2007
DOI: 10.1093/ietisy/e90-d.9.1374
|View full text |Cite
|
Sign up to set email alerts
|

Web Services-Based Security Requirement Elicitation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2009
2009
2012
2012

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…Such security attributes are essential for securing WS messages: confidentiality, integrity, and freshness; and interactions: audit, authentication, authorization and non-repudiation. To identify business security objectives, the analyst can use security requirement elicitation techniques [6] or the Unified Compliance Framework (www.unifiedcompliance.org).…”
Section: A Identifying Business-level Security Objectivesmentioning
confidence: 99%
“…Such security attributes are essential for securing WS messages: confidentiality, integrity, and freshness; and interactions: audit, authentication, authorization and non-repudiation. To identify business security objectives, the analyst can use security requirement elicitation techniques [6] or the Unified Compliance Framework (www.unifiedcompliance.org).…”
Section: A Identifying Business-level Security Objectivesmentioning
confidence: 99%
“…We can find in the literature much research in the area of web services security, both regarding security requirements analysis (Firesmith, 2003;Firesmith, 2004;Gutiérrez et al, 2005b;OASIS, 2005;W3C, 2004;WS-I, 2005;Yagüe et al, 2005;Yagüe and Troya, 2002) and concerning the definition of security patterns (Alexander et al, 1977;Buschmann, 1999;Buschmann et al, 1996;Fernandez, 2002;Fernandez and Pan, 2001;Fernandez et al, 2003;Lehtoren and Pärssinen, 2002;Ramachandran, 2002;Rosado et al, 2006;Steel et al, 2005;Yoder and Barcalow, 1997). However, there are no approaches connecting security requirements with security patterns, so there are no traceability mechanisms allowing choosing the most appropriate security pattern depending on a specific security requirement.…”
Section: Introductionmentioning
confidence: 99%