메뉴 건너뛰기




Volumn 5, Issue , 2008, Pages 59-71

Model-driven security engineering of service oriented systems

Author keywords

Security analysis; Security engineering; Service oriented architecture

Indexed keywords

INFORMATION SERVICES; INFORMATION SYSTEMS; INFORMATION USE; SECURITY SYSTEMS;

EID: 84994715673     PISSN: 18651348     EISSN: 18651356     Source Type: Book Series    
DOI: 10.1007/978-3-540-78942-0_8     Document Type: Conference Paper
Times cited : (18)

References (21)
  • 1
    • 84994766153 scopus 로고    scopus 로고
    • SHVT Manual, Fraunhofer Institute for Secure Telecooperation (2004)
    • (2004)
  • 2
    • 84994744969 scopus 로고    scopus 로고
    • Business Process Modeling Notation (BPMN) Information (2006), Available online: http://www.bpmn.org
    • (2006)
  • 3
    • 84994701737 scopus 로고    scopus 로고
    • IHE.net: IT Infrastructure Technical Framework (2006), Available online: http://www.ihe.net
    • (2006)
  • 8
    • 24944479237 scopus 로고    scopus 로고
    • ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements
    • Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.), Springer, Heidelberg
    • Giorgini, P., et al.: ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, Springer, Heidelberg (2005)
    • (2005) Itrust 2005. LNCS , vol.3477
    • Giorgini, P.1
  • 9
    • 11144276637 scopus 로고    scopus 로고
    • Federal Office for Information Security (BSI). IT Baseline Protection Manual (2003), Available online: http://www.bsi.bund.de/english/gshb/manual/index.htm
    • (2003) IT Baseline Protection Manual
  • 11
    • 33750453781 scopus 로고    scopus 로고
    • SECTET - An Extensible Framework for the Realization of Secure Inter-Organizational Workflows
    • Hafner, M., Agreiter, B., Breu, R., Nowak, A.: SECTET - An Extensible Framework for the Realization of Secure Inter-Organizational Workflows. Journal of Internet Research (2006)
    • (2006) Journal of Internet Research
    • Hafner, M.1    Agreiter, B.2    Breu, R.3    Nowak, A.4
  • 14
    • 79955143136 scopus 로고    scopus 로고
    • SecureUML: A UML-Based Modeling Language for Model-Driven Security
    • Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.), Springer, Heidelberg
    • Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426-441. Springer, Heidelberg (2002)
    • (2002) UML 2002. LNCS , vol.2460 , pp. 426-441
    • Lodderstedt, T.1    Basin, D.2    Doser, J.3
  • 15
    • 84994734251 scopus 로고    scopus 로고
    • Risk analysis and risk management
    • Peltier, T.R.: Risk analysis and risk management. Information Systems Security 13(4), 44-56 (2004)
    • (2004) Information Systems Security , vol.13 , Issue.4 , pp. 44-56
    • Peltier, T.R.1
  • 17
    • 20444404422 scopus 로고    scopus 로고
    • The CORAS Approach for Model-based Risk Management applied to e-Commerce Domain
    • Raptis, D., Dimitrakos, T., Gran, B.A., Stølen, K.: The CORAS Approach for Model-based Risk Management applied to e-Commerce Domain. In: Proc. CMS-2002, pp. 169-181 (2002)
    • (2002) Proc. CMS-2002 , pp. 169-181
    • Raptis, D.1    Dimitrakos, T.2    Gran, B.A.3    Stølen, K.4
  • 18
    • 33845208648 scopus 로고    scopus 로고
    • Capturing Security Requirements in Business Processes Through a UML 2.0 Activity Diagrams Profile
    • Roddick, J.F., Benjamins, V.R., Si-said Cherfi, S., Chiang, R., Claramunt, C., El-masri, R.A., Grandi, F., Han, H.. Hepp, M., Lytras, M., Mišić, V.B., Poels, G., Song, I.-Y., Trujillo, J., Vangenot, C. (eds.), Springer, Heidelberg
    • Rodriguez, A., Fernandez-Medina, E., Piattini, M.: Capturing Security Requirements in Business Processes Through a UML 2.0 Activity Diagrams Profile. In: Roddick, J.F., Benjamins, V.R., Si-said Cherfi, S., Chiang, R., Claramunt, C., El-masri, R.A., Grandi, F., Han, H.. Hepp, M., Lytras, M., Mišić, V.B., Poels, G., Song, I.-Y., Trujillo, J., Vangenot, C. (eds.) ER Workshops 2006. LNCS, vol. 4231, pp. 32-42. Springer, Heidelberg (2006)
    • (2006) ER Workshops 2006. LNCS , vol.4231 , pp. 32-42
    • Rodriguez, A.1    Fernandez-Medina, E.2    Piattini, M.3
  • 21
    • 39049192878 scopus 로고    scopus 로고
    • Medical Data GRIDs as approach towards secure cross enterprise document sharing (Based on IHE XDS)
    • Wozak, F., Ammenwerth, E., Breu, M., Penz, R., Schabetsberger, T., Vogl, R., Wurz, M.: Medical Data GRIDs as approach towards secure cross enterprise document sharing (based on IHE XDS). In: Proc. MIE 2006, pp. 377-383 (2006)
    • (2006) Proc. MIE 2006 , pp. 377-383
    • Wozak, F.1    Ammenwerth, E.2    Breu, M.3    Penz, R.4    Schabetsberger, T.5    Vogl, R.6    Wurz, M.7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.