Web services enterprise security architecture: a case study
暂无分享,去创建一个
Mario Piattini | Eduardo Fernández-Medina | Carlos Gutiérrez | E. Fernández-Medina | M. Piattini | C. Gutiérrez
[1] Fabio Massacci,et al. An access control framework for business processes for web services , 2003, XMLSEC '03.
[2] Donald Firesmith,et al. Common Concepts Underlying Safety, Security, and Survivability Engineering , 2003 .
[3] Axel van Lamsweerde,et al. Elaborating security requirements by construction of intentional anti-models , 2004, Proceedings. 26th International Conference on Software Engineering.
[4] Ruth Breu,et al. Key Issues of a Formally Based Process Model for Security Engineer-ing , 2003 .
[5] Daniel Roth,et al. Web Services Policy Framework (WS- Policy) , 2002 .
[6] Donald Firesmith,et al. Engineering Security Requirements , 2003, J. Object Technol..
[7] Tim Moses,et al. EXtensible Access Control Markup Language (XACML) version 1 , 2003 .
[8] Donald Firesmith,et al. Security Use Cases , 2003, J. Object Technol..
[9] Joaquín Nicolás,et al. Requirements Reuse for Improving Information Systems Security: A Practitioner’s Approach , 2002, Requirements Engineering.
[10] Mario Piattini,et al. Web Services Security: Is the Problem Solved? , 2004, Inf. Secur. J. A Glob. Perspect..
[11] Michiaki Tatsubori,et al. Best-practice patterns and tool support for configuring secure Web services messaging , 2004, Proceedings. IEEE International Conference on Web Services, 2004..
[12] Jerry Schwarz,et al. Security Challenges, Threats and Countermeasures Version 1.0 , 2005 .
[13] Vijay Varadharajan,et al. Authorization service for Web services and its implementation , 2004, Proceedings. IEEE International Conference on Web Services, 2004..
[14] Eduardo B. Fernández,et al. Two Patterns for Web Services Security , 2004, International Conference on Internet Computing.
[15] Andreas L. Opdahl,et al. Eliciting security requirements with misuse cases , 2004, Requirements Engineering.
[16] Ibm Redbooks,et al. Patterns: Service Oriented Architecture And Web Services , 2004 .
[17] Andrew P. Moore,et al. Attack Modeling for Information Security and Survivability , 2001 .
[18] Mario Piattini,et al. PWSSec: Process for Web Services Security , 2006, 2006 IEEE International Conference on Web Services (ICWS'06).
[19] Andreas Matheus,et al. How to Declare Access Control Policies for XML Structured Information Objects using OASIS' eXtensible Access Control Markup Language (XACML) , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[20] Mario Piattini,et al. Towards a Process for Web Services Security , 2006, J. Res. Pract. Inf. Technol..
[21] Sabrina De Capitani di Vimercati,et al. A fine-grained access control system for XML documents , 2002, TSEC.
[22] Bashar Nuseibeh,et al. A framework for security requirements engineering , 2006, SESS '06.
[23] Philippe Kruchten,et al. The Rational Unified Process: An Introduction , 1998 .
[24] Gary McGraw,et al. Risk Analysis in Software Design , 2004, IEEE Secur. Priv..
[25] Bob Atkinson. Web Services Security (WS-Security) , 2003 .
[26] Ian F. Alexander,et al. Misuse Cases: Use Cases with Hostile Intent , 2003, IEEE Softw..
[27] Philippe Kruchten,et al. The Rational Unified Process: An Introduction, Second Edition , 2000 .
[28] J. Aagedal,et al. UML Pro?le for Modeling Quality of Service and Fault Tolerance Characteristics and Mechanisms , 2004 .
[29] Elisa Bertino,et al. XML-based specification for Web services document security , 2004, Computer.
[30] Zahir Tari,et al. A role based access control for Web services , 2004, IEEE International Conference onServices Computing, 2004. (SCC 2004). Proceedings. 2004.