Galapagos: Model-driven discovery of end-to-end application-storage relationships in distributed systems

2008 ◽  
Vol 52 (4.5) ◽  
pp. 367-377 ◽  
Author(s):  
K. Magoutis ◽  
M. Devarakonda ◽  
N. Joukov ◽  
N. G. Vogl
2014 ◽  
Vol 47 (3) ◽  
pp. 4441-4446
Author(s):  
A. Armentia ◽  
A. Agirre ◽  
E. Estévez ◽  
J. Pérez ◽  
M. Marcos

2011 ◽  
Vol 8 (6) ◽  
pp. 913-928 ◽  
Author(s):  
K. R. Joshi ◽  
M. A. Hiltunen ◽  
W. H. Sanders ◽  
R. D. Schlichting

Author(s):  
Fumiko Satoh ◽  
Yuichi Nakamura ◽  
Nirmal K. Mukhi ◽  
Michiaki Tatsubori ◽  
Kouichi Ono

The configuration of non-functional requirements, such as security, has become important for SOA applications, but the configuration process has not been discussed comprehensively. In current development processes, the security requirements are not considered in upstream phases and a developer at a downstream phase is responsible for writing the security configuration. However, configuring security requirements properly is quite difficult for developers because the SOA security is cross-domain and all required information is not available in the downstream phase. To resolve this problem, this chapter clarifies how to configure security in the SOA application development process and defines the developer’s roles in each phase. Additionally, it proposes a supporting technology to generate security configurations: Model-Driven Security. The authors propose a methodology for end-to-end security configuration for SOA applications and tools for generating detailed security configurations from the requirements specified in upstream phases model transformations, making it possible to configure security properly without increasing developers’ workloads.


Sign in / Sign up

Export Citation Format

Share Document