2007
DOI: 10.1109/icse.2007.49
|View full text |Cite
|
Sign up to set email alerts
|

Managing Impacts of Security Protocol Changes in Service-Oriented Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2007
2007
2020
2020

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 22 publications
(11 citation statements)
references
References 11 publications
0
11
0
Order By: Relevance
“…In addition, this work is based on the methodology developed in our previous work [Skosgrud et al 2007], which supports the evolution management of security protocols (i.e., trust negotiation protocol). The approach presents constraints specific to security protocols and provides analysis methods for the change impact of security protocols.…”
Section: Database Schema Evolutionmentioning
confidence: 99%
“…In addition, this work is based on the methodology developed in our previous work [Skosgrud et al 2007], which supports the evolution management of security protocols (i.e., trust negotiation protocol). The approach presents constraints specific to security protocols and provides analysis methods for the change impact of security protocols.…”
Section: Database Schema Evolutionmentioning
confidence: 99%
“…Mainly, there are three aspects of service changes including interface changes, protocol changes and QoS changes. Existing research addresses inter-service dependency analysis [3,33,52,61,75,76], SLA violations [22,24,63] and protocol changes [62,65] at the service level. Graphbased dependency analysis and formal specifications also dominate inter-service dependency analysis.…”
Section: Inter-service Impact Analysis and Propagationmentioning
confidence: 99%
“…A significant disadvantage of these approaches is that they do not allow verification of non-functional requirements such as integrity of the web services [2,3], information flow properties. To overcome the above shortcomings, we employ a hardware-based trust mechanism called Trusted Platform Module to bootstrap trust in a service-oriented architecture.…”
Section: Introductionmentioning
confidence: 99%