Fan Zhang, Junwei Cao, et al.
IEEE TETC
The configuration of non-functional requirements, such as security, has become important for SOA applications, but the configuration process has not been discussed comprehensively. In current development processes, the security requirements are not considered in upstream phases and a developer at a downstream phase is responsible for writing the security configuration. However, configuring security requirements properly is quite difficult for developers because the SOA security is cross-domain and all required information is not available in the downstream phase. To resolve this problem, we clarify how to configure security in the SOA application development process, and define the developer's roles in each phase. Additionally, supporting technologies to generate security configurations are proposed: Model-Driven Security and Pattern-based Policy Configuration. Our contribution is proposing a methodology for end-to-end security configuration for SOA applications and tools for generating detailed security configurations from the requirements specified in upstream phases model transformations, making it possible to configure security properly without increasing developers' workloads. © 2008 IEEE.
Fan Zhang, Junwei Cao, et al.
IEEE TETC
Rajeev Gupta, Shourya Roy, et al.
ICAC 2006
David S. Kung
DAC 1998
Kafai Lai, Alan E. Rosenbluth, et al.
SPIE Advanced Lithography 2007