2010 Asia Pacific Software Engineering Conference 2010
DOI: 10.1109/apsec.2010.29
|View full text |Cite
|
Sign up to set email alerts
|

Aspect Oriented Approach to Building Secure Service Composition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…However, there is a lack of details illustrating how the security action is realized. Finally, Fan [12] presents a formal aspect-oriented approach to design and enforce service composition with security requirements. The main contribution is the proposition of formalizing the AOP enforcement environment to realize security requirements in service compositions.…”
Section: Enforcement Of Security Requirementsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, there is a lack of details illustrating how the security action is realized. Finally, Fan [12] presents a formal aspect-oriented approach to design and enforce service composition with security requirements. The main contribution is the proposition of formalizing the AOP enforcement environment to realize security requirements in service compositions.…”
Section: Enforcement Of Security Requirementsmentioning
confidence: 99%
“…Related work already focus on related issues such as: specification of security requirements [2,8,19,21,26,28,[34][35][36], translation of high-level security requirements into security executable configurations [21,31,36], translation of the functional business process into an executable process [24,25] and security enforcement [7,9,12,37]. However, there is a lack of a holistic environment that integrates all the aforementioned points, which includes not only the security modeling, translation and enforcement, but also the functional business process automation in the same approach.…”
Section: Introductionmentioning
confidence: 99%
“… Introduce t s and p s to describe the beginning operation and position of user request and initiate the user request on the basis of the characteristics of the job. Transition t e and place p e are introduced to describe the termination operation and position of user request then synthesize and output the corresponding results on the basis of the relationships between jobs The model of job J a i , i is shown by a dashed box in Figure .…”
Section: Job Scheduling Model For Cloud Data Centermentioning
confidence: 99%
“…All the possibly reachable states of S are denoted by R ( S ). The remaining concepts can refer to the work of Fan et al…”
Section: Job Scheduling Model For Cloud Data Centermentioning
confidence: 99%