Telos: representing knowledge about information systems
ACM Transactions on Information Systems (TOIS)
ConceptBase—a deductive object base for meta data management
Journal of Intelligent Information Systems - Special issue: deductive and object-oriented databases
Role-Based Access Control Models
Computer
The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems
The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems
Handbook of Information Security Management 1999
Handbook of Information Security Management 1999
Exploring a Multi-Faceted Framework for SoC: How to Develop Secure Web-Service Interactions?
RIDE '04 Proceedings of the 14th International Workshop on Research Issues on Data Engineering: Web Services for E-Commerce and E-Government Applications (RIDE'04)
Separation of duties for access control enforcement in workflow environments
IBM Systems Journal - End-to-end security
Web Services-Based Security Requirement Elicitation
IEICE - Transactions on Information and Systems
The practical application of a process for eliciting and designing security in web service systems
Information and Software Technology
Hi-index | 0.00 |
Service-Oriented Computing is a new paradigm for the specification and deployment of distributed services in highly dynamic environments. The very nature of the context in which service-oriented computing thrives imposes unique security requirements. Large scale interconnection of systems and services, rapidly changing service compositions and ad-hoc composition and invocation of services require a flexible security model that is able to adapt to these changes. In this paper, we present an approach to specification and querying of security (access control) constraints in the context of the event-driven framework for service-oriented computing.