메뉴 건너뛰기




Volumn 7, Issue 6, 2003, Pages 45-52

Model-Driven Trust Negotiation for Web Services

Author keywords

[No Author keywords available]

Indexed keywords

SIMPLE PUBLIC KEY INFRASTRUCTURE (SPKI); WEB SERVICES;

EID: 1142301944     PISSN: 10897801     EISSN: None     Source Type: Journal    
DOI: 10.1109/MIC.2003.1250583     Document Type: Article
Times cited : (62)

References (14)
  • 1
    • 0036871183 scopus 로고    scopus 로고
    • Negotiating Trust on the Web
    • M. Winslett et al., "Negotiating Trust on the Web," IEEE Internet Computing, vol. 6, no. 6, 2002, pp. 30-37.
    • (2002) IEEE Internet Computing , vol.6 , Issue.6 , pp. 30-37
    • Winslett, M.1
  • 2
    • 0003308762 scopus 로고    scopus 로고
    • Internet X.509 Public Key Infrastructure Certificate and CRL Profile
    • Jan.
    • R. Housley et al. "Internet X.509 Public Key Infrastructure Certificate and CRL Profile," Internet Eng. Task Force RFC 2459, Jan. 1999; www.rfc-editor.org/rfc/rfc2459.txt.
    • (1999) Internet Eng. Task Force RFC , vol.2459
    • Housley, R.1
  • 3
    • 0003358457 scopus 로고    scopus 로고
    • SPKI Certificate Theory
    • Sept.
    • C. Ellison et al, "SPKI Certificate Theory," Internet Eng. Task Force RFC 2693, Sept. 1999; www.rfc-editor.org/rfc/rfc2693.txt.
    • (1999) Internet Eng. Task Force RFC , vol.2693
    • Ellison, C.1
  • 4
    • 84862030675 scopus 로고    scopus 로고
    • Security Assertion Markup Language (SAML)
    • Nov.
    • P. Hallam-Baker and E. Maler, eds, "Security Assertion Markup Language (SAML)," OASIS specification, Nov. 2002; www.oasis-open.org/committees/security.
    • (2002) OASIS Specification
    • Hallam-Baker, P.1    Maler, E.2
  • 5
    • 0028513932 scopus 로고
    • Access Control: Principles and Practice
    • R. Sandhu and P. Samarati, "Access Control: Principles and Practice," IEEE Comm., vol. 32, no. 9, 1994, pp. 40-48.
    • (1994) IEEE Comm. , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.1    Samarati, P.2
  • 6
    • 0009481412 scopus 로고    scopus 로고
    • A Survey of Trust in Internet Applications
    • T. Grandison and M. Sloman, "A Survey of Trust in Internet Applications," IEEE Comm. Surveys & Tutorials, vol. 3, no. 4, 2000, pp. 2-16.
    • (2000) IEEE Comm. Surveys & Tutorials , vol.3 , Issue.4 , pp. 2-16
    • Grandison, T.1    Sloman, M.2
  • 7
    • 85008030215 scopus 로고    scopus 로고
    • State Machines
    • D. Thomas and A. Hunt, "State Machines," IEEE Software, vol. 19, no. 6, 2002, pp. 10-12.
    • (2002) IEEE Software , vol.19 , Issue.6 , pp. 10-12
    • Thomas, D.1    Hunt, A.2
  • 8
    • 1142309815 scopus 로고    scopus 로고
    • Provisions and Obligations in Policy Management and Security Applications
    • Morgan Kaufmann
    • C. Bettini et al., "Provisions and Obligations in Policy Management and Security Applications," Proc. 28th Conf. Very Large Data Bases (VLDB 02), Morgan Kaufmann, 2002, pp. 502-513.
    • (2002) Proc. 28th Conf. Very Large Data Bases (VLDB 02) , pp. 502-513
    • Bettini, C.1
  • 9
    • 1142273446 scopus 로고    scopus 로고
    • PFIRES: A Policy Framework for Information Security
    • J. Rees, S. Bandyopadhyay, and E. Spafford, "PFIRES: A Policy Framework for Information Security," Comm. ACM, vol. 46, no. 7, 2003, pp. 101-106.
    • (2003) Comm. ACM , vol.46 , Issue.7 , pp. 101-106
    • Rees, J.1    Bandyopadhyay, S.2    Spafford, E.3
  • 10
    • 0031699648 scopus 로고    scopus 로고
    • Workflow Evolution
    • F. Casati et al., "Workflow Evolution," Data and Knowledge Eng., vol. 24, no. 3, 1998, pp. 211-238.
    • (1998) Data and Knowledge Eng. , vol.24 , Issue.3 , pp. 211-238
    • Casati, F.1
  • 11
    • 1142297676 scopus 로고    scopus 로고
    • XML Key Management Specification (XKMS)
    • Mar.
    • W. Ford et al., "XML Key Management Specification (XKMS)," W3C note, Mar. 2001; www.w3.org/TR/xkms.
    • (2001) W3C Note
    • Ford, W.1
  • 12
    • 0037251267 scopus 로고    scopus 로고
    • The Self-Serv Environment for Web Services Composition
    • B. Benatallah, Q. Sheng, and M. Dumas, "The Self-Serv Environment for Web Services Composition," IEEE Internet Computing, vol. 7, no. 1, 2003, pp. 40-48.
    • (2003) IEEE Internet Computing , vol.7 , Issue.1 , pp. 40-48
    • Benatallah, B.1    Sheng, Q.2    Dumas, M.3
  • 13
    • 0036328418 scopus 로고    scopus 로고
    • Unraveling the Web Services Web: An Introduction to SOAP, WSDL, and UDDI
    • F. Curbera et al., "Unraveling the Web Services Web: An Introduction to SOAP, WSDL, and UDDI," IEEE Internet Computing, vol. 6, no. 2, 2002, pp. 86-93.
    • (2002) IEEE Internet Computing , vol.6 , Issue.2 , pp. 86-93
    • Curbera, F.1
  • 14
    • 0030086382 scopus 로고    scopus 로고
    • Role-Based Access Control Models
    • R. Sandhu et al., "Role-Based Access Control Models," Computer, vol. 29, no. 2, 1996, pp. 38-47.
    • (1996) Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.