
Security Engineering for Service-Oriented Architectures
By:Â Michael Hafner, Ruth Breu
Hardcover | 10 October 2008
At a Glance
264 Pages
23.5 x 15.88 x 1.91
Hardcover
$84.99
or 4 interest-free payments of $21.25 with
 orÂShips in 5 to 7 business days
Industry Reviews
From the reviews:
"The book is an important reference for professionals engaged in designing security-critical SOA systems. The authors provide an in-depth treatment of security engineering methods using advanced model-based design technology. The detailed examples and case studies make the work extremely valuable for practicing engineers as well as students." - Prof. Janos Sztipanovits, Vanderbilt University, Nashville, TN, USA
"Providing the bridge between business and IT the paradigm of service-oriented architecture has an important impact on the future structuring of IT landscapes. Though security is a crucial requirement for many service oriented systems it is too often handled at a mere technical level. With their book, Hafner and Breu provide a valuable contribution to handle security requirements at the business level and to develop sustainable service oriented solutions." - Prof. Dr. Gregor Engels, University of Paderborn and Scientific Director of sd&m Research, Munich ,Germany
"Going beyond applied SOA-concepts this book provides a method how to model and integrate security aspects. Including a proof of concept and practical experiences of two real projects it provides a useful reference to everyone dealing with SOA-requirements." - Alexander Lechner, Senior Technical Consultant, world-direct eBusiness/Telekom Austria
"Even as a security professional, skilled in low-level computer security mechanisms and details, I cannot ignore the ever growing requests and demands of implementing and enforcing security at higher-levels of the system stack and consider the tremendous advantages of large scale service-oriented architectures for modern software engineering efforts. The model-driven security engineering approach as described here by Hafner and Breu provides an excellent introduction into the very practical and useful topic of modeling and understanding the overall system security ata very high level and then transforming it into lower policy languages. This book does an excellent job in describing the underlying principles and methodologies of this approach. It offers a solution to the dream of practical security architects to understand and describe very abstract and subtle security requirements through high-level models and how to transform those models into enforceable code by transforming the models into executables. The presented methodology has the real potential to make a strong impact on how to build Trusted Platforms in the near future - simply generate them from high-level models." - Dr. Jean-Pierre Seifert, Director Trusted Platform Laboratory, Samsung Electronics Research, San Jose, CA, USA
"This extremely valuable book for IT professionals covers these emerging topics of SOA and security. ... provide a sound methodological and technical basis for the engineering of security-critical scenarios. The intended audience includes industry professionals and software architects, but it might also be useful to graduate-level students with an orientation in practical/implementation matters. ... Most of the chapters contain a lot of figures that are very helpful in understanding the presented material. ... To conclude, this is a nice, extremely useful book for practitioners." (M. Ivanovic, ACM Computing Reviews, April, 2009)
| The Basics of SOA Security Engineering | |
| Introduction | p. 3 |
| Service Oriented Architecture | p. 3 |
| Interoperability and Securitiy Issues in SOA | p. 4 |
| Model Driven Security Engineering | p. 5 |
| Problem Description | p. 6 |
| Contribution | p. 7 |
| ProSecO | p. 8 |
| Sectet | p. 8 |
| Related Work | p. 9 |
| Model Driven Security | p. 9 |
| Formal Systems Engineering | p. 10 |
| Pattern-based Approaches | p. 11 |
| Tools and Frameworks | p. 11 |
| Workflow Management | p. 12 |
| SOA - Standards & Technology | p. 15 |
| Service Oriented Architectures | p. 15 |
| Principles of SOA | p. 16 |
| Motivating Example | p. 16 |
| Web Services | p. 17 |
| Basic Definition | p. 18 |
| Service Invocation | p. 18 |
| Service Description and Discovery | p. 20 |
| The Web Services Specification Stack | p. 20 |
| Transport Layer | p. 21 |
| Messaging Layer | p. 21 |
| Description Layer | p. 22 |
| Discovery Layer | p. 22 |
| Quality of Service Layer | p. 22 |
| Web Services Security Standards | p. 23 |
| Services Composition Layer | p. 23 |
| Basic Concepts of SOA Security | p. 27 |
| What Is (SOA) Security? | p. 27 |
| Security Objectives | p. 29 |
| Security Policies | p. 30 |
| Basic Security Policies | p. 31 |
| Policy Models | p. 32 |
| Advanced Security Policies | p. 36 |
| Security Analysis | p. 38 |
| Security Requirements | p. 38 |
| Attacks | p. 38 |
| Web Services Security Standards | p. 41 |
| Confidentiality, Integrity, and Authenticity | p. 41 |
| Authentication | p. 42 |
| Advanced Web Services Security Standards | p. 44 |
| Domain Architectures | p. 47 |
| Model Driven Software Development | p. 47 |
| The Unified Modeling Language | p. 48 |
| The Meta-Object Facility | p. 48 |
| Model Driven Software Development | p. 49 |
| Model Driven Architecture | p. 50 |
| Model Driven Security | p. 51 |
| A Definition of Model Driven Software Development | p. 51 |
| Domain Specific Languages | p. 52 |
| The Target Architecture | p. 54 |
| Model-(to-model-)to-code Transformation | p. 54 |
| Domain Architecture | p. 56 |
| Framework | p. 57 |
| Model Driven Security | p. 57 |
| Definition | p. 57 |
| Extensions to the Problem Space | p. 57 |
| Realizing SOA Security | |
| Sectino - A Motivating Case Study from E-Government | p. 65 |
| Problem Context | p. 65 |
| Project Mission | p. 66 |
| Expected Benefits | p. 66 |
| Scenario Description | p. 67 |
| Requirements | p. 68 |
| Security Requirements | p. 69 |
| Results | p. 70 |
| Security Analysis | p. 71 |
| Overview | p. 71 |
| Modularity | p. 72 |
| Traceability | p. 73 |
| Model-driven Configuration of Security Services | p. 73 |
| Tight Integration of Functional and Security Aspects | p. 73 |
| Security as a Process | p. 73 |
| Functional System View | p. 74 |
| Level of Interaction | p. 74 |
| Level of Abstraction | p. 74 |
| Functional Meta-models | p. 75 |
| Global Functional Meta-model | p. 75 |
| Local Functional Meta-model | p. 77 |
| Security Analysis Process | p. 79 |
| Security Concepts | p. 79 |
| The Security Micro-process | p. 81 |
| Elaborate Functional Model | p. 82 |
| Define Security Objectives | p. 82 |
| Identify Dependencies | p. 83 |
| Security Requirements Engineering | p. 83 |
| Threat and Risk Analysis | p. 85 |
| Security Control Engineering | p. 86 |
| Access Control | p. 86 |
| Related Work | p. 89 |
| Standards and Baseline Protection | p. 89 |
| Security Management | p. 89 |
| Security Analysis in the Software Process | p. 90 |
| Formal Approaches to Security Requirements Specification | p. 90 |
| Modeling Security Critical SOA Applications | p. 93 |
| The Sectet Domain Specific Language | p. 93 |
| Domain Definition | p. 93 |
| Global Worklfow | p. 94 |
| Local Worklfow | p. 94 |
| Sectet Model Views | p. 96 |
| Security Policies | p. 98 |
| The DSL Meta-models | p. 100 |
| The Workflow View | p. 101 |
| The Interface View | p. 107 |
| Integrating Security into the DSL | p. 114 |
| Enforcing Security with the Sectet Reference Architecture | p. 121 |
| Architectural Blueprint | p. 121 |
| Components | p. 122 |
| Service Components | p. 123 |
| Security Components | p. 123 |
| Supporting Security Components | p. 126 |
| Communication Protocols | p. 126 |
| Enforcing Confidentiality and Integrity | p. 127 |
| Enforcing Non-repudiation | p. 128 |
| Component Configuration | p. 130 |
| Inbound Messaging - (Executable Security Policy File) | p. 131 |
| Outbound Messaging - (Executable Security Policy Files) | p. 136 |
| Request for Compliance Check | p. 138 |
| Response Request for Compliance Check | p. 139 |
| Technology and Standards | p. 140 |
| Model Transformation & Code Generation | p. 141 |
| Transformations in the Sectet-Framework | p. 141 |
| The Generation of Security Artefacts | p. 141 |
| The Generation of Services Artefacts | p. 142 |
| Security Transformations | p. 143 |
| Inbound Policy File | p. 143 |
| Outbound Policy Files | p. 144 |
| Services Transformations | p. 145 |
| Global Workflow to Local Workflow Translation | p. 146 |
| Global Workflow to WSDL Description | p. 146 |
| Global Workflow to XSD Schema Template | p. 148 |
| Implementing Transformation | p. 149 |
| Template Based Transformations | p. 149 |
| Meta-model Based Transformations | p. 150 |
| Software & Security Management | p. 153 |
| Tool Chain | p. 153 |
| Modeling | p. 153 |
| Code Generation | p. 154 |
| Build Tools and Integrated Development Environments | p. 155 |
| The Realization Process | p. 155 |
| The Engineering Process | p. 156 |
| The Deployment Process | p. 157 |
| Extending Sectet: Advanced Security Policy Modeling | p. 159 |
| Motivation | p. 160 |
| Extending the DSL | p. 161 |
| A New Security Objective | p. 161 |
| Advanced Security Policies | p. 162 |
| Introducing the RBAC Policy Model | p. 162 |
| Modeling Policies with Dynamic Constraints | p. 164 |
| Sectet-PL | p. 164 |
| Static RBAC | p. 165 |
| Dynamic RBAC | p. 165 |
| Rights Delegation | p. 167 |
| Integrating Sectet-PL into the Sectet- Framework | p. 171 |
| Metamodel Extensions | p. 171 |
| Sectet-PL - Abstract Syntax | p. 173 |
| Extending the Reference Architecture | p. 174 |
| Access Control, Delegation and Privacy Policies | p. 174 |
| Protocol Extensions | p. 179 |
| PDP Extensions | p. 180 |
| Sectet-PL Transformations | p. 182 |
| Modeling Advanced Use Cases with Sectet-PL | p. 182 |
| Break-Glass Policy (BGP) | p. 182 |
| 4-Eyes-Principle | p. 183 |
| Usage Control (UC) | p. 183 |
| Qualified Signature | p. 183 |
| A Case Study from Healthcare | |
| health@net - A Case Study from Healthcare | p. 189 |
| Background | p. 190 |
| The Electronic Healthcare Record | p. 190 |
| National E-Health Initiatives | p. 190 |
| Technical Standards for Healthcare | p. 191 |
| The Austrian Data Privacy Law | p. 191 |
| health@net | p. 192 |
| Project Mission | p. 192 |
| Organizational Setting | p. 193 |
| Architectural Concept | p. 194 |
| health@net - Security Analysis | p. 198 |
| Introduction | p. 198 |
| Functional System View | p. 198 |
| Identification of Security Objectives | p. 200 |
| Engineering of Security Requirements | p. 202 |
| Conclusion | p. 204 |
| health@net - Security Concept | p. 205 |
| Phase 1: Service-level Security | p. 205 |
| Phase 2a: Static, Process-level Security | p. 206 |
| Phase 2b: Dynamic, Process-level Security | p. 206 |
| Realizing Security with the Sectet-Framework | p. 207 |
| Conceptual Background | p. 207 |
| Model Views | p. 208 |
| health@net - Phases 2a & 2b | p. 212 |
| Use Cases | p. 212 |
| Security Architecture | p. 213 |
| Appendices | |
| Mapping Tables | p. 225 |
| Mapping Table for Inbound Policy File | p. 226 |
| Mapping Table for Outbound Policy Files | p. 227 |
| Mapping Table for BPEL Files | p. 228 |
| Mapping Table for BPEL Files (continued) | p. 229 |
| Mapping Table for WSDL Files | p. 230 |
| References | p. 231 |
| Index | p. 243 |
| Table of Contents provided by Ingram. All Rights Reserved. |
ISBN: 9783540795384
ISBN-10: 3540795383
Published: 10th October 2008
Format: Hardcover
Language: English
Number of Pages: 264
Audience: Professional and Scholarly
Publisher: Springer Nature B.V.
Country of Publication: DE
Dimensions (cm): 23.5 x 15.88 x 1.91
Weight (kg): 0.54
Shipping
| Standard Shipping | Express Shipping | |
|---|---|---|
| Metro postcodes: | $9.99 | $14.95 |
| Regional postcodes: | $9.99 | $14.95 |
| Rural postcodes: | $9.99 | $14.95 |
Orders over $79.00 qualify for free shipping.
How to return your order
At Booktopia, we offer hassle-free returns in accordance with our returns policy. If you wish to return an item, please get in touch with Booktopia Customer Care.
Additional postage charges may be applicable.
Defective items
If there is a problem with any of the items received for your order then the Booktopia Customer Care team is ready to assist you.
For more info please visit our Help Centre.
You Can Find This Book In

Cloud Native Application Protection Platforms
A Guide to CNAPPs and the Foundations of Comprehensive Cloud Security
Paperback
RRP $125.75
$60.99
OFF

Red Team Evaluation Framework
Sharpening the Spear: A Framework for Forging and Measuring an Elite Adversary Emulation Team
Paperback
RRP $105.00
$65.99
OFF

Red Team Evaluation Framework
Sharpening the Spear: A Framework for Forging and Measuring an Elite Adversary Emulation Team
Hardcover
RRP $252.00
$219.75
OFF

Cryptocurrency Forensics and Investigation using Open Source Intelligence Techniques (OSINT)
Volume I
Paperback
RRP $94.99
$85.75
OFF
This product is categorised by
- Non-FictionComputing & I.T.Computer ScienceComputer Architecture & Logic Design
- Non-FictionComputing & I.T.Computer SecurityData Encryption
- Non-FictionComputing & I.T.Computer Programming & Software DevelopmentSoftware Engineering
- Non-FictionComputing & I.T.Computer Networking & CommunicationsClient-Server Networking
- Non-FictionComputing & I.T.Computer Networking & CommunicationsNetwork Security





















