- Full Description
While their basic principles and ideas are well understood and cogent from a conceptual perspective, the realization of interorganizational workflows and applications based on service-oriented architectures (SOAs) remains a complex task, and, especially when it comes to security, the implementation is still bound to low-level technical knowledge and hence inherently error-prone. Hafner and Breu set a different focus. Based on the paradigm of model-driven security, they show how to systematically design and realize security-critical applications for SOAs. In their presentation, they first detail how systems and security engineering go hand in hand and are integrated from the very start in the requirements elicitation and the design phase. In a second step, they apply the principles of model-driven security to SOAs. Model-driven security is an engineering paradigm that aims at the automatic generation of security-critical executable software for target architectures. Based on the general principles of model-driven software development, the automation of security engineering through proven and reliable mechanisms guarantees correctness and facilitates an agile and flexible approach to the implementation and high-level management of security-critical systems. Their book addresses IT professionals interested in the design and realization of modern security-critical applications. It presents a synthesis of various best practices, standards and technologies from model-driven software development, security engineering, and SOAs. As a reader, you will learn how to design and realize SOA security using the framework of an extensible domain architecture for model-driven security.
- Table of Contents
Table of Contents
- Part I: The Basics of SOA Security Engineering.
- 1) Introduction
- 2) Basic Concepts of Security
- 3) SOA
- Standards and Technology
- 4) Domain Architectures.
- Part II: Realizing SOA Security.
- 5) Sectino
- A Motivating Case Study from E
- 6) Security Analysis
- 7) Modeling Security Critical SOA Applications
- 8) Enforcing Security with the Sectet Reference Architecture
- 9) Model Transformation and Code Generation
- 10) Software and Security Management
- 11) Extending Sectet: Advanced Security Policy Modeling.
- Part III: A Case
- study from Healthcare.
- 12) health@net
- A Case Study from Healthcare.
If you think that you've found an error in this book, please let us know by emailing to email@example.com . You will find any confirmed erratum below, so you can check if your concern has already been addressed. No errata are currently published