2006
DOI: 10.1108/10662240610710978
|View full text |Cite
|
Sign up to set email alerts
|

Sectet: an extensible framework for the realization of secure inter‐organizational workflows

Abstract: SECTET is an extensible framework for the model-driven realization of security-critical, inter-organizational workflows. The framework is based on a methodology that focuses on the correct implementation of securityrequirements and consists of a suite of tools that facilitates the cost-efficient realization and management of decentralized, security-critical workflows. After giving a description of the framework, we show how it can be adapted to incorporate advanced security patterns like the Qualified Signatur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0
1

Year Published

2006
2006
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(22 citation statements)
references
References 24 publications
0
21
0
1
Order By: Relevance
“…''Misuse cases'' (Sindre and Opdahl 2005) and ''abuse cases'' (McDermott and Fox 1999) has utilized UML's use case diagrams, and van Lamsweerde (2004) used ''anti-goals''. Some approaches target supporting several phases-defining high level requirements and elaborating them to support their realization in software (e.g., Hafner et al 2006;Wolter and Schaad 2007;Rodriguez et al 2006).…”
Section: Evaluation With Respect To Existing Workmentioning
confidence: 99%
See 1 more Smart Citation
“…''Misuse cases'' (Sindre and Opdahl 2005) and ''abuse cases'' (McDermott and Fox 1999) has utilized UML's use case diagrams, and van Lamsweerde (2004) used ''anti-goals''. Some approaches target supporting several phases-defining high level requirements and elaborating them to support their realization in software (e.g., Hafner et al 2006;Wolter and Schaad 2007;Rodriguez et al 2006).…”
Section: Evaluation With Respect To Existing Workmentioning
confidence: 99%
“…For example, Lankhorst (2005), Wolter and Schaad (2007), and Gaaloul et al (2012) focused on modeling access control. Some modeling methods have focused on business processes (e.g., Rodriguez et al 2006;Hafner et al 2006;Wolter et al 2008;Accorsi et al 2011) while others have focused on security risk management (e.g., Matulevičius et al 2012;den Braber et al 2007), and security goals (e.g., Giorgini et al 2005;van Lamsweerde 2004). The lack of methods that satisfy requirement R1 may be a result of the observation that researchers working in this field generally specialize in a specific perspective, mainly a technical or a business/social variant.…”
Section: Evaluation With Respect To Existing Workmentioning
confidence: 99%
“…Shifting to more access-control-oriented proposals, we found the SECTET framework [4], perhaps the most remarkable one. SECTET makes use of a model-driven approach to focus on confidentiality, integrity, and nonrepudiation characteristics of SOAs, using WS as the implementation technology.…”
Section: Related Workmentioning
confidence: 99%
“…[2], [3], [4]). However, these approaches do not offer thorough support for access control descriptors, code generation, Web Services Descnption Language (WSDL) [5], and WS-Pohcy [6].…”
Section: Service-orientedmentioning
confidence: 99%
“…These specifications are then used to indicate security functionalities that are offered by a special Security Service, and integrate them in the AO4BPEL process. Sectet [13] is a framework for the implementation of security patterns from design to the implementation of an orchestration. Sectet enables the design of orchestrations as UML message flow diagrams, which are converted into workflows and used to generate stubs for actual orchestrations.…”
Section: Related Workmentioning
confidence: 99%