Proceedings of the 2nd International Conference on Service Oriented Computing 2004
DOI: 10.1145/1035167.1035186
|View full text |Cite
|
Sign up to set email alerts
|

Specification and querying of security constraints in the EFSOC framework

Abstract: Service-Oriented Computing is a new paradigm for the specification and deployment of distributed services in highly dynamic environments. The very nature of the context in which service oriented computing thrives imposes unique security requirements. Large scale interconnection of systems and services, rapidly changing service compositions and adhoc composition and invocation of services require a flexible security model that is able to adapt to these changes. In this paper, we present an approach to specifica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2006
2006
2009
2009

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…This work describes an adaptation of Tropos which permits the definition of an architecture that covers a certain set of WS-based Quality-of-Service requirements. EFSOC [9] is an event-driven framework for WSbased systems which specifies a security model that can be easily adopted by systems in which the degree of modifiability is very high, thereby requiring the continuous review and updating of authorization policies. In [10], a formal analysis of security-critical service-based software systems is presented and in [11] a formal approach to the construction of service-based systems is described.…”
Section: Related Workmentioning
confidence: 99%
“…This work describes an adaptation of Tropos which permits the definition of an architecture that covers a certain set of WS-based Quality-of-Service requirements. EFSOC [9] is an event-driven framework for WSbased systems which specifies a security model that can be easily adopted by systems in which the degree of modifiability is very high, thereby requiring the continuous review and updating of authorization policies. In [10], a formal analysis of security-critical service-based software systems is presented and in [11] a formal approach to the construction of service-based systems is described.…”
Section: Related Workmentioning
confidence: 99%