2005 IEEE International Conference on Services Computing (SCC'05) Vol-1 2005
DOI: 10.1109/scc.2005.66
|View full text |Cite
|
Sign up to set email alerts
|

Model-driven security based on a Web services security architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
53
0

Year Published

2006
2006
2017
2017

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 55 publications
(53 citation statements)
references
References 6 publications
0
53
0
Order By: Relevance
“…Sometimes security is added at the time of integration of distributed applications. SOA applications are coupled over various protocols and network technologies, just adding security to software applications is not a realistic approach [6,22] because all the required security information is not available at the downstream phases [6,23]. This approach degrades implementing and maintaining the security of the system [24].…”
Section: Security Is Not Unified With Software Engineering Processmentioning
confidence: 99%
See 1 more Smart Citation
“…Sometimes security is added at the time of integration of distributed applications. SOA applications are coupled over various protocols and network technologies, just adding security to software applications is not a realistic approach [6,22] because all the required security information is not available at the downstream phases [6,23]. This approach degrades implementing and maintaining the security of the system [24].…”
Section: Security Is Not Unified With Software Engineering Processmentioning
confidence: 99%
“…The paradigm of SOA promises inter-operability and integration ensuring the availability of resources in the form of services over the network. The SOA paradigm utilizes services as a fundamental element for developing applications [5] and makes the application development easy by coupling services over the Internet or intranet [6]. A business application can be developed as a runtime orchestration of a set of services.…”
Section: Introductionmentioning
confidence: 99%
“…Security must be unified with the software engineering process [41] and security engineering [42] should be implemented for SOA applications at design phase itself, instead of applying as an ad-hoc requirement. Successfully implemented SOA security has to be well-defined, well-planned, and well-implemented [43].…”
Section: Need Of Security For Soamentioning
confidence: 99%
“…In most of the current practice in separating functional and non-functional properties, non-functional properties are specified on a per-service basis (?, ? ; Amir & Zeid, 2004;Lodderstedt, Basin, & Doser, 2002;Jrjens, 2002;Nakamura, Tatsubori, Imamura, & Ono, 2005;Soler, Villarroel, Trujillo, Medina, & Piattini, 2006;Vokäc, 2005;Baligand & Monfort, 2004;G. Wang, Chen, Wang, Fung, & Uczekaj, 2004).…”
Section: Introductionmentioning
confidence: 99%
“…They are informally specified in natural languages in most of the current practice of separating functional and non-functional properties; it is tedious and error-prone for application developers to manually ensure that their applications satisfy required non-functional constraints (?, ? ; Amir & Zeid, 2004;Nakamura et al, 2005). Few methods exist to explicitly specify non-functional constraints and consistently validate and enforce them in applications.…”
Section: Introductionmentioning
confidence: 99%