Show simple item record

AuthorKhan, Khaled M.
AuthorTan, Calvin
Available date2024-04-02T06:04:50Z
Publication Date2009
Publication NameLecture Notes in Business Information Processing
ResourceScopus
ISSN18651348
URIhttp://dx.doi.org/10.1007/978-3-642-01112-2_40
URIhttp://hdl.handle.net/10576/53805
AbstractThis paper addresses information security from systems development point of view. This paper presents a prototype demonstrating how security-aware software components can be composed with other remote objects in terms of security compliances. It shows that the integration between two third-party components can be formed based on the compliance of their security requirements and assurances. With a running example, the paper attempts to demonstrate how the compliance of security requirements of a component is checked, and how a viable integration between software components is formed matching the security requirements of each other. The paper also describes the underlying architecture of the prototype.
Languageen
PublisherSpringer Verlag
SubjectComposition
Security properties
Security-aware
Software components
Software services
TitleSecCom: A prototype for integrating security-aware components
TypeConference Paper
Pagination393-403
Volume Number20 LNBIP


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record