Acknowledgments
This research is part of the following projects: MESSENGER (PCC-03-003-1)
financed by the “Consejería de Ciencia y Tecnología de la Junta de Comunidades de
Castilla-La Mancha” (Spain), CALIPO (TIC2003-07804-C05-03) and RETISTIC
(TIC2002-12487-E) granted by the “Dirección General de Investigación del
Ministerio de Ciencia y Tecnología” (Spain).
References
1. Nott, C., Patterns: Using Business Service Choreography In Conjuction With An Enterprise
Service Bus. IBM Redbooks Paper. 2004. 32.
2. IDC, Cautious Web Services Software Adoption Continues; IDC Expects Spending to
Reach $11 Billion by 2008. 2004.
3. Gutiérrez, C., E. Fernández-Medina, and M. Piattini, Web Services Security: is the problem
solved? Information Systems Security, 2004. 13(3): p. 22-31.
4. Endrei, M., et al., 4. Service-oriented architecture approach, in Patterns: Service-Oriented
Architecture and Web Services. 2004. p. 345.
5. Endrei, M., et al., Patterns: Services Oriented Architectures and Web Services. IBM
Redbook, ed. IBM. 2004.
6. Papazoglou, M.P. and D. Georgakopoulo, Service-Oriented Computing. Communications
of the ACM, 2003. 46(10): p. 25-28.
7. Alberts, C.J., et al., Operationally Critical Threat, Asset, and Vulnerability Evaluation
(OCTAVE) Framework, Version 1.0, in Networked Systems Survivability Program. 1999,
Carnegie Mellon. Software Engineering Institute. p. 84.
8. Smith, D.G., Common Concepts Underlying Safety, Security, and Survivability
Engineering. 2003, SEI.
9. OMG, UML Profile for Modeling Quality of Service and Fault Tolerance Characteristics
and Mechanisms. 2004.
10. Bass, L. and R. Kazman, Architecture Based Development, in Product Line Systems. April
1999, Carnegie Mellon. Software Engineering Institute. p. 36.
11. Jürjens, J., Secure Systems Development with UML. 2005: Springer. 309.
12. Yu, H., et al. Integrating Security Administration into Software Architecture Design. in
International Conference on Software Engineering and Knowledge Engineering 2004.
2004. Banff, Canada.
13. Sindre, G. and A.L. Opdahl. Eliciting Security Requirements with Misuse Cases. in 37th
International Conference on Technology of Object-Oriented Languages and Systems
(TOOLS-37'00). 2000. Sydney, Australia.
14. Alexander, I., Misuse Cases: Use Cases with Hostile Intent. IEEE Computer Software,
2003. 20(1): p. 58-66.
15. Firesmith, D.G., Security Use Cases. Journal of Object Technology, 2003. 2(3): p. 53-64.
16. Toval, A., et al., Requirements Reuse for Improving Information Systems Security: A
Practitioner's Approach. Requirements Engineering Journal, 2001. 6(4): p. 205-219.
17. Bass, L., P. Clements, and R. Kazman, Software Architecture in Practice. 2nd, ed. 2003:
Addison-Wesley. 560.
18. Ellison, R.J., et al., Security and Survivability Reasoning Frameworks and Architectural
Design Tactics. 2004, SEI.
19. Klein, M. and R. Kazman, Attribute-Based Architectural Styles, in Product Line Practice.
1999, Software Engineering Institute. p. 90.
307