-
5
-
-
0004175734
-
-
May
-
D. Box, D. Ehnebuske, G. Kakivaya, A. Layman, N. Mendelsohn, H. F. Nielsen, S. Thatte, and D. Winer. Simple Object Access Protocol (SOAP) 1.1. http://www.w3.org/TR/SOAP/, May 2000.
-
(2000)
Simple Object Access Protocol (SOAP) 1.1
-
-
Box, D.1
Ehnebuske, D.2
Kakivaya, G.3
Layman, A.4
Mendelsohn, N.5
Nielsen, H.F.6
Thatte, S.7
Winer, D.8
-
13
-
-
0033723110
-
Design and implementation of an access control processor for XML documents
-
June
-
E. Damiani, S. D. C. di Vimercati, S. Paraboschi, and P. Samarati. Design and implementation of an access control processor for XML documents. Computer Networks, 33(1-6):59-75, June 2000.
-
(2000)
Computer Networks
, vol.33
, Issue.1-6
, pp. 59-75
-
-
Damiani, E.1
Di Vimercati, S.D.C.2
Paraboschi, S.3
Samarati, P.4
-
16
-
-
33745719971
-
-
January
-
B. A. et al. Web Services Security Language (WS-Security) http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnglobspec/ html/ws-security,asp, January 2002.
-
(2002)
Web Services Security Language (WS-security)
-
-
-
17
-
-
0003347539
-
Hypertext transfer protocol -HTTP/1.1
-
January
-
R. Fielding, J. Gettys, J. Mogul, and H. Frystyk. Hypertext transfer protocol -HTTP/1.1. Network Writing Group, Request for Comments, (2068), January 1997.
-
(1997)
Network Writing Group, Request for Comments
, Issue.2068
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
-
18
-
-
0141902730
-
-
Network World, January
-
J. Fontana. Top Web services worry: Security. Network World, http://www.nwfusion.com/news/2002/0121webservices.html?docid=7747, January 2002.
-
(2002)
Top Web Services Worry: Security
-
-
Fontana, J.1
-
19
-
-
0042794768
-
-
March
-
W. Ford, P. Hallam-Baker, B. Fox, B. Dillaway, B. LaMacchia, J. Epstein, and J. Lapp. XML Key Management Specification (XKMS). http://www.w3.org/TR/xkms/, March 2001.
-
(2001)
XML Key Management Specification (XKMS)
-
-
Ford, W.1
Hallam-Baker, P.2
Fox, B.3
Dillaway, B.4
LaMacchia, B.5
Epstein, J.6
Lapp, J.7
-
24
-
-
0002824760
-
Weaving a Web of Trust
-
summer
-
R. Khare and A. Rifkin. Weaving a Web of Trust. World Wide Web Journal, 2(3):77-112, summer 1997.
-
(1997)
World Wide Web Journal
, vol.2
, Issue.3
, pp. 77-112
-
-
Khare, R.1
Rifkin, A.2
-
27
-
-
0142006514
-
Research and design issues of access control for network services on the web
-
June
-
R. Kraft. Research and design issues of access control for network services on the web. The 3rd International Conference on Internet Computing (IC 2002), 3:542-548, June 2002.
-
(2002)
The 3rd International Conference on Internet Computing (IC 2002)
, vol.3
, pp. 542-548
-
-
Kraft, R.1
-
28
-
-
0034450091
-
XML document security based on provisional authorization
-
IBM Tokyo Research Laboratory
-
M. Kudo and S. Hada. XML document security based on provisional authorization. CCS'00, 2000. IBM Tokyo Research Laboratory.
-
(2000)
CCS'00
-
-
Kudo, M.1
Hada, S.2
-
32
-
-
0141902728
-
-
last accessed: April
-
Microsoft Passport. Microsoft Passport homepage. http://passport.microsoft.com. last accessed: April 2002.
-
(2002)
Microsoft Passport Homepage
-
-
-
35
-
-
0033485728
-
Methods of securing applications for the world wide web (WWW)
-
Winter
-
R. Oppliger. Methods of securing applications for the world wide web (WWW). Computer Security Journal, 15(1):1-9, Winter 1999.
-
(1999)
Computer Security Journal
, vol.15
, Issue.1
, pp. 1-9
-
-
Oppliger, R.1
-
36
-
-
0141971880
-
-
Organization for the Advancement of Structured Information Standards (OASIS). OASIS homepage. http://www.oasis-open.org/.
-
OASIS Homepage
-
-
-
37
-
-
2942533835
-
-
last accessed: April
-
SAML. Security Assertion Markup Language (SAML). http://www.oasis-open.org/committees/security/docs/draftsstc-saml-01.pdf. last accessed: April 2002.
-
(2002)
Security Assertion Markup Language (SAML)
-
-
-
38
-
-
0028513932
-
Access control: Principles and practice
-
September
-
R. Sandhu and P. Samarati. Access control: Principles and practice. IEEE Communications, pages 40-48, September 1994.
-
(1994)
IEEE Communications
, pp. 40-48
-
-
Sandhu, R.1
Samarati, P.2
-
39
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 20(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.20
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
40
-
-
0141937132
-
-
last accessed: 3/7
-
A. SOAP. Apache SOAP homepage. http://xml.apache.org/soap/. last accessed: 3/7/2002.
-
(2002)
Apache SOAP Homepage
-
-
-
42
-
-
0141971878
-
-
last accessed: 6/3/2002
-
O. L. Tim Berners-Lee, James Hendler. W3C Semantic Web - Web Site, http://www.w3.org/2001/sw/. last accessed: 6/3/2002.
-
-
-
Tim Berners-Lee, O.L.1
Hendler, J.2
-
43
-
-
0141902729
-
-
last accessed: 3/5
-
UDDI. UDDI homepage. http://www.uddi.org/. last accessed: 3/5/2002.
-
(2002)
UDDI Homepage
-
-
-
46
-
-
84893253396
-
-
W3C. XML encryption WG. http://www.w3c.org/Encryption/2001/.
-
XML Encryption WG
-
-
-
47
-
-
84888185379
-
-
W3C. XML schema. http://www.w3.org/XML/Schema.
-
XML Schema
-
-
|