메뉴 건너뛰기




Volumn 18, Issue , 2004, Pages 1499-1509

A framework for heterogeneous middleware security

Author keywords

Interoperability; Middleware; Role Based Access Control; Security; Trust Management; Web Services

Indexed keywords

ABSTRACTING; COMPUTER ARCHITECTURE; COMPUTER PROGRAMMING LANGUAGES; INTEROPERABILITY; PUBLIC KEY CRYPTOGRAPHY; PUBLIC POLICY; SECURITY OF DATA; SERVERS; SOCIETIES AND INSTITUTIONS; WORLD WIDE WEB;

EID: 12444260716     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (11)

References (29)
  • 4
    • 0003226048 scopus 로고    scopus 로고
    • The keynote trust-management system version 2
    • Sept.
    • M. Blaze et al. The keynote trust-management system version 2. Sept. 1999. Internet Request For Comments 2704.
    • (1999) Internet Request for Comments , vol.2704
    • Blaze, M.1
  • 5
    • 0001885557 scopus 로고    scopus 로고
    • The role of trust management in distributed system's security
    • Springer-Verlag Lecture Notes in Computer Science
    • M. Blaze et al, The role of trust management in distributed system's security. In Secure Internet Programming: Issues in Distributed and Mobile Object Systems. Springer-Verlag Lecture Notes in Computer Science, 1999.
    • (1999) Secure Internet Programming: Issues in Distributed and Mobile Object Systems
    • Blaze, M.1
  • 10
    • 0033295882 scopus 로고    scopus 로고
    • The nature of a useable PKI
    • C. M. Ellison. The nature of a useable PKI. Computer Networks, (31):823-830, 1999.
    • (1999) Computer Networks , Issue.31 , pp. 823-830
    • Ellison, C.M.1
  • 11
    • 12444292205 scopus 로고    scopus 로고
    • A kernelized architecture for multilevel secure application policies
    • Springer Verlag LNCS 1485
    • S. Foley. A kernelized architecture for multilevel secure application policies. In European Symposium on Research in Security and Privacy. Springer Verlag LNCS 1485, 1998.
    • (1998) European Symposium on Research in Security and Privacy
    • Foley, S.1
  • 12
    • 12444293847 scopus 로고    scopus 로고
    • Computational paradigms and protection
    • Cloudcroft, NM, USA. ACM Press
    • S. Foley and J. Morrison. Computational paradigms and protection. In ACM New Computer Security Paradigms, Cloudcroft, NM, USA, 2001. ACM Press.
    • (2001) ACM New Computer Security Paradigms
    • Foley, S.1    Morrison, J.2
  • 13
    • 12444288567 scopus 로고    scopus 로고
    • Supporting imprecise delegation in keynote using similarity measures
    • Copenhagen, November
    • S. N. Foley. Supporting imprecise delegation in keynote using similarity measures. In Proceedings of The Sixth Nordic Workshop on Secure IT Systems, pages 101-119, Copenhagen, November 2001.
    • (2001) Proceedings of the Sixth Nordic Workshop on Secure IT Systems , pp. 101-119
    • Foley, S.N.1
  • 17
  • 18
    • 12444310225 scopus 로고    scopus 로고
    • Using SPKI certificates for authorization in CORBA based distributed object-oriented systems
    • Kista, Sweden, November
    • T. Lampinen. Using SPKI certificates for authorization in CORBA based distributed object-oriented systems. In 4th Nordic Workshop on Secure IT systems (NordSec '99), pages 61-81, Kista, Sweden, November 1999.
    • (1999) 4th Nordic Workshop on Secure IT Systems (NordSec '99) , pp. 61-81
    • Lampinen, T.1
  • 19
    • 17444392993 scopus 로고
    • Abstracting process-to-process relations in concurrent object-oriented applications
    • Springer Verlag LNCS 821
    • C. Lopes and K. Lieberherr. Abstracting process-to-process relations in concurrent object-oriented applications. In European Conference on Object-Oriented Programming (ECOOP). Springer Verlag LNCS 821, 1994.
    • (1994) European Conference on Object-Oriented Programming (ECOOP)
    • Lopes, C.1    Lieberherr, K.2
  • 25
    • 0005311305 scopus 로고
    • Unified login with pluggable authentication modules (PAM)
    • Open Software Foundation, October
    • V. Samar and R. Schemers. Unified login with pluggable authentication modules (PAM). Request for Comments 86.0, Open Software Foundation, October 1995.
    • (1995) Request for Comments 86.0
    • Samar, V.1    Schemers, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.