Security in computing
ACM Transactions on Information and System Security (TISSEC)
LSCs: Breathing Life into Message Sequence Charts
Formal Methods in System Design
Introduction: Service-oriented computing
Communications of the ACM - Service-oriented computing
Reo: a channel-based coordination model for component composition
Mathematical Structures in Computer Science
Modeling component connectors in Reo by constraint automata
Science of Computer Programming - Special issue on second international workshop on foundations of coordination languages and software architectures (FOCLASA'03)
Compliance checking between business processes and business contracts
EDOC '06 Proceedings of the 10th IEEE International Enterprise Distributed Object Computing Conference
Security policy compliance with violation management
Proceedings of the 2007 ACM workshop on Formal methods in security engineering
Visual specifications of policies and their verification
FASE'03 Proceedings of the 6th international conference on Fundamental approaches to software engineering
A state/event temporal deontic logic
DEON'06 Proceedings of the 8th international conference on Deontic Logic and Artificial Normative Systems
Hi-index | 0.00 |
Connectors have emerged as a powerful concept for composition and coordination of concurrent activities encapsulated as components and services. The widespread use of connectors in service-oriented applications is hindered by the lack of adequate security support. A security policy defines a set of security requirements that correspond to permissions, prohibitions and obligations to some executions when some contextual conditions are satisfied. In this paper, we propose the use of a scenario-based visual notation, called Policy Sequence Chart (PSC), for specifying security policies, and investigate an approach in which connectors are compliant with the security policies.