Security engineering for service-oriented architectures / Michael Hafner.
Material type:
TextPublication details: New York : Springer, 2008.Description: xvi, 245 p. : ill. ; 22 cmISBN: - 9783540795384
- 005.8 22
| Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|
Books
|
Main library General Stacks | 005.8 / HA.S 2009 (Browse shelf(Opens below)) | 1 | Available | 001908 |
Includes bibliographical references (p. [231]-242) and index.
The Basics of SOA Security Engineering -- Introduction -- Basic Concepts of Security -- SOA - Standards and Technology -- Domain Architectures -- : Realizing SOA Security -- Sectino - A Motivating Case Study from E-Government -- Security Analysis -- Modeling Security Critical SOA Applications -- Enforcing Security with the Sectet Reference Architecture -- ) Model Transformation and Code Generation -- Software and Security Management -- Extending Sectet: Advanced Security Policy Modeling -- A Case-study from Healthcare.
The book is an important reference for professionals engaged in designing security-critical SOA systems. The authors provide an in-depth treatment of security engineering methods using advanced model-based design technology. The detailed examples and case studies make the work extremely valuable for practicing engineers as well as students." - Prof. Janos Sztipanovits, Vanderbilt University, Nashville, TN, USA "Providing the bridge between business and IT the paradigm of service-oriented architecture has an important impact on the future structuring of IT landscapes. Though security is a crucial requirement for many service oriented systems it is too often handled at a mere technical level. With their book, Hafner and Breu provide a valuable contribution to handle security requirements at the business level and to develop sustainable service oriented solutions." - Prof. Dr. Gregor Engels, University of Paderborn and Scientific Director of sd&m Research, Munich ,Germany "Going beyond applied SOA-concepts this book provides a method how to model and integrate security aspects.
1
There are no comments on this title.