-
1
-
-
33750940982
-
Modelling permissions in a (U/X)ML world
-
M. Alam, R. Breu, and M. Hafner, "Modelling Permissions in a (U/X)ML World," Proc. Int'l Conf. Availability, Reliability, and Security (ARES '06), pp. 685-692, 2006.
-
(2006)
Proc. Int'l Conf. Availability, Reliability, and Security (ARES '06)
, pp. 685-692
-
-
Alam, M.1
Breu, R.2
Hafner, M.3
-
2
-
-
81455150925
-
An introduction to the OCTAVESM method
-
C. Alberts and A. Dorofee, "An Introduction to the OCTAVESM Method," white paper, CERT, http://www.cert.org/octave/methodintro.html, 2001.
-
(2001)
White Paper, CERT
-
-
Alberts, C.1
Dorofee, A.2
-
4
-
-
13844285637
-
-
A. Andrieux, K. Czajkowski, A. Dan, K. Keahey, H. Ludwig, J. Pruyne, J. Rofrano, S. Tuecke, and M. Xu, "Web Services Agreement Specification (WS-Agreement)," http://www.ogf. org/documents/GFD.107.pdf, 2007.
-
(2007)
Web Services Agreement Specification (WS-Agreement)
-
-
Andrieux, A.1
Czajkowski, K.2
Dan, A.3
Keahey, K.4
Ludwig, H.5
Pruyne, J.6
Rofrano, J.7
Tuecke, S.8
Xu, M.9
-
5
-
-
81455129654
-
-
A. Dan, H. Ludwig, and J. Rofrano, "WS-Agreement Structure, Version 0.1," http://www.mcs.anl.gov/~keahey/Meetings/GRAAP/WS-Agreement Structure.pdf, 2004.
-
(2004)
WS-Agreement Structure, Version 0.1
-
-
Dan, A.1
Ludwig, H.2
Rofrano, J.3
-
6
-
-
34247268048
-
Towards a modeling framework for networks of SMEs
-
F. Biennier, X. Boucher, A. Hammami, and L. Vincent, "Towards a Modeling Framework for Networks of SMEs," Proc. IFIP TC5/WG5.5 Third Working Conf. Infrastructures for Virtual Enterprises: Collaborative Business Ecosystems and Virtual Enterprises (PRO-VE '02), pp. 11-18, 2002.
-
(2002)
Proc. IFIP TC5/WG5.5 Third Working Conf. Infrastructures for Virtual Enterprises: Collaborative Business Ecosystems and Virtual Enterprises (PRO-VE '02)
, pp. 11-18
-
-
Biennier, F.1
Boucher, X.2
Hammami, A.3
Vincent, L.4
-
7
-
-
81455138997
-
-
CLUSIF Mehari 2000
-
CLUSIF, Mehari, https://www.clusif.asso.fr/fr/production/ouvrages/pdf/ MEHARI.pdf, 2000.
-
-
-
-
8
-
-
81455138998
-
-
Common Criteria Organization
-
Common Criteria Organization, "Common Criteria an Introduction," http://www.commoncriteria.org/introductory-over views/CCIntroduction.pdf, p. 20, 2000.
-
(2000)
Common Criteria An Introduction
, pp. 20
-
-
-
9
-
-
77954513436
-
-
Direction Centrale de la Sécurité des Systèmes d'Information (DCSSI) rapport technique
-
Direction Centrale de la Sécurité des Systèmes d'Information (DCSSI), "Expression des Besoins et Identification des Objectifs de Sécurité (EBIOS)," rapport technique, http://www.ssi.gouv.fr/fr/confiance/ebios.html, 2004.
-
(2004)
Expression des Besoins et Identification des Objectifs de Sécurité (EBIOS)
-
-
-
10
-
-
81455156482
-
-
US Department of Defense, Trusted Computer Security Evaluation Criteria-Orange Book, DOD 5200.28-STD report,1985
-
US Department of Defense, Trusted Computer Security Evaluation Criteria-Orange Book, DOD 5200.28-STD report, 1985.
-
-
-
-
11
-
-
63649132566
-
-
US Department of Defense
-
US Department of Defense, NRL Security Ontology, http://chacs.nrl.navy. mil/projects/4SEA/ontology.html, 2005.
-
(2005)
NRL Security Ontology
-
-
-
13
-
-
81455156481
-
-
Information Technology Security Evaluation Criteria (ITSEC)
-
Information Technology Security Evaluation Criteria (ITSEC), "Criteria and Methods of Evaluations of Information Systems," http://www.cordis.lu/infosec/src/crit.htm, 1991.
-
(1991)
Criteria and Methods of Evaluations of Information Systems
-
-
-
14
-
-
0002262722
-
Role based access control: Features and motivations
-
D. Ferraiolo, J. Cugini, and R. Kuhn, "Role Based Access Control: Features and Motivations," Proc. Ann. Computer Security Application Conf., pp. 554-563, 1995.
-
(1995)
Proc. Ann. Computer Security Application Conf.
, pp. 554-563
-
-
Ferraiolo, D.1
Cugini, J.2
Kuhn, R.3
-
16
-
-
81455129653
-
-
ISO/IEC 17799 Code of Practice for Information Security Management, ISO
-
ISO/IEC 17799, Standard-Information Technology, Code of Practice for Information Security Management, ISO, 2000.
-
(2000)
Standard-Information Technology
-
-
-
17
-
-
33750034578
-
Standards-based approaches to B2B workflow integration
-
DOI 10.1016/j.cie.2006.02.011, PII S0360835206000982
-
J.-Y. Jung, H. Kim, and S.-H. Kang, "Standards-Based Approaches to B2B Workflow Integration," Computers and Industrial Eng., vol. 51, no. 2, pp. 321-334, Oct. 2006. (Pubitemid 44573589)
-
(2006)
Computers and Industrial Engineering
, vol.51
, Issue.2
, pp. 321-334
-
-
Jung, J.-Y.1
Kim, H.2
Kang, S.-H.3
-
18
-
-
84931361791
-
A uniform model for authorization and access control in enterprise information platform
-
D. Li, S. Hu, and S. Bai, "A Uniform Model for Authorization and Access Control in Enterprise Information Platform," Proc. Int'l Conf. Eng. and Deployment of Cooperative Information Systems (EDCIS '02), pp. 180-192, 2002.
-
(2002)
Proc. Int'l Conf. Eng. and Deployment of Cooperative Information Systems (EDCIS '02)
, pp. 180-192
-
-
Li, D.1
Hu, S.2
Bai, S.3
-
19
-
-
0034318674
-
Application of security policy to role-based access control and the common data security architecture
-
DOI 10.1016/S0140-3664(00)00244-9
-
A. Lin, R. Brown, "The Application of Security Policy to Role-Based Access Control and the Common Data Security Architecture," Computer Comm., vol. 23, pp. 1584-1593, 2000. (Pubitemid 32033558)
-
(2000)
Computer Communications
, vol.23
, Issue.17
, pp. 1584-1593
-
-
Lin, A.1
Brown, R.2
-
20
-
-
12244257385
-
-
Technical Note SOFT01 (CMU/SEI-2001-TN-008), Software Eng. Inst., Carnegie Mellon Univ. Oct.
-
A.P. Moore and R.J. Ellison, "Architectural Refinement for the Design of Survivable Systems," Technical Note SOFT01 (CMU/SEI-2001-TN-008), Software Eng. Inst., Carnegie Mellon Univ., http://www.sei.cmu.edu/ publications/documents/01.reports/01tn008.html, Oct. 2001.
-
(2001)
Architectural Refinement for the Design of Survivable Systems
-
-
Moore, A.P.1
Ellison, R.J.2
-
21
-
-
2942533835
-
-
Organization for the Advancement of Structured Information Standards (OASIS)
-
Organization for the Advancement of Structured Information Standards (OASIS), "Security Assertion Markup Language (SAML)," http://xml.coverpages.org/saml.html, 2002.
-
(2002)
Security Assertion Markup Language (SAML)
-
-
-
22
-
-
33745883651
-
-
Organization for the Advancement of Structured Information Standards (OASIS)
-
Organization for the Advancement of Structured Information Standards (OASIS), "Extensible Access Control Markup Language (XACML) TC," http://www.oasisopen.org/committees/tc-home.php?wg-abbrev=xacml, 2008.
-
(2008)
Extensible Access Control Markup Language (XACML) TC
-
-
-
25
-
-
81455131413
-
Services Contextualisés pour Utilisateurs et la Modé lisation des Utilisateurs à Base d'Ontologie: Dé fis et Perspectives
-
L. Razmerita, "Services Contextualisés pour Utilisateurs et la Modé lisation des Utilisateurs à Base d'Ontologie: Dé fis et Perspectives," Proc. EGC Workshop, 2005.
-
(2005)
Proc. EGC Workshop
-
-
Razmerita, L.1
-
27
-
-
78651416405
-
-
Technical Report DERI-TR-2008-06-26, Digital Enterprise Research Inst., Galway Nat'l Univ.
-
Z. Zhou and S. Bhiri, "Space Based Process Mediator," Technical Report DERI-TR-2008-06-26, Digital Enterprise Research Inst., Galway Nat'l Univ., 2008.
-
(2008)
Space Based Process Mediator
-
-
Zhou, Z.1
Bhiri, S.2
-
28
-
-
33749367621
-
Security requirement analysis of business processes
-
DOI 10.1007/s10660-006-8677-7
-
P. Herrmann and G. Herrmann, "Security Requirement Analysis of Business Processes," Electronic Commerce Research, vol. 6, nos. 3/4, pp. 305-335, Oct. 2006. (Pubitemid 44488792)
-
(2006)
Electronic Commerce Research
, vol.6
, Issue.3-4
, pp. 305-335
-
-
Herrmann, P.1
Herrmann, G.2
-
29
-
-
63949084590
-
Model-driven business process security requirement specification
-
Apr.
-
C. Wolter, M. Menzel, A. Schaad, P. Miseldine, and C. Meinel, "Model-Driven Business Process Security Requirement Specification," J. Systems Architecture, vol. 55, no. 4, pp. 211-223, Apr. 2009.
-
(2009)
J. Systems Architecture
, vol.55
, Issue.4
, pp. 211-223
-
-
Wolter, C.1
Menzel, M.2
Schaad, A.3
Miseldine, P.4
Meinel, C.5
-
31
-
-
0242625201
-
Model driven security for process-oriented systems
-
D. Basin, J. Doser, and T. Lodderstedt, "Model Driven Security for Process-Oriented Systems," Proc. the Eighth ACM Symp. Access Control Models and Technologies, pp. 100-109, 2003.
-
(2003)
Proc. the Eighth ACM Symp. Access Control Models and Technologies
, pp. 100-109
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
33
-
-
33750083883
-
Towards a UML 2.0 extension for the modeling of security requirements in business processes
-
Trust and Privacy in Digital Business - Third International Conference, TrustBus 2006, Proceedings
-
A. Rodŕguez, E. Fernández-Medina, and M. Piattini, "Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes," Proc. TrustBus, pp. 51-61, 2006. (Pubitemid 44577491)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4083
, pp. 51-61
-
-
Rodriguez, A.1
Fernandez-Medina, E.2
Piattini, M.3
-
36
-
-
33646699357
-
Security Ontology for annotating resources
-
DOI 10.1007/11575801-34, On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE - OTM Confederated International Conferences, CoopIS, DOA, and ODBASE 2005, Proceedings
-
A. Kim, J. Luo, and M.H. Kang, "Security Ontology for Annotating Resources," Proc. OTM Conf., vol. 2, pp. 1483-1499, 2005. (Pubitemid 43734382)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3761
, pp. 1483-1499
-
-
Kim, A.1
Luo, J.2
Kang, M.3
-
39
-
-
77954328819
-
Yet another semantic annotation for WSDL (YASA4WSDL)
-
Oct.
-
Y. Chabeb and S. Tata, "Yet Another Semantic Annotation for WSDL (YASA4WSDL)," Proc. IADIS WWW/Internet Conf., pp. 462-467, Oct. 2008.
-
(2008)
Proc. IADIS WWW/Internet Conf.
, pp. 462-467
-
-
Chabeb, Y.1
Tata, S.2
-
40
-
-
77954323254
-
YASA-M A semantic web service matchmaker
-
Apr.
-
Y. Chabeb, S. Tata, and A. Ozanne, "YASA-M A Semantic Web Service Matchmaker," Proc. Int'l Conf. Advanced Information Networking and Applications (AINA '10), pp. 20-23, Apr. 2010.
-
(2010)
Proc. Int'l Conf. Advanced Information Networking and Applications (AINA '10)
, pp. 20-23
-
-
Chabeb, Y.1
Tata, S.2
Ozanne, A.3
|