While their basic principles and ideas are well understood and cogent from a conceptual perspective, the realization of interorganizational workflows and applications based on service-oriented architectures (SOAs) remains a complex task, and, especially when it comes to security, the implementation is still bound to low-level technical knowledge and hence inherently error-prone. Hafner and Breu set a different focus. Based on the paradigm of model-driven security, they show how to systematically design and realize security-critical applications for SOAs. In their presentation, they first detail how systems and security engineering go hand in hand and are integrated from the very start in the requirements elicitation and the design phase. In a second step, they apply the principles of model-driven security to SOAs. Model-driven security is an engineering paradigm that aims at the automatic generation of security-critical executable software for target architectures. Based on the general principles of model-driven software development, the automation of security engineering through proven and reliable mechanisms guarantees correctness and facilitates an agile and flexible approach to the implementation and high-level management of security-critical systems. Their book addresses IT professionals interested in the design and realization of modern security-critical applications. It presents a synthesis of various best practices, standards and technologies from model-driven software development, security engineering, and SOAs. As a reader, you will learn how to design and realize SOA security using the framework of an extensible domain architecture for model-driven security. TOC:Part I: The Basics of SOA Security Engineering.- 1) Introduction - 2) Basic Concepts of Security - 3) SOA - Standards and Technology - 4) Domain Architectures.- Part II: Realizing SOA Security.- 5) Sectino - A Motivating Case Study from E-Government - 6) Security Analysis - 7) Modeling Security Critical SOA Applications - 8) Enforcing Security with the Sectet Reference Architecture - 9) Model Transformation and Code Generation - 10) Software and Security Management - 11) Extending Sectet: Advanced Security Policy Modeling.- Part III: A Case-study from Healthcare.- 12) health@net - A Case Study from Healthcare.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GB, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.