메뉴 건너뛰기




Volumn , Issue , 2011, Pages 21-30

An integrated approach for identity and access management in a SOA context

Author keywords

Identity and access management; SAML; SOAP; WS BPEL; WSSecurity

Indexed keywords

BUSINESS PROCESS; BUSINESS PROCESS EXECUTION LANGUAGE FOR WEB SERVICES; DEPLOYMENT TIME; DOMAIN EXPERTS; DOMAIN SPECIFIC LANGUAGES; IDENTITY AND ACCESS MANAGEMENTS; INTEGRATED APPROACH; PERFORMANCE ASPECTS; POLICY SPECIFICATION; PROCESS DEFINITION; PROTOTYPE IMPLEMENTATIONS; RBAC MODEL; ROLE-BASED ACCESS CONTROL; RUNTIMES; SAML; SERVICE ORIENTED; TECHNICAL DETAILS; WS-BPEL; WSSECURITY;

EID: 79960160217     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1998441.1998446     Document Type: Conference Paper
Times cited : (23)

References (42)
  • 1
    • 60849115033 scopus 로고    scopus 로고
    • A constraint based role based access control in the SECTET a model-driven approach
    • M. Alam, M. Hafner, and R. Breu. A constraint based role based access control in the SECTET a model-driven approach. In Int. Conf. on Privacy, Security and Trust, 2006.
    • (2006) Int. Conf. on Privacy, Security and Trust
    • Alam, M.1    Hafner, M.2    Breu, R.3
  • 8
    • 67650157292 scopus 로고    scopus 로고
    • A mediation framework for the implementation of context- aware access control in pervasive grid-based healthcare systems
    • V. Koufi, F. Malamateniou, and G. Vassilacopoulos. A Mediation Framework for the Implementation of Context- Aware Access Control in Pervasive Grid-Based Healthcare Systems. In 4th Int. Conf. on Advances in Grid and Pervasive Computing, pages 281-292, 2009.
    • (2009) 4th Int. Conf. on Advances in Grid and Pervasive Computing , pp. 281-292
    • Koufi, V.1    Malamateniou, F.2    Vassilacopoulos, G.3
  • 9
    • 57349145290 scopus 로고    scopus 로고
    • Context-aware role-based access control in pervasive computing systems
    • D. Kulkarni and A. Tripathi. Context-aware role-based access control in pervasive computing systems. In 13th ACM SACMAT, pages 113-122, 2008.
    • (2008) 13th ACM SACMAT , pp. 113-122
    • Kulkarni, D.1    Tripathi, A.2
  • 11
    • 57349171335 scopus 로고    scopus 로고
    • Policy decomposition for collaborative access control
    • D. Lin, P. Rao, E. Bertino, N. Li, and J. Lobo. Policy decomposition for collaborative access control. In 13th ACM SACMAT, pages 103-112, 2008.
    • (2008) 13th ACM SACMAT , pp. 103-112
    • Lin, D.1    Rao, P.2    Bertino, E.3    Li, N.4    Lobo, J.5
  • 15
    • 33745167684 scopus 로고    scopus 로고
    • When and how to develop domain-specific languages
    • M. Mernik, J. Heering, and A. Sloane. When and How to Develop Domain-Specific Languages. ACM Computing Surveys, 37(4):316-344, December 2005. (Pubitemid 43898543)
    • (2005) ACM Computing Surveys , vol.37 , Issue.4 , pp. 316-344
    • Mernik, M.1    Heering, J.2    Sloane, A.M.3
  • 17
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • Sept.
    • B. Neuman and T. Ts'o. Kerberos: an authentication service for computer networks. Communications Magazine, IEEE, 32(9):33-38, Sept. 1994.
    • (1994) Communications Magazine, IEEE , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.1    Ts'o, T.2
  • 20
    • 33646149431 scopus 로고    scopus 로고
    • March
    • OASIS. Security Assertion Markup Language. http://docs.oasis-open.org/ security/saml/v2.0/saml-core-2.0-os.pdf March 2005.
    • (2005) Security Assertion Markup Language
  • 24
    • 36749060136 scopus 로고    scopus 로고
    • Service-oriented computing: State of the art and research challenges
    • M. P. Papazoglou, P. Traverso, S. Dustdar, and F. Leymann. Service-Oriented Computing: State of the Art and Research Challenges. Computer, 40(11):38-45, 2007.
    • (2007) Computer , vol.40 , Issue.11 , pp. 38-45
    • Papazoglou, M.P.1    Traverso, P.2    Dustdar, S.3    Leymann, F.4
  • 25
    • 63449115454 scopus 로고    scopus 로고
    • A Taxonomy of Single Sign-On Systems
    • Information Security and Privacy
    • A. Pashalidis and C. J. Mitchell. A taxonomy of single sign-on systems. In 8th Australasian Conference on Information Security and Privacy, pages 249-264, 2003. (Pubitemid 36892639)
    • (2003) Lecture Notes in Computer Science , Issue.2727 , pp. 249-264
    • Pashalidis, A.1    Mitchell, C.J.2
  • 28
    • 33344465743 scopus 로고    scopus 로고
    • Model-driven engineering - guest editor's introduction
    • February
    • D. C. Schmidt. Model-Driven Engineering - Guest Editor's Introduction. Computer, 39(2), February 2006.
    • (2006) Computer , vol.39 , Issue.2
    • Schmidt, D.C.1
  • 29
    • 0141725660 scopus 로고    scopus 로고
    • The pragmatics of model-driven development
    • B. Selic. The Pragmatics of Model-Driven Development. IEEE Software, 20(5), 2003.
    • (2003) IEEE Software , vol.20 , Issue.5
    • Selic, B.1
  • 30
    • 0141725642 scopus 로고    scopus 로고
    • Model transformation: The heart and soul of model-driven software development
    • S. Sendall and W. Kozaczynski. Model Transformation: The Heart and Soul of Model-Driven Software Development. IEEE Software, 20(5), 2003.
    • (2003) IEEE Software , vol.20 , Issue.5
    • Sendall, S.1    Kozaczynski, W.2
  • 31
  • 32
    • 0346026383 scopus 로고    scopus 로고
    • Notable design patterns for domain-specific languages
    • PII S0164121200000893
    • D. Spinellis. Notable design patterns for domain-specific languages. J. of Systems and Software, 56(1):91-99, 2001. (Pubitemid 33649529)
    • (2001) Journal of Systems and Software , vol.56 , Issue.1 , pp. 91-99
    • Spinellis, D.1
  • 35
    • 77249095368 scopus 로고    scopus 로고
    • Scenario-driven role engineering
    • January/February
    • M. Strembeck. Scenario-driven Role Engineering. IEEE Security & Privacy, 8(1), January/February 2010.
    • (2010) IEEE Security & Privacy , vol.8 , Issue.1
    • Strembeck, M.1
  • 36
    • 79952439750 scopus 로고    scopus 로고
    • Modeling process-related RBAC models with extended UML activity models
    • May
    • M. Strembeck and J. Mendling. Modeling Process-related RBAC Models with Extended UML Activity Models. Information and Software Technology, 53(5), May 2011.
    • (2011) Information and Software Technology , vol.53 , Issue.5
    • Strembeck, M.1    Mendling, J.2
  • 37
    • 4444246080 scopus 로고    scopus 로고
    • An integrated approach to engineer and enforce context constraints in RBAC environments
    • M. Strembeck and G. Neumann. An Integrated Approach to Engineer and Enforce Context Constraints in RBAC Environments. ACM Trans. on Inf. and System Security, 7(3), 2004.
    • (2004) ACM Trans. on Inf. and System Security , vol.7 , Issue.3
    • Strembeck, M.1    Neumann, G.2
  • 38
    • 70349874815 scopus 로고    scopus 로고
    • An approach for the systematic development of domain-specific languages
    • October
    • M. Strembeck and U. Zdun. An Approach for the Systematic Development of Domain-Specific Languages. Software: Practice and Experience (SP&E), 39(15), October 2009.
    • (2009) Software: Practice and Experience (SP&E) , vol.39 , Issue.15
    • Strembeck, M.1    Zdun, U.2
  • 39
  • 41
    • 84884127162 scopus 로고    scopus 로고
    • Modeling composition in dynamic programming environments with model transformations
    • U. Zdun and M. Strembeck. Modeling Composition in Dynamic Programming Environments with Model Transformations. In 5th Int. Sym. on Software Composition, 2006.
    • (2006) 5th Int. Sym. on Software Composition
    • Zdun, U.1    Strembeck, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.