analysis in software design
    • D. Verdon and G. McGraw, "Risk Analysis in Software Design", in IEEE Security & Privacy, vol.2, 2004, pp. 79-84.
    • (2004) IEEE Security & Privacy , vol.2 , pp. 79-84
    • Verdon, D.1    McGraw, G.2
  • 31
    • 4544279898 scopus 로고    scopus 로고
    • VeriSign Microsoft, SonicSoftware IBM BEA and SAP
    • VeriSign, Microsoft, SonicSoftware, IBM, BEA, and SAP, "Web Services Policy Framework (WS-Policy)", 2004.
    • (2004) Web Services Policy Framework (WS-Policy)
  • 32
    • 77954326316 scopus 로고    scopus 로고
    • A role based access control for web services
    • San Diego, California, USA
    • R. Wonohoesodo and Z. Tari, "A Role based Access Control for Web Services", Proc. ICWS'04, San Diego, California, USA, 2004.
    • (2004) Proc. ICWS'04
    • Wonohoesodo, R.1    Tari, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.