TY - GEN
T1 - Towards security awareness in designing service-oriented architectures
AU - Nassar, Pascal Bou
AU - Badr, Youakim
AU - Biennier, Frédérique
AU - Barbar, Kablan
PY - 2013
Y1 - 2013
N2 - Many information security approaches deal with service-oriented architectures by focusing on security policies, requirements and technical implementation during service design, specification and implementation phases. Nevertheless, service-oriented architectures are increasingly deployed in open, distributed and dynamic environments, which particularly require an end-to-end security at each phase of the service's lifecycle. Moreover, the security should not only focus on services without considering the risks and threats that might be caused by elements from business activities or underlying hardware and software infrastructure. In this paper, we develop a model highlighting the dependency between elements at business, service and infrastructure levels, defining the design context. In addition, we develop a holistic approach to define a security conceptual model, including services, security risks and security policies and guides all phases in a typical design method for service-oriented architectures.
AB - Many information security approaches deal with service-oriented architectures by focusing on security policies, requirements and technical implementation during service design, specification and implementation phases. Nevertheless, service-oriented architectures are increasingly deployed in open, distributed and dynamic environments, which particularly require an end-to-end security at each phase of the service's lifecycle. Moreover, the security should not only focus on services without considering the risks and threats that might be caused by elements from business activities or underlying hardware and software infrastructure. In this paper, we develop a model highlighting the dependency between elements at business, service and infrastructure levels, defining the design context. In addition, we develop a holistic approach to define a security conceptual model, including services, security risks and security policies and guides all phases in a typical design method for service-oriented architectures.
UR - http://www.scopus.com/inward/record.url?scp=84887717994&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84887717994&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:84887717994
SN - 9789898565617
T3 - ICEIS 2013 - Proceedings of the 15th International Conference on Enterprise Information Systems
SP - 347
EP - 355
BT - ICEIS 2013 - Proceedings of the 15th International Conference on Enterprise Information Systems
T2 - 15th International Conference on Enterprise Information Systems, ICEIS 2013
Y2 - 4 July 2013 through 7 July 2013
ER -