메뉴 건너뛰기




Volumn , Issue , 2005, Pages 298-308

Towards a process for web services security

Author keywords

[No Author keywords available]

Indexed keywords

LEARNING CURVES; SECURITY ARCHITECTURE; SECURITY REQUIREMENTS; SECURITY SERVICES; SYSTEMS DEVELOPMENT; THREE STAGES; WEB SERVICES SECURITY; WS SECURITY;

EID: 78651452980     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (25)
  • 7
    • 78651418385 scopus 로고    scopus 로고
    • Operationally critical threat, asset, and vulnerability evaluation (OCTAVE) framework, version 1.0
    • Carnegie Mellon. Software Engineering Institute
    • Alberts, C.J., et al., Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Framework, Version 1.0, in Networked Systems Survivability Program. 1999, Carnegie Mellon. Software Engineering Institute, p. 84.
    • (1999) Networked Systems Survivability Program , pp. 84
    • Alberts, C.J.1
  • 10
    • 78651453649 scopus 로고    scopus 로고
    • Architecture based development
    • April Carnegie Mellon. Software Engineering Institute
    • Bass, L. and R. Kazman, Architecture Based Development, in Product Line Systems. April 1999, Carnegie Mellon. Software Engineering Institute, p. 36.
    • (1999) Product Line Systems , pp. 36
    • Bass, L.1    Kazman, R.2
  • 14
    • 0037240812 scopus 로고    scopus 로고
    • Misuse cases: Use cases with hostile intent
    • Alexander, I., Misuse Cases: Use Cases with Hostile Intent. IEEE Computer Software, 2003. 20(1): p. 58-66.
    • (2003) IEEE Computer Software , vol.20 , Issue.1 , pp. 58-66
    • Alexander, I.1
  • 16
    • 17844409254 scopus 로고    scopus 로고
    • Requirements reuse for improving information systems security: A practitioner's approach
    • Toval, A., et al., Requirements Reuse for Improving Information Systems Security: A Practitioner's Approach. Requirements Engineering Journal, 2001. 6(4): p. 205-219.
    • (2001) Requirements Engineering Journal , vol.6 , Issue.4 , pp. 205-219
    • Toval, A.1
  • 19
    • 78651465752 scopus 로고    scopus 로고
    • Attribute-based architectural styles
    • Software Engineering Institute
    • Klein, M. and R. Kazman, Attribute-Based Architectural Styles, in Product Line Practice. 1999, Software Engineering Institute, p. 90.
    • (1999) Product Line Practice , pp. 90
    • Klein, M.1    Kazman, R.2
  • 20
    • 0029408391 scopus 로고
    • The 4+1 view model of software architecture
    • Krutchen, P., The 4+1 View Model of Software Architecture. IEEE Software, 1995: p. 42-50.
    • (1995) IEEE Software , pp. 42-50
    • Krutchen, P.1
  • 23
    • 3543129528 scopus 로고    scopus 로고
    • A XML-based approach to combine firewalls and web services security specifications
    • Fairfaz VA, USA.
    • Cremonini, M., et al. A XML-based Approach to Combine Firewalls and Web Services Security Specifications, in ACM Workshop on XML Security. 2003. Fairfaz VA, USA.
    • (2003) ACM Workshop on XML Security
    • Cremonini, M.1
  • 24
    • 38949154073 scopus 로고    scopus 로고
    • Specification and querying of security constraints in the EFSOC framework
    • Willem-Jan van den Heuvel. New York City, USA.
    • Leune, K. and M. Papazaglou. Specification and Querying of Security Constraints in the EFSOC Framework, in International Conference on Service Oriented Computing. Willem-Jan van den Heuvel. New York City, USA.
    • International Conference on Service Oriented Computing
    • Leune, K.1    Papazaglou, M.2
  • 25
    • 20444440807 scopus 로고    scopus 로고
    • Sound development of secure service-based systems
    • New York, USA: ACM.
    • Deubler, M., et al. Sound Development of Secure Service-based Systems, in ICSOC04. 2004. New York, USA: ACM.
    • (2004) ICSOC04
    • Deubler, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.