메뉴 건너뛰기




Volumn 13, Issue 2, 2014, Pages 513-548

Modeling and enforcing secure object flows in process-driven SOAs: An integrated model-driven approach

Author keywords

Model driven development; Process modeling; Secure object flows; Security engineering; Service oriented architecture; SoaML; UML; Web services

Indexed keywords

ELECTRONICS INDUSTRY; INFORMATION SERVICES; MODELING LANGUAGES; PROCESS ENGINEERING; WEB SERVICES;

EID: 84899976809     PISSN: 16191366     EISSN: 16191374     Source Type: Journal    
DOI: 10.1007/s10270-012-0263-y     Document Type: Article
Times cited : (26)

References (97)
  • 1
    • 70449472021 scopus 로고    scopus 로고
    • Apache Software Foundation (ASF)
    • Apache Software Foundation (ASF): Apache Axis2. http://axis. apache. org/axis2/java/core/ (2012).
    • (2012) Apache Axis2
  • 2
    • 84881385420 scopus 로고    scopus 로고
    • Apache Software Foundation (ASF)
    • Apache Software Foundation (ASF): Apache ODE. http://ode. apache. org (2012).
    • (2012) Apache ODE
  • 3
    • 84899944678 scopus 로고    scopus 로고
    • Apache Software Foundation (ASF)
    • Apache Software Foundation (ASF): Apache Rampart-Axis2 Security Module. http://axis. apache. org/axis2/java/rampart/ (2012).
    • (2012) Apache Rampart-Axis2 Security Module
  • 7
    • 57849114441 scopus 로고    scopus 로고
    • Compliance deconstructed
    • Cannon, J., Byers, M.: Compliance deconstructed. ACM Queue 4(7), 30-37 (2006).
    • (2006) ACM Queue , vol.4 , Issue.7 , pp. 30-37
    • Cannon, J.1    Byers, M.2
  • 8
    • 79960266007 scopus 로고    scopus 로고
    • Committee on National Security Systems (CNSS)
    • Committee on National Security Systems (CNSS): National Information Assurance (IA): glossary. http://www. cnss. gov/Assets/pdf/cnssi_4009. pdf (2010).
    • (2010) National Information Assurance (IA): Glossary
  • 9
    • 79952440320 scopus 로고    scopus 로고
    • How does SOX change IT?
    • Damianides, M.: How does SOX change IT? J. Corp. Account. Finance 15(6), 35-41 (2004).
    • (2004) J. Corp. Account. Finance , vol.15 , Issue.6 , pp. 35-41
    • Damianides, M.1
  • 10
    • 84899911477 scopus 로고    scopus 로고
    • Eclipse Foundation
    • Eclipse Foundation: Eclipse IDE. http://www. eclipse. org (2012).
    • (2012) Eclipse IDE
  • 12
    • 84899950881 scopus 로고    scopus 로고
    • Eclipse Foundation
    • Eclipse Foundation: Eclipse Papyrus. http://www. eclipse. org/modeling/mdt/papyrus/ (2012).
    • (2012) Eclipse Papyrus
  • 15
  • 16
    • 28044457328 scopus 로고    scopus 로고
    • International Organization for Standardization (ISO), ISO/IEC 27002: 2005, Stage: 90. 92
    • International Organization for Standardization (ISO): Information technology: security techniques-code of practice for information security management, ISO/IEC 27002: 2005, Stage: 90. 92. http://www. iso. org/iso/iso_catalogue/catalogue_tc/catalogue_detail. htm?csnumber=50297 (2008).
    • (2008) Information Technology: Security Techniques-code of Practice For Information Security Management
  • 17
    • 33644658584 scopus 로고    scopus 로고
    • International Organization for Standardization (ISO), ISO/IEC 27001: 2005, Stage: 90. 92
    • International Organization for Standardization (ISO): Information technology: security techniques-information security management systems-requirements, ISO/IEC 27001: 2005, Stage: 90. 92. http://www. iso. org/iso/iso_catalogue/catalogue_tc/catalogue_detail. htm?csnumber=42103 (2008).
    • (2008) Information Technology: Security Techniques-information Security Management Systems-requirements
  • 20
    • 79959767827 scopus 로고    scopus 로고
    • Non-functional properties in the model-driven development of service-oriented systems
    • Gilmore, S., Gönczy, L., Koch, N., Mayer, P., Tribastone, M., Varró, D.: Non-functional properties in the model-driven development of service-oriented systems. Softw. Syst. Model. 10(3), 287-311 (2011).
    • (2011) Softw. Syst. Model. , vol.10 , Issue.3 , pp. 287-311
    • Gilmore, S.1    Gönczy, L.2    Koch, N.3    Mayer, P.4    Tribastone, M.5    Varró, D.6
  • 23
    • 33750453781 scopus 로고    scopus 로고
    • SECTET: an extensible framework for the realization of secure inter-organizational workflows
    • Hafner, M., Breu, R., Agreiter, B., Nowak, A.: SECTET: an extensible framework for the realization of secure inter-organizational workflows. Internet Res. 16(5), 491-506 (2006).
    • (2006) Internet Res. , vol.16 , Issue.5 , pp. 491-506
    • Hafner, M.1    Breu, R.2    Agreiter, B.3    Nowak, A.4
  • 24
    • 47749117634 scopus 로고    scopus 로고
    • Modeling and enforcing advanced access control policies in healthcare systems with SECTET
    • In: Giese, H. (ed.), Springer, Berlin
    • Hafner, M., Memon, M., Alam, M.: Modeling and enforcing advanced access control policies in healthcare systems with SECTET. In: Giese, H. (ed.) Models in Software Engineering, pp. 132-144. Springer, Berlin (2008).
    • (2008) Models In Software Engineering , pp. 132-144
    • Hafner, M.1    Memon, M.2    Alam, M.3
  • 25
    • 76749126312 scopus 로고    scopus 로고
    • A pattern language for process execution and integration design in service-oriented architectures
    • In: Noble, J., Johnson, R. (eds.), Springer, Berlin
    • Hentrich, C., Zdun, U.: A pattern language for process execution and integration design in service-oriented architectures. In: Noble, J., Johnson, R. (eds.) Transactions on Pattern Languages of Programming I, Lecture Notes in Computer Science (LNCS), pp. 136-191. Springer, Berlin (2009).
    • (2009) Transactions On Pattern Languages of Programming I, Lecture Notes In Computer Science (LNCS) , pp. 136-191
    • Hentrich, C.1    Zdun, U.2
  • 29
    • 14844363625 scopus 로고    scopus 로고
    • Service-oriented computing: key concepts and principles
    • Huhns, M., Singh, M.: Service-oriented computing: key concepts and principles. IEEE Internet Comput. 9, 75-81 (2005).
    • (2005) IEEE Internet Comput. , vol.9 , pp. 75-81
    • Huhns, M.1    Singh, M.2
  • 35
    • 74549140366 scopus 로고    scopus 로고
    • The difference between graph-based and block-structured business process modelling languages
    • Kopp, O., Martin, D., Wutke, D., Leymann, F.: The difference between graph-based and block-structured business process modelling languages. Enterp. Model. Inf. Syst. 4(1), 3-13 (2009).
    • (2009) Enterp. Model. Inf. Syst. , vol.4 , Issue.1 , pp. 3-13
    • Kopp, O.1    Martin, D.2    Wutke, D.3    Leymann, F.4
  • 41
    • 55549147543 scopus 로고    scopus 로고
    • On the transformation of control flow between block-oriented and graph-oriented process modeling languages
    • Mendling, J., Lassen, K., Zdun, U.: On the transformation of control flow between block-oriented and graph-oriented process modeling languages. Int. J. Business Process Integr. Manag. 3(2), 96-108 (2008).
    • (2008) Int. J. Business Process Integr. Manag. , vol.3 , Issue.2 , pp. 96-108
    • Mendling, J.1    Lassen, K.2    Zdun, U.3
  • 43
    • 67249096218 scopus 로고    scopus 로고
    • A framework for integrating Sarbanes-Oxley compliance into the systems development process
    • Mishra, S., Weistroffer, H.: A framework for integrating Sarbanes-Oxley compliance into the systems development process. Commun. Assoc. Inf. Systems (CAIS) 20(1), 712-727 (2007).
    • (2007) Commun. Assoc. Inf. Systems (CAIS) , vol.20 , Issue.1 , pp. 712-727
    • Mishra, S.1    Weistroffer, H.2
  • 45
    • 0038562418 scopus 로고
    • National Institute of Standards and Technology (NIST), Special Publication 800-12
    • National Institute of Standards and Technology (NIST): An Introduction to Computer Security: The NIST Handbook. Special Publication 800-12. http://csrc. nist. gov/publications/nistpubs/800-12/handbook. pdf (1995).
    • (1995) An Introduction to Computer Security: The NIST Handbook
  • 46
    • 0003508570 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST), Federal Information Processing Standards Publication 46-3
    • National Institute of Standards and Technology (NIST): Data Encryption Standard (DES). Federal Information Processing Standards Publication 46-3. http://csrc. nist. gov/publications/fips/fips46-3/fips46-3. pdf (1999).
    • (1999) Data Encryption Standard (DES)
  • 47
    • 0003508558 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST), Federal Information Processing Standards Publication 197
    • National Institute of Standards and Technology (NIST): Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197. http://csrc. nist. gov/publications/fips/fips197/fips-197. pdf (2001).
    • (2001) Advanced Encryption Standard (AES)
  • 48
    • 77954619771 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST), Federal Information Processing Standards Publication 180-3
    • National Institute of Standards and Technology (NIST): Secure Hash Standard (SHS). Federal Information Processing Standards Publication 180-3. http://csrc. nist. gov/publications/fips/fips180-3/fips180-3_final. pdf (2008).
    • (2008) Secure Hash Standard (SHS)
  • 49
    • 24944551836 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST), NIST Special Publication 800-53, Revision 3
    • National Institute of Standards and Technology (NIST): Recommended Security Controls for Federal Information Systems and Organizations. NIST Special Publication 800-53, Revision 3. http://csrc. nist. gov/publications/nistpubs/800-53-Rev3/sp800-53-rev3-final_updated-errata_05-01-2010. pdf (2009).
    • (2009) Recommended Security Controls For Federal Information Systems and Organizations
  • 50
    • 35248812243 scopus 로고    scopus 로고
    • National Security Agency (NSA)
    • National Security Agency (NSA): Information assurance technical framework. http://handle. dtic. mil/100. 2/ADA393328 (2000).
    • (2000) Information Assurance Technical Framework
  • 51
    • 84899914641 scopus 로고    scopus 로고
    • No Magic, Inc
    • No Magic, Inc.: MacigDraw. https://www. magicdraw. com (2012).
    • (2012) MacigDraw
  • 52
    • 80053311229 scopus 로고    scopus 로고
    • Object Management Group, Specification, Version 2. 0, formal/2011-01-03
    • Object Management Group: OMG Business Process Model and Notation (BPMN) Specification, Version 2. 0, formal/2011-01-03. http://www. omg. org/spec/BPMN (2011).
    • (2011) OMG Business Process Model and Notation (BPMN)
  • 61
    • 35248828620 scopus 로고    scopus 로고
    • Organization for the Advancement of Structured Information Standards (OASIS)
    • Organization for the Advancement of Structured Information Standards (OASIS): Web Services Business Process Execution Language, Version 2. 0. http://docs. oasis-open. org/wsbpel/2. 0/OS/wsbpel-v2. 0-OS. pdf (2007).
    • (2007) Web Services Business Process Execution Language, Version 2. 0
  • 62
    • 77955933772 scopus 로고    scopus 로고
    • Organization for the Advancement of Structured Information Standards (OASIS)
    • Organization for the Advancement of Structured Information Standards (OASIS): Reference Architecture Foundation for Service Oriented Architecture, Version 1. 0. http://docs. oasis-open. org/soa-rm/soa-ra/v1. 0/soa-ra-cd-02. pdf (2009).
    • (2009) Reference Architecture Foundation For Service Oriented Architecture, Version 1. 0
  • 63
    • 56349149885 scopus 로고    scopus 로고
    • Organization for the Advancement of Structured Information Standards (OASIS)
    • Organization for the Advancement of Structured Information Standards (OASIS): WS-SecurityPolicy 1. 3. http://docs. oasis-open. org/ws-sx/ws-securitypolicy/v1. 3/os/ws-securitypolicy-1. 3-spec-os. pdf (2009).
    • (2009) WS-SecurityPolicy 1. 3
  • 64
    • 36749060136 scopus 로고    scopus 로고
    • Service-oriented computing: state of the art and research challenges
    • Papazoglou, M., Traverso, P., Dustdar, S., Leymann, F.: Service-oriented computing: state of the art and research challenges. IEEE Comput. 40, 38-45 (2007).
    • (2007) IEEE Comput. , vol.40 , pp. 38-45
    • Papazoglou, M.1    Traverso, P.2    Dustdar, S.3    Leymann, F.4
  • 66
    • 79955884819 scopus 로고    scopus 로고
    • Secure business process model specification through a UML 2.0 activity diagram profile
    • Rodríguez, A., Fernández-Medina, E., Trujillo, J., Piattini, M.: Secure business process model specification through a UML 2. 0 activity diagram profile. Decis. Support Syst. 51(3), 446-465 (2011).
    • (2011) Decis. Support Syst. , vol.51 , Issue.3 , pp. 446-465
    • Rodríguez, A.1    Fernández-Medina, E.2    Trujillo, J.3    Piattini, M.4
  • 68
    • 73149125546 scopus 로고    scopus 로고
    • ModelSec: a generative architecture for model-driven security
    • Sánchez, Ó., Molina, F., García-Molina, J., Toval, A.: ModelSec: a generative architecture for model-driven security. J. Univ. Comput. Sci. 15(15), 2957-2980 (2009).
    • (2009) J. Univ. Comput. Sci. , vol.15 , Issue.15 , pp. 2957-2980
    • Sánchez, Ó.1    Molina, F.2    García-Molina, J.3    Toval, A.4
  • 77
    • 33344465743 scopus 로고    scopus 로고
    • Model-driven engineering: guest editor's introduction
    • Schmidt, D.: Model-driven engineering: guest editor's introduction. IEEE Comput. 39(2), 25-31 (2006).
    • (2006) IEEE Comput. , vol.39 , Issue.2 , pp. 25-31
    • Schmidt, D.1
  • 79
    • 0141725660 scopus 로고    scopus 로고
    • The pragmatics of model-driven development
    • Selic, B.: The pragmatics of model-driven development. IEEE Softw. 20(5), 19-25 (2003).
    • (2003) IEEE Softw. , vol.20 , Issue.5 , pp. 19-25
    • Selic, B.1
  • 80
    • 0141725642 scopus 로고    scopus 로고
    • Model transformation: the heart and soul of model-driven software development
    • Sendall, S., Kozaczynski, W.: Model transformation: the heart and soul of model-driven software development. IEEE Softw. 20(5), 42-45 (2003).
    • (2003) IEEE Softw. , vol.20 , Issue.5 , pp. 42-45
    • Sendall, S.1    Kozaczynski, W.2
  • 85
    • 79952439750 scopus 로고    scopus 로고
    • Modeling process-related RBAC models with extended UML activity models
    • Strembeck, M., Mendling, J.: Modeling process-related RBAC models with extended UML activity models. Inform. Softw. Technol. 53(5), 456-483 (2011).
    • (2011) Inform. Softw. Technol. , vol.53 , Issue.5 , pp. 456-483
    • Strembeck, M.1    Mendling, J.2
  • 88
    • 84899977013 scopus 로고    scopus 로고
    • Wenzel, S.: CARiSMA. http://vm4a003. itmc. tu-dortmund. de/carisma/web/doku. php (2012).
    • (2012) CARiSMA
    • Wenzel, S.1
  • 89
    • 84859973861 scopus 로고    scopus 로고
    • Modelling security goals in business processes. In Modellierung 2008
    • Wolter, C., Menzel, M., Meinel, C.: Modelling security goals in business processes. In Modellierung 2008, Lecture Notes in Informatics (LNI), pp. 197-212 (2008).
    • (2008) Lecture Notes In Informatics (LNI) , pp. 197-212
    • Wolter, C.1    Menzel, M.2    Meinel, C.3
  • 90
    • 63949084590 scopus 로고    scopus 로고
    • Model-driven business process security requirement specification
    • Wolter, C., Menzel, M., Schaad, A., Miseldine, P., Meinel, C.: Model-driven business process security requirement specification. J. Systems Archit. 55(4), 211-223 (2009).
    • (2009) J. Systems Archit. , vol.55 , Issue.4 , pp. 211-223
    • Wolter, C.1    Menzel, M.2    Schaad, A.3    Miseldine, P.4    Meinel, C.5
  • 93
    • 38149051793 scopus 로고    scopus 로고
    • World Wide Web Consortium (W3C), Attachment
    • World Wide Web Consortium (W3C): Web Services Policy 1. 5, Attachment. http://www. w3. org/TR/ws-policy-attach/ (2007).
    • (2007) Web Services Policy 1. 5
  • 94
    • 38149051793 scopus 로고    scopus 로고
    • World Wide Web Consortium (W3C)
    • World Wide Web Consortium (W3C): Web Services Policy 1. 5, Framework. http://www. w3. org/TR/ws-policy/ (2007).
    • (2007) Web Services Policy 1. 5, Framework
  • 95
    • 44849101712 scopus 로고    scopus 로고
    • Patterns of component and language integration
    • In: Manolescu, D., Völter, M., Noble, J. (eds.)
    • Zdun, U.: Patterns of component and language integration. In: Manolescu, D., Völter, M., Noble, J. (eds.) Pattern Languages of Program Design 5 (2006).
    • (2006) Pattern Languages of Program Design , pp. 5
    • Zdun, U.1
  • 96
    • 35448958453 scopus 로고    scopus 로고
    • Model-driven and pattern-based integration of process-driven SOA models
    • Zdun, U., Dustdar, S.: Model-driven and pattern-based integration of process-driven SOA models. Int. J. Business Process Integr. Manag. (IJBPIM) 2(2), 109-119 (2007).
    • (2007) Int. J. Business Process Integr. Manag. (IJBPIM) , vol.2 , Issue.2 , pp. 109-119
    • Zdun, U.1    Dustdar, S.2
  • 97
    • 34848864554 scopus 로고    scopus 로고
    • Modeling process-driven and service-oriented architectures using patterns and pattern primitives
    • Zdun, U., Hentrich, C., Dustdar, S.: Modeling process-driven and service-oriented architectures using patterns and pattern primitives. ACM Transact. Web 1(3), 14: 1-14: 44 (2007).
    • (2007) ACM Transact. Web , vol.1 , Issue.3 , pp. 1-44
    • Zdun, U.1    Hentrich, C.2    Dustdar, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.