-
1
-
-
80054797561
-
The service-oriented metaphor deciphered
-
D. Draheim The service-oriented metaphor deciphered JCSE 4 4 2010 253 275
-
(2010)
JCSE
, vol.4
, Issue.4
, pp. 253-275
-
-
Draheim, D.1
-
2
-
-
14844363625
-
Service-oriented computing: Key concepts and principles
-
M. Huhns, and M. Singh Service-oriented computing: key concepts and principles IEEE Internet Computing 9 2005 75 81
-
(2005)
IEEE Internet Computing
, vol.9
, pp. 75-81
-
-
Huhns, M.1
Singh, M.2
-
3
-
-
36749060136
-
Service-oriented computing: State of the art and research challenges
-
M.P. Papazoglou, P. Traverso, S. Dustdar, and F. Leymann Service-oriented computing: state of the art and research challenges IEEE Computer 40 11 2007 38 45
-
(2007)
IEEE Computer
, vol.40
, Issue.11
, pp. 38-45
-
-
Papazoglou, M.P.1
Traverso, P.2
Dustdar, S.3
Leymann, F.4
-
6
-
-
57849114441
-
Compliance deconstructed
-
J. Cannon, and M. Byers Compliance deconstructed ACM Queue 4 7 2006 30 37
-
(2006)
ACM Queue
, vol.4
, Issue.7
, pp. 30-37
-
-
Cannon, J.1
Byers, M.2
-
10
-
-
0030086382
-
Role-based access control models
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman Role-based access control models Computer 29 2 1996 38 47
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
12
-
-
77249095368
-
Scenario-driven role engineering
-
M. Strembeck Scenario-driven role engineering IEEE Security & Privacy 8 1 2010 28 35
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.1
, pp. 28-35
-
-
Strembeck, M.1
-
14
-
-
79952439750
-
Modeling process-related RBAC models with extended UML activity models
-
M. Strembeck, and J. Mendling Modeling process-related RBAC models with extended UML activity models Information and Software Technology 53 5 2011 456 483
-
(2011)
Information and Software Technology
, vol.53
, Issue.5
, pp. 456-483
-
-
Strembeck, M.1
Mendling, J.2
-
17
-
-
0034810791
-
Separation of duties for access control enforcement in workflow environments
-
R. Botha, and J. Eloff Separation of duties for access control enforcement in workflow environments IBM Systems Journal 40 3 2001 666 682
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 666-682
-
-
Botha, R.1
Eloff, J.2
-
18
-
-
4944250730
-
The consistency of task-based authorization constraints in workflow systems
-
K. Tan, J. Crampton, C. Gunter, The consistency of task-based authorization constraints in workflow systems, in: 17th IEEE Workshop on Computer Security Foundations (CSFW), 2004, pp. 155-169.
-
(2004)
17th IEEE Workshop on Computer Security Foundations (CSFW)
, pp. 155-169
-
-
Tan, K.1
Crampton, J.2
Gunter, C.3
-
21
-
-
79960160217
-
An integrated approach for identity and access management in a SOA context
-
W. Hummer, P. Gaubatz, M. Strembeck, U. Zdun, S. Dustdar, An integrated approach for identity and access management in a SOA context, in: 16th ACM Symposium on Access Control Models and Technologies (SACMAT), 2011, pp. 21-30.
-
(2011)
16th ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 21-30
-
-
Hummer, W.1
Gaubatz, P.2
Strembeck, M.3
Zdun, U.4
Dustdar, S.5
-
22
-
-
33344465743
-
Guest editor's introduction: Model-driven engineering
-
D.C. Schmidt Guest editor's introduction: model-driven engineering IEEE Computer 39 2 2006 25 31
-
(2006)
IEEE Computer
, vol.39
, Issue.2
, pp. 25-31
-
-
Schmidt, D.C.1
-
23
-
-
0141725660
-
The pragmatics of model-driven development
-
B. Selic The pragmatics of model-driven development IEEE Software 20 5 2003 19 25
-
(2003)
IEEE Software
, vol.20
, Issue.5
, pp. 19-25
-
-
Selic, B.1
-
25
-
-
33745167684
-
When and how to develop domain-specific languages
-
M. Mernik, J. Heering, and A. Sloane When and how to develop domain-specific languages ACM Computing Surveys 37 4 2005 316 344
-
(2005)
ACM Computing Surveys
, vol.37
, Issue.4
, pp. 316-344
-
-
Mernik, M.1
Heering, J.2
Sloane, A.3
-
26
-
-
0346026383
-
Notable design patterns for domain-specific languages
-
D. Spinellis Notable design patterns for domain-specific languages Journal of Systems and Software 56 1 2001 91 99
-
(2001)
Journal of Systems and Software
, vol.56
, Issue.1
, pp. 91-99
-
-
Spinellis, D.1
-
28
-
-
70349874815
-
An approach for the systematic development of domain-specific languages
-
M. Strembeck, U. Zdun, An approach for the systematic development of domain-specific languages, Software: Practice and Experience 39 (15) (2009).
-
(2009)
Software: Practice and Experience
, vol.39
, Issue.15
-
-
Strembeck, M.1
Zdun, U.2
-
30
-
-
0141725642
-
Model transformation: The heart and soul of model-driven software development
-
S. Sendall, W. Kozaczynski, Model transformation: the heart and soul of model-driven software development, IEEE Software 20 (5) (2003).
-
(2003)
IEEE Software
, vol.20
, Issue.5
-
-
Sendall, S.1
Kozaczynski, W.2
-
32
-
-
84884125241
-
-
Object Management Group, UML 2.4.1 Superstructure, August 2011
-
Object Management Group, UML 2.4.1 Superstructure, August 2011 < http://www.omg.org/spec/UML/2.4.1 >.
-
-
-
-
33
-
-
84884139448
-
-
OASIS, Web Services Business Process Execution Language, 2007
-
OASIS, Web Services Business Process Execution Language, 2007 < http://docs.oasis-open.org/wsbpel/2.0/OS >.
-
-
-
-
34
-
-
84884150882
-
-
OASIS, Security Assertion Markup Language, March 2005
-
OASIS, Security Assertion Markup Language, March 2005 < http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf >.
-
-
-
-
35
-
-
84884160735
-
-
World Wide Web Consortium, SOAP Messaging Framework, 2007
-
World Wide Web Consortium, SOAP Messaging Framework, 2007 < http://www.w3.org/TR/soap12-part1/ >.
-
-
-
-
36
-
-
63949084590
-
Model-driven business process security requirement specification
-
C. Wolter, M. Menzel, A. Schaad, P. Miseldine, and C. Meinel Model-driven business process security requirement specification Journal of Systems Architecture 55 2009 211 223
-
(2009)
Journal of Systems Architecture
, vol.55
, pp. 211-223
-
-
Wolter, C.1
Menzel, M.2
Schaad, A.3
Miseldine, P.4
Meinel, C.5
-
37
-
-
84884128291
-
-
Object Management Group, Meta Object Facility (MOF) 2.0 Query/View/Transformation Specification (January 2011)
-
Object Management Group, Meta Object Facility (MOF) 2.0 Query/View/Transformation Specification (January 2011). URL: http://www.omg.org/spec/QVT/.
-
-
-
-
38
-
-
84884161319
-
-
OASIS, Metadata for the OASIS Security Assertion Markup Language (SAML), 2005
-
OASIS, Metadata for the OASIS Security Assertion Markup Language (SAML), 2005 < http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf >.
-
-
-
-
48
-
-
33845638417
-
How to break access control in a controlled manner
-
A. Ferreira, R. Cruz-Correia, L. Antunes, P. Farinha, E. Oliveira-Palhares, D. Chadwick, A. Costa-Pereira, How to break access control in a controlled manner, in: 19th IEEE International Symposium on Computer-Based Medical Systems (CBMS), 2006, pp. 847-854.
-
(2006)
19th IEEE International Symposium on Computer-Based Medical Systems (CBMS)
, pp. 847-854
-
-
Ferreira, A.1
Cruz-Correia, R.2
Antunes, L.3
Farinha, P.4
Oliveira-Palhares, E.5
Chadwick, D.6
Costa-Pereira, A.7
-
49
-
-
79960184348
-
Rumpole: A flexible break-glass access control model
-
S. Marinovic, R. Craven, J. Ma, N. Dulay, Rumpole: a flexible break-glass access control model, in: 16th ACM Symposium on Access Control Models and Technologies (SACMAT), 2011.
-
(2011)
16th ACM Symposium on Access Control Models and Technologies (SACMAT)
-
-
Marinovic, S.1
Craven, R.2
Ma, J.3
Dulay, N.4
-
55
-
-
84884155940
-
-
OASIS, WS-SecurityPolicy 1.3, 2009 < http://docs.oasis-open.org/ws-sx/ ws-securitypolicy/v1.3/os/ >.
-
(2009)
OASIS, WS-SecurityPolicy 1.3
-
-
-
57
-
-
4444246080
-
An integrated approach to engineer and enforce context constraints in RBAC environments
-
M. Strembeck, and G. Neumann An integrated approach to engineer and enforce context constraints in RBAC environments ACM Transactions on Information and System Security 7 3 2004 392 427
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.3
, pp. 392-427
-
-
Strembeck, M.1
Neumann, G.2
-
58
-
-
4143058053
-
Using trust and risk in role-based access control policies
-
N. Dimmock, A. Belokosztolszki, D. Eyers, J. Bacon, K. Moody, Using trust and risk in role-based access control policies, in: 9th ACM Symposium on Access Control Models and Technologies (SACMAT), 2004.
-
(2004)
9th ACM Symposium on Access Control Models and Technologies (SACMAT)
-
-
Dimmock, N.1
Belokosztolszki, A.2
Eyers, D.3
Bacon, J.4
Moody, K.5
-
60
-
-
77954525351
-
An integrated workbench for model-based engineering of service compositions
-
H. Foster, S. Uchitel, J. Magee, and J. Kramer An integrated workbench for model-based engineering of service compositions IEEE Transactions on Services Computing 3 2 2010 131 144
-
(2010)
IEEE Transactions on Services Computing
, vol.3
, Issue.2
, pp. 131-144
-
-
Foster, H.1
Uchitel, S.2
Magee, J.3
Kramer, J.4
-
63
-
-
79960312614
-
A semantic approach for business process model abstraction
-
S. Smirnov, H.A. Reijers, M. Weske, A semantic approach for business process model abstraction, in: 23rd International Conference on Advanced Information Systems Engineering (CAiSE), 2011, pp. 497-511.
-
(2011)
23rd International Conference on Advanced Information Systems Engineering (CAiSE)
, pp. 497-511
-
-
Smirnov, S.1
Reijers, H.A.2
Weske, M.3
-
65
-
-
57349171335
-
Policy decomposition for collaborative access control
-
D. Lin, P. Rao, E. Bertino, N. Li, J. Lobo, Policy decomposition for collaborative access control, in: 13th ACM SACMAT, 2008, pp. 103-112.
-
(2008)
13th ACM SACMAT
, pp. 103-112
-
-
Lin, D.1
Rao, P.2
Bertino, E.3
Li, N.4
Lobo, J.5
-
68
-
-
84884144866
-
-
OASIS, eXtensible Access Control Markup Language, 2005
-
OASIS, eXtensible Access Control Markup Language, 2005 < http://docs.oasis-open.org/xacml/2.0 >.
-
-
-
-
71
-
-
35248828504
-
Aspect-oriented programming
-
G. Kiczales, J. Lamping, A. Mendhekar, C. Maeda, C. Lopes, J.-M. Loingtier, J. Irwin, Aspect-oriented programming, in: European Conference on Object-Oriented Programming (ECOOP'97), 1997, pp. 220-242.
-
(1997)
European Conference on Object-Oriented Programming (ECOOP'97)
, pp. 220-242
-
-
Kiczales, G.1
Lamping, J.2
Mendhekar, A.3
Maeda, C.4
Lopes, C.5
Loingtier, J.-M.6
Irwin, J.7
-
72
-
-
78549284586
-
New approach for the dynamic enforcement of Web services security
-
A. Mourad, S. Ayoubi, H. Yahyaoui, H. Otrok, New approach for the dynamic enforcement of Web services security, in: 8th International Conference on Privacy Security and Trust, 2010, pp. 189-196.
-
(2010)
8th International Conference on Privacy Security and Trust
, pp. 189-196
-
-
Mourad, A.1
Ayoubi, S.2
Yahyaoui, H.3
Otrok, H.4
-
74
-
-
79959698716
-
A transformation contract to generate aspects from access control policies
-
C. Braga A transformation contract to generate aspects from access control policies Software and Systems Modeling 10 2011 395 409
-
(2011)
Software and Systems Modeling
, vol.10
, pp. 395-409
-
-
Braga, C.1
-
78
-
-
79958706564
-
Test coverage of data-centric dynamic compositions in service-based systems
-
W. Hummer, O. Raz, O. Shehory, P. Leitner, S. Dustdar, Test coverage of data-centric dynamic compositions in service-based systems, in: 4th International Conference on Software Testing, Verification and Validation (ICST), 2011, pp. 40-49.
-
(2011)
4th International Conference on Software Testing, Verification and Validation (ICST)
, pp. 40-49
-
-
Hummer, W.1
Raz, O.2
Shehory, O.3
Leitner, P.4
Dustdar, S.5
-
79
-
-
84877971753
-
Identifying incompatible service implementations using pooled decision trees
-
C. Inzinger, W. Hummer, B. Satzger, P. Leitner, S. Dustdar, Identifying incompatible service implementations using pooled decision trees, in: 28th ACM Symposium on Applied Computing (SAC), 2013, pp. 485-492.
-
(2013)
28th ACM Symposium on Applied Computing (SAC)
, pp. 485-492
-
-
Inzinger, C.1
Hummer, W.2
Satzger, B.3
Leitner, P.4
Dustdar, S.5
-
80
-
-
33646676768
-
Balancing flexibility and security in adaptive process management systems
-
Springer Berlin/Heidelberg
-
B. Weber, M. Reichert, W. Wild, and S. Rinderle Balancing flexibility and security in adaptive process management systems On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE vol. 3760 2005 Springer Berlin/Heidelberg 59 76
-
(2005)
On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE
, vol.3760 VOL.
, pp. 59-76
-
-
Weber, B.1
Reichert, M.2
Wild, W.3
Rinderle, S.4
-
81
-
-
43749117481
-
An environment for flexible advanced compensations of web service transactions
-
M. Schäfer, P. Dolog, and W. Nejdl An environment for flexible advanced compensations of web service transactions ACM Transactions on the Web 2 2 2008 14:1 14:36
-
(2008)
ACM Transactions on the Web
, vol.2
, Issue.2
, pp. 141-1436
-
-
Schäfer, M.1
Dolog, P.2
Nejdl, W.3
-
82
-
-
77950690111
-
Rule-based coordination of distributed web service transactions
-
M. von Riegen, M. Husemann, S. Fink, and N. Ritter Rule-based coordination of distributed web service transactions IEEE Transactions on Services Computing 3 1 2010 60 72
-
(2010)
IEEE Transactions on Services Computing
, vol.3
, Issue.1
, pp. 60-72
-
-
Von Riegen, M.1
Husemann, M.2
Fink, S.3
Ritter, N.4
-
83
-
-
0742268963
-
Web service conversation modeling: A cornerstone for e-business automation
-
B. Benatallah, F. Casati, and F. Toumani Web service conversation modeling: a cornerstone for e-business automation IEEE Internet Computing 8 1 2004 46 54
-
(2004)
IEEE Internet Computing
, vol.8
, Issue.1
, pp. 46-54
-
-
Benatallah, B.1
Casati, F.2
Toumani, F.3
-
84
-
-
84864995538
-
Deriving a unified fault taxonomy for event-based systems
-
W. Hummer, C. Inzinger, P. Leitner, B. Satzger, S. Dustdar, Deriving a unified fault taxonomy for event-based systems, in: 6th ACM International Conference on Distributed Event-Based Systems (DEBS'12), 2012.
-
(2012)
6th ACM International Conference on Distributed Event-Based Systems (DEBS'12)
-
-
Hummer, W.1
Inzinger, C.2
Leitner, P.3
Satzger, B.4
Dustdar, S.5
-
85
-
-
84877951841
-
Supporting entailment constraints in the context of collaborative web applications
-
ACM
-
P. Gaubatz, U. Zdun, Supporting entailment constraints in the context of collaborative web applications, in: 28th Symposium on Applied Computing (SAC), ACM, 2013.
-
(2013)
28th Symposium on Applied Computing (SAC)
-
-
Gaubatz, P.1
Zdun, U.2
|