Security is an essential feature and foremost concern to enterprise software systems. Today, application-level security functions, e.g. access control based on complex, fine-grain and/or context dependent security policies, are largely embedded in application software. This results in multiple point security control, which makes system integration and security administration tremendously difficult, costly and error-prone. No effective and scalable means exist to systematically classify, precisely predict and measure end-to-end properties (e.g. completeness and assurance of security policies) of enterprise security services. In this talk, we present our ongoing effort to address the above problems by integrating the latest results in distri...
AbstractThis paper describes an approach to modeling the evolution of non-secure applications into s...
For large security systems a clear separation of concerns is achieved through architecting. Particul...
The paper proposes a framework for dynamic service-oriented IT systems security. We review the conte...
Security is an essential feature and foremost concern to enterprise software systems. Today, applica...
[[abstract]]Security system architecture governs the composition of components in security systems a...
Security system architecture governs the composition of components in security systems and interacti...
In today's field of distributed software architectures there is a need for environments allowin...
International audienceIn this paper, we present E2SM, an End-to-End Security Model and a set of algo...
This paper introduces a framework for security-oriented software service composition and evolution. ...
Software systems, in particular component (or service) based software systems, are becoming highly d...
This presentation makes two primary contributions toward establishing support for application-specif...
A service-oriented architecture (SOA)-based application is composed of a number of distributed and l...
This paper makes two main contributions towards estab-lishing support for application-specific facto...
International audienceDue to today's rapidly changing corporate environments, business processes are...
The research proposed a novel approach to improve the alignment of high-level business requirements ...
AbstractThis paper describes an approach to modeling the evolution of non-secure applications into s...
For large security systems a clear separation of concerns is achieved through architecting. Particul...
The paper proposes a framework for dynamic service-oriented IT systems security. We review the conte...
Security is an essential feature and foremost concern to enterprise software systems. Today, applica...
[[abstract]]Security system architecture governs the composition of components in security systems a...
Security system architecture governs the composition of components in security systems and interacti...
In today's field of distributed software architectures there is a need for environments allowin...
International audienceIn this paper, we present E2SM, an End-to-End Security Model and a set of algo...
This paper introduces a framework for security-oriented software service composition and evolution. ...
Software systems, in particular component (or service) based software systems, are becoming highly d...
This presentation makes two primary contributions toward establishing support for application-specif...
A service-oriented architecture (SOA)-based application is composed of a number of distributed and l...
This paper makes two main contributions towards estab-lishing support for application-specific facto...
International audienceDue to today's rapidly changing corporate environments, business processes are...
The research proposed a novel approach to improve the alignment of high-level business requirements ...
AbstractThis paper describes an approach to modeling the evolution of non-secure applications into s...
For large security systems a clear separation of concerns is achieved through architecting. Particul...
The paper proposes a framework for dynamic service-oriented IT systems security. We review the conte...