Security engineering for service-oriented architectures:
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2009
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XVI, 245 S. graph. Darst. |
ISBN: | 3540795383 9783540795384 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV035115294 | ||
003 | DE-604 | ||
005 | 20090423 | ||
007 | t | ||
008 | 081023s2009 gw d||| |||| 00||| eng d | ||
015 | |a 08,N16,0015 |2 dnb | ||
016 | 7 | |a 988058294 |2 DE-101 | |
020 | |a 3540795383 |c Gb. : EUR 48.10 (freier Pr.), sfr 75.00 (freier Pr.) |9 3-540-79538-3 | ||
020 | |a 9783540795384 |c Gb. : EUR 48.10 (freier Pr.), sfr 75.00 (freier Pr.) |9 978-3-540-79538-4 | ||
024 | 3 | |a 9783540795384 | |
028 | 5 | 2 | |a 12082223 |
035 | |a (OCoLC)269453664 | ||
035 | |a (DE-599)DNB988058294 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-384 |a DE-355 |a DE-70 |a DE-703 |a DE-706 |a DE-634 |a DE-83 | ||
082 | 0 | |a 004.65028558 |2 22/ger | |
084 | |a ST 230 |0 (DE-625)143617: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Hafner, Michael |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security engineering for service-oriented architectures |c Michael Hafner ; Ruth Breu |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2009 | |
300 | |a XVI, 245 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Sicherheitskritisches System |0 (DE-588)4767762-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anwendungssystem |0 (DE-588)4139375-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Serviceorientierte Architektur |0 (DE-588)4841015-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Requirements engineering |0 (DE-588)4213997-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Modellgetriebene Entwicklung |0 (DE-588)4832365-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Serviceorientierte Architektur |0 (DE-588)4841015-9 |D s |
689 | 0 | 1 | |a Sicherheitskritisches System |0 (DE-588)4767762-4 |D s |
689 | 0 | 2 | |a Requirements engineering |0 (DE-588)4213997-1 |D s |
689 | 0 | 3 | |a Modellgetriebene Entwicklung |0 (DE-588)4832365-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Serviceorientierte Architektur |0 (DE-588)4841015-9 |D s |
689 | 1 | 1 | |a Anwendungssystem |0 (DE-588)4139375-2 |D s |
689 | 1 | 2 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 1 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 4 | |a Modellgetriebene Entwicklung |0 (DE-588)4832365-2 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Breu, Ruth |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-540-79539-1 |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016783050&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016783050 |
Datensatz im Suchindex
_version_ | 1804138090097278976 |
---|---|
adam_text | Contents
Part I The Basics of
SOA
Security Engineering
1
Introduction
............................................... 3
1.1
Service Oriented Architecture
............................. 3
1.1.1
Interoperability and Securitiy Issues in
SOA
.......... 4
1.1.2
Model Driven Security Engineering
.................. 5
1.2
Problem Description
..................................... 6
1.3
Contribution
............................................ 7
1.3.1
ProSecO
......................................... 8
1.3.2
Sectet
.......................................... 8
1.4
Related Work
........................................... 9
1.4.1
Model Driven Security
............................. 9
1.4.2
Formal Systems Engineering
........................ 10
1.4.3
Pattern-based Approaches
.......................... 11
1.4.4
Tools and Frameworks
............................. 11
1.4.5
Workflow Management
............................. 12
2
SOA
-
Standards
&
Technology
............................ 15
2.1
Service Oriented Architectures
............................ 15
2.1.1
Principles of
SOA
................................. 16
2.1.2
Motivating Example
............................... 16
2.2
Web Services
........................................... 17
2.2.1
Basic Definition
................................... 18
2.2.2
Service Invocation
................................. 18
2.2.3
Service Description and Discovery
................... 20
2.3
The Web Services Specification Stack
...................... 20
2.3.1
Transport Layer
................................... 21
2.3.2
Messaging Layer
.................................. 21
2.3.3
Description Layer
................................. 22
2.3.4
Discovery Layer
................................... 22
2.3.5
Quality of Service Layer
............................ 22
XII Contents
2.3.6
Web
Services Security Standards
.................... 23
2.3.7
Services Composition Layer
......................... 23
3
Basic Concepts of
SOA
Security
........................... 27
3.1
What Is
(SOA)
Security?
................................. 27
3.2
Security Objectives
...................................... 29
3.3
Security Policies
......................................... 30
3.3.1
Basic Security Policies
............................. 31
3.3.2
Policy Models
..................................... 32
3.3.3
Advanced Security Policies
......................... 36
3.4
Security Analysis
........................................ 38
3.4.1
Security Requirements
............................. 38
3.4.2
Attacks
.......................................... 38
3.5
Web Services Security Standards
.......................... 41
3.5.1
Confidentiality, Integrity, and Authenticity
........... 41
3.5.2
Authentication
.................................... 42
3.5.3
Advanced Web Services Security Standards
........... 44
4
Domain Architectures
..................................... 47
4.1
Model Driven Software Development
....................... 47
4.1.1
The Unified Modeling Language
..................... 48
4.1.2
The Meta-Object Facility
........................... 48
4.1.3
Model Driven Software Development
................. 49
4.1.4
Model Driven Architecture
......................... 50
4.1.5
Model Driven Security
............................. 51
4.2
A Definition of Model Driven Software Development
......... 51
4.3
Domain Specific Languages
............................... 52
4.4
The Target Architecture
.................................. 54
4.5
Model-(to-model-)to-code Transformation
.................. 54
4.6
Domain Architecture
..................................... 56
4.7
Framework
............................................. 57
4.8
Model Driven Security
................................... 57
4.8.1
Definition
........................................ 57
4.8.2
Extensions to the Problem Space
.................... 57
Part II Realizing
SOA
Security
5
Sectino
—
A Motivating Case Study from E-Gavernment
... 65
5.1
Problem Context
........................................ 65
5.2
Project Mission
......................................... 66
5.3
Expected Benefits
....................................... 66
5.4
Scenario Description
..................................... 67
5.4.1
Requirements
..................................... 68
5.4.2
Security Requirements
............................. 69
5.5
Results
................................................. 70
Contents XIII
Security Analysis
.......................................... 71
6.1
Overview
............................................... 71
6.1.1
Modularity
....................................... 72
6.1.2
Traceability
...................................... 73
6.1.3
Model-driven Configuration of Security Services
....... 73
6.1.4
Tight Integration of Functional and Security Aspects
.. 73
6.1.5
Security as a Process
.............................. 73
6.2
Functional System View
.................................. 74
6.2.1
Level of Interaction
................................ 74
6.2.2
Level of Abstraction
............................... 74
6.2.3
Functional Meta-models
............................ 75
6.2.4
Global Functional Meta-model
...................... 75
6.2.5
Local Functional Meta-model
....................... 77
6.3
Security Analysis Process
................................. 79
6.3.1
Security Concepts
................................. 79
6.3.2
The Security Micro-process
......................... 81
6.3.3
Elaborate Functional Model
........................ 82
6.3.4
Define Security Objectives
.......................... 82
6.3.5
Identify Dependencies
.............................. 83
6.3.6
Security Requirements Engineering
.................. 83
6.3.7
Threat and Risk Analysis
.......................... 85
6.3.8
Security Control Engineering
....................... 86
6.4
Access Control
.......................................... 86
6.5
Related Work
........................................... 89
6.5.1
Standards and Baseline Protection
.................. 89
6.5.2
Security Management
.............................. 89
6.5.3
Security Analysis in the Software Process
............. 90
6.5.4
Formal Approaches to Security Requirements
Specification
...................................... 90
Modeling Security Critical
SOA
Applications
.............. 93
7.1
The Sectet Domain Specific Language
.................... 93
7.1.1
Domain Definition
................................. 93
7.1.2
Global Worklfow
.................................. 94
7.1.3
Local Worklfow
................................... 94
7.1.4
Sectet Model Views
.............................. 96
7.1.5
Security Policies
................................... 98
7.2
The DSL Meta-models
...................................100
7.2.1
The Workflow View
...............................101
7.2.2
The Interface View
................................107
7.3
Integrating Security into the DSL
.........................114
XIV Contents
8
Enforcing Security with the Sectet Reference Architecture
121
8.1
Architectural Blueprint
..................................121
8.2
Components
............................................122
8.2.1
Service Components
...............................123
8.2.2
Security Components
..............................123
8.2.3
Supporting Security Components
....................126
8.3
Communication Protocols
................................126
8.3.1
Enforcing Confidentiality and Integrity
...............127
8.3.2
Enforcing Non-repudiation
.........................128
8.4
Component Configuration
................................130
8.4.1
Inbound Messaging
-
(Executable Security Policy File)
. 131
8.4.2
Outbound Messaging
-
(Executable Security Policy
Files)
............................................136
8.4.3
Request for Compliance Check
......................138
8.4.4
Response Request for Compliance Check
.............139
8.4.5
Technology and Standards
..........................140
9
Model Transformation
&¿
Code Generation
................141
9.1
Transformations in the SECTET-Framework
.................141
9.1.1
The Generation of Security Artefacts
................141
9.1.2
The Generation of Services Artefacts
................142
9.2
Security Transformations
.................................143
9.2.1
Inbound Policy File
................................143
9.2.2
Outbound Policy Files
.............................144
9.3
Services Transformations
.................................145
9.3.1
Global Workflow to Local Workflow Translation
.......146
9.3.2
Global Workflow to WSDL Description
..............146
9.3.3
Global Workflow to XSD Schema Template
...........148
9.4
Implementing Transformation
.............................149
9.4.1
Template Based Transformations
....................149
9.4.2
Meta-model Based Transformations
..................150
10
Software
&:
Security Management
.........................153
10.1
Tool Chain
.............................................153
10.1.1
Modeling
.........................................153
10.1.2
Code Generation
..................................154
10.1.3
Build Tools and Integrated Development Environments
155
10.1.4
The Realization Process
............................155
10.1.5
The Engineering Process
...........................156
10.2
The Deployment. Process
.................................157
11
Extending Sectet: Advanced Security Policy Modeling
.....159
11.1
Motivation
.............................................160
11.2
Extending the DSL
......................................161
11.2.1
A New Security Objective
..........................161
Contents
XV
11.2.2 Advanced
Security Policies
.........................162
11.2.3
Introducing the RBAC Policy Model
.................162
11.3
Modeling Policies with Dynamic Constraints
................164
11.3.1
Sectbt-PL
......................................164
11.3.2
Static RBAC
.....................................165
11.3.3
Dynamic RBAC
...................................165
11.3.4
Rights Delegation
.................................167
11.4
Integrating Sectet-PL into the Sectet- Framework
........171
11.4.1
Metamodel Extensions
.............................171
11.4.2
Sectet-PL
-
Abstract Syntax
......................173
11.5
Extending the Reference Architecture
......................174
11.5.1
Access Control, Delegation and Privacy Policies
.......174
11.5.2
Protocol Extensions
...............................179
11.5.3
PDP Extensions
...................................180
11.6
Sectet-PL Transformations
..............................182
11.7
Modeling Advanced Use Cases with Sectet-PL
.............182
11.7.1
Break-Glass Policy (BGP)
..........................182
11.7.2
4-Eyes-Principle
...................................183
11.7.3
Usage Control (UC)
...............................183
11.7.4
Qualified Signature
................................183
Part III A Case Study from Healthcare
12
health@net
-
A Case Study from Healthcare
..............189
12.1
Background
.............................................190
12.1.1
The Electronic Healthcare Record
...................190
12.1.2
National
Е
-Health Initiatives
.......................190
12.1.3
Technical Standards for Healthcare
..................191
12.1.4
The Austrian Data Privacy Law
.....................191
12.2
health@net
.............................................192
12.2.1
Project Mission
...................................192
12.2.2
Organizational Setting
.............................193
, 12.2.3
Architectural Concept
.............................194
11.3
health@net
-
Security Analysis
............................198
12.3.1
Introduction
......................................198
12.3.2
Functional System View
............................198
12.3.3
Identification of Security Objectives
.................200
12.3.4
Engineering of Security Requirements
................202
12.3.5
Conclusion
.......................................204
12.4
healthQnet
-
Security Concept
............................205
12.4.1
Phase
1:
Service-level Security
......................205
12.4.2
Phase 2a: Static. Process-level Security
...............206
12.4.3
Phase 2b: Dynamic, Process-level Security
............206
12.5
Realizing Security with the SECTET-Framework
.............207
XVI Contents
12.5.1
Conceptual Background
............................207
12.5.2
Model
Views
......................................208
12.6
health@net
-
Phases
2a
&
2b
..............................212
12.6.1
Use Cases........................................
212
12.6.2
Security Architecture
..............................213
Part IV Appendices
A Mapping Tables
...........................................225
A.I Mapping Table for Inbound Policy File
.....................226
A.2 Mapping Table for Outbound Policy Files
..................227
A.3 Mapping Table for BPEL Files
............................228
A.4 Mapping Table for BPEL Files (continued)
.................229
A.5 Mapping Table for WSDL Files
...........................230
References
.....................................................231
Index
..........................................................243
|
adam_txt |
Contents
Part I The Basics of
SOA
Security Engineering
1
Introduction
. 3
1.1
Service Oriented Architecture
. 3
1.1.1
Interoperability and Securitiy Issues in
SOA
. 4
1.1.2
Model Driven Security Engineering
. 5
1.2
Problem Description
. 6
1.3
Contribution
. 7
1.3.1
ProSecO
. 8
1.3.2
Sectet
. 8
1.4
Related Work
. 9
1.4.1
Model Driven Security
. 9
1.4.2
Formal Systems Engineering
. 10
1.4.3
Pattern-based Approaches
. 11
1.4.4
Tools and Frameworks
. 11
1.4.5
Workflow Management
. 12
2
SOA
-
Standards
&
Technology
. 15
2.1
Service Oriented Architectures
. 15
2.1.1
Principles of
SOA
. 16
2.1.2
Motivating Example
. 16
2.2
Web Services
. 17
2.2.1
Basic Definition
. 18
2.2.2
Service Invocation
. 18
2.2.3
Service Description and Discovery
. 20
2.3
The Web Services Specification Stack
. 20
2.3.1
Transport Layer
. 21
2.3.2
Messaging Layer
. 21
2.3.3
Description Layer
. 22
2.3.4
Discovery Layer
. 22
2.3.5
Quality of Service Layer
. 22
XII Contents
2.3.6
Web
Services Security Standards
. 23
2.3.7
Services Composition Layer
. 23
3
Basic Concepts of
SOA
Security
. 27
3.1
What Is
(SOA)
Security?
. 27
3.2
Security Objectives
. 29
3.3
Security Policies
. 30
3.3.1
Basic Security Policies
. 31
3.3.2
Policy Models
. 32
3.3.3
Advanced Security Policies
. 36
3.4
Security Analysis
. 38
3.4.1
Security Requirements
. 38
3.4.2
Attacks
. 38
3.5
Web Services Security Standards
. 41
3.5.1
Confidentiality, Integrity, and Authenticity
. 41
3.5.2
Authentication
. 42
3.5.3
Advanced Web Services Security Standards
. 44
4
Domain Architectures
. 47
4.1
Model Driven Software Development
. 47
4.1.1
The Unified Modeling Language
. 48
4.1.2
The Meta-Object Facility
. 48
4.1.3
Model Driven Software Development
. 49
4.1.4
Model Driven Architecture
. 50
4.1.5
Model Driven Security
. 51
4.2
A Definition of Model Driven Software Development
. 51
4.3
Domain Specific Languages
. 52
4.4
The Target Architecture
. 54
4.5
Model-(to-model-)to-code Transformation
. 54
4.6
Domain Architecture
. 56
4.7
Framework
. 57
4.8
Model Driven Security
. 57
4.8.1
Definition
. 57
4.8.2
Extensions to the Problem Space
. 57
Part II Realizing
SOA
Security
5
Sectino
—
A Motivating Case Study from E-Gavernment
. 65
5.1
Problem Context
. 65
5.2
Project Mission
. 66
5.3
Expected Benefits
. 66
5.4
Scenario Description
. 67
5.4.1
Requirements
. 68
5.4.2
Security Requirements
. 69
5.5
Results
. 70
Contents XIII
Security Analysis
. 71
6.1
Overview
. 71
6.1.1
Modularity
. 72
6.1.2
Traceability
. 73
6.1.3
Model-driven Configuration of Security Services
. 73
6.1.4
Tight Integration of Functional and Security Aspects
. 73
6.1.5
Security as a Process
. 73
6.2
Functional System View
. 74
6.2.1
Level of Interaction
. 74
6.2.2
Level of Abstraction
. 74
6.2.3
Functional Meta-models
. 75
6.2.4
Global Functional Meta-model
. 75
6.2.5
Local Functional Meta-model
. 77
6.3
Security Analysis Process
. 79
6.3.1
Security Concepts
. 79
6.3.2
The Security Micro-process
. 81
6.3.3
Elaborate Functional Model
. 82
6.3.4
Define Security Objectives
. 82
6.3.5
Identify Dependencies
. 83
6.3.6
Security Requirements Engineering
. 83
6.3.7
Threat and Risk Analysis
. 85
6.3.8
Security Control Engineering
. 86
6.4
Access Control
. 86
6.5
Related Work
. 89
6.5.1
Standards and Baseline Protection
. 89
6.5.2
Security Management
. 89
6.5.3
Security Analysis in the Software Process
. 90
6.5.4
Formal Approaches to Security Requirements
Specification
. 90
Modeling Security Critical
SOA
Applications
. 93
7.1
The Sectet Domain Specific Language
. 93
7.1.1
Domain Definition
. 93
7.1.2
Global Worklfow
. 94
7.1.3
Local Worklfow
. 94
7.1.4
Sectet Model Views
. 96
7.1.5
Security Policies
. 98
7.2
The DSL Meta-models
.100
7.2.1
The Workflow View
.101
7.2.2
The Interface View
.107
7.3
Integrating Security into the DSL
.114
XIV Contents
8
Enforcing Security with the Sectet Reference Architecture
121
8.1
Architectural Blueprint
.121
8.2
Components
.122
8.2.1
Service Components
.123
8.2.2
Security Components
.123
8.2.3
Supporting Security Components
.126
8.3
Communication Protocols
.126
8.3.1
Enforcing Confidentiality and Integrity
.127
8.3.2
Enforcing Non-repudiation
.128
8.4
Component Configuration
.130
8.4.1
Inbound Messaging
-
(Executable Security Policy File)
. 131
8.4.2
Outbound Messaging
-
(Executable Security Policy
Files)
.136
8.4.3
Request for Compliance Check
.138
8.4.4
Response Request for Compliance Check
.139
8.4.5
Technology and Standards
.140
9
Model Transformation
&¿
Code Generation
.141
9.1
Transformations in the SECTET-Framework
.141
9.1.1
The Generation of Security Artefacts
.141
9.1.2
The Generation of Services Artefacts
.142
9.2
Security Transformations
.143
9.2.1
Inbound Policy File
.143
9.2.2
Outbound Policy Files
.144
9.3
Services Transformations
.145
9.3.1
Global Workflow to Local Workflow Translation
.146
9.3.2
Global Workflow to WSDL Description
.146
9.3.3
Global Workflow to XSD Schema Template
.148
9.4
Implementing Transformation
.149
9.4.1
Template Based Transformations
.149
9.4.2
Meta-model Based Transformations
.150
10
Software
&:
Security Management
.153
10.1
Tool Chain
.153
10.1.1
Modeling
.153
10.1.2
Code Generation
.154
10.1.3
Build Tools and Integrated Development Environments
155
10.1.4
The Realization Process
.155
10.1.5
The Engineering Process
.156
10.2
The Deployment. Process
.157
11
Extending Sectet: Advanced Security Policy Modeling
.159
11.1
Motivation
.160
11.2
Extending the DSL
.161
11.2.1
A New Security Objective
.161
Contents
XV
11.2.2 Advanced
Security Policies
.162
11.2.3
Introducing the RBAC Policy Model
.162
11.3
Modeling Policies with Dynamic Constraints
.164
11.3.1
Sectbt-PL
.164
11.3.2
Static RBAC
.165
11.3.3
Dynamic RBAC
.165
11.3.4
Rights Delegation
.167
11.4
Integrating Sectet-PL into the Sectet- Framework
.171
11.4.1
Metamodel Extensions
.171
11.4.2
Sectet-PL
-
Abstract Syntax
.173
11.5
Extending the Reference Architecture
.174
11.5.1
Access Control, Delegation and Privacy Policies
.174
11.5.2
Protocol Extensions
.179
11.5.3
PDP Extensions
.180
11.6
Sectet-PL Transformations
.182
11.7
Modeling Advanced Use Cases with Sectet-PL
.182
11.7.1
Break-Glass Policy (BGP)
.182
11.7.2
4-Eyes-Principle
.183
11.7.3
Usage Control (UC)
.183
11.7.4
Qualified Signature
.183
Part III A Case Study from Healthcare
12
health@net
-
A Case Study from Healthcare
.189
12.1
Background
.190
12.1.1
The Electronic Healthcare Record
.190
12.1.2
National
Е
-Health Initiatives
.190
12.1.3
Technical Standards for Healthcare
.191
12.1.4
The Austrian Data Privacy Law
.191
12.2
health@net
.192
12.2.1
Project Mission
.192
12.2.2
Organizational Setting
.193
, 12.2.3
Architectural Concept
.194
11.3
health@net
-
Security Analysis
.198
12.3.1
Introduction
.198
12.3.2
Functional System View
.198
12.3.3
Identification of Security Objectives
.200
12.3.4
Engineering of Security Requirements
.202
12.3.5
Conclusion
.204
12.4
healthQnet
-
Security Concept
.205
12.4.1
Phase
1:
Service-level Security
.205
12.4.2
Phase 2a: Static. Process-level Security
.206
12.4.3
Phase 2b: Dynamic, Process-level Security
.206
12.5
Realizing Security with the SECTET-Framework
.207
XVI Contents
12.5.1
Conceptual Background
.207
12.5.2
Model
Views
.208
12.6
health@net
-
Phases
2a
&
2b
.212
12.6.1
Use Cases.
212
12.6.2
Security Architecture
.213
Part IV Appendices
A Mapping Tables
.225
A.I Mapping Table for Inbound Policy File
.226
A.2 Mapping Table for Outbound Policy Files
.227
A.3 Mapping Table for BPEL Files
.228
A.4 Mapping Table for BPEL Files (continued)
.229
A.5 Mapping Table for WSDL Files
.230
References
.231
Index
.243 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Hafner, Michael Breu, Ruth |
author_facet | Hafner, Michael Breu, Ruth |
author_role | aut aut |
author_sort | Hafner, Michael |
author_variant | m h mh r b rb |
building | Verbundindex |
bvnumber | BV035115294 |
classification_rvk | ST 230 ST 277 |
ctrlnum | (OCoLC)269453664 (DE-599)DNB988058294 |
dewey-full | 004.65028558 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.65028558 |
dewey-search | 004.65028558 |
dewey-sort | 14.65028558 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02739nam a2200625 c 4500</leader><controlfield tag="001">BV035115294</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090423 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">081023s2009 gw d||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">08,N16,0015</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">988058294</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540795383</subfield><subfield code="c">Gb. : EUR 48.10 (freier Pr.), sfr 75.00 (freier Pr.)</subfield><subfield code="9">3-540-79538-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540795384</subfield><subfield code="c">Gb. : EUR 48.10 (freier Pr.), sfr 75.00 (freier Pr.)</subfield><subfield code="9">978-3-540-79538-4</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783540795384</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12082223</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)269453664</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB988058294</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-384</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-70</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.65028558</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 230</subfield><subfield code="0">(DE-625)143617:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hafner, Michael</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security engineering for service-oriented architectures</subfield><subfield code="c">Michael Hafner ; Ruth Breu</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVI, 245 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitskritisches System</subfield><subfield code="0">(DE-588)4767762-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Serviceorientierte Architektur</subfield><subfield code="0">(DE-588)4841015-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Requirements engineering</subfield><subfield code="0">(DE-588)4213997-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Modellgetriebene Entwicklung</subfield><subfield code="0">(DE-588)4832365-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Serviceorientierte Architektur</subfield><subfield code="0">(DE-588)4841015-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Sicherheitskritisches System</subfield><subfield code="0">(DE-588)4767762-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Requirements engineering</subfield><subfield code="0">(DE-588)4213997-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Modellgetriebene Entwicklung</subfield><subfield code="0">(DE-588)4832365-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Serviceorientierte Architektur</subfield><subfield code="0">(DE-588)4841015-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Modellgetriebene Entwicklung</subfield><subfield code="0">(DE-588)4832365-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Breu, Ruth</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-540-79539-1</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016783050&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016783050</subfield></datafield></record></collection> |
id | DE-604.BV035115294 |
illustrated | Illustrated |
index_date | 2024-07-02T22:19:19Z |
indexdate | 2024-07-09T21:22:39Z |
institution | BVB |
isbn | 3540795383 9783540795384 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016783050 |
oclc_num | 269453664 |
open_access_boolean | |
owner | DE-384 DE-355 DE-BY-UBR DE-70 DE-703 DE-706 DE-634 DE-83 |
owner_facet | DE-384 DE-355 DE-BY-UBR DE-70 DE-703 DE-706 DE-634 DE-83 |
physical | XVI, 245 S. graph. Darst. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Springer |
record_format | marc |
spelling | Hafner, Michael Verfasser aut Security engineering for service-oriented architectures Michael Hafner ; Ruth Breu Berlin [u.a.] Springer 2009 XVI, 245 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Sicherheitskritisches System (DE-588)4767762-4 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Anwendungssystem (DE-588)4139375-2 gnd rswk-swf Serviceorientierte Architektur (DE-588)4841015-9 gnd rswk-swf Requirements engineering (DE-588)4213997-1 gnd rswk-swf Modellgetriebene Entwicklung (DE-588)4832365-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Serviceorientierte Architektur (DE-588)4841015-9 s Sicherheitskritisches System (DE-588)4767762-4 s Requirements engineering (DE-588)4213997-1 s Modellgetriebene Entwicklung (DE-588)4832365-2 s DE-604 Anwendungssystem (DE-588)4139375-2 s Zugriffskontrolle (DE-588)4293034-0 s Datensicherung (DE-588)4011144-1 s Breu, Ruth Verfasser aut Erscheint auch als Online-Ausgabe 978-3-540-79539-1 Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016783050&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Hafner, Michael Breu, Ruth Security engineering for service-oriented architectures Sicherheitskritisches System (DE-588)4767762-4 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Anwendungssystem (DE-588)4139375-2 gnd Serviceorientierte Architektur (DE-588)4841015-9 gnd Requirements engineering (DE-588)4213997-1 gnd Modellgetriebene Entwicklung (DE-588)4832365-2 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4767762-4 (DE-588)4293034-0 (DE-588)4139375-2 (DE-588)4841015-9 (DE-588)4213997-1 (DE-588)4832365-2 (DE-588)4011144-1 |
title | Security engineering for service-oriented architectures |
title_auth | Security engineering for service-oriented architectures |
title_exact_search | Security engineering for service-oriented architectures |
title_exact_search_txtP | Security engineering for service-oriented architectures |
title_full | Security engineering for service-oriented architectures Michael Hafner ; Ruth Breu |
title_fullStr | Security engineering for service-oriented architectures Michael Hafner ; Ruth Breu |
title_full_unstemmed | Security engineering for service-oriented architectures Michael Hafner ; Ruth Breu |
title_short | Security engineering for service-oriented architectures |
title_sort | security engineering for service oriented architectures |
topic | Sicherheitskritisches System (DE-588)4767762-4 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Anwendungssystem (DE-588)4139375-2 gnd Serviceorientierte Architektur (DE-588)4841015-9 gnd Requirements engineering (DE-588)4213997-1 gnd Modellgetriebene Entwicklung (DE-588)4832365-2 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Sicherheitskritisches System Zugriffskontrolle Anwendungssystem Serviceorientierte Architektur Requirements engineering Modellgetriebene Entwicklung Datensicherung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016783050&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT hafnermichael securityengineeringforserviceorientedarchitectures AT breuruth securityengineeringforserviceorientedarchitectures |