메뉴 건너뛰기




Volumn , Issue , 2010, Pages 35-42

Secure business processes in service-oriented architectures - A requirements analysis

Author keywords

[No Author keywords available]

Indexed keywords

BUSINESS PROCESS; COORDINATING ACTIVITIES; EHEALTH; HUMAN ACTOR; MANAGEMENT SYSTEMS; POSSIBLE SOLUTIONS; REAL-WORLD; REQUIREMENTS ANALYSIS; SECURITY MECHANISM; SECURITY REQUIREMENTS; SERVICE ORIENTED; SERVICE-ORIENTED ENVIRONMENT; STATE OF THE ART;

EID: 79951826265     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ECOWS.2010.24     Document Type: Conference Paper
Times cited : (4)

References (46)
  • 5
    • 33845432307 scopus 로고    scopus 로고
    • Aspect-oriented workflow languages
    • A. Charfi and M. Mezini, "Aspect-Oriented Workflow Languages," in CoopIS 2006, 2006.
    • (2006) CoopIS 2006
    • Charfi, A.1    Mezini, M.2
  • 11
    • 0017930809 scopus 로고
    • METHOD FOR OBTAINING DIGITAL SIGNATURES AND PUBLIC-KEY CRYPTOSYSTEMS.
    • DOI 10.1145/359340.359342
    • R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978. (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 17
    • 62949114652 scopus 로고    scopus 로고
    • Supporting attribute-based access control in authentication and authorization infrastructures with ontologies
    • Februar [Online]. Available
    • T. Priebe, W. Dobmeier, C. Schläger, and N. Kamprath, "Supporting Attribute-based Access Control in Authentication and Authorization Infrastructures with Ontologies," Journal of software: JSW, vol. 2, no. 1, pp. 27-38, Februar 2007. [Online]. Available: http://epub.uni-regensburg.de/6423/
    • (2007) Journal of Software: JSW , vol.2 , Issue.1 , pp. 27-38
    • Priebe, T.1    Dobmeier, W.2    Schläger, C.3    Kamprath, N.4
  • 21
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • E. Bertino, E. Ferrari, and V. Atluri, "The Specification and Enforcement of Authorization Constraints in Workflow Management Systems," ACM Trans. Inf. Syst. Secur., vol. 2, no. 1, pp. 65-104, 1999.
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 22
    • 0348209180 scopus 로고    scopus 로고
    • W-RBAC - A workflow security model incorporating controlled overriding of constraints
    • DOI 10.1142/S0218843003000814
    • J. Wainer, P. Barthelmess, and A. Kumar, "W-RBAC - A Workflow Security Model Incorporating Controlled Overriding of Constraints," Int. J. Cooperative Inf. Syst., vol. 12, no. 4, pp. 455-485, 2003. (Pubitemid 38000660)
    • (2003) International Journal of Cooperative Information Systems , vol.12 , Issue.4 , pp. 455-485
    • Wainer, J.1    Barthelmess, P.2    Kumar, A.3
  • 23
    • 33746354903 scopus 로고    scopus 로고
    • Active Endpoints, Adobe, BEA, IBM, Oracle, SAP AG June
    • Active Endpoints, Adobe, BEA, IBM, Oracle, SAP AG, "WS-BPEL Extension for People," June 2007.
    • (2007) WS-BPEL Extension for People
  • 26
    • 84949747356 scopus 로고    scopus 로고
    • An Authorization Model for Workflows
    • V. Atluri and W.-K. Huang, "An Authorization Model for Workflows," in ESORICS '96: Proceedings of the 4th European Symposium on Research in Computer Security. London, UK: Springer-Verlag, 1996, pp. 44-64. (Pubitemid 126128893)
    • (1996) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1146 , pp. 44-64
    • Atluri, V.1    Huang, W.-K.2
  • 27
    • 0033685030 scopus 로고    scopus 로고
    • A Petri Net based safety analysis of workflow authorization models
    • 3
    • -, "A Petri Net Based Safety Analysis of Workflow Authorization Models," J. Comput. Secur., vol. 8, no. 2, 3, pp. 209-240, 2000.
    • (2000) J. Comput. Secur. , vol.8 , Issue.2 , pp. 209-240
    • Atluri, V.1    Huang, W.-K.2
  • 29
    • 0031387996 scopus 로고    scopus 로고
    • Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments
    • New York, NY, USA: ACM
    • R. K. Thomas, "Team-based Access Control (TMAC): a Primitive for Applying Role-based Access Controls in Collaborative Environments," in RBAC '97: Proceedings of the Second ACM Workshop on Role-based Access Control. New York, NY, USA: ACM, 1997, pp. 13-19.
    • (1997) RBAC '97: Proceedings of the Second ACM Workshop on Role-based Access Control , pp. 13-19
    • Thomas, R.K.1
  • 31
    • 78650118674 scopus 로고    scopus 로고
    • The OAuth 1.0 protocol
    • (Informational), Internet Engineering Task Force, Apr. [Online]. Available
    • E. Hammer-Lahav, "The OAuth 1.0 Protocol," RFC 5849 (Informational), Internet Engineering Task Force, Apr. 2010. [Online]. Available: http://www.ietf.org/rfc/rfc5849.txt
    • (2010) RFC 5849
    • Hammer-Lahav, E.1
  • 32
    • 3042684910 scopus 로고    scopus 로고
    • A rule-based framework for role-based delegation and revocation
    • L. Zhang, G.-J. Ahn, and B.-T. Chu, "A Rule-based Framework for Role-based Delegation and Revocation," ACM Trans. Inf. Syst. Secur., vol. 6, no. 3, pp. 404-441, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , Issue.3 , pp. 404-441
    • Zhang, L.1    Ahn, G.-J.2    Chu, B.-T.3
  • 35
    • 41949086982 scopus 로고    scopus 로고
    • The venn of identity: Options and issues in federated identity management
    • DOI 10.1109/MSP.2008.50, 4480459
    • E. Maler and D. Reed, "The Venn of Identity: Options and Issues in Federated Identity Management," IEEE Security and Privacy, vol. 6, pp. 16-23, 2008. (Pubitemid 351506252)
    • (2008) IEEE Security and Privacy , vol.6 , Issue.2 , pp. 16-23
    • Maler, E.1    Reed, D.2
  • 43
    • 0012736565 scopus 로고    scopus 로고
    • RBAC policies in XML for X.509 based privilege management
    • A. Ghonaimy, M. T. El-Hadidi, and H. K. Aslan, Eds. Kluwer
    • D. W. Chadwick and A. Otenko, "RBAC Policies in XML for X.509 Based Privilege Management," in SEC, ser. IFIP Conference Proceedings, A. Ghonaimy, M. T. El-Hadidi, and H. K. Aslan, Eds., vol. 214. Kluwer, 2002, pp. 39-54.
    • (2002) SEC, Ser. IFIP Conference Proceedings , vol.214 , pp. 39-54
    • Chadwick, D.W.1    Otenko, A.2
  • 44
    • 38949086163 scopus 로고    scopus 로고
    • Access control and authorization constraints for WS-BPEL
    • DOI 10.1109/ICWS.2006.21, 4032037, Proceedings - ICWS 2006: 2006 IEEE International Conference on Web Services
    • E. Bertino, J. Crampton, and F. Paci, "Access Control and Authorization Constraints for WS-BPEL," in ICWS '06: Proceedings of the IEEE International Conference on Web Services. Los Alamitos, CA, USA: IEEE Computer Society, 2006, pp. 275-284. (Pubitemid 351209863)
    • (2006) Proceedings - ICWS 2006: 2006 IEEE International Conference on Web Services , pp. 275-284
    • Bertino, E.1    Crampton, J.2    Paci, F.3
  • 46
    • 13544276885 scopus 로고    scopus 로고
    • Process mining and security: Detecting anomalous process executions and checking process conformance
    • DOI 10.1016/j.entcs.2004.10.013, PII S1571066105000228
    • W. van der Aalst and A. de Medeiros, "Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance," Electronic Notes in Theoretical Computer Science, vol. 121, pp. 3 - 21, 2005. (Pubitemid 40219700)
    • (2005) Electronic Notes in Theoretical Computer Science , vol.121 , Issue.SPEC. ISS. , pp. 3-21
    • Van Der Aalst, W.M.P.1    De Medeiros, A.K.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.