Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Christian Emig is active.

Publication


Featured researches published by Christian Emig.


advanced industrial conference on telecommunications | 2006

Development of SOA-Based Software Systems - an Evolutionary Programming Approach

Christian Emig; Jochen Weisser; Sebastian Abeck

A software application has strong relationships with the business processes it supports. In the analysis phase those parts of the processes in which the software system is applied by its future users are analyzed. Taking an object-oriented approach, the Unified Modeling Language (UML) is often used to model the relevant aspects of the business processes. In the design phase these models must be manually mapped to the business layer of the software application. The Service-Oriented Architecture (SOA) offers a promising new approach: The business process is described in a programming language [1], i.e. a process language which can be automatically mapped to an execution language and executed by a process engine. This article shows how Programming in the Large can be practically applied in a software engineering process. The Business Process Model Notation (BPMN) is used as a process programming language. A BPMN description can be mapped to the widely accepted Business Process Execution Language (BPEL).


international conference on software engineering advances | 2007

An Access Control Metamodel for Web Service-Oriented Architecture

Christian Emig; Frank Brandt; Sebastian Abeck; Jürgen Biermann; Heiko Klarl

With the mutual consent to use WSDL (Web Service Description Language) to describe web service interfaces and SOAP as the basic communication protocol, the cornerstone for web service-oriented architecture (WSOA) has been established. Considering the momentum observable by the growing number of specifications in the web service domain for the indispensable cross-cutting concern of identity management (IdM) it is still an open issue how a WSOA-aware IdM architecture is built and how it is linked with WSOAs main elements, the web services providing functional core concerns. In this paper we present an access control model for WSOA and a blueprint of a WSOA- aware authorization verification service which is part of the IdM architecture. We show the integration of this service with WSOA consisting of both basic and composite web services. Our solution has been tested and evaluated in an implementation case study.


international conference on software engineering advances | 2006

SOA-Aware Authorization Control

Christian Emig; Heiko Schandua; Sebastian Abeck

The question how to handle authorization of digital identities in a service-oriented architecture (SOA) remains an open issue. In this paper we present a design pattern for the integration of legacy systems with SOA using out-of-the-box (unmodified) application servers and discuss how the architecture has to be extended by an Identity Management (IdM) infrastructure. We claim that the IdM infrastructure itself must be designed in a service-oriented way to fit into the overall SOA approach. We introduce a possibility how to decouple the policy enforcement point from the application server and propose an architectural design pattern to seamlessly integrate the SOAs business-related functionality and the IdM infrastructure. An implementation case study illustrates how to apply the invocation pattern for secured web services.


international conference on emerging security information, systems and technologies | 2009

Integration of a Security Product in Service-Oriented Architecture

Aleksander Dikanski; Christian Emig; Sebastian Abeck

The future of enterprise software development lies in the use of a service-oriented architecture (SOA) to support business concerns. Business services are using security services offered by service-oriented security architectures for security support. The question re¬mains how to implement the security services using traditional security products and how to map security policies defined at service level to product-specific po¬licies. In this paper we present an approach for inte¬grating existing security products into service-oriented security architectures. We show how traditional se¬curity products can be adapted to fit into the overall service-oriented paradigm. We present a case study that applies our approach.


trust and privacy in digital business | 2009

An MDA-Based Environment for Generating Access Control Policies

Heiko Klarl; Florian Marmé; Christian Wolff; Christian Emig; Sebastian Abeck

Identity management and access control are essential in the enterprise IT landscape in order to control access to applications and to fulfil laws or regulations. The global competition of enterprises leads to short development cycles and fast changes of IT applications, which requires also an error-free and quick adaption of its security. The model-driven development of access control policies promises to cope with this situation. This work introduces an mda-based environment for generating access control policies. A comprehensive overview is given on the organisational aspects, describing details of roles, artefacts and tools involved. On this basis the four phases of a model-driven development process for access control policies and their organisational aspects are presented.


kommunikation in verteilten systemen | 2007

Semantic Integration of Identity Data Repositories

Christian Emig; Kim Langer; Jürgen Biermann; Sebastian Abeck

With the continuously growing number of distributed and heterogeneous IT systems there is the need for structured and efficient identity management (IdM) processes. This implies that new users are created once and then the information is distributed to all applicable software systems same as if changes on existing user objects occur. The central issue is that there is no generally accepted standard for handling this information distribution because each system has its own internal representation of this data. Our approach is to give a semantic definition of the digital user objects’ attributes to ease the mapping process of an abstract user object to the concrete instantiation of each software system. Therefore we created an ontology to define the mapping of users’ attributes as well as an architecture which enables the semantic integration of identity data repositories. Our solution has been tested in an implementation case study.


EUNICE'07 Proceedings of the 13th open European summer school and IFIP TC6.6 conference on Dependable and adaptable networks and services | 2007

Identity as a service-towards a service-oriented identity management architecture

Christian Emig; Frank Brandt; Sebastian Kreuzer; Sebastian Abeck


Wirtschaftsinformatik und Angewandte Informatik | 2009

IDENTITY MANAGEMENT IN BUSINESS PROCESS MODELLING: A MODEL-DRIVEN APPROACH

Heiko Klarl; Christian Wolff; Christian Emig


Archive | 2008

Model-Driven Development of Access Control Policies for Web Services

Christian Emig; Sebastian Kreuzer; Sebastian Abeck; Jürgen Biermann; Heiko Klarl


GI Jahrestagung (2) | 2005

Programming in the Large based on the Business Process Modelling Notation.

Christian Emig; Christof Momm; Jochen Weisser; Sebastian Abeck

Collaboration


Dive into the Christian Emig's collaboration.

Top Co-Authors

Avatar

Sebastian Abeck

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Heiko Klarl

University of Regensburg

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jochen Weisser

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Christof Momm

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Frank Brandt

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Heiko Schandua

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Sebastian Kreuzer

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Aleksander Dikanski

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Florian Marmé

Karlsruhe Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge