메뉴 건너뛰기




Volumn 13, Issue 2, 2014, Pages 549-572

Security modeling for service-oriented systems using security pattern refinement approach

Author keywords

Model transformation; Model driven security; Security patterns; SOA security

Indexed keywords

INFORMATION SERVICES; SECURITY SYSTEMS; XML;

EID: 84899994114     PISSN: 16191366     EISSN: 16191374     Source Type: Journal    
DOI: 10.1007/s10270-012-0268-6     Document Type: Article
Times cited : (9)

References (59)
  • 1
    • 84899922534 scopus 로고    scopus 로고
    • Apache Rampart
    • Apache Rampart. http://ws. apache. org/rampart.
  • 2
    • 84899930328 scopus 로고    scopus 로고
    • OpenArchitectureWare 4
    • OpenArchitectureWare 4. http://www. eclipse. org/gmt/oaw.
  • 5
    • 55049109759 scopus 로고    scopus 로고
    • Model-driven Security Engineering for Trust Management in SECTET
    • Alam, M., Hafner, M., Breu, R.: Model-driven Security Engineering for Trust Management in SECTET. J. Softw. 2(1), 47-59 (2007).
    • (2007) J. Softw. , vol.2 , Issue.1 , pp. 47-59
    • Alam, M.1    Hafner, M.2    Breu, R.3
  • 6
    • 38949134784 scopus 로고    scopus 로고
    • A framework for modeling restricted delegation of rights in SECTET
    • Alam, M., Hafner, M., Breu, R., Unterthiner, S.: A framework for modeling restricted delegation of rights in SECTET. Int. J. Comput. Syst. Sci. Eng. 22(5), 289-305 (2007).
    • (2007) Int. J. Comput. Syst. Sci. Eng , vol.22 , Issue.5 , pp. 289-305
    • Alam, M.1    Hafner, M.2    Breu, R.3    Unterthiner, S.4
  • 8
    • 33745471209 scopus 로고    scopus 로고
    • Model driven security: from UML models to access control infrastructures
    • Basin, D., Doser, J., Lodderstedt, T.: Model driven security: from UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol. 15(1), 39-91 (2006).
    • (2006) ACM Trans. Softw. Eng. Methodol. , vol.15 , Issue.1 , pp. 39-91
    • Basin, D.1    Doser, J.2    Lodderstedt, T.3
  • 12
    • 33750441515 scopus 로고    scopus 로고
    • Security patterns and requirements for internet-based applications
    • David, R., Carlos, G., Fernandez-Medina, E., Piattini, M.: Security patterns and requirements for internet-based applications. J. Int. Res. 16(5), 519-536 (2006).
    • (2006) J. Int. Res. , vol.16 , Issue.5 , pp. 519-536
    • David, R.1    Carlos, G.2    Fernandez-Medina, E.3    Piattini, M.4
  • 23
    • 33750453781 scopus 로고    scopus 로고
    • SECTET: an extensible framework for the realization of secure inter-organizational workflows
    • Hafner, M., Breu, R., Agreiter, B., Nowak, A.: SECTET: an extensible framework for the realization of secure inter-organizational workflows. Int. Res. 16(5), 491-506 (2006).
    • (2006) Int. Res. , vol.16 , Issue.5 , pp. 491-506
    • Hafner, M.1    Breu, R.2    Agreiter, B.3    Nowak, A.4
  • 25
    • 73149108190 scopus 로고    scopus 로고
    • SeAAS-a reference architecture for security services in SOA
    • Hafner, M., Memon, M., Breu, R.: SeAAS-a reference architecture for security services in SOA. J. Univ. Comput. Sci. 15(15), 2916-2936 (2009).
    • (2009) J. Univ. Comput. Sci. , vol.15 , Issue.15 , pp. 2916-2936
    • Hafner, M.1    Memon, M.2    Breu, R.3
  • 26
    • 35448984481 scopus 로고    scopus 로고
    • Security-oriented service composition and evolution
    • IEEE Computer Society, Washington, DC
    • Han, J., Khan, K. M.: Security-oriented service composition and evolution. In: APSEC '06: 13th Asia Pacific Software Engineering Conference, pp. 71-78. IEEE Computer Society, Washington, DC (2006).
    • (2006) APSEC '06: 13th Asia Pacific Software Engineering Conference , pp. 71-78
    • Han, J.1    Khan, K.M.2
  • 27
    • 84899911236 scopus 로고    scopus 로고
    • Security Patterns within a Service-oriented Architecture
    • November
    • Hinton, H., Hondo, M., Hutchison, B.: Security Patterns within a Service-oriented Architecture. IBM White Paper, November 2005.
    • (2005) IBM White Paper
    • Hinton, H.1    Hondo, M.2    Hutchison, B.3
  • 33
    • 0036836682 scopus 로고    scopus 로고
    • An intensive survey of fair non-repudiation protocols
    • Kremer, S., Markowitch, O., Zhou, J.: An intensive survey of fair non-repudiation protocols. Comput. Commun. 25(17), 1606-1621 (2002).
    • (2002) Comput. Commun. , vol.25 , Issue.17 , pp. 1606-1621
    • Kremer, S.1    Markowitch, O.2    Zhou, J.3
  • 37
    • 33744952590 scopus 로고    scopus 로고
    • Mantell, K.: From UML to BPEL (2005). http://www. ibm. com/developerworks/webservices/library/ws-uml2bpel.
    • (2005) From UML to BPEL
    • Mantell, K.1
  • 42
    • 84899938239 scopus 로고    scopus 로고
    • OASIS
    • OASIS. WS-Security Policy (2007). http://docs. oasis-open. org.
    • (2007) WS-Security Policy
  • 48
    • 51749122210 scopus 로고    scopus 로고
    • Methodology and tools for end-to-end SOA security configurations
    • Satoh, F., Nakamura, Y., Mukhi, N. K., et al.: Methodology and tools for end-to-end SOA security configurations. In: IEEE Congress on Services-Part I, pp. 307-314 (2008).
    • (2008) IEEE Congress On Services-Part I , pp. 307-314
    • Satoh, F.1    Nakamura, Y.2    Mukhi, N.K.3
  • 56
    • 33646934851 scopus 로고    scopus 로고
    • Improving design pattern instance recognition by dynamic analysis
    • Wendehals, L.: Improving design pattern instance recognition by dynamic analysis. In: WODA 2003: ICSE Workshop on D Analysis, p. 29 (2003).
    • (2003) WODA 2003: ICSE Workshop On D Analysis , pp. 29
    • Wendehals, L.1
  • 57
    • 84859973861 scopus 로고    scopus 로고
    • Modeling security goals in business processes
    • Wolter, C., Menzel, M., Meinel, C.: Modeling security goals in business processes. In: Modellierung'08, pp. 197-212 (2008).
    • (2008) Modellierung'08 , pp. 197-212
    • Wolter, C.1    Menzel, M.2    Meinel, C.3
  • 58
    • 63949084590 scopus 로고    scopus 로고
    • Model-driven business process security requirement specification
    • Wolter, C., Menzel, M., Schaad, A., Miseldine, P., Meinel, C.: Model-driven business process security requirement specification. J. Syst. Archit. 55(4), 211-223 (2009).
    • (2009) J. Syst. Archit. , vol.55 , Issue.4 , pp. 211-223
    • Wolter, C.1    Menzel, M.2    Schaad, A.3    Miseldine, P.4    Meinel, C.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.