Coverart for item
The Resource Security engineering for service-oriented architectures, Michael Hafner, Ruth Breu

Security engineering for service-oriented architectures, Michael Hafner, Ruth Breu

Label
Security engineering for service-oriented architectures
Title
Security engineering for service-oriented architectures
Statement of responsibility
Michael Hafner, Ruth Breu
Creator
Contributor
Subject
Language
eng
Cataloging source
UKM
http://library.link/vocab/creatorName
Hafner, Michael
Dewey number
004.22
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A73
LC item number
H34 2009
Literary form
non fiction
Nature of contents
bibliography
http://library.link/vocab/relatedWorkOrContributorDate
1964-
http://library.link/vocab/relatedWorkOrContributorName
Breu, R.
http://library.link/vocab/subjectName
  • Computer architecture
  • Computer security
Label
Security engineering for service-oriented architectures, Michael Hafner, Ruth Breu
Instantiates
Publication
Bibliography note
Includes bibliographical references (pages [231]-242) and index
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Cover -- Contents -- Part I: The Basics of SOA Security Engineering -- 1 Introduction -- 1.1 Service Oriented Architecture -- 1.2 Problem Description -- 1.3 Contribution -- 1.4 Related Work -- 2 SOA -- Standards & Technology -- 2.1 Service Oriented Architectures -- 2.2 Web Services -- 2.3 The Web Services Specification Stack -- 3 Basic Concepts of SOA Security -- 3.1 What Is (SOA) Security? -- 3.2 Security Objectives -- 3.3 Security Policies -- 3.4 Security Analysis -- 3.5 Web Services Security Standards -- 4 Domain Architectures -- 4.1 Model Driven Software Development -- 4.2 A Definition of Model Driven Software Development -- 4.3 Domain Specific Languages -- 4.4 The Target Architecture -- 4.5 Model-(to-model- )to-code Transformation -- 4.6 Domain Architecture -- 4.7 Framework -- 4.8 Model Driven Security -- Part II: Realizing SOA Security -- 5 Sectino -- A Motivating Case Study from E-Government -- 5.1 Problem Context -- 5.2 Project Mission -- 5.3 Expected Benefits -- 5.4 Scenario Description -- 5.5 Results -- 6 Security Analysis -- 6.1 Overview -- 6.2 Functional System View -- 6.3 Security Analysis Process -- 6.4 Access Control -- 6.5 Related Work -- 7 Modeling Security Critical SOA Applications -- 7.1 The Sectet Domain Specific Language -- 7.2 The DSL Meta-models -- 7.3 Integrating Security into the DSL -- 8 Enforcing Security with the Sectet Reference Architecture -- 8.1 Architectural Blueprint -- 8.2 Components -- 8.3 Communication Protocols -- 8.4 Component Configuration -- 9 Model Transformation & Code Generation -- 9.1 Transformations in the Sectet-Framework -- 9.2 Security Transformations -- 9.3 Services Transformations -- 9.4 Implementing Transformation -- 10 Software & Security Management -- 10.1 Tool Chain -- 10.2 The Deployment Process -- 11 Extending Sectet: Advanced Security Policy Modeling -- 11.1 Motivation -- 11.2 Extending the DSL -- 11.3 Modeling Policies with Dynamic Constraints -- 11.4 Integrating Sectet-PL into the Sectet- Framework -- 11.5 Extending the Reference Architecture -- 11.6 Sectet-PL Transformations -- 11.7 Modeling Advanced Use Cases with Sectet-PL -- Part III: A Case Study from Healthcare -- 12 health@net -- A Case Study from Healthcare -- 12.1 Background -- 12.2 health@net -- 12.3 health@net -- Security Analysis -- 12.4 health@net -- Security Concept -- 12.5 Realizing Security with the Sectet-Framework -- 12.6 health@net -- Phases 2a & 2b -- Part IV: Appendices -- A Mapping Tables -- A.1 Mapping Table for Inbound Policy File -- A.2 Mapping Table for Outbound Policy Files -- A.3 Mapping Table for BPEL Files -- A.4 Mapping Table for BPEL Files (continued) -- A.5 Mapping Table for WSDL Files -- References -- Index
Control code
271770369
Dimensions
24 cm
Extent
xvi, 245 pages
Isbn
9783540795384
Isbn Type
(hbk.)
Lccn
2008933600
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Other physical details
illustrations
System control number
(OCoLC)271770369
Label
Security engineering for service-oriented architectures, Michael Hafner, Ruth Breu
Publication
Bibliography note
Includes bibliographical references (pages [231]-242) and index
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Cover -- Contents -- Part I: The Basics of SOA Security Engineering -- 1 Introduction -- 1.1 Service Oriented Architecture -- 1.2 Problem Description -- 1.3 Contribution -- 1.4 Related Work -- 2 SOA -- Standards & Technology -- 2.1 Service Oriented Architectures -- 2.2 Web Services -- 2.3 The Web Services Specification Stack -- 3 Basic Concepts of SOA Security -- 3.1 What Is (SOA) Security? -- 3.2 Security Objectives -- 3.3 Security Policies -- 3.4 Security Analysis -- 3.5 Web Services Security Standards -- 4 Domain Architectures -- 4.1 Model Driven Software Development -- 4.2 A Definition of Model Driven Software Development -- 4.3 Domain Specific Languages -- 4.4 The Target Architecture -- 4.5 Model-(to-model- )to-code Transformation -- 4.6 Domain Architecture -- 4.7 Framework -- 4.8 Model Driven Security -- Part II: Realizing SOA Security -- 5 Sectino -- A Motivating Case Study from E-Government -- 5.1 Problem Context -- 5.2 Project Mission -- 5.3 Expected Benefits -- 5.4 Scenario Description -- 5.5 Results -- 6 Security Analysis -- 6.1 Overview -- 6.2 Functional System View -- 6.3 Security Analysis Process -- 6.4 Access Control -- 6.5 Related Work -- 7 Modeling Security Critical SOA Applications -- 7.1 The Sectet Domain Specific Language -- 7.2 The DSL Meta-models -- 7.3 Integrating Security into the DSL -- 8 Enforcing Security with the Sectet Reference Architecture -- 8.1 Architectural Blueprint -- 8.2 Components -- 8.3 Communication Protocols -- 8.4 Component Configuration -- 9 Model Transformation & Code Generation -- 9.1 Transformations in the Sectet-Framework -- 9.2 Security Transformations -- 9.3 Services Transformations -- 9.4 Implementing Transformation -- 10 Software & Security Management -- 10.1 Tool Chain -- 10.2 The Deployment Process -- 11 Extending Sectet: Advanced Security Policy Modeling -- 11.1 Motivation -- 11.2 Extending the DSL -- 11.3 Modeling Policies with Dynamic Constraints -- 11.4 Integrating Sectet-PL into the Sectet- Framework -- 11.5 Extending the Reference Architecture -- 11.6 Sectet-PL Transformations -- 11.7 Modeling Advanced Use Cases with Sectet-PL -- Part III: A Case Study from Healthcare -- 12 health@net -- A Case Study from Healthcare -- 12.1 Background -- 12.2 health@net -- 12.3 health@net -- Security Analysis -- 12.4 health@net -- Security Concept -- 12.5 Realizing Security with the Sectet-Framework -- 12.6 health@net -- Phases 2a & 2b -- Part IV: Appendices -- A Mapping Tables -- A.1 Mapping Table for Inbound Policy File -- A.2 Mapping Table for Outbound Policy Files -- A.3 Mapping Table for BPEL Files -- A.4 Mapping Table for BPEL Files (continued) -- A.5 Mapping Table for WSDL Files -- References -- Index
Control code
271770369
Dimensions
24 cm
Extent
xvi, 245 pages
Isbn
9783540795384
Isbn Type
(hbk.)
Lccn
2008933600
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Other physical details
illustrations
System control number
(OCoLC)271770369

Library Locations

    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...