Skip to Main Content (Press Enter)

Logo UNIBG
  • ×
  • Home
  • Corsi
  • Insegnamenti
  • Persone
  • Pubblicazioni
  • Strutture
  • Terza Missione
  • Attività
  • Competenze

UNI-FIND
Logo UNIBG

|

UNI-FIND

unibg.it
  • ×
  • Home
  • Corsi
  • Insegnamenti
  • Persone
  • Pubblicazioni
  • Strutture
  • Terza Missione
  • Attività
  • Competenze
  1. Pubblicazioni

From Consumer Requirements to Policies in Secure Services

Capitolo di libro
Data di Pubblicazione:
2014
Citazione:
(2014). From Consumer Requirements to Policies in Secure Services . Retrieved from https://hdl.handle.net/10446/324069
Abstract:
Automatic translation of elicited consumer security requirements at high level (problem space) into application or service level security requirements (solution space) has been traditionally the Achilles’ heel of security requirements engineering. Such automated translation would result in significant failure and cost reduction in application development and maintenance, particularly in those complex applications based on compositions and choreographies of services. In this paper we present a framework which makes a step forward to solve this dilemma. The framework supports the engineering of composite service security and trust requirements directly derived from the organisational needs expressed for such service. The followed approach starts with the modelling of organisation actors’ objectives and commitments among these actors, and follows with the transformation of such commitments into security elements in the service business process specification and into a consumer security policy which the service will need to be compliant with.
Tipologia CRIS:
1.2.01 Contributi in volume (Capitoli o Saggi) - Book Chapters/Essays
Elenco autori:
Rios, Erkuden; Malmignati, Francesco; Iturbe, Eider; D'Errico, Michela; Salnitri, Mattia
Autori di Ateneo:
SALNITRI Mattia
Link alla scheda completa:
https://aisberg.unibg.it/handle/10446/324069
Titolo del libro:
Secure and Trustworthy Service Composition. The Aniketos Approach
Pubblicato in:
LECTURE NOTES IN COMPUTER SCIENCE
Series
  • Ricerca

Ricerca

Settori (2)


PE6_5 - Security, privacy, cryptology, quantum cryptography - (2024)

Settore IINF-05/A - Sistemi di elaborazione delle informazioni
  • Utilizzo dei cookie

Realizzato con VIVO | Designed by Cineca | 26.5.0.0