-
2
-
-
0003551091
-
-
Cambridge, MA: World Wide Web Consortium (W3C)
-
T. Bray, J. Paoli, C. Sperberg-McQeen, and E. Maler, Extensible Markup Language (XML) 1.1 (Second Edition). Cambridge, MA: World Wide Web Consortium (W3C), 2000.
-
(2000)
Extensible Markup Language (XML) 1.1 (Second Edition)
-
-
Bray, T.1
Paoli, J.2
Sperberg-McQeen, C.3
Maler, E.4
-
4
-
-
0003791651
-
-
Cambridge, MA: World Wide Web Consortium (W3C)
-
R. Chinnici, M. Gudgin, J. Moreau, and S. Weerawarana, Web Services Description Language (WSDL) 1.2. Cambridge, MA: World Wide Web Consortium (W3C), 2002.
-
(2002)
Web Services Description Language (WSDL) 1.2
-
-
Chinnici, R.1
Gudgin, M.2
Moreau, J.3
Weerawarana, S.4
-
5
-
-
85069422432
-
-
[Online]
-
(2002) Excellent e-Service. [Online] Available: http://www.excellente-service.com/
-
(2002)
-
-
-
7
-
-
0032124041
-
Mobility and security management in the GSM system and some proposed future improvements
-
July
-
A. Mehrotra and L. Golding, "Mobility and security management in the GSM system and some proposed future improvements," Proc. IEEE, vol. 86, pp. 1480-1496, July 1998.
-
(1998)
Proc. IEEE
, vol.86
, pp. 1480-1496
-
-
Mehrotra, A.1
Golding, L.2
-
8
-
-
84962890350
-
Untraceable off-line electronic cash flow in e-commerce
-
Gold-Coast, Australia, Feb.
-
H. Wang and Y. Zhang, "Untraceable off-line electronic cash flow in e-commerce," in Proc. 24th Australian Computer Science Conf.,. Gold-Coast, Australia, Feb. 2001, pp. 191-198.
-
(2001)
Proc. 24th Australian Computer Science Conf.
, pp. 191-198
-
-
Wang, H.1
Zhang, Y.2
-
9
-
-
22044447040
-
Secure billing for mobile information services in UMTS
-
Antwerp, Belgium, May
-
K. Martin, B. Preneel, C. Mitchell, H. Hitz, A. Poliakova, and P. Howard, "Secure billing for mobile information services in UMTS," in Proc. 5th Int. Conf. Intelligence Services Networks Technology for Ubiquitous Telecom Services. Antwerp, Belgium, May 1998, pp. 535-548.
-
(1998)
Proc. 5th Int. Conf. Intelligence Services Networks Technology for Ubiquitous Telecom Services
, pp. 535-548
-
-
Martin, K.1
Preneel, B.2
Mitchell, C.3
Hitz, H.4
Poliakova, A.5
Howard, P.6
-
10
-
-
0348151884
-
A consumer anonymity scalable payment scheme with role based access control
-
Kyoto, Japan, Dec.
-
H. Wang, J. Cao, and Y. Zhang, "A consumer anonymity scalable payment scheme with role based access control," in Proc. 2nd Int. Conf. Web Information Systems Engineering, Kyoto, Japan, Dec. 2001, pp. 53-62.
-
(2001)
Proc. 2nd Int. Conf. Web Information Systems Engineering
, pp. 53-62
-
-
Wang, H.1
Cao, J.2
Zhang, Y.3
-
11
-
-
0030416137
-
Pseudorandom functions revisited: The cascade construction and its concrete security. Extended abstract
-
Burlington, VT, Oct.
-
M. Bellare, R. Canetti, and H. Krawczyk, "Pseudorandom functions revisited: the cascade construction and its concrete security. Extended abstract," in Proc. 37th Annu. Symp. Foundations Computer Science, Burlington, VT, Oct. 1996, pp. 514-523.
-
(1996)
Proc. 37th Annu. Symp. Foundations Computer Science
, pp. 514-523
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
12
-
-
0348151886
-
Better login protocols for computer networks
-
Toulouse, France, Oct.
-
D. Waleffe and J. J. Quisquater, "Better login protocols for computer networks," in Proc. Eur. Symp. Research Computer Security, Toulouse, France, Oct. 1990, pp. 163-172.
-
(1990)
Proc. Eur. Symp. Research Computer Security
, pp. 163-172
-
-
Waleffe, D.1
Quisquater, J.J.2
-
13
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Feb.
-
R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
15
-
-
0348151888
-
Formal authorization allocation approaches for role-based access control based on relational algebra operations
-
Singapore, Dec.
-
H. Wang, J. Cao, and Y. Zhang, "Formal authorization allocation approaches for role-based access control based on relational algebra operations," in Proc. 3nd Int. Conf. Web Information Systems Engineering, Singapore, Dec. 2002, pp. 301-312.
-
(2002)
Proc. 3nd Int. Conf. Web Information Systems Engineering
, pp. 301-312
-
-
Wang, H.1
Cao, J.2
Zhang, Y.3
-
17
-
-
0002357382
-
Role based access control
-
Washington, DC, Oct.
-
D. Ferraiolo and D. Kuhn, "Role based access control," in Proc. 15th Natl. Computer Security Conf., Washington, DC, Oct. 1992, pp. 544-563.
-
(1992)
Proc. 15th Natl. Computer Security Conf.
, pp. 544-563
-
-
Ferraiolo, D.1
Kuhn, D.2
-
18
-
-
0347380552
-
Supporting relationships in access control using role based access control
-
Fairfax, VA, Oct.
-
J. Barkley, K. Beznosov, and J. Uppal, "Supporting relationships in access control using role based access control," in Proc. 3rd ACM Workshop RoleBased Access Control, Fairfax, VA, Oct. 1998, pp. 55-65.
-
(1998)
Proc. 3rd ACM Workshop RoleBased Access Control
, pp. 55-65
-
-
Barkley, J.1
Beznosov, K.2
Uppal, J.3
-
19
-
-
0002422823
-
Role-based access control model and reference implementation within a corporate intranet
-
D. Ferraiolo, J. Barkley, and D. Kuhn, "Role-based access control model and reference implementation within a corporate intranet," ACM Trans. Inform. Syst. Security, vol. 2, no. 1, pp. 34-64, 1999.
-
(1999)
ACM Trans. Inform. Syst. Security
, vol.2
, Issue.1
, pp. 34-64
-
-
Ferraiolo, D.1
Barkley, J.2
Kuhn, D.3
-
20
-
-
4444261015
-
Future directions in role-based access control models
-
St. Petersburg, Russia,: Lecture Notes in Computer Science, May
-
R. Sandhu, "Future directions in role-based access control models," in Proc. Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop. St. Petersburg, Russia,: Lecture Notes in Computer Science, May 2001, vol. 2052, pp. 67-73.
-
(2001)
Proc. Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop
, vol.2052
, pp. 67-73
-
-
Sandhu, R.1
-
21
-
-
0033313663
-
Accountable anonymous access to services in mobile communication systems
-
Lausanne, Switzerland, Oct.
-
L. Buttyan and J. Hubaux, "Accountable anonymous access to services in mobile communication systems," in Proc. 18th Symp. Reliable Distributed Systems. Lausanne, Switzerland, Oct. 1999, pp. 384-389.
-
(1999)
Proc. 18th Symp. Reliable Distributed Systems
, pp. 384-389
-
-
Buttyan, L.1
Hubaux, J.2
-
22
-
-
0030661010
-
Ticket based service access for the mobile user
-
Budapest, Hungary, Sept.
-
B. Pratel and J. Crowcroft, "Ticket based service access for the mobile user," in Proc. MobiCom: Int. Conf. Mobile Computing Networking, Budapest, Hungary, Sept. 1997, pp. 223-232.
-
(1997)
Proc. MobiCom: Int. Conf. Mobile Computing Networking
, pp. 223-232
-
-
Pratel, B.1
Crowcroft, J.2
-
24
-
-
0348151887
-
A logic of authentication, from proceedings of the royal society, volume 426, number 1871, 1989
-
Los Alamitos, CA: IEEE Comput. Soc. Press
-
M. Burrows, M. Abadi, and R. Needham, "A logic of authentication, from proceedings of the royal society, volume 426, number 1871, 1989," in William Stallings, Practical Cryptography for Data Internetworks. Los Alamitos, CA: IEEE Comput. Soc. Press, 1996.
-
(1996)
William Stallings, Practical Cryptography for Data Internetworks
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
25
-
-
0141998523
-
Toward securing xml web services
-
Washington, DC, Nov.
-
E. Damiani, S. D. Capitani, and P. Samarati, "Toward securing xml web services," in Proc. ACM Workshop XML Security, Washington, DC, Nov. 2002, pp. 90-96.
-
(2002)
Proc. ACM Workshop XML Security
, pp. 90-96
-
-
Damiani, E.1
Capitani, S.D.2
Samarati, P.3
-
28
-
-
0029360131
-
Security issues in a CDPD wireless network
-
Aug.
-
Y. Frankel, A. Herzberg, P. Karger, H. Krawczyk, C. Kunzinger, and M. Yung, "Security issues in a CDPD wireless network," IEEE Pers. Commun., vol. 2, pp. 16-27, Aug. 1995.
-
(1995)
IEEE Pers. Commun.
, vol.2
, pp. 16-27
-
-
Frankel, Y.1
Herzberg, A.2
Karger, P.3
Krawczyk, H.4
Kunzinger, C.5
Yung, M.6
-
29
-
-
0348151885
-
Building a consumer anonymity scalable payment protocol for the internet purchases
-
San Jose, CA, Feb.
-
H. Wang, J. Cao, and Y. Kambayashi, "Building a consumer anonymity scalable payment protocol for the internet purchases," in Proc. 12th Int. Workshop Research Issues Data Engineering: Engineering E-Commerce/E-Business Systems, San Jose, CA, Feb. 2002, pp. 159-168.
-
(2002)
Proc. 12th Int. Workshop Research Issues Data Engineering: Engineering E-commerce/E-business Systems
, pp. 159-168
-
-
Wang, H.1
Cao, J.2
Kambayashi, Y.3
-
30
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Commun. ACM, vol. 24, no. 2, pp. 84-88, 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
31
-
-
0033723110
-
Design and implementation of an access control processor for XML documents
-
Jun.
-
E. Damiani, S. D. Capitani, S. Paraboschi, and P. Samarati, "Design and implementation of an access control processor for XML documents," Comput. Netw., vol. 33, no. 1-6, pp. 59-75, Jun. 2000.
-
(2000)
Comput. Netw.
, vol.33
, Issue.1-6
, pp. 59-75
-
-
Damiani, E.1
Capitani, S.D.2
Paraboschi, S.3
Samarati, P.4
-
32
-
-
0141908648
-
Securing SOAP e-services
-
Feb.
-
_, "Securing SOAP e-services," Int. J. Inform. Security, vol. 1, no. 2, pp. 100-115, Feb. 2002.
-
(2002)
Int. J. Inform. Security
, vol.1
, Issue.2
, pp. 100-115
-
-
-
33
-
-
85001697848
-
A fine-grained access control system for XML documents
-
May
-
_, "A fine-grained access control system for XML documents," ACM Trans. Inform. Syst. Security, vol. 5, no. 2, pp. 169-202, May 2002.
-
(2002)
ACM Trans. Inform. Syst. Security
, vol.5
, Issue.2
, pp. 169-202
-
-
-
34
-
-
26844544709
-
On the problem of trust in mobile agent systems
-
San Diego, CA
-
U. Wilhelm, S. Staamann, and L. Buttyan, "On the problem of trust in mobile agent systems," in Proc. IEEE Network Distributed Systems Security Symp., San Diego, CA, 1998, pp. 11-13.
-
(1998)
Proc. IEEE Network Distributed Systems Security Symp.
, pp. 11-13
-
-
Wilhelm, U.1
Staamann, S.2
Buttyan, L.3
|