Filters








67,994 Hits in 2.4 sec

A Security Meta-model for Service-Oriented Architectures

Michael Menzel, Christoph Meinel
2009 2009 IEEE International Conference on Services Computing  
Several approaches have been described to generate executable description of service orchestrations based on visual business process models.  ...  Service-oriented Architectures (SOA) facilitate the provision and orchestration of business services to enable a faster adoption to changing business demands.  ...  It supports business analysts and business process experts to analyse and improve processes concerning business requirements.  ... 
doi:10.1109/scc.2009.57 dblp:conf/IEEEscc/MenzelM09 fatcat:m6bwwrrh2bdidd3smigptq52te

Modeling Wizard for Confidential Business Processes [chapter]

Andreas Lehmann, Niels Lohmann
2013 Lecture Notes in Business Information Processing  
The proposed technique can be integrated into the design phase of a service-oriented business process and help the modeler choose which tasks can be safely outsourced.  ...  A core motivation of service-oriented execution of business processes is the opportunity to reduce costs by outsourcing certain tasks to third-party service providers.  ...  The Petri net in Fig. 1 models a service-oriented insurance claim business process.  ... 
doi:10.1007/978-3-642-36285-9_67 fatcat:4j3jqwfbmbd6vpdivrlhdm2vte

Integrity and Confidentiality Annotations for Service Interfaces in SoaML Models

Bernhard Hoisl, Stefan Sobernig
2011 2011 Sixth International Conference on Availability, Reliability and Security  
process-driven service-oriented archi- tion models of the process-executing software system.  ...  Services development (MDD) approaches ([3]–[7]) have combined require and provide callable functions at announced net- modelling support for security properties in business process work  ... 
doi:10.1109/ares.2011.105 dblp:conf/IEEEares/HoislS11 fatcat:7upyyresmbdkzf4sz6vpbcaplu

Development of Distributed Applications Using Service-Oriented-Architecture

Pragati Priyadarshinee, Y. Ramadevi, Anuradh Srinivas
2011 Journal of clean energy technologies  
This paper advocates approaching the design activity from a business rather than technological perspective by defining a service-oriented software architecture that satisfies the functional requirements  ...  The paper also suggests identifying existing or new design patterns to capture common business process functionalities and fulfill the non-functional requirements.  ...  First, a service-oriented architecture captures existing legacy systems functionalities in the form of basic services and business processes in the form of composite services.  ... 
doi:10.7763/ijcte.2011.v3.411 fatcat:w7gt646xm5f2bbfgzinspcvaxy

Quality-Driven Business Policy Specification and Refinement for Service-Oriented Systems [chapter]

Tan Phan, Jun Han, Jean-Guy Schneider, Kirk Wilson
2008 Lecture Notes in Computer Science  
In this paper, we introduce the HOPE (High-Level Objective-based Policy for Enterprises) framework that supports, in a systematic manner, the specification of quality-oriented policies at the business  ...  For systems implemented using Web Services, the specification and management of these qualities in the form of Web Service policies are often complicated and difficult to be aligned with the initial business  ...  In recent years, Service-Oriented Architectures (SOA) and Web Services (WS) have offered a new way of implementing enterprise business processes.  ... 
doi:10.1007/978-3-540-89652-4_5 fatcat:p55oswcvbvbn7biyzou25asfey

Designing a Generic System for Process-Oriented Support of Business Transactions Using the Internet

Oliver Braun, Dirk Bremer, Günter Schmidt, Kathrin Zimmer
1998 Electronic Markets  
In this project we design and implement an open architecture for supporting business transactions using the Internet confidentially and in a process-oriented way.  ...  We are presenting a project supported by the DFN-Verein, a registered association, and the German government (BMBF) which is called "Confidential Business Transactions on the Internet".  ...  But only a system which supports all phases mentioned above in a process-oriented way can exploit the whole benefits of electronic commerce. • There are many kinds of business processes an enterprise has  ... 
doi:10.1080/10196789800000027 fatcat:a3w7rtsnkbdcvfniv3whzqjzvy

A Model Driven Security Engineering Approach to Support Collaborative Tools Deployment Over Clouds [chapter]

W. F. Ouedraogo, F. Biennier, P. Ghodous
2012 Concurrent Engineering Approaches for Sustainable Product Development in a Multi-Disciplinary Environment  
The development of web 2.0 increases the call for agile and simple business process support.  ...  SOA (Service oriented Architecture) provides companies a new model to build their IT applications around their business processes and to combine them dynamically with the services of partner companies.  ...  Fig. 4 Global security meta-model Business Process Meta-Model Business Process Meta-Model Business Process Meta-Model Business Process Meta-Model Business Process Meta-Model Business Process Meta-Model  ... 
doi:10.1007/978-1-4471-4426-7_95 dblp:conf/ispe/OuedraogoBG12 fatcat:wzc2yt75ajbntov7kkxl4oe6bu

Using Enterprise Architecture Models for System Quality Analysis

Per Närman, Marten Schönherr, Pontus Johnson, Mathias Ekstedt, Moustafa Chenine
2008 2008 12th International IEEE Enterprise Distributed Object Computing Conference  
Enterprise Architecture is a model-based approach to business-oriented IT management.  ...  The use of the extended metamodel is demonstrated in a case study where the availability, accuracy, confidentiality and integrity of the two Service Oriented Architecture (SOA) platforms Sun JCaps and  ...  for a particular business process.  ... 
doi:10.1109/edoc.2008.26 dblp:conf/edoc/NarmanSJEC08 fatcat:gbrm65rgbje7tkague6eie5nzu

Securing Airline-Turnaround Processes Using Security Risk-Oriented Patterns [chapter]

Silver Samarütel, Raimundas Matulevičius, Alex Norta, Rein Nõukas
2016 Lecture Notes in Business Information Processing  
These security risk oriented patterns are applied on business processes from an aviation-turnaround system.  ...  For example, many people rely on e-services offered by banks and medical establishments.  ...  The result of this step is a set of models pertaining to the turnaround processes supported by the system. 2.  ... 
doi:10.1007/978-3-319-48393-1_15 fatcat:cdyyrlx4zrcs5masolfr3eurtu

An Experience Report of Improving Business Process Compliance Using Security Risk-Oriented Patterns [chapter]

Mari-Liis Alaküla, Raimundas Matulevičius
2015 Lecture Notes in Business Information Processing  
In this paper we report on our experience to use the security risk-oriented patterns to improve business processes of the insurance brokerage.  ...  The lessons learnt highlight some method guidelines toward compliance management and suggest needed improvement directions for the application of the security risk-oriented patterns.  ...  The paper of the Baltic-German University Liaison Office is also supported by the German Academic Exchange Service (DAAD) with funds from the Foreign Office of the Federal Republic Germany.  ... 
doi:10.1007/978-3-319-25897-3_18 fatcat:q5gkiwhgyvcohkjor65fctio3i

SOABSE: An approach to realizing business-oriented security requirements with Web Service security policies

Tan Phan, Jun Han, Ingo Mueller, Malinda Kapuruge, Steve Versteeg
2009 2009 IEEE International Conference on Service-Oriented Computing and Applications (SOCA)  
This paper introduces an approach to Web Services security engineering called SOABSE, which systematically models, designs and implements security for a WS-based application from a given set of business-oriented  ...  It includes 1) a stepwise process that systematically transforms business-level security requirements into system-level WS-* security policies, and relies on 2) a security realization model that maps business-level  ...  In [14] , the authors proposed a model-driven approach for annotating security requirements in business processes and transforming them into WS-SecurityPolicy (for authentication, integrity, and confidentiality  ... 
doi:10.1109/soca.2009.5410258 dblp:conf/soca/PhanHMKV09 fatcat:ymtoxdeiqfd6xbscndyhugrb2a

Security Specification at Process Level

Stéphanie Chollet, Philippe Lalanda
2008 2008 IEEE International Conference on Services Computing  
In this paper, we present a process-oriented tool allowing the specification of security properties at the service composition level.  ...  Meta-links between the meta-models have been defined to specify the authorized security constraints on the orchestrated services. The tool has been validated on an application specified by Thales.  ...  We then propose to develop a process-oriented tool orchestrating abstract services and using usual operators for control.  ... 
doi:10.1109/scc.2008.51 dblp:conf/IEEEscc/CholletL08 fatcat:efoqghr4afaqvgklolt6i4emeu

Gaining an Edge in Cyberspace with Advanced Situational Awareness

Vincent Lenders, Axel Tanner, Albert Blarer
2015 IEEE Security and Privacy  
A new cyber-situational awareness framework relies on the OODA (observe, orient, decide, act) cycle to provide near real-time cognitive mapping for corporate environments.  ...  Other product or service names may be trademarks or service marks of IBM or other companies.  ...  Acknowledgments We thank Stefan Engel and Marc Stoecklin for their valuable contributions during the project and the reviewers for their very constructive feedback to the article.  ... 
doi:10.1109/msp.2015.30 fatcat:3ze2ygkasvdytajncl2iwvvwqe

Security Requirements Specification in Service-Oriented Business Process Management

Michael Menzel, Ivonne Thomas, Christoph Meinel
2009 2009 International Conference on Availability, Reliability and Security  
In this paper, we propose an approach to describe security requirements at the business process layer and their translation to concrete security configuration for service-based systems.  ...  We introduce security elements for business process modelling which allow to evaluate the trustworthiness of participants based on a rating of enterprise assets and to express security intentions such  ...  For instance SecureUML [36] is a model-driven security approach for process-oriented systems focusing on access control.  ... 
doi:10.1109/ares.2009.90 dblp:conf/IEEEares/MenzelTM09 fatcat:dnkntgycznbpjgfmq4kzqody6i

Editorial to the theme issue on model-driven service engineering

Juan Manuel Vara, Mike Papazoglou, Il-Yeol Song
2013 Journal of Software and Systems Modeling  
Besides, we would like to express our appreciation to the Editors-in-Chief for hosting this theme issue and particularly to Martin Schindler for his continuous support and his constant guidance along the  ...  Acknowledgments First of all, we would like to thank the authors for their work and patience since the number of submissions resulted in a long reviewing process.  ...  It aims at bringing together the benefits of Service Orientation and Business Process Management, therefore making the most of Service Orientation to help organizations deliver sustainable business value  ... 
doi:10.1007/s10270-013-0368-y fatcat:bs23tylm65ddbba6mnpblamfxm
« Previous Showing results 1 — 15 out of 67,994 results