2011 IEEE International Conference on Services Computing 2011
DOI: 10.1109/scc.2011.102
|View full text |Cite
|
Sign up to set email alerts
|

Multi Domain-Specific Modeling of the Security Concerns of Service-Oriented Architectures

Abstract: Abstract-Service-Oriented Architectures (SOA), and Web Services (WS), the technology generally used to implement them, achieve the integration of heterogeneous technologies, providing interoperability, and yielding the reutilization of preexistent systems. Model-driven development methodologies provide inherent benefits such as increased productivity, greater reuse, and better maintainability, to ñame a few. Efforts on achieving model-driven development of SOAs already exist, but there is currently no standard… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0
1

Year Published

2013
2013
2014
2014

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 2 publications
0
0
0
1
Order By: Relevance
“…In [9] the authors define an approach, which ensures the generation of security configurations from business process models. In the first step, the business process model is annotated with abstract security intents using different models and notations: like UML'S SOAML profile, UML's QoS profile, and secureUML.…”
Section: Related Workmentioning
confidence: 99%
“…In [9] the authors define an approach, which ensures the generation of security configurations from business process models. In the first step, the business process model is annotated with abstract security intents using different models and notations: like UML'S SOAML profile, UML's QoS profile, and secureUML.…”
Section: Related Workmentioning
confidence: 99%
“…El proceso que se presenta, que extiende y detalla el presentado por primera vez en [Silva Gallino, J. P. and de Miguel, M. A. and Briones, J. F. and Alonso, A. (2011a)], hace uso de ontologías para el descubrimiento de modelos NF almacenados en repositorios.…”
Section: Introductionunclassified