메뉴 건너뛰기




Volumn , Issue , 2010, Pages 266-270

Model Driven Security framework for definition of security requirements for SOA based applications

Author keywords

Business process modelling; Model Driven Security (MDS); Model Driven Software Development (MDSD); Service Oriented Architecture (SOA)

Indexed keywords

BUSINESS ANALYSTS; BUSINESS PROCESS; BUSINESS PROCESS MODEL; BUSINESS PROCESS MODELLING; INFORMATION GAP; MODEL DRIVEN SECURITY; MODEL DRIVEN SECURITY (MDS); MODEL DRIVEN SOFTWARE DEVELOPMENT (MDSD); SECURITY EXPERTS; SECURITY IMPLEMENTATIONS; SECURITY REQUIREMENTS; SECURITY RISKS; SOFTWARE APPLICATIONS;

EID: 79953844482     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCAIE.2010.5735087     Document Type: Conference Paper
Times cited : (6)

References (17)
  • 2
    • 63949084590 scopus 로고    scopus 로고
    • Model-driven business process security requirement specification
    • Wolter, C., et al., Model-driven business process security requirement specification. J. Syst. Archit., 2009. 55(4): p. 211-223.
    • (2009) J. Syst. Archit. , vol.55 , Issue.4 , pp. 211-223
    • Wolter, C.1
  • 4
    • 34247151648 scopus 로고    scopus 로고
    • A BPMN extension for the modeling of security requirements in business processes
    • DOI 10.1093/ietisy/e90-d.4.745
    • Rodriguez, A. and E.F.-M.M. Piattini, A BPMN Extension for the Modeling of Security Requirements in Business Processes. IEICE - Trans. Inf. Syst., 2007. E90-D(4): p. 745-752. (Pubitemid 46600133)
    • (2007) IEICE Transactions on Information and Systems , vol.E90-D , Issue.4 , pp. 745-752
    • Rodriguez, A.1    Fernandez-Medina, E.2    Piattini, M.3
  • 6
    • 38149075083 scopus 로고    scopus 로고
    • Model driven security engineering for the realization of dynamic security requirements
    • Alam, M., Model Driven Security Engineering for the Realization of Dynamic Security Requirements in Collaborative Systems, in Models in Software Engineering. 2007. p. 278-287.
    • (2007) Collaborative Systems, in Models in Software Engineering , pp. 278-287
    • Alam, M.1
  • 11
    • 33750453781 scopus 로고    scopus 로고
    • Sectet: An extensible framework for the realization of secure inter-organizational workflows
    • DOI 10.1108/10662240610710978, Internet Security
    • Michal Hafner, R.B., Berthold Agreiter, SECTET: an extensible framework for the realization of secure inter-organizational workflows. Emeral Internet Research, 2006. Vol.16 No. 5, 2006: p. pp.491-506. (Pubitemid 44657322)
    • (2006) Internet Research , vol.16 , Issue.5 , pp. 491-506
    • Hafner, M.1    Breu, R.2    Agreiter, B.3    Nowak, A.4
  • 13
    • 78049450441 scopus 로고    scopus 로고
    • Model driven security frameworks for addressing security problems of service oriented architecture
    • Saleem, M.Q., J. Jaafar, and M.F. Hassan, Model Driven Security Frameworks for Addressing Security Problems of Service Oriented Architecture. ITSim 2010, 2010.
    • (2010) ITSim 2010
    • Saleem, M.Q.1    Jaafar, J.2    Hassan, M.F.3
  • 14
    • 84859973861 scopus 로고    scopus 로고
    • Modelling security goals in business processes
    • GI LNI 127, Berlin, Germany, March
    • Wolter, C., M. Menzel, and C. Meinel, Modelling Security Goals in Business Processes. Proc. GI Modellierung 2008, GI LNI 127, Berlin, Germany, March 2008. pp. 197 - 212.
    • (2008) Proc. GI Modellierung 2008 , pp. 197-212
    • Wolter, C.1    Menzel, M.2    Meinel, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.