Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/2363395.2363402guidebooksArticle/Chapter ViewAbstractPublication PagesBookacm-pubtype
chapter

Pattern-Based context establishment for service-oriented architectures

Published: 01 January 2012 Publication History

Abstract

A context description of a software system and its environment is essential for any given software engineering process. Requirements define statements about the environment (according to Jackson's terminology). The context description of a Service-Oriented Architecture is difficult to provide, because of the variety of technical systems and stakeholders involved. We present two patterns for SOA systems and support their instantiation with a structured method. In addition, we show how the pattern can be used in a secure service development life-cycle.

References

[1]
Arsanjani, A., Ghosh, S., Allam, A., Abdollah, T., Gariapathy, S., Holley, K.: SOMA: a method for developing service-oriented solutions. IBM Systems Journal 47(3), 377-396 (2008)
[2]
Arsanjani, A., Zhang, L.-J., Ellis, M., Allam, A., Channabasavaiah, K.: Design an SOA solution using a reference architecture. Technical report, IBM (2007), http://www.ibm.com/developerworks/library/ar-archtemp/
[3]
Beckers, K., Faßbender, S., Küster, J.-C., Schmidt, H.: A Pattern-Based Method for Identifying and Analyzing Laws. In: Regnell, B., Damian, D. (eds.) REFSQ 2012. LNCS, vol. 7195, pp. 256-262. Springer, Heidelberg (2012)
[4]
Darimont, R., Delor, E., Massonet, P., van Lamsweerde, A.: GRAIL/KAOS: an environment for goal-driven requirements engineering. In: Proceedings of the 19th International Conference on Software Engineering (ICSE), pp. 612-613. ACM, New York (1997)
[5]
Dijkman, R. M., Dumas, M.: Service-oriented design: A multi-viewpoint approach. International Journal on Cooperative Information Systems 13(4), 337-368 (2004)
[6]
Gregoire, J., Buyens, K., De Win, B., Scandariato, R., Joosen, W.: On the secure software development process: CLASP and SDL compared. In: Proceedings of the Third International Workshop on Software Engineering for Secure Systems, SESS 2007, pp. 1-7. IEEE Computer Society, Washington, DC (2007)
[7]
Gürses, S., Berendt, B., Santen, T.: Multilateral Security Requirements Analysis for Preserving Privacy in Ubiquitous Environments. In: Proceedings of the Workshop on Ubiquitous Knowledge Discovery for Users, pp. 51-64 (2006), www.ecmlpkdd2006.org/ws-ukdu.pdf
[8]
Howard, M., Lipner, S.: The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software. Microsoft Press (2006)
[9]
Jackson, M.: Problem Frames. In: Analyzing and Structuring Software Development Problems. Addison-Wesley (2001)
[10]
Microsoft. Microsoft Security Development Lifecycle Simplified Implementation of the Microsoft SDL. SDL 1-2, Microsoft (2010), http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=123%79
[11]
Mouratidis, H., Giorgini, P.: Secure tropos: a security-oriented extension of the tropos methodology. International Journal of Software Engineering and Knowledge Engineering 17(2), 285-309 (2007)
[12]
Object Management Group, Needham, MA, USA. Service oriented architecture modeling language 1.0 - Beta 2 (December 2009), http://www.omg.org/spec/SoaML/1.0/Beta2/PDF
[13]
OWASP. CLASP (Comprehensive, Lightweight Application Security Process). Technical report, The Open Web Application Security Project, OWASP (2011)
[14]
Papazoglou, M. P., Traverso, P., Dustdar, S., Leymann, F.: Service-oriented computing: a research roadmap. Int. J. Cooperative Inf. Syst. 17(2), 223-255 (2008)
[15]
Perepletchikov, M., Ryan, C., Frampton, K., Schmidt, H. W.: Formalising serviceoriented design. Journal of Software 3(2), 1-14 (2008)
[16]
Rodríguez, A., Fernández-Medina, E., Piattini, M.: A BPMN extension for the modeling of security requirements in business processes. The Institute of Electronics, Information and Communication Engineers (IEICE) Transactions 90-D(4), 745-752 (2007)
[17]
Schmidt, H., Hatebur, D., Heisel, M.: A pattern- and component-based method to develop secure software. In: Mouratidis, H. (ed.) Software Engineering for Secure Systems: Academic and Industrial Perspectives, ch.3, pp. 32-74. IGI Global (2011)

Cited By

View all
  • (2014)A meta-pattern and pattern form for context-patternsProceedings of the 19th European Conference on Pattern Languages of Programs10.1145/2721956.2721979(1-23)Online publication date: 9-Jul-2014
  • (2014)Deriving a pattern language syntax for context-patternsProceedings of the 19th European Conference on Pattern Languages of Programs10.1145/2721956.2721967(1-25)Online publication date: 9-Jul-2014
  • (2013)A meta-model for context-patternsProceedings of the 18th European Conference on Pattern Languages of Program10.1145/2739011.2739016(1-15)Online publication date: 10-Jul-2013

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide books
Software Service and Application Engineering: essays dedicated to Bernd Krämer on the occasion of his 65th birthday
January 2012
179 pages
ISBN:9783642308345
  • Editor:
  • Maritta Heisel

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 01 January 2012

Author Tags

  1. SOA
  2. requirements engineering
  3. secure software development

Qualifiers

  • Chapter

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2014)A meta-pattern and pattern form for context-patternsProceedings of the 19th European Conference on Pattern Languages of Programs10.1145/2721956.2721979(1-23)Online publication date: 9-Jul-2014
  • (2014)Deriving a pattern language syntax for context-patternsProceedings of the 19th European Conference on Pattern Languages of Programs10.1145/2721956.2721967(1-25)Online publication date: 9-Jul-2014
  • (2013)A meta-model for context-patternsProceedings of the 18th European Conference on Pattern Languages of Program10.1145/2739011.2739016(1-15)Online publication date: 10-Jul-2013

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media