{"title":"用于引出SOA安全需求的基于成熟度度量的方法","authors":"M. Kassou, L. Kjiri","doi":"10.1109/JNS2.2012.6249231","DOIUrl":null,"url":null,"abstract":"The emergence of service-oriented architecture (SOA) as an approach for integrating applications that expose services presents many new challenges to organizations resulting in significant risks to their business. Particularly important among those risks are failures to effectively address quality attribute requirements such as security. Properly defining and configuring security requirements in SOA applications is quite difficult for developers and business experts because they are not necessary security experts. SOA security requirements identification is a challenging and promising research area. In this article, we propose an SOA Security requirement elicitation approach based on the maturity assessment of security processes and controls applicable in the context of SOA.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A maturity metric based approach for eliciting SOA security requirements\",\"authors\":\"M. Kassou, L. Kjiri\",\"doi\":\"10.1109/JNS2.2012.6249231\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The emergence of service-oriented architecture (SOA) as an approach for integrating applications that expose services presents many new challenges to organizations resulting in significant risks to their business. Particularly important among those risks are failures to effectively address quality attribute requirements such as security. Properly defining and configuring security requirements in SOA applications is quite difficult for developers and business experts because they are not necessary security experts. SOA security requirements identification is a challenging and promising research area. In this article, we propose an SOA Security requirement elicitation approach based on the maturity assessment of security processes and controls applicable in the context of SOA.\",\"PeriodicalId\":224410,\"journal\":{\"name\":\"2012 National Days of Network Security and Systems\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-04-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 National Days of Network Security and Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/JNS2.2012.6249231\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 National Days of Network Security and Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/JNS2.2012.6249231","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A maturity metric based approach for eliciting SOA security requirements
The emergence of service-oriented architecture (SOA) as an approach for integrating applications that expose services presents many new challenges to organizations resulting in significant risks to their business. Particularly important among those risks are failures to effectively address quality attribute requirements such as security. Properly defining and configuring security requirements in SOA applications is quite difficult for developers and business experts because they are not necessary security experts. SOA security requirements identification is a challenging and promising research area. In this article, we propose an SOA Security requirement elicitation approach based on the maturity assessment of security processes and controls applicable in the context of SOA.