[go: up one dir, main page]

Gutiérrez et al., 2005 - Google Patents

Web services enterprise security architecture: a case study

Gutiérrez et al., 2005

View PDF
Document ID
16290500903472288020
Author
Gutiérrez C
Fernández-Medina E
Piattini M
Publication year
Publication venue
Proceedings of the 2005 workshop on Secure web services

External Links

Snippet

Web Services (WS hereafter) Security is a crucial aspect for technologies based on this paradigm to be completely adopted by the industry. As a consequence, a lot of initiativesof initiatives have arisen during the last years setting as their main purpose the standardization …
Continue reading at dl.acm.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US10348774B2 (en) Method and system for managing security policies
CN101415001B (en) Composite application using security annotations
Wolter et al. Modelling security goals in business processes
Beckers et al. A pattern-based method for establishing a cloud-specific information security management system: Establishing information security management systems for clouds considering security, privacy, and legal compliance
US20090099882A1 (en) Enhanced Security Framework for Composite Applications
US9805172B2 (en) System and methods of resource usage using an interoperable management framework
US20080163335A1 (en) Method and arrangement for role management
Nagaratnam et al. Business-driven application security: From modeling to managing secure applications
Basso et al. Towards a UML profile for privacy-aware applications
Gutiérrez et al. Web services enterprise security architecture: a case study
JP2005503596A (en) Resource sharing system and method
Demchenko et al. Policy based access control in dynamic Grid-based collaborative environment
Chollet et al. Security specification at process level
Ayoubi et al. New XACML-AspectBPEL approach for composite web services security
Müller Security Mechanisms for Workflows in Service-Oriented Architectures
Wang et al. Access control for human tasks in service oriented architecture
Höllrigl et al. Towards systematic engineering of Service-Oriented access control in federated environments
Karantjias et al. Design principles of secure federated e/m-government framework
Hung et al. Implementing conflict of interest assertions for web services matchmaking process
Linkies et al. SAP security and authorizations
Hung et al. Specifying conflict of interest assertions in WS-policy with Chinese wall security policy
Tout et al. XrML-RBLicensing approach adapted to the BPEL process of composite web services
Chen et al. On designing access control aspects for web applications
Lorch PRIMA: Privilege management and authorization in grid computing environments
NASSR et al. Security service design for the RMI distributed system based on parameterized RBAC