-
1
-
-
84899922534
-
-
Apache Rampart
-
Apache Rampart. http://ws. apache. org/rampart.
-
-
-
-
2
-
-
84899930328
-
-
OpenArchitectureWare 4
-
OpenArchitectureWare 4. http://www. eclipse. org/gmt/oaw.
-
-
-
-
5
-
-
55049109759
-
Model-driven Security Engineering for Trust Management in SECTET
-
Alam, M., Hafner, M., Breu, R.: Model-driven Security Engineering for Trust Management in SECTET. J. Softw. 2(1), 47-59 (2007).
-
(2007)
J. Softw.
, vol.2
, Issue.1
, pp. 47-59
-
-
Alam, M.1
Hafner, M.2
Breu, R.3
-
6
-
-
38949134784
-
A framework for modeling restricted delegation of rights in SECTET
-
Alam, M., Hafner, M., Breu, R., Unterthiner, S.: A framework for modeling restricted delegation of rights in SECTET. Int. J. Comput. Syst. Sci. Eng. 22(5), 289-305 (2007).
-
(2007)
Int. J. Comput. Syst. Sci. Eng
, vol.22
, Issue.5
, pp. 289-305
-
-
Alam, M.1
Hafner, M.2
Breu, R.3
Unterthiner, S.4
-
8
-
-
33745471209
-
Model driven security: from UML models to access control infrastructures
-
Basin, D., Doser, J., Lodderstedt, T.: Model driven security: from UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol. 15(1), 39-91 (2006).
-
(2006)
ACM Trans. Softw. Eng. Methodol.
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
10
-
-
34548787238
-
mODEL-based security engineering of distributed information systems using UMLsec
-
IEEE Computer Society, Washington, DC
-
Best, B., Jurjens, J., Nuseibeh, B.: mODEL-based security engineering of distributed information systems using UMLsec. In: ICSE '07: Proceedings of the 29th International Conference on Software Engineering, pp. 581-590. IEEE Computer Society, Washington, DC (2007).
-
(2007)
ICSE '07: Proceedings of the 29th International Conference On Software Engineering
, pp. 581-590
-
-
Best, B.1
Jurjens, J.2
Nuseibeh, B.3
-
11
-
-
33645586196
-
Using security patterns to model and analyze security
-
Cheng, B., Konrad, S., Campbell, L. A., Wassermann, R.: Using security patterns to model and analyze security. In: RHAS '03: International Workshop on Requirements for High Assurance Systems, pp. 13-22 (2003).
-
(2003)
RHAS '03: International Workshop On Requirements For High Assurance Systems
, pp. 13-22
-
-
Cheng, B.1
Konrad, S.2
Campbell, L.A.3
Wassermann, R.4
-
12
-
-
33750441515
-
Security patterns and requirements for internet-based applications
-
David, R., Carlos, G., Fernandez-Medina, E., Piattini, M.: Security patterns and requirements for internet-based applications. J. Int. Res. 16(5), 519-536 (2006).
-
(2006)
J. Int. Res.
, vol.16
, Issue.5
, pp. 519-536
-
-
David, R.1
Carlos, G.2
Fernandez-Medina, E.3
Piattini, M.4
-
13
-
-
49049090200
-
A pattern-driven security process for SOA applications
-
IEEE Computer Society, Washington, DC
-
Delessy, N., Fernandez, E. B.: A pattern-driven security process for SOA applications. In: ARES '08: 3rd International Conference on Availability, Reliability and Security, pp. 416-421. IEEE Computer Society, Washington, DC (2008).
-
(2008)
ARES '08: 3rd International Conference On Availability, Reliability and Security
, pp. 416-421
-
-
Delessy, N.1
Fernandez, E.B.2
-
14
-
-
46449118553
-
Model checking security pattern compositions
-
IEEE Computer Society, Washington, DC
-
Dong, J., Peng, T., Zhao, Y.: Model checking security pattern compositions. In: QSIC '07: Proceedings of the Seventh International Conference on Quality Software, pp. 80-89. IEEE Computer Society, Washington, DC (2007).
-
(2007)
QSIC '07: Proceedings of the Seventh International Conference On Quality Software
, pp. 80-89
-
-
Dong, J.1
Peng, T.2
Zhao, Y.3
-
15
-
-
33749069452
-
Using patterns to understand and compare web services security products and standards
-
IEEE Computer Society, Washington, DC
-
Fernandez, E. B., Delessy, N.: Using patterns to understand and compare web services security products and standards. In: AICT-ICIW '06: Proceedings of the Advanced Int'l Conference on Telecommunications, pp. 157. IEEE Computer Society, Washington, DC (2006).
-
(2006)
AICT-ICIW '06: Proceedings of the Advanced Int'l Conference On Telecommunications
, pp. 157
-
-
Fernandez, E.B.1
Delessy, N.2
-
19
-
-
33644682278
-
Towards a process for web services security
-
Gutiérrez, C., Fernández-Medina, E., Piattini, M.: Towards a process for web services security. J. Res. Pract. Inf. Technol. 38(1) (2006).
-
(2006)
J. Res. Pract. Inf. Technol
, vol.38
, Issue.1
-
-
Gutiérrez, C.1
Fernández-Medina, E.2
Piattini, M.3
-
21
-
-
33749063417
-
Modeling inter-organizational workflow security in a peer-to-peer environment
-
IEEE Computer Society, Washington, DC
-
Hafner, M., Breu, M., Breu, R., Nowak, A.: Modeling inter-organizational workflow security in a peer-to-peer environment. In: ICWS '05: Proceedings of the IEEE International Conference on Web Services, pp. 533-540. IEEE Computer Society, Washington, DC (2005).
-
(2005)
ICWS '05: Proceedings of the IEEE International Conference On Web Services
, pp. 533-540
-
-
Hafner, M.1
Breu, M.2
Breu, R.3
Nowak, A.4
-
23
-
-
33750453781
-
SECTET: an extensible framework for the realization of secure inter-organizational workflows
-
Hafner, M., Breu, R., Agreiter, B., Nowak, A.: SECTET: an extensible framework for the realization of secure inter-organizational workflows. Int. Res. 16(5), 491-506 (2006).
-
(2006)
Int. Res.
, vol.16
, Issue.5
, pp. 491-506
-
-
Hafner, M.1
Breu, R.2
Agreiter, B.3
Nowak, A.4
-
24
-
-
38349165472
-
A security architecture for inter-organizational workflows: Putting security standards for web services together
-
Hafner, M., Breu, R., Breu, M.: A security architecture for inter-organizational workflows: putting security standards for web services together. In: ICEIS '05, 7th International Conference on Enterprise Information Systems, pp. 128-135 (2005).
-
(2005)
ICEIS '05, 7th International Conference On Enterprise Information Systems
, pp. 128-135
-
-
Hafner, M.1
Breu, R.2
Breu, M.3
-
25
-
-
73149108190
-
SeAAS-a reference architecture for security services in SOA
-
Hafner, M., Memon, M., Breu, R.: SeAAS-a reference architecture for security services in SOA. J. Univ. Comput. Sci. 15(15), 2916-2936 (2009).
-
(2009)
J. Univ. Comput. Sci.
, vol.15
, Issue.15
, pp. 2916-2936
-
-
Hafner, M.1
Memon, M.2
Breu, R.3
-
26
-
-
35448984481
-
Security-oriented service composition and evolution
-
IEEE Computer Society, Washington, DC
-
Han, J., Khan, K. M.: Security-oriented service composition and evolution. In: APSEC '06: 13th Asia Pacific Software Engineering Conference, pp. 71-78. IEEE Computer Society, Washington, DC (2006).
-
(2006)
APSEC '06: 13th Asia Pacific Software Engineering Conference
, pp. 71-78
-
-
Han, J.1
Khan, K.M.2
-
27
-
-
84899911236
-
Security Patterns within a Service-oriented Architecture
-
November
-
Hinton, H., Hondo, M., Hutchison, B.: Security Patterns within a Service-oriented Architecture. IBM White Paper, November 2005.
-
(2005)
IBM White Paper
-
-
Hinton, H.1
Hondo, M.2
Hutchison, B.3
-
32
-
-
26844509638
-
Extending UML 2 activity diagrams with business intelligence objects
-
Springer, Berlin
-
Korherr, B., List, B.: Extending UML 2 activity diagrams with business intelligence objects. In: DaWaK '05, 7th International Conference on Data Warehousing and Knowledge Discovery, pp. 53-63. Springer, Berlin (2005).
-
(2005)
DaWaK '05, 7th International Conference On Data Warehousing and Knowledge Discovery
, pp. 53-63
-
-
Korherr, B.1
List, B.2
-
33
-
-
0036836682
-
An intensive survey of fair non-repudiation protocols
-
Kremer, S., Markowitch, O., Zhou, J.: An intensive survey of fair non-repudiation protocols. Comput. Commun. 25(17), 1606-1621 (2002).
-
(2002)
Comput. Commun.
, vol.25
, Issue.17
, pp. 1606-1621
-
-
Kremer, S.1
Markowitch, O.2
Zhou, J.3
-
36
-
-
79955143136
-
SecureUML: A UML-based modeling language for model-driven security
-
Springer, London
-
Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-based modeling language for model-driven security. In: UML '02: Proceedings of the 5th International Conference on The Unified Modeling Language, pp. 426-441. Springer, London (2002).
-
(2002)
UML '02: Proceedings of the 5th International Conference On the Unified Modeling Language
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
37
-
-
33744952590
-
-
Mantell, K.: From UML to BPEL (2005). http://www. ibm. com/developerworks/webservices/library/ws-uml2bpel.
-
(2005)
From UML to BPEL
-
-
Mantell, K.1
-
41
-
-
49049109969
-
A Pattern language for identity management
-
IEEE Computer Society, Washington, DC
-
Nelly, D., Fernandez, E. B., Petrie, L., Maria, M.: A Pattern language for identity management. In: ICCGI '07: International Multi-Conference on Computing in the Global Information Technology, p. 31. IEEE Computer Society, Washington, DC (2007).
-
(2007)
ICCGI '07: International Multi-Conference On Computing In the Global Information Technology
, pp. 31
-
-
Nelly, D.1
Fernandez, E.B.2
Petrie, L.3
Maria, M.4
-
42
-
-
84899938239
-
-
OASIS
-
OASIS. WS-Security Policy (2007). http://docs. oasis-open. org.
-
(2007)
WS-Security Policy
-
-
-
44
-
-
34147146459
-
Model driven development of security aspects
-
Reznik, J., Ritter, T., Schreiner, R., Lang, U.: Model driven development of security aspects. Electron. Notes Theor. Comput. Sci. 163(2), 65-79 (2007).
-
(2007)
Electron. Notes Theor. Comput. Sci.
, vol.163
, Issue.2
, pp. 65-79
-
-
Reznik, J.1
Ritter, T.2
Schreiner, R.3
Lang, U.4
-
45
-
-
84942786976
-
A language for modeling secure business transactions
-
Washington, DC, USA
-
Roehm, A. W., Herrmann, G., Pernul, G.: A language for modeling secure business transactions. In: ACSAC '99: Proceedings of the 15th Annual Computer Security Applications Conference, Washington, DC, USA, p. 22 (1999).
-
(1999)
ACSAC '99: Proceedings of the 15th Annual Computer Security Applications Conference
, pp. 22
-
-
Roehm, A.W.1
Herrmann, G.2
Pernul, G.3
-
46
-
-
70249097010
-
Comparison of security patterns
-
Rosado, D. G., Fernandez-Medina, E., Piattini, M.: Comparison of security patterns. Int. J. Comput. Sci. Netw. Secur. 6(2B), 139-146 (2006).
-
(2006)
Int. J. Comput. Sci. Netw. Secur.
, vol.6
, Issue.2 B
, pp. 139-146
-
-
Rosado, D.G.1
Fernandez-Medina, E.2
Piattini, M.3
-
47
-
-
52049112967
-
Pattern-based policy configuration for SOA applications
-
IEEE Computer Society, Washington, DC
-
Satoh, F., Mukhi, N. K., Nakamura, Y., Hirose, S.: Pattern-based policy configuration for SOA applications. In: SCC '08: Proceedings of the 2008 IEEE International Conference on Services Computing, pp. 13-20. IEEE Computer Society, Washington, DC (2008).
-
(2008)
SCC '08: Proceedings of the 2008 IEEE International Conference On Services Computing
, pp. 13-20
-
-
Satoh, F.1
Mukhi, N.K.2
Nakamura, Y.3
Hirose, S.4
-
48
-
-
51749122210
-
Methodology and tools for end-to-end SOA security configurations
-
Satoh, F., Nakamura, Y., Mukhi, N. K., et al.: Methodology and tools for end-to-end SOA security configurations. In: IEEE Congress on Services-Part I, pp. 307-314 (2008).
-
(2008)
IEEE Congress On Services-Part I
, pp. 307-314
-
-
Satoh, F.1
Nakamura, Y.2
Mukhi, N.K.3
-
49
-
-
38949105485
-
Adding Authentication to model driven security
-
Satoh, F., Nakamura, Y., Ono, K.: Adding Authentication to model driven security. In: ICWS '06: Proceedings of the IEEE International Conference on Web Services, Washington, DC, USA, pp. 585-594 (2006).
-
(2006)
ICWS '06: Proceedings of the IEEE International Conference On Web Services, Washington, DC, USA
, pp. 585-594
-
-
Satoh, F.1
Nakamura, Y.2
Ono, K.3
-
53
-
-
35248832632
-
Towards a business process-driven framework for security engineering with the UML
-
Vivas, J. L., Montenegro, J. A., Lopez, J.: Towards a business process-driven framework for security engineering with the UML. In: 6th Information Security Conference-ISC'2003, pp. 381-395 (2003).
-
(2003)
6th Information Security Conference-ISC'2003
, pp. 381-395
-
-
Vivas, J.L.1
Montenegro, J.A.2
Lopez, J.3
-
56
-
-
33646934851
-
Improving design pattern instance recognition by dynamic analysis
-
Wendehals, L.: Improving design pattern instance recognition by dynamic analysis. In: WODA 2003: ICSE Workshop on D Analysis, p. 29 (2003).
-
(2003)
WODA 2003: ICSE Workshop On D Analysis
, pp. 29
-
-
Wendehals, L.1
-
57
-
-
84859973861
-
Modeling security goals in business processes
-
Wolter, C., Menzel, M., Meinel, C.: Modeling security goals in business processes. In: Modellierung'08, pp. 197-212 (2008).
-
(2008)
Modellierung'08
, pp. 197-212
-
-
Wolter, C.1
Menzel, M.2
Meinel, C.3
-
58
-
-
63949084590
-
Model-driven business process security requirement specification
-
Wolter, C., Menzel, M., Schaad, A., Miseldine, P., Meinel, C.: Model-driven business process security requirement specification. J. Syst. Archit. 55(4), 211-223 (2009).
-
(2009)
J. Syst. Archit.
, vol.55
, Issue.4
, pp. 211-223
-
-
Wolter, C.1
Menzel, M.2
Schaad, A.3
Miseldine, P.4
Meinel, C.5
-
59
-
-
84961312272
-
Evolution of fair non-repudiation with TTP
-
Springer, Berlin
-
Zhou, J., Deng, R., Bao, F.: Evolution of fair non-repudiation with TTP. In: ACISP '99: 4th Australasian Conference on Information Security and Privacy, London, UK, Springer, Berlin (1999).
-
(1999)
ACISP '99: 4th Australasian Conference on Information Security and Privacy, London, UK
-
-
Zhou, J.1
Deng, R.2
Bao, F.3
|