-
1
-
-
0036871183
-
Negotiating Trust on the Web
-
M. Winslett et al., "Negotiating Trust on the Web," IEEE Internet Computing, vol. 6, no. 6, 2002, pp. 30-37.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
, pp. 30-37
-
-
Winslett, M.1
-
2
-
-
0003308762
-
Internet X.509 Public Key Infrastructure Certificate and CRL Profile
-
Jan.
-
R. Housley et al. "Internet X.509 Public Key Infrastructure Certificate and CRL Profile," Internet Eng. Task Force RFC 2459, Jan. 1999; www.rfc-editor.org/rfc/rfc2459.txt.
-
(1999)
Internet Eng. Task Force RFC
, vol.2459
-
-
Housley, R.1
-
3
-
-
0003358457
-
SPKI Certificate Theory
-
Sept.
-
C. Ellison et al, "SPKI Certificate Theory," Internet Eng. Task Force RFC 2693, Sept. 1999; www.rfc-editor.org/rfc/rfc2693.txt.
-
(1999)
Internet Eng. Task Force RFC
, vol.2693
-
-
Ellison, C.1
-
4
-
-
84862030675
-
Security Assertion Markup Language (SAML)
-
Nov.
-
P. Hallam-Baker and E. Maler, eds, "Security Assertion Markup Language (SAML)," OASIS specification, Nov. 2002; www.oasis-open.org/committees/security.
-
(2002)
OASIS Specification
-
-
Hallam-Baker, P.1
Maler, E.2
-
5
-
-
0028513932
-
Access Control: Principles and Practice
-
R. Sandhu and P. Samarati, "Access Control: Principles and Practice," IEEE Comm., vol. 32, no. 9, 1994, pp. 40-48.
-
(1994)
IEEE Comm.
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.1
Samarati, P.2
-
6
-
-
0009481412
-
A Survey of Trust in Internet Applications
-
T. Grandison and M. Sloman, "A Survey of Trust in Internet Applications," IEEE Comm. Surveys & Tutorials, vol. 3, no. 4, 2000, pp. 2-16.
-
(2000)
IEEE Comm. Surveys & Tutorials
, vol.3
, Issue.4
, pp. 2-16
-
-
Grandison, T.1
Sloman, M.2
-
7
-
-
85008030215
-
State Machines
-
D. Thomas and A. Hunt, "State Machines," IEEE Software, vol. 19, no. 6, 2002, pp. 10-12.
-
(2002)
IEEE Software
, vol.19
, Issue.6
, pp. 10-12
-
-
Thomas, D.1
Hunt, A.2
-
8
-
-
1142309815
-
Provisions and Obligations in Policy Management and Security Applications
-
Morgan Kaufmann
-
C. Bettini et al., "Provisions and Obligations in Policy Management and Security Applications," Proc. 28th Conf. Very Large Data Bases (VLDB 02), Morgan Kaufmann, 2002, pp. 502-513.
-
(2002)
Proc. 28th Conf. Very Large Data Bases (VLDB 02)
, pp. 502-513
-
-
Bettini, C.1
-
9
-
-
1142273446
-
PFIRES: A Policy Framework for Information Security
-
J. Rees, S. Bandyopadhyay, and E. Spafford, "PFIRES: A Policy Framework for Information Security," Comm. ACM, vol. 46, no. 7, 2003, pp. 101-106.
-
(2003)
Comm. ACM
, vol.46
, Issue.7
, pp. 101-106
-
-
Rees, J.1
Bandyopadhyay, S.2
Spafford, E.3
-
10
-
-
0031699648
-
Workflow Evolution
-
F. Casati et al., "Workflow Evolution," Data and Knowledge Eng., vol. 24, no. 3, 1998, pp. 211-238.
-
(1998)
Data and Knowledge Eng.
, vol.24
, Issue.3
, pp. 211-238
-
-
Casati, F.1
-
11
-
-
1142297676
-
XML Key Management Specification (XKMS)
-
Mar.
-
W. Ford et al., "XML Key Management Specification (XKMS)," W3C note, Mar. 2001; www.w3.org/TR/xkms.
-
(2001)
W3C Note
-
-
Ford, W.1
-
12
-
-
0037251267
-
The Self-Serv Environment for Web Services Composition
-
B. Benatallah, Q. Sheng, and M. Dumas, "The Self-Serv Environment for Web Services Composition," IEEE Internet Computing, vol. 7, no. 1, 2003, pp. 40-48.
-
(2003)
IEEE Internet Computing
, vol.7
, Issue.1
, pp. 40-48
-
-
Benatallah, B.1
Sheng, Q.2
Dumas, M.3
-
13
-
-
0036328418
-
Unraveling the Web Services Web: An Introduction to SOAP, WSDL, and UDDI
-
F. Curbera et al., "Unraveling the Web Services Web: An Introduction to SOAP, WSDL, and UDDI," IEEE Internet Computing, vol. 6, no. 2, 2002, pp. 86-93.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.2
, pp. 86-93
-
-
Curbera, F.1
-
14
-
-
0030086382
-
Role-Based Access Control Models
-
R. Sandhu et al., "Role-Based Access Control Models," Computer, vol. 29, no. 2, 1996, pp. 38-47.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
|