2008 IEEE Congress on Services - Part I 2008
DOI: 10.1109/services-1.2008.82
|View full text |Cite
|
Sign up to set email alerts
|

Methodology and Tools for End-to-End SOA Security Configurations

Abstract: The configuration of non-functional requirements, such as security, has become important for SOA applications, but the configuration process has not been discussed comprehensively. In current development processes, the security requirements are not considered in upstream phases and a developer at a downstream phase is responsible for writing the security configuration. However, configuring security requirements properly is quite difficult for developers because the SOA security is cross-domain and all required… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0
3

Year Published

2010
2010
2017
2017

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(17 citation statements)
references
References 11 publications
0
14
0
3
Order By: Relevance
“…Sometimes security is added at the time of integration of distributed applications. SOA applications are coupled over various protocols and network technologies, just adding security to software applications is not a realistic approach [6,22] because all the required security information is not available at the downstream phases [6,23]. This approach degrades implementing and maintaining the security of the system [24].…”
Section: Security Is Not Unified With Software Engineering Processmentioning
confidence: 99%
“…Sometimes security is added at the time of integration of distributed applications. SOA applications are coupled over various protocols and network technologies, just adding security to software applications is not a realistic approach [6,22] because all the required security information is not available at the downstream phases [6,23]. This approach degrades implementing and maintaining the security of the system [24].…”
Section: Security Is Not Unified With Software Engineering Processmentioning
confidence: 99%
“…A methodology for an end to end SOA security configuration in proposed by [18]. The approach is model-driven, and makes use of templates to express identified security patterns, initially added as abstract keywords that represent security requirements at business level, and then at a service model level.…”
Section: Related Workmentioning
confidence: 99%
“…The SIM, although closer to topology modeling, fulfills an equivalent functionality to that of the WS-SecurityPolicy platform model in this work. Our approach and the one in [18] differ in that the latter is limited to security, and in, perhaps, the greatest strength in this proposal: the use of sepárate concern models to address each non-functional characteristic, a feature that aids reuse and modularity of design and implementation.…”
Section: Related Workmentioning
confidence: 99%
“…It offers routing services to navigate the requests to the relevant service provider based on a routing path specification. Routing may be [6] itinerary-based, content-based, conditional-based defined manually [45] or dynamic [51]. In both cases the drawback is the minimal support for considering all functional and non-functional requirements of all service connections in the system.…”
Section: Technical Integrationmentioning
confidence: 99%