메뉴 건너뛰기




Volumn , Issue , 2010, Pages 115-122

The service Security Lab: A model-driven platform to compose and explore service security in the cloud

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD COMPUTING; IDENTITY AND ACCESS MANAGEMENTS; INFORMATION PROTECTION; MODEL DRIVEN APPROACH; MODEL-DRIVEN; MONITORING AND ANALYSIS; SECURITY MECHANISM; SECURITY POLICY; SECURITY REQUIREMENTS; SECURITY RISKS; SERVICE SECURITY; TRANSFORMATION BASED;

EID: 78049341379     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SERVICES.2010.90     Document Type: Conference Paper
Times cited : (28)

References (17)
  • 4
    • 78049349433 scopus 로고    scopus 로고
    • Identity metasystem interoperability version 1.0
    • July, [Online]. Available:
    • OASIS, "Identity Metasystem Interoperability Version 1.0, " OASIS Standard, July 2009. [Online]. Available: "http://docs.oasis-open. org/imi/identity/v1.0/identity.html".
    • (2009) OASIS Standard
  • 8
    • 85058340956 scopus 로고    scopus 로고
    • Web services security policy language (ws-securitypolicy)
    • Juli
    • G. Della-Libera, M. Gudgin, and et all, "Web services security policy language (ws-securitypolicy), " Public Draft Specification, Juli 2005.
    • (2005) Public Draft Specification
    • Della-Libera, G.1    Gudgin, M.2
  • 10
    • 57049164245 scopus 로고    scopus 로고
    • Oryx - an open modeling platform for the bpm community
    • G. Decker, H. Overdick, and M.Weske, "Oryx - an open modeling platform for the bpm community, " in BPM, 2008, pp. 382-385.
    • (2008) BPM , pp. 382-385
    • Decker, G.1    Overdick, H.2    Weske, M.3
  • 11
    • 34247151648 scopus 로고    scopus 로고
    • A bpmn extension for the modeling of security requirements in business processes
    • A. Rodríguez, E. Fernández-Medina, and M. Piattini, "A bpmn extension for the modeling of security requirements in business processes, " IEICE Transactions, vol. 90-D, no. 4, pp. 745-752, 2007.
    • (2007) IEICE Transactions , vol.90-D , Issue.4 , pp. 745-752
    • Rodríguez, A.1    Fernández-Medina, E.2    Piattini, M.3
  • 12
    • 38049132539 scopus 로고    scopus 로고
    • Modeling of task-based authorization constraints in bpmn
    • C. Wolter and A. Schaad, "Modeling of task-based authorization constraints in bpmn, " in BPM, 2007, pp. 64- 79.
    • (2007) BPM , pp. 64-79
    • Wolter, C.1    Schaad, A.2
  • 16
    • 46849091971 scopus 로고    scopus 로고
    • Generic security policy transformation framework for ws-security
    • Los Alamitos, CA, USA: IEEE Computer Society
    • F. Satoh and Y. Yamaguchi, "Generic security policy transformation framework for ws-security, " in IEEE International Conference on Web Services (ICWS 2007). Los Alamitos, CA, USA: IEEE Computer Society, 2007, pp. 513-520.
    • (2007) IEEE International Conference on Web Services (ICWS 2007) , pp. 513-520
    • Satoh, F.1    Yamaguchi, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.