Listing 1 - 2 of 2 |
Sort by
|
Choose an application
While their basic principles and ideas are well understood and cogent from a conceptual perspective, the realization of interorganizational workflows and applications based on service-oriented architectures (SOAs) remains a complex task, and, especially when it comes to security, the implementation is still bound to low-level technical knowledge and hence inherently error-prone. Hafner and Breu set a different focus. Based on the paradigm of model-driven security, they show how to systematically design and realize security-critical applications for SOAs. In their presentation, they first detail how systems and security engineering go hand in hand and are integrated from the very start in the requirements elicitation and the design phase. In a second step, they apply the principles of model-driven security to SOAs. Model-driven security is an engineering paradigm that aims at the automatic generation of security-critical executable software for target architectures. Based on the general principles of model-driven software development, the automation of security engineering through proven and reliable mechanisms guarantees correctness and facilitates an agile and flexible approach to the implementation and high-level management of security-critical systems. Their book addresses IT professionals interested in the design and realization of modern security-critical applications. It presents a synthesis of various best practices, standards and technologies from model-driven software development, security engineering, and SOAs. As a reader, you will learn how to design and realize SOA security using the framework of an extensible domain architecture for model-driven security.
Information Technology --- Software Engineering --- Computer architecture. --- Computer security. --- Computer simulation. --- System design. --- Engineering & Applied Sciences --- Computer Science --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Architecture, Computer --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Software engineering. --- Computer Science. --- Software Engineering. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Data protection --- Security systems --- Hacking --- Computer software engineering --- Engineering --- Informatics --- Science --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
Listing 1 - 2 of 2 |
Sort by
|