메뉴 건너뛰기




Volumn 55, Issue 11, 2013, Pages 1884-1903

Enforcement of entailment constraints in distributed service-based business processes

Author keywords

Architecture (SOA); Business process management; Entailment constraints; Identity and access management; Service Oriented; WS BPEL

Indexed keywords

BUSINESS PROCESS MANAGEMENT; ENTAILMENT CONSTRAINTS; IDENTITY AND ACCESS MANAGEMENTS; SERVICE ORIENTED; WS-BPEL;

EID: 84884150946     PISSN: 09505849     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.infsof.2013.05.001     Document Type: Article
Times cited : (18)

References (86)
  • 1
    • 80054797561 scopus 로고    scopus 로고
    • The service-oriented metaphor deciphered
    • D. Draheim The service-oriented metaphor deciphered JCSE 4 4 2010 253 275
    • (2010) JCSE , vol.4 , Issue.4 , pp. 253-275
    • Draheim, D.1
  • 2
    • 14844363625 scopus 로고    scopus 로고
    • Service-oriented computing: Key concepts and principles
    • M. Huhns, and M. Singh Service-oriented computing: key concepts and principles IEEE Internet Computing 9 2005 75 81
    • (2005) IEEE Internet Computing , vol.9 , pp. 75-81
    • Huhns, M.1    Singh, M.2
  • 3
    • 36749060136 scopus 로고    scopus 로고
    • Service-oriented computing: State of the art and research challenges
    • M.P. Papazoglou, P. Traverso, S. Dustdar, and F. Leymann Service-oriented computing: state of the art and research challenges IEEE Computer 40 11 2007 38 45
    • (2007) IEEE Computer , vol.40 , Issue.11 , pp. 38-45
    • Papazoglou, M.P.1    Traverso, P.2    Dustdar, S.3    Leymann, F.4
  • 6
    • 57849114441 scopus 로고    scopus 로고
    • Compliance deconstructed
    • J. Cannon, and M. Byers Compliance deconstructed ACM Queue 4 7 2006 30 37
    • (2006) ACM Queue , vol.4 , Issue.7 , pp. 30-37
    • Cannon, J.1    Byers, M.2
  • 12
    • 77249095368 scopus 로고    scopus 로고
    • Scenario-driven role engineering
    • M. Strembeck Scenario-driven role engineering IEEE Security & Privacy 8 1 2010 28 35
    • (2010) IEEE Security & Privacy , vol.8 , Issue.1 , pp. 28-35
    • Strembeck, M.1
  • 14
    • 79952439750 scopus 로고    scopus 로고
    • Modeling process-related RBAC models with extended UML activity models
    • M. Strembeck, and J. Mendling Modeling process-related RBAC models with extended UML activity models Information and Software Technology 53 5 2011 456 483
    • (2011) Information and Software Technology , vol.53 , Issue.5 , pp. 456-483
    • Strembeck, M.1    Mendling, J.2
  • 16
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • E. Bertino, E. Ferraria, and V. Atluri The specification and enforcement of authorization constraints in workflow management systems ACM Transactions on Information and System Security 2 1 1999 65 104
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferraria, E.2    Atluri, V.3
  • 17
    • 0034810791 scopus 로고    scopus 로고
    • Separation of duties for access control enforcement in workflow environments
    • R. Botha, and J. Eloff Separation of duties for access control enforcement in workflow environments IBM Systems Journal 40 3 2001 666 682
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 666-682
    • Botha, R.1    Eloff, J.2
  • 22
    • 33344465743 scopus 로고    scopus 로고
    • Guest editor's introduction: Model-driven engineering
    • D.C. Schmidt Guest editor's introduction: model-driven engineering IEEE Computer 39 2 2006 25 31
    • (2006) IEEE Computer , vol.39 , Issue.2 , pp. 25-31
    • Schmidt, D.C.1
  • 23
    • 0141725660 scopus 로고    scopus 로고
    • The pragmatics of model-driven development
    • B. Selic The pragmatics of model-driven development IEEE Software 20 5 2003 19 25
    • (2003) IEEE Software , vol.20 , Issue.5 , pp. 19-25
    • Selic, B.1
  • 25
    • 33745167684 scopus 로고    scopus 로고
    • When and how to develop domain-specific languages
    • M. Mernik, J. Heering, and A. Sloane When and how to develop domain-specific languages ACM Computing Surveys 37 4 2005 316 344
    • (2005) ACM Computing Surveys , vol.37 , Issue.4 , pp. 316-344
    • Mernik, M.1    Heering, J.2    Sloane, A.3
  • 26
    • 0346026383 scopus 로고    scopus 로고
    • Notable design patterns for domain-specific languages
    • D. Spinellis Notable design patterns for domain-specific languages Journal of Systems and Software 56 1 2001 91 99
    • (2001) Journal of Systems and Software , vol.56 , Issue.1 , pp. 91-99
    • Spinellis, D.1
  • 28
    • 70349874815 scopus 로고    scopus 로고
    • An approach for the systematic development of domain-specific languages
    • M. Strembeck, U. Zdun, An approach for the systematic development of domain-specific languages, Software: Practice and Experience 39 (15) (2009).
    • (2009) Software: Practice and Experience , vol.39 , Issue.15
    • Strembeck, M.1    Zdun, U.2
  • 30
    • 0141725642 scopus 로고    scopus 로고
    • Model transformation: The heart and soul of model-driven software development
    • S. Sendall, W. Kozaczynski, Model transformation: the heart and soul of model-driven software development, IEEE Software 20 (5) (2003).
    • (2003) IEEE Software , vol.20 , Issue.5
    • Sendall, S.1    Kozaczynski, W.2
  • 32
    • 84884125241 scopus 로고    scopus 로고
    • Object Management Group, UML 2.4.1 Superstructure, August 2011
    • Object Management Group, UML 2.4.1 Superstructure, August 2011 < http://www.omg.org/spec/UML/2.4.1 >.
  • 33
    • 84884139448 scopus 로고    scopus 로고
    • OASIS, Web Services Business Process Execution Language, 2007
    • OASIS, Web Services Business Process Execution Language, 2007 < http://docs.oasis-open.org/wsbpel/2.0/OS >.
  • 34
    • 84884150882 scopus 로고    scopus 로고
    • OASIS, Security Assertion Markup Language, March 2005
    • OASIS, Security Assertion Markup Language, March 2005 < http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf >.
  • 35
    • 84884160735 scopus 로고    scopus 로고
    • World Wide Web Consortium, SOAP Messaging Framework, 2007
    • World Wide Web Consortium, SOAP Messaging Framework, 2007 < http://www.w3.org/TR/soap12-part1/ >.
  • 37
    • 84884128291 scopus 로고    scopus 로고
    • Object Management Group, Meta Object Facility (MOF) 2.0 Query/View/Transformation Specification (January 2011)
    • Object Management Group, Meta Object Facility (MOF) 2.0 Query/View/Transformation Specification (January 2011). URL: http://www.omg.org/spec/QVT/.
  • 38
    • 84884161319 scopus 로고    scopus 로고
    • OASIS, Metadata for the OASIS Security Assertion Markup Language (SAML), 2005
    • OASIS, Metadata for the OASIS Security Assertion Markup Language (SAML), 2005 < http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf >.
  • 55
    • 84884155940 scopus 로고    scopus 로고
    • OASIS, WS-SecurityPolicy 1.3, 2009 < http://docs.oasis-open.org/ws-sx/ ws-securitypolicy/v1.3/os/ >.
    • (2009) OASIS, WS-SecurityPolicy 1.3
  • 57
    • 4444246080 scopus 로고    scopus 로고
    • An integrated approach to engineer and enforce context constraints in RBAC environments
    • M. Strembeck, and G. Neumann An integrated approach to engineer and enforce context constraints in RBAC environments ACM Transactions on Information and System Security 7 3 2004 392 427
    • (2004) ACM Transactions on Information and System Security , vol.7 , Issue.3 , pp. 392-427
    • Strembeck, M.1    Neumann, G.2
  • 65
    • 57349171335 scopus 로고    scopus 로고
    • Policy decomposition for collaborative access control
    • D. Lin, P. Rao, E. Bertino, N. Li, J. Lobo, Policy decomposition for collaborative access control, in: 13th ACM SACMAT, 2008, pp. 103-112.
    • (2008) 13th ACM SACMAT , pp. 103-112
    • Lin, D.1    Rao, P.2    Bertino, E.3    Li, N.4    Lobo, J.5
  • 68
    • 84884144866 scopus 로고    scopus 로고
    • OASIS, eXtensible Access Control Markup Language, 2005
    • OASIS, eXtensible Access Control Markup Language, 2005 < http://docs.oasis-open.org/xacml/2.0 >.
  • 74
    • 79959698716 scopus 로고    scopus 로고
    • A transformation contract to generate aspects from access control policies
    • C. Braga A transformation contract to generate aspects from access control policies Software and Systems Modeling 10 2011 395 409
    • (2011) Software and Systems Modeling , vol.10 , pp. 395-409
    • Braga, C.1
  • 81
    • 43749117481 scopus 로고    scopus 로고
    • An environment for flexible advanced compensations of web service transactions
    • M. Schäfer, P. Dolog, and W. Nejdl An environment for flexible advanced compensations of web service transactions ACM Transactions on the Web 2 2 2008 14:1 14:36
    • (2008) ACM Transactions on the Web , vol.2 , Issue.2 , pp. 141-1436
    • Schäfer, M.1    Dolog, P.2    Nejdl, W.3
  • 83
    • 0742268963 scopus 로고    scopus 로고
    • Web service conversation modeling: A cornerstone for e-business automation
    • B. Benatallah, F. Casati, and F. Toumani Web service conversation modeling: a cornerstone for e-business automation IEEE Internet Computing 8 1 2004 46 54
    • (2004) IEEE Internet Computing , vol.8 , Issue.1 , pp. 46-54
    • Benatallah, B.1    Casati, F.2    Toumani, F.3
  • 85
    • 84877951841 scopus 로고    scopus 로고
    • Supporting entailment constraints in the context of collaborative web applications
    • ACM
    • P. Gaubatz, U. Zdun, Supporting entailment constraints in the context of collaborative web applications, in: 28th Symposium on Applied Computing (SAC), ACM, 2013.
    • (2013) 28th Symposium on Applied Computing (SAC)
    • Gaubatz, P.1    Zdun, U.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.