메뉴 건너뛰기




Volumn 4, Issue 3, 2011, Pages 243-254

The integration of corporate security strategies in collaborative business processes

Author keywords

Computer security; data processing; distributed information system

Indexed keywords

BUSINESS ORGANIZATIONS; BUSINESS PROCESS; BUSINESS SERVICE; COLLABORATIVE BUSINESS PROCESS; COLLABORATIVE PROCESS; DISTRIBUTED ENVIRONMENTS; DISTRIBUTED INFORMATION SYSTEMS; END-TO-END SECURITY; ENTERPRISE SERVICE BUS; NEW SERVICES; QUALITY OF PROTECTIONS; SECURITY APPROACH; SECURITY OBJECTIVES; SECURITY REQUIREMENTS; SECURITY STRATEGIES; SERVICE DESCRIPTION; SERVICE ENVIRONMENT; SERVICE ORIENTED; STRUCTURAL ORGANIZATION; TECHNICAL SECURITY; VIRTUAL ENTERPRISE;

EID: 81455143669     PISSN: 19391374     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSC.2010.18     Document Type: Article
Times cited : (17)

References (40)
  • 2
    • 81455150925 scopus 로고    scopus 로고
    • An introduction to the OCTAVESM method
    • C. Alberts and A. Dorofee, "An Introduction to the OCTAVESM Method," white paper, CERT, http://www.cert.org/octave/methodintro.html, 2001.
    • (2001) White Paper, CERT
    • Alberts, C.1    Dorofee, A.2
  • 7
    • 81455138997 scopus 로고    scopus 로고
    • CLUSIF Mehari 2000
    • CLUSIF, Mehari, https://www.clusif.asso.fr/fr/production/ouvrages/pdf/ MEHARI.pdf, 2000.
  • 8
    • 81455138998 scopus 로고    scopus 로고
    • Common Criteria Organization
    • Common Criteria Organization, "Common Criteria an Introduction," http://www.commoncriteria.org/introductory-over views/CCIntroduction.pdf, p. 20, 2000.
    • (2000) Common Criteria An Introduction , pp. 20
  • 9
    • 77954513436 scopus 로고    scopus 로고
    • Direction Centrale de la Sécurité des Systèmes d'Information (DCSSI) rapport technique
    • Direction Centrale de la Sécurité des Systèmes d'Information (DCSSI), "Expression des Besoins et Identification des Objectifs de Sécurité (EBIOS)," rapport technique, http://www.ssi.gouv.fr/fr/confiance/ebios.html, 2004.
    • (2004) Expression des Besoins et Identification des Objectifs de Sécurité (EBIOS)
  • 10
    • 81455156482 scopus 로고    scopus 로고
    • US Department of Defense, Trusted Computer Security Evaluation Criteria-Orange Book, DOD 5200.28-STD report,1985
    • US Department of Defense, Trusted Computer Security Evaluation Criteria-Orange Book, DOD 5200.28-STD report, 1985.
  • 11
    • 63649132566 scopus 로고    scopus 로고
    • US Department of Defense
    • US Department of Defense, NRL Security Ontology, http://chacs.nrl.navy. mil/projects/4SEA/ontology.html, 2005.
    • (2005) NRL Security Ontology
  • 13
    • 81455156481 scopus 로고
    • Information Technology Security Evaluation Criteria (ITSEC)
    • Information Technology Security Evaluation Criteria (ITSEC), "Criteria and Methods of Evaluations of Information Systems," http://www.cordis.lu/infosec/src/crit.htm, 1991.
    • (1991) Criteria and Methods of Evaluations of Information Systems
  • 16
    • 81455129653 scopus 로고    scopus 로고
    • ISO/IEC 17799 Code of Practice for Information Security Management, ISO
    • ISO/IEC 17799, Standard-Information Technology, Code of Practice for Information Security Management, ISO, 2000.
    • (2000) Standard-Information Technology
  • 17
    • 33750034578 scopus 로고    scopus 로고
    • Standards-based approaches to B2B workflow integration
    • DOI 10.1016/j.cie.2006.02.011, PII S0360835206000982
    • J.-Y. Jung, H. Kim, and S.-H. Kang, "Standards-Based Approaches to B2B Workflow Integration," Computers and Industrial Eng., vol. 51, no. 2, pp. 321-334, Oct. 2006. (Pubitemid 44573589)
    • (2006) Computers and Industrial Engineering , vol.51 , Issue.2 , pp. 321-334
    • Jung, J.-Y.1    Kim, H.2    Kang, S.-H.3
  • 19
    • 0034318674 scopus 로고    scopus 로고
    • Application of security policy to role-based access control and the common data security architecture
    • DOI 10.1016/S0140-3664(00)00244-9
    • A. Lin, R. Brown, "The Application of Security Policy to Role-Based Access Control and the Common Data Security Architecture," Computer Comm., vol. 23, pp. 1584-1593, 2000. (Pubitemid 32033558)
    • (2000) Computer Communications , vol.23 , Issue.17 , pp. 1584-1593
    • Lin, A.1    Brown, R.2
  • 20
    • 12244257385 scopus 로고    scopus 로고
    • Technical Note SOFT01 (CMU/SEI-2001-TN-008), Software Eng. Inst., Carnegie Mellon Univ. Oct.
    • A.P. Moore and R.J. Ellison, "Architectural Refinement for the Design of Survivable Systems," Technical Note SOFT01 (CMU/SEI-2001-TN-008), Software Eng. Inst., Carnegie Mellon Univ., http://www.sei.cmu.edu/ publications/documents/01.reports/01tn008.html, Oct. 2001.
    • (2001) Architectural Refinement for the Design of Survivable Systems
    • Moore, A.P.1    Ellison, R.J.2
  • 21
    • 2942533835 scopus 로고    scopus 로고
    • Organization for the Advancement of Structured Information Standards (OASIS)
    • Organization for the Advancement of Structured Information Standards (OASIS), "Security Assertion Markup Language (SAML)," http://xml.coverpages.org/saml.html, 2002.
    • (2002) Security Assertion Markup Language (SAML)
  • 22
    • 33745883651 scopus 로고    scopus 로고
    • Organization for the Advancement of Structured Information Standards (OASIS)
    • Organization for the Advancement of Structured Information Standards (OASIS), "Extensible Access Control Markup Language (XACML) TC," http://www.oasisopen.org/committees/tc-home.php?wg-abbrev=xacml, 2008.
    • (2008) Extensible Access Control Markup Language (XACML) TC
  • 25
    • 81455131413 scopus 로고    scopus 로고
    • Services Contextualisés pour Utilisateurs et la Modé lisation des Utilisateurs à Base d'Ontologie: Dé fis et Perspectives
    • L. Razmerita, "Services Contextualisés pour Utilisateurs et la Modé lisation des Utilisateurs à Base d'Ontologie: Dé fis et Perspectives," Proc. EGC Workshop, 2005.
    • (2005) Proc. EGC Workshop
    • Razmerita, L.1
  • 27
    • 78651416405 scopus 로고    scopus 로고
    • Technical Report DERI-TR-2008-06-26, Digital Enterprise Research Inst., Galway Nat'l Univ.
    • Z. Zhou and S. Bhiri, "Space Based Process Mediator," Technical Report DERI-TR-2008-06-26, Digital Enterprise Research Inst., Galway Nat'l Univ., 2008.
    • (2008) Space Based Process Mediator
    • Zhou, Z.1    Bhiri, S.2
  • 28
    • 33749367621 scopus 로고    scopus 로고
    • Security requirement analysis of business processes
    • DOI 10.1007/s10660-006-8677-7
    • P. Herrmann and G. Herrmann, "Security Requirement Analysis of Business Processes," Electronic Commerce Research, vol. 6, nos. 3/4, pp. 305-335, Oct. 2006. (Pubitemid 44488792)
    • (2006) Electronic Commerce Research , vol.6 , Issue.3-4 , pp. 305-335
    • Herrmann, P.1    Herrmann, G.2
  • 29
    • 63949084590 scopus 로고    scopus 로고
    • Model-driven business process security requirement specification
    • Apr.
    • C. Wolter, M. Menzel, A. Schaad, P. Miseldine, and C. Meinel, "Model-Driven Business Process Security Requirement Specification," J. Systems Architecture, vol. 55, no. 4, pp. 211-223, Apr. 2009.
    • (2009) J. Systems Architecture , vol.55 , Issue.4 , pp. 211-223
    • Wolter, C.1    Menzel, M.2    Schaad, A.3    Miseldine, P.4    Meinel, C.5
  • 39
    • 77954328819 scopus 로고    scopus 로고
    • Yet another semantic annotation for WSDL (YASA4WSDL)
    • Oct.
    • Y. Chabeb and S. Tata, "Yet Another Semantic Annotation for WSDL (YASA4WSDL)," Proc. IADIS WWW/Internet Conf., pp. 462-467, Oct. 2008.
    • (2008) Proc. IADIS WWW/Internet Conf. , pp. 462-467
    • Chabeb, Y.1    Tata, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.