메뉴 건너뛰기




Volumn 5, Issue 2, 2011, Pages 105-137

A declarative two-level framework to specify and verify workflow and authorization policies in service-oriented architectures

Author keywords

Authorization policies; Formal methods; Industrial case study; Service oriented architectures; Services; Specification; Verification; Workflow

Indexed keywords

AUTHORIZATION POLICY; INDUSTRIAL CASE STUDY; SERVICE ORIENTED; SERVICES; WORKFLOW;

EID: 79958789709     PISSN: 18632386     EISSN: 18632394     Source Type: Journal    
DOI: 10.1007/s11761-010-0073-4     Document Type: Article
Times cited : (8)

References (60)
  • 2
    • 0038070233 scopus 로고    scopus 로고
    • A rewriting approach to satisfiability procedures
    • Armando A, Ranise S, Rusinowitch M (2003) A rewriting approach to satisfiability procedures. Inf Comput 183(2): 140-164.
    • (2003) Inf Comput , vol.183 , Issue.2 , pp. 140-164
    • Armando, A.1    Ranise, S.2    Rusinowitch, M.3
  • 6
    • 70849107955 scopus 로고    scopus 로고
    • Verifying the interplay of authorization policies and workflow in service-oriented architectures
    • (SecureCom 2009)international conference on computational science and engineering (CSE 2009). IEEE Computer Society Press
    • Barletta M, Ranise S, Viganò L (2009) Verifying the interplay of authorization policies and workflow in service-oriented architectures. In: Proceedings of the 2009 international symposium on secure computing (SecureCom 2009), vol. 3 of 2009 international conference on computational science and engineering (CSE 2009). IEEE Computer Society Press, pp 289-299. http://doi. ieeecomputersociety. org/10. 1109/CSE. 2009. 172.
    • (2009) Proceedings of the 2009 international symposium on secure computing , vol.3 , pp. 289-299
    • Barletta, M.1    Ranise, S.2    Viganò, L.3
  • 12
    • 38949086163 scopus 로고    scopus 로고
    • Access control and authorization constraints for WS-BPEL
    • IEEE Computer Society Press
    • Bertino E, Crampton J, Paci F (2006) Access control and authorization constraints for WS-BPEL. In: Proceedings of ICWS'06. IEEE Computer Society Press, pp 275-284.
    • (2006) Proceedings of ICWS'06 , pp. 275-284
    • Bertino, E.1    Crampton, J.2    Paci, F.3
  • 17
    • 46249093384 scopus 로고    scopus 로고
    • Property-directed incremental invariant generation
    • To appear
    • Bradley AR, Manna Z (2009) Property-directed incremental invariant generation. Formal aspects of computing. To appear.
    • (2009) Formal aspects of computing
    • Bradley, A.R.1    Manna, Z.2
  • 18
    • 79952531030 scopus 로고    scopus 로고
    • Automated validation of security-sensitive web services specified in bpel and rbac
    • Timisoara, Sept. 23-25 (2010). To appear in IEEE Comp. Society
    • Calvi A, Ranise S, Viganò L (2010) Automated validation of security-sensitive web services specified in bpel and rbac. In: Proceedings of 1st workshop on software service (satellite of SYNASC symposium). Timisoara, Sept. 23-25 (2010). To appear in IEEE Comp. Society.
    • (2010) Proceedings of 1st workshop on software service (satellite of SYNASC symposium) , pp. 23-25
    • Calvi, A.1    Ranise, S.2    Viganò, L.3
  • 20
  • 21
    • 0036083264 scopus 로고    scopus 로고
    • Binder, a logic-based security language
    • IEEE Computer Society Press
    • DeTreville J (2002) Binder, a logic-based security language. In: IEEE symposium on security and privacy. IEEE Computer Society Press.
    • (2002) IEEE symposium on security and privacy
    • DeTreville, J.1
  • 27
    • 79958835294 scopus 로고    scopus 로고
    • Fast Home Page
    • Fast Home Page. http://www. lsv. ens-cachan. fr/Software/fast.
  • 31
    • 70350219117 scopus 로고    scopus 로고
    • Complete instantiation for quantified formulas in satisfiabiliby modulo theories
    • Ge Y, de Moura L (2009) Complete instantiation for quantified formulas in satisfiabiliby modulo theories. In: Proceedings of computer aided verification (CAV). pp 306-320.
    • (2009) Proceedings of computer aided verification (CAV) , pp. 306-320
    • Ge, Y.1    de Moura, L.2
  • 32
    • 9444252425 scopus 로고    scopus 로고
    • Model theoretic methods in combined constraint satisfiability
    • Ghilardi S (2004) Model theoretic methods in combined constraint satisfiability. J Autom Reason 33(3-4).
    • (2004) J Autom Reason , vol.33 , Issue.4
    • Ghilardi, S.1
  • 36
    • 34249933531 scopus 로고    scopus 로고
    • Coloured petri nets and CPN tools for modelling and validation of concurrent systems
    • Jensen K, Kristensen L, Wells L (2007) Coloured petri nets and CPN tools for modelling and validation of concurrent systems. Int J Softw Tools Technol Transf 9: 213-254.
    • (2007) Int J Softw Tools Technol Transf , vol.9 , pp. 213-254
    • Jensen, K.1    Kristensen, L.2    Wells, L.3
  • 37
    • 37049005548 scopus 로고    scopus 로고
    • Predicate abstraction with indexed predicates
    • Lahiri SK, Bryant RE (2007) Predicate abstraction with indexed predicates. ACM Trans Comput Log 9(1).
    • (2007) ACM Trans Comput Log , vol.9 , Issue.1
    • Lahiri, S.K.1    Bryant, R.E.2
  • 38
    • 33646242539 scopus 로고    scopus 로고
    • Understanding SPKI/SDSI using first-order logic
    • Li N, Mitchell JC (2006) Understanding SPKI/SDSI using first-order logic. Int J Inf Secur 5(1): 48-64.
    • (2006) Int J Inf Secur , vol.5 , Issue.1 , pp. 48-64
    • Li, N.1    Mitchell, J.C.2
  • 40
    • 72849111672 scopus 로고    scopus 로고
    • Automated composition of web services: the astro approach
    • Marconi A, Pistore M, Traverso P (2008) Automated composition of web services: the astro approach. IEEE Data Eng Bull 31(3): 23-26.
    • (2008) IEEE Data Eng Bull , vol.31 , Issue.3 , pp. 23-26
    • Marconi, A.1    Pistore, M.2    Traverso, P.3
  • 43
    • 55949114432 scopus 로고    scopus 로고
    • An access control framework for WS-BPEL
    • Paci F, Bertino E, Crampton J (2008) An access control framework for WS-BPEL. Int J Web Serv Res 5(3): 20-43.
    • (2008) Int J Web Serv Res , vol.5 , Issue.3 , pp. 20-43
    • Paci, F.1    Bertino, E.2    Crampton, J.3
  • 44
    • 0026122705 scopus 로고
    • Petri nets and algebraic specifications
    • Reisig W (1991) Petri nets and algebraic specifications. Theor Comput Sci 80(1): 1-34.
    • (1991) Theor Comput Sci , vol.80 , Issue.1 , pp. 1-34
    • Reisig, W.1
  • 47
    • 70849090093 scopus 로고    scopus 로고
    • A workflow-based model-checking approach to inter- and intra-analysis of organisational controls in service-oriented business processes
    • Schaad A, Sohr K, Drouineaud M (2007) A workflow-based model-checking approach to inter- and intra-analysis of organisational controls in service-oriented business processes. J Inf Assur Secur 2(1).
    • (2007) J Inf Assur Secur , vol.2 , Issue.1
    • Schaad, A.1    Sohr, K.2    Drouineaud, M.3
  • 49
    • 27144534564 scopus 로고    scopus 로고
    • Technical Report 188, Humbolt-Universität zu Berlin
    • Stahl C (2005) A petri net semantics for BPEL. Technical Report 188, Humbolt-Universität zu Berlin.
    • (2005) A petri net semantics for BPEL
    • Stahl, C.1
  • 51
    • 33646176117 scopus 로고    scopus 로고
    • Combining non-stably infinite theories
    • Tinelli C, Zarba CG (2005) Combining non-stably infinite theories. J Autom Reason 34(3).
    • (2005) J Autom Reason , vol.34 , Issue.3
    • Tinelli, C.1    Zarba, C.G.2
  • 52
    • 79958863899 scopus 로고    scopus 로고
    • Tools4bpel Home Page
    • Tools4bpel Home Page. http://www2. informatik. hu-berlin. de/top/tools4bpel.
  • 55
    • 36749019202 scopus 로고    scopus 로고
    • A policy enforcement framework for verification and control of service collaboration
    • Tsai W-T, Zhou X, Wei X (2008) A policy enforcement framework for verification and control of service collaboration. Inf Syst E-Bus Manag 6(1): 83-107.
    • (2008) Inf Syst E-Bus Manag , vol.6 , Issue.1 , pp. 83-107
    • Tsai, W.-T.1    Zhou, X.2    Wei, X.3
  • 56
    • 0002719897 scopus 로고    scopus 로고
    • The application of Petri nets to workflow management
    • van der Aalst WMP (1998) The application of Petri nets to workflow management. J circuits syst comput 8(1): 21-66.
    • (1998) J Circuits Syst Comput , vol.8 , Issue.1 , pp. 21-66
    • van der Aalst, W.M.P.1
  • 58
    • 79958835293 scopus 로고    scopus 로고
    • Yices Home Page
    • Yices Home Page. http://yices. csl. sri. com.
  • 59
    • 79958790284 scopus 로고    scopus 로고
    • Z3 Home Page
    • Z3 Home Page. http://research. microsoft. com/en-us/um/redmond/projects/z3/.
  • 60
    • 33645964601 scopus 로고    scopus 로고
    • Evaluating access control policies through model checking
    • Springer
    • Zhang N, Ryan MD, Guelev D (2005) Evaluating access control policies through model checking. In: Proceedings of ISC'05, LNCS 3650. Springer, pp 446-460.
    • (2005) Proceedings of ISC'05, LNCS 3650 , pp. 446-460
    • Zhang, N.1    Ryan, M.D.2    Guelev, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.