-
1
-
-
33749040692
-
Modeldriven security based on a Web services security architecture
-
Y. Nakamura, M. Tatsubori, T. Imamura, and K. Ono, "Modeldriven security based on a Web services security architecture," in Services Computing, 2005 IEEE International Conference on, 2005, pp. 7-15 vol.1.
-
(2005)
Services Computing, 2005 IEEE International Conference on
, vol.1
, pp. 7-15
-
-
Nakamura, Y.1
Tatsubori, M.2
Imamura, T.3
Ono, K.4
-
2
-
-
63949084590
-
Model-driven business process security requirement specification
-
C. Wolter, M. Menzel, A. Schaad, P. Miseldine, and C. Meinel, "Model-driven business process security requirement specification," J. Syst. Archit., vol. 55, pp. 211-223, 2009.
-
(2009)
J. Syst. Archit.
, vol.55
, pp. 211-223
-
-
Wolter, C.1
Menzel, M.2
Schaad, A.3
Miseldine, P.4
Meinel, C.5
-
3
-
-
70349683196
-
Security requirements specification in service-oriented business process management
-
M. Menzel, I. Thomas, and C. Meinel, "Security Requirements Specification in Service-Oriented Business Process Management," in Availability, Reliability and Security, 2009. ARES '09. International Conference on, 2009, pp. 41-48.
-
(2009)
Availability, Reliability and Security, 2009. ARES '09. International Conference on
, pp. 41-48
-
-
Menzel, M.1
Thomas, I.2
Meinel, C.3
-
4
-
-
51749122210
-
Methodology and tools for end-to-end SOA security configurations
-
F. Satoh, Y. Nakamura, N. K. Mukhi, M. Tatsubori, and K. Ono, "Methodology and Tools for End-to-End SOA Security Configurations," in Services - Part I, 2008. IEEE Congress on, 2008, pp. 307-314.
-
(2008)
Services - Part I, 2008. IEEE Congress on
, pp. 307-314
-
-
Satoh, F.1
Nakamura, Y.2
Mukhi, N.K.3
Tatsubori, M.4
Ono, K.5
-
5
-
-
33750453781
-
SECTET: An extensible framework for the realization of secure inter-organizational workflows
-
2006
-
R. B. Michal Hafner, Berthold Agreiter, "SECTET: an extensible framework for the realization of secure inter-organizational workflows," Emeral Internet Research, vol. Vol.16 No. 5, 2006, pp. pp.491-506, 2006.
-
(2006)
Emeral Internet Research
, vol.16
, Issue.5
, pp. 491-506
-
-
Michal Hafner, R.B.1
Agreiter, B.2
-
8
-
-
79955143136
-
SecureUML: A UML-based modeling language for model-driven security
-
J\, \#252, and, Springer-Verlag
-
T. Lodderstedt, D. A. Basin, J\, \#252, and r. Doser, "SecureUML: A UML-Based Modeling Language for Model-Driven Security," in Proceedings of the 5th International Conference on The Unified Modeling Language: Springer-Verlag, 2002.
-
(2002)
Proceedings of the 5th International Conference on the Unified Modeling Language
-
-
Lodderstedt, T.1
Basin, D.A.2
Doser, R.3
-
10
-
-
34547256400
-
Common misconceptions about service-oriented architecture
-
DOI 10.1109/ICCBSS.2007.9, 4127307, Proceedings - ICCBSS 2007: Sixth International IEEE Conference on Commercial-off-the-Shelf (COTS)-Based Software Systems
-
G. A. Lewis, E. Morris, S. Simanta, and L. Wrage, "Common Misconceptions about Service-Oriented Architecture," in Commercial-off-the-Shelf (COTS)-Based Software Systems, 2007. ICCBSS '07. Sixth International IEEE Conference on, 2007, pp. 123-130. (Pubitemid 47133566)
-
(2007)
Proceedings - ICCBSS 2007: Sixth International IEEE Conference on Commercial-off-the-Shelf (COTS)-Based Software Systems
, pp. 123-130
-
-
Lewis, G.A.1
Morris, E.2
Simanta, S.3
Wrage, L.4
-
11
-
-
63349083012
-
Dependable service-oriented computing
-
March/April 2009
-
A. D. a. P. Narasimhan, "Dependable Service-Oriented Computing," IEEE Internet Computing, March/April 2009, pp. 11-15, 2009.
-
(2009)
IEEE Internet Computing
, pp. 11-15
-
-
Narasimhan, P.1
-
12
-
-
78049420876
-
Evaluation of service-oriented architecture
-
Carnegie Mellon, vol., September 2007
-
R. K. Philip Bianco, Paulo Merson, "Evaluation of Service- Oriented Architecture," Software Engineering Institute/Carnegie Mellon, vol. Technical Report, CMU/SEI-2007-TR-015, September 2007, 2007.
-
(2007)
Software Engineering Institute, Technical Report, CMU/SEI-2007-TR-015
-
-
Philip Bianco, R.K.1
Merson, P.2
-
17
-
-
38149075083
-
Model driven security engineering for the realization of dynamic security requirements in collaborative systems
-
M. Alam, "Model Driven Security Engineering for the Realization of Dynamic Security Requirements in Collaborative Systems," in Models in Software Engineering, 2007, pp. 278-287.
-
(2007)
Models in Software Engineering
, pp. 278-287
-
-
Alam, M.1
-
18
-
-
70449482747
-
Identity management in business process modelling: A model-driven approach
-
Wien, 25 -27. Februar, H. R. Hansen, D. Karagiannis, and H.-G. Fill, Eds. Wien: Ãsterreichische Computer Gesellschaft, 2009
-
H. Klarl, C. Wolff, and C. Emig, "Identity Management in Business Process Modelling: A Model-Driven Approach," in Konzepte, Technologien, Anwendungen: 9. Internationale Tagung Wirtschaftsinformatik, Wien, 25 -27. Februar 2009. Teil 1, H. R. Hansen, D. Karagiannis, and H.-G. Fill, Eds. Wien: Ãsterreichische Computer Gesellschaft, 2009, pp. 161-170.
-
(2009)
Konzepte, Technologien, Anwendungen: 9. Internationale Tagung Wirtschaftsinformatik
, vol.1
, pp. 161-170
-
-
Klarl, H.1
Wolff, C.2
Emig, C.3
|