메뉴 건너뛰기




Volumn 7565 LNCS, Issue PART 1, 2012, Pages 232-249

Aligning service-oriented architectures with security requirements

Author keywords

alignment; evolution; security requirements; SOA

Indexed keywords

E-GOVERNMENT; EVOLUTION; NON-COMPLIANCE; NON-REPUDIATION; ON-THE-FLY; PRIVACY VIOLATION; SECURITY REQUIREMENTS; SERVICE ORIENTED; SOA; SYSTEM ARCHITECTURES; SYSTEM DEPLOYMENT; SYSTEMS EVOLUTION;

EID: 84872768719     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-33606-5_15     Document Type: Conference Paper
Times cited : (5)

References (24)
  • 1
    • 84889986653 scopus 로고    scopus 로고
    • Software Architecture Evolution
    • Mens, T., Demeyer, S. (eds.) Software Evolution. Springer, Heidelberg
    • Barais, O., Le Meur, A.F., Duchien, L., Lawall, J.: Software Architecture Evolution. In: Mens, T., Demeyer, S. (eds.) Software Evolution. LNCS, pp. 233-262. Springer, Heidelberg (2008)
    • (2008) LNCS , pp. 233-262
    • Barais, O.1    Le Meur, A.F.2    Duchien, L.3    Lawall, J.4
  • 2
    • 36849087931 scopus 로고    scopus 로고
    • Systematic Integration between Requirements and Architecture
    • Choren, R., Garcia, A., Lucena, C., Romanovsky, A. (eds.) SELMAS 2004. Springer, Heidelberg
    • Bastos, L.R.D., Castro, J.F.B.: Systematic Integration Between Requirements and Architecture. In: Choren, R., Garcia, A., Lucena, C., Romanovsky, A. (eds.) SELMAS 2004. LNCS, vol. 3390, pp. 85-103. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3390 , pp. 85-103
    • Bastos, L.R.D.1    Castro, J.F.B.2
  • 3
    • 84943233377 scopus 로고    scopus 로고
    • Adaptive and Dynamic Service Composition in eFlow
    • Wangler, B., Bergman, L.D. (eds.) CAiSE 2000. Springer, Heidelberg
    • Casati, F., Ilnicki, S., Jin, L., Krishnamoorthy, V., Shan, M.-C.: Adaptive and Dynamic Service Composition in eFlow. In: Wangler, B., Bergman, L.D. (eds.) CAiSE 2000. LNCS, vol. 1789, pp. 13-31. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1789 , pp. 13-31
    • Casati, F.1    Ilnicki, S.2    Jin, L.3    Krishnamoorthy, V.4    Shan, M.-C.5
  • 4
    • 84948972584 scopus 로고    scopus 로고
    • Security Requirements Engineering: When Anti-Requirements Hit the Fan
    • IEEE
    • Crook, R., Ince, D., Lin, L., Nuseibeh, B.: Security Requirements Engineering: When Anti-Requirements Hit the Fan. In: Proc. of RE 2002, pp. 203-205. IEEE (2002)
    • (2002) Proc. of RE 2002 , pp. 203-205
    • Crook, R.1    Ince, D.2    Lin, L.3    Nuseibeh, B.4
  • 7
    • 73549097759 scopus 로고    scopus 로고
    • Compliance Analysis Based on a Goaloriented Requirement Language Evaluation Methodology
    • Ghanavati, S., Amyot, D., Peyton, L.: Compliance Analysis Based on a Goaloriented Requirement Language Evaluation Methodology. In: Proc. of RE 2009, pp. 133-142 (2009)
    • (2009) Proc. of RE 2009 , pp. 133-142
    • Ghanavati, S.1    Amyot, D.2    Peyton, L.3
  • 8
    • 38349004887 scopus 로고    scopus 로고
    • Auditing Business Process Compliance
    • Krämer, B.J., Lin, K.-J., Narasimhan, P. (eds.) ICSOC 2007.
    • Ghose, A., Koliadis, G.: Auditing Business Process Compliance. In: Krämer, B.J., Lin, K.-J., Narasimhan, P. (eds.) ICSOC 2007. LNCS, vol. 4749, pp. 169-180.
    • LNCS , vol.4749 , pp. 169-180
    • Ghose, A.1    Koliadis, G.2
  • 9
    • 27644537252 scopus 로고    scopus 로고
    • Modeling Security Requirements through Ownership, Permission and Delegation
    • IEEE
    • Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Modeling Security Requirements through Ownership, Permission and Delegation. In: Proc. of RE 2005, pp. 167-176. IEEE (2005)
    • (2005) Proc. of RE 2005 , pp. 167-176
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 10
    • 84936941964 scopus 로고    scopus 로고
    • Relating Software Requirements and Architectures using Problem Frames
    • IEEE
    • Hall, J.G., Jackson, M., Laney, R.C., Nuseibeh, B., Rapanotti, L.: Relating Software Requirements and Architectures using Problem Frames. In: Proc. of RE 2002, pp. 137-144. IEEE (2002)
    • (2002) Proc. of RE 2002 , pp. 137-144
    • Hall, J.G.1    Jackson, M.2    Laney, R.C.3    Nuseibeh, B.4    Rapanotti, L.5
  • 11
    • 84991969449 scopus 로고
    • The Change and Evolution of Requirements as a Challenge to the Practice of Software Engineering
    • IEEE
    • Harker, S.D.P., Eason, K.D., Dobson, J.E.: The Change and Evolution of Requirements as a Challenge to the Practice of Software Engineering. In: Proc. of RE 1993, pp. 266-272. IEEE (1993)
    • (1993) Proc. of RE 1993 , pp. 266-272
    • Harker, S.D.P.1    Eason, K.D.2    Dobson, J.E.3
  • 13
    • 34247861351 scopus 로고    scopus 로고
    • A Static Compliance-Checking Framework for Business Process Models
    • Liu, Y., Müller, S., Xu, K.: A Static Compliance-Checking Framework for Business Process Models. IBM Systems Journal 46(2), 335-361 (2007)
    • (2007) IBM Systems Journal , vol.46 , Issue.2 , pp. 335-361
    • Liu, Y.1    Müller, S.2    Xu, K.3
  • 14
    • 85045573601 scopus 로고    scopus 로고
    • Using Abuse Case Models for Security Requirements Analysis
    • IEEE
    • McDermott, J., Fox, C.: Using Abuse Case Models for Security Requirements Analysis. In: Proc. of ACSAC 1999, pp. 55-64. IEEE (1999)
    • (1999) Proc. of ACSAC 1999 , pp. 55-64
    • McDermott, J.1    Fox, C.2
  • 16
    • 85008523798 scopus 로고    scopus 로고
    • Weaving together requirements and architectures
    • Nuseibeh, B.: Weaving together requirements and architectures. Computer 34(3), 115-119 (2001)
    • (2001) Computer , vol.34 , Issue.3 , pp. 115-119
    • Nuseibeh, B.1
  • 17
    • 85023009798 scopus 로고    scopus 로고
    • Requirements Engineering: A Roadmap
    • ACM
    • Nuseibeh, B., Easterbrook, S.: Requirements Engineering: a Roadmap. In: Proc. of FOSE 2000, pp. 35-46. ACM (2000)
    • (2000) Proc. of FOSE 2000 , pp. 35-46
    • Nuseibeh, B.1    Easterbrook, S.2
  • 19
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting Security Requirements with Misuse Cases
    • Sindre, G., Opdahl, A.L.: Eliciting Security Requirements with Misuse Cases. Requirements Engineering 10(1), 34-44 (2005)
    • (2005) Requirements Engineering , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 20
    • 0032675444 scopus 로고    scopus 로고
    • An Ontology for Commitments in Multiagent Systems: Toward a Unification of Normative Concepts
    • Singh, M.P.: An Ontology for Commitments in Multiagent Systems: Toward a Unification of Normative Concepts. Artificial Intelligence and Law 7(1), 97-113 (1999)
    • (1999) Artificial Intelligence and Law , vol.7 , Issue.1 , pp. 97-113
    • Singh, M.P.1
  • 21
    • 77149132467 scopus 로고    scopus 로고
    • Compliance with Information Security Policies: An Empirical Investigation
    • Siponen, M., Pahnila, S., Adam Mahmood, M.: Compliance with Information Security Policies: An Empirical Investigation. Computer 43, 64-71 (2010)
    • (2010) Computer , vol.43 , pp. 64-71
    • Siponen, M.1    Pahnila, S.2    Adam Mahmood, M.3
  • 22
    • 0033716145 scopus 로고    scopus 로고
    • Requirements Engineering in the Year 2000: A Research Perspective
    • van Lamsweerde, A.: Requirements Engineering in the Year 2000: A Research Perspective. In: Proc. of ICSE 2000, pp. 5-19 (2000)
    • (2000) Proc. of ICSE 2000 , pp. 5-19
    • Van Lamsweerde, A.1
  • 23
    • 35248827688 scopus 로고    scopus 로고
    • From System Goals to Software Architecture
    • Bernardo, M., Inverardi, P. (eds.) SFM 2003. Springer, Heidelberg
    • van Lamsweerde, A.: From System Goals to Software Architecture. In: Bernardo, M., Inverardi, P. (eds.) SFM 2003. LNCS, vol. 2804, pp. 25-43. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2804 , pp. 25-43
    • Van Lamsweerde, A.1
  • 24
    • 4544255381 scopus 로고    scopus 로고
    • Elaborating Security Requirements by Construction of Intentional Anti-Models
    • IEEE
    • van Lamsweerde, A.: Elaborating Security Requirements by Construction of Intentional Anti-Models. In: Proc. of ICSE 2004, pp. 148-157. IEEE (2004)
    • (2004) Proc. of ICSE 2004 , pp. 148-157
    • Van Lamsweerde, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.