Show simple item record

dc.contributor.authorLowis, Lutz
dc.contributor.authorHöhn, Sebastian
dc.contributor.authorGilliot, Maike
dc.contributor.editorAlkassar, Ammar
dc.contributor.editorSiekmann, Jörg
dc.date.accessioned2019-04-03T13:29:13Z
dc.date.available2019-04-03T13:29:13Z
dc.date.issued2008
dc.identifier.isbn978-3-88579-222-2
dc.identifier.issn1617-5468
dc.identifier.urihttp://dl.gi.de/handle/20.500.12116/21499
dc.description.abstractSoftware vulnerabilities put automated business processes at risk. In service- oriented architectures (SOA), where business processes are implemented as potentially highly complex service compositions, the exploit of a software vulnerability can have far reaching effects on the confidentiality, integrity, and availability of business processes. In this paper, we report on our ongoing work which combines business process models with vulnerability information to automatically determine those effects. This determination is required in the identification phase in risk management.en
dc.language.isoen
dc.publisherGesellschaft für Informatik e. V.
dc.relation.ispartofSICHERHEIT 2008 – Sicherheit, Schutz und Zuverlässigkeit. Beiträge der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI)
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-128
dc.titleVulnerability Effect Propagation in Service-Oriented Architecturesen
dc.typeText/Conference Paper
dc.pubPlaceBonn
mci.reference.pages473-484
mci.conference.sessiontitleRegular Research Papers
mci.conference.locationSaarbrücken
mci.conference.date2.- 4. April 2008


Files in this item

Thumbnail

Show simple item record