{"title":"Utilizing a Service Oriented Architecture for Information Security Evaluation and Quantification","authors":"C. Martin, Khalil A. Abuosba","doi":"10.1109/BDIM.2007.375023","DOIUrl":null,"url":null,"abstract":"The service oriented architecture provides an abstraction utility that is characterized to be autonomous, well defined, and self-contained. In this research we define the basic building blocks of a security reference model composed out of processes domain view, security requirements view, infrastructure management view, security assurance view, and survivability management view. We build a security attributes organizational model based on security processes states and security attributes requirements. We continue to dissect our proposed architecture based on the service oriented architecture reference model, and map the SOA dimensions into security requirements attributes.","PeriodicalId":414047,"journal":{"name":"2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management","volume":"73 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BDIM.2007.375023","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The service oriented architecture provides an abstraction utility that is characterized to be autonomous, well defined, and self-contained. In this research we define the basic building blocks of a security reference model composed out of processes domain view, security requirements view, infrastructure management view, security assurance view, and survivability management view. We build a security attributes organizational model based on security processes states and security attributes requirements. We continue to dissect our proposed architecture based on the service oriented architecture reference model, and map the SOA dimensions into security requirements attributes.