sectet.org
Sectissimo - Applied Security Abstractions
http://www.sectet.org/approach
Sectet follows a multi-layered transformation approach. The layers introduce a mapping from the abstract security requirements to a set of gradually refined architectural alternatives guiding the security engineer through the engineering process (e.g., from the abstract requirement of. SAML-based authentication with trusted-third party. After completing the process, services needed are indicated and deployed, configuration policies distributed.
sectet.org
Sectissimo - Applied Security Abstractions
http://www.sectet.org/publications
Memon, M. (2011). Security Modeling with Pattern Refinement for a Security-as-a-Service Architecture. PhD Thesis, University of Innsbruck. Schabetsberger, T. and Wozak, F. and Katt, B. and Mair, R. and Hirsch, B. and Hoerbst, A. (2010). Implementation of a Secure and Interoperable Generic e-Health Infrastructure for Shared Electronic Health Records based on IHE Integration Profiles. In: 13th world congress on Medical and Health Informatics, Medinfo 2010., 12-15 Sep 2010, Cape Town, South Africa. Constrai...
sectet.org
Sectissimo - Applied Security Abstractions
http://www.sectet.org/download
The SECTET prototype is available under the EPL (Eclipse Public License). Please leave your name and e-mail address before downloading the prototype.
sectet.org
Sectissimo - Applied Security Abstractions
http://www.sectet.org/prototype
The following figure illustrates the developed prototype as an UML deployment diagram:. The activity diagrams with the security requirements of the prototype:. Activity diagram of GetItems. Additionally to the GetItems operation the client in the prototype also invokes a GetStock operation which requires exactly the same security requirements. Therefore we do not include an extra activity diagram for this operation. Activity diagram of OrderItem. Activity diagram of CancelOrder.
sectissimo.info
Sectissimo - Applied Security Abstractions
http://www.sectissimo.info/publications
Memon, M. (2011). Security Modeling with Pattern Refinement for a Security-as-a-Service Architecture. PhD Thesis, University of Innsbruck. Schabetsberger, T. and Wozak, F. and Katt, B. and Mair, R. and Hirsch, B. and Hoerbst, A. (2010). Implementation of a Secure and Interoperable Generic e-Health Infrastructure for Shared Electronic Health Records based on IHE Integration Profiles. In: 13th world congress on Medical and Health Informatics, Medinfo 2010., 12-15 Sep 2010, Cape Town, South Africa. Constrai...
sectissimo.info
Sectissimo - Applied Security Abstractions
http://www.sectissimo.info/approach
Sectet follows a multi-layered transformation approach. The layers introduce a mapping from the abstract security requirements to a set of gradually refined architectural alternatives guiding the security engineer through the engineering process (e.g., from the abstract requirement of. SAML-based authentication with trusted-third party. After completing the process, services needed are indicated and deployed, configuration policies distributed.
sectissimo.info
Sectissimo - Applied Security Abstractions
http://www.sectissimo.info/prototype
The following figure illustrates the developed prototype as an UML deployment diagram:. The activity diagrams with the security requirements of the prototype:. Activity diagram of GetItems. Additionally to the GetItems operation the client in the prototype also invokes a GetStock operation which requires exactly the same security requirements. Therefore we do not include an extra activity diagram for this operation. Activity diagram of OrderItem. Activity diagram of CancelOrder.
sectissimo.info
Sectissimo - Applied Security Abstractions
http://www.sectissimo.info/download
The SECTET prototype is available under the EPL (Eclipse Public License). Please leave your name and e-mail address before downloading the prototype.