skip to main content
10.1145/1363686.1364217acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
poster

A pattern-driven security process for SOA applications

Published:16 March 2008Publication History

ABSTRACT

SOA enables the design of flexible and modular software applications that can be used in a cross-organization context. Unfortunately, those qualities have a negative impact on the security of the software application. In this paper, we provide an approach to build secure SOA applications that takes into account the new security issues introduced by the complexity of SOA-based applications. We build upon two different approaches to secure SOA applications: model-driven development and the use of security patterns.

References

  1. Delessy, N., Fernandez, E. B: Patterns for the eXtensible Access Control Markup Language. In: Proceedings of the 12th Pattern Languages of Programs Conference (PLoP2005), Monticello, Illinois, USA, 7--10 September 2005.Google ScholarGoogle Scholar
  2. Delessy, N., Fernandez, E. B., Larrondo-Petrie, Maria M.: A Pattern Language for Identity Management. In: International Multi-Conference on Computing in the Global Information Technology, 2007. ICCGI 2007. pp. 31--36. IEEE Press (2007) Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Fernandez, E. B., Delessy, N. A. and Larrondo-Petrie, M. M. "Patterns for web services security", in "Best Practices and Methodologies in Service-Oriented Architectures", L. A. Skar and A. A. Bjerkestrand (Eds.), 29--39, part of OOPSLA 2006, the 21st Int. Conf. on Object-Oriented Programming, Systems, Languages, and Applications, Portland, OR, ACM, October 22--26.Google ScholarGoogle Scholar
  1. A pattern-driven security process for SOA applications

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SAC '08: Proceedings of the 2008 ACM symposium on Applied computing
      March 2008
      2586 pages
      ISBN:9781595937537
      DOI:10.1145/1363686

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 16 March 2008

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • poster

      Acceptance Rates

      Overall Acceptance Rate1,650of6,669submissions,25%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader