Gutiérrez et al., 2005 - Google Patents
Web services enterprise security architecture: a case studyGutiérrez et al., 2005
View PDF- Document ID
- 16290500903472288020
- Author
- Gutiérrez C
- Fernández-Medina E
- Piattini M
- Publication year
- Publication venue
- Proceedings of the 2005 workshop on Secure web services
External Links
Snippet
Web Services (WS hereafter) Security is a crucial aspect for technologies based on this paradigm to be completely adopted by the industry. As a consequence, a lot of initiativesof initiatives have arisen during the last years setting as their main purpose the standardization …
- 238000000034 method 0 abstract description 30
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10348774B2 (en) | Method and system for managing security policies | |
| CN101415001B (en) | Composite application using security annotations | |
| Wolter et al. | Modelling security goals in business processes | |
| Beckers et al. | A pattern-based method for establishing a cloud-specific information security management system: Establishing information security management systems for clouds considering security, privacy, and legal compliance | |
| US20090099882A1 (en) | Enhanced Security Framework for Composite Applications | |
| US9805172B2 (en) | System and methods of resource usage using an interoperable management framework | |
| US20080163335A1 (en) | Method and arrangement for role management | |
| Nagaratnam et al. | Business-driven application security: From modeling to managing secure applications | |
| Basso et al. | Towards a UML profile for privacy-aware applications | |
| Gutiérrez et al. | Web services enterprise security architecture: a case study | |
| JP2005503596A (en) | Resource sharing system and method | |
| Demchenko et al. | Policy based access control in dynamic Grid-based collaborative environment | |
| Chollet et al. | Security specification at process level | |
| Ayoubi et al. | New XACML-AspectBPEL approach for composite web services security | |
| Müller | Security Mechanisms for Workflows in Service-Oriented Architectures | |
| Wang et al. | Access control for human tasks in service oriented architecture | |
| Höllrigl et al. | Towards systematic engineering of Service-Oriented access control in federated environments | |
| Karantjias et al. | Design principles of secure federated e/m-government framework | |
| Hung et al. | Implementing conflict of interest assertions for web services matchmaking process | |
| Linkies et al. | SAP security and authorizations | |
| Hung et al. | Specifying conflict of interest assertions in WS-policy with Chinese wall security policy | |
| Tout et al. | XrML-RBLicensing approach adapted to the BPEL process of composite web services | |
| Chen et al. | On designing access control aspects for web applications | |
| Lorch | PRIMA: Privilege management and authorization in grid computing environments | |
| NASSR et al. | Security service design for the RMI distributed system based on parameterized RBAC |