메뉴 건너뛰기




Volumn 56, Issue 3, 2005, Pages 283-298

Trust-based secure information sharing between federal government agencies

Author keywords

[No Author keywords available]

Indexed keywords

E-AUTHENTICATION; FEDERAL GOVERNMENT AGENCIES; INFORMATION SHARING; WEB SERVICES;

EID: 13844255241     PISSN: 15322882     EISSN: None     Source Type: Journal    
DOI: 10.1002/asi.20117     Document Type: Article
Times cited : (35)

References (52)
  • 1
    • 1142303699 scopus 로고    scopus 로고
    • Information sharing across private databases
    • A. Y. Halevy, Z. G. Ives, & A. Doan (Eds.), New York: ACM
    • Agrawal, R., Evfimievski, A., & Srikant, R. (2003). Information sharing across private databases. In A. Y. Halevy, Z. G. Ives, & A. Doan (Eds.), Proceedings of the ACM SIGMOD Data 2003 (pp. 86-97). New York: ACM.
    • (2003) Proceedings of the ACM SIGMOD Data 2003 , pp. 86-97
    • Agrawal, R.1    Evfimievski, A.2    Srikant, R.3
  • 3
    • 13844257876 scopus 로고    scopus 로고
    • A trusted third-party computation service
    • Cambridge, MA: MIT
    • Ajmani, S., Morris R., & Liskov, B. (2001). A trusted third-party computation service (Technical report MIT-LCS-TR-847). Cambridge, MA: MIT.
    • (2001) Technical Report , vol.MIT-LCS-TR-847
    • Ajmani, S.1    Morris, R.2    Liskov, B.3
  • 6
    • 84860091323 scopus 로고    scopus 로고
    • InfoWorld. Retrieved July 27, 2003
    • April, C.A., & Fonseca, B. (2002). Monumental mission. InfoWorld. Retrieved July 27, 2003, from http://www.infoworld.com/article/02/09/06/ 020909ctgovt_l.html
    • (2002) Monumental Mission
    • April, C.A.1    Fonseca, B.2
  • 21
    • 84860077330 scopus 로고    scopus 로고
    • Microsoft Corporation. Retrieved July 27, 2003
    • Ewald, T. (2002). The web services idea. Microsoft Corporation. Retrieved July 27, 2003, from http://msdn.microsoft.com/webservices/understanding/readme/ default.aspx
    • (2002) The Web Services Idea
    • Ewald, T.1
  • 22
    • 2342534635 scopus 로고    scopus 로고
    • FEA Working Group. Retrieved July 17, 2003
    • Federal CIO Council. (2002). E-gov enterprise architecture guidance (common reference model). FEA Working Group. Retrieved July 17, 2003, from http://www.cio.gov/documents/E-Gov_Guidance_July_25_Final_Draft_2_Oa.pdf
    • (2002) E-gov Enterprise Architecture Guidance (Common Reference Model)
  • 23
    • 12344266325 scopus 로고    scopus 로고
    • Federal Architecture Program Management Office
    • Federal Enterprise Architecture Program Management Office. (2002a). The business reference model version 1.0: A foundation for government wide improvement. Federal Architecture Program Management Office. Retrieved from http://www.feapmo.gov/resources/fea_brm_release_document_rev_l.pdf
    • (2002) The Business Reference Model Version 1.0: A Foundation for Government Wide Improvement
  • 24
    • 12344266325 scopus 로고    scopus 로고
    • Federal Architecture Program Management Office. Retrieved July 27, 2003
    • Federal Enterprise Architecture Program Management Office. (2002b). The business reference model version 1.0: Agency Briefing. Federal Architecture Program Management Office. Retrieved July 27, 2003, from http://www.feapmo.gov/ fea_downloads.htm
    • (2002) The Business Reference Model Version 1.0: Agency Briefing
  • 25
    • 84860079977 scopus 로고    scopus 로고
    • Federal Architecture Program Management Office. Retrieved July 27, 2003
    • Federal Enterprise Architecture Program Management Office. (2002c). Draft business reference model common response document. Federal Architecture Program Management Office. Retrieved July 27, 2003, from http://www.feapmo.gov/ fea_downloads.htm
    • (2002) Draft Business Reference Model Common Response Document
  • 26
    • 84860077164 scopus 로고    scopus 로고
    • Federal Architecture Program Management Office. Retrieved July 27, 2003
    • Federal Enterprise Architecture Program Management Office. (2002d). Solution architects working group: Overview of missions and objectives. Federal Architecture Program Management Office. Retrieved July 27, 2003, from http://xml.gov/presentations/sawg/overview.ppt
    • (2002) Solution Architects Working Group: Overview of Missions and Objectives
  • 27
    • 84860091726 scopus 로고    scopus 로고
    • Federal Architecture Program Management Office. Retrieved July 27, 2003
    • Federal Enterprise Architecture Program Management Office. (2002e). Twenty four presidential priority e-govt initiatives. Federal Architecture Program Management Office. Retrieved July 27, 2003, from http://www.feapmo.gov/ fea.htm
    • (2002) Twenty Four Presidential Priority E-govt Initiatives
  • 29
    • 13844303998 scopus 로고    scopus 로고
    • CIA, FBI wrangle over threat center
    • Retrieved July 27, 2003
    • French, M. (2003). CIA, FBI wrangle over threat center. Federal Computer Week. Retrieved July 27, 2003, from http://www.fcw.com/fcw/articles/2003/0421/ web-ciafbi-04-23-03.asp
    • (2003) Federal Computer Week.
    • French, M.1
  • 37
    • 84860091516 scopus 로고    scopus 로고
    • Federal Computer Incident Response Center. Retrieved July 27, 2003
    • Jarrell, D. (2002) The value of information sharing. Federal Computer Incident Response Center. Retrieved July 27, 2003, from http://www.fed-circ.gov
    • (2002) The Value of Information Sharing
    • Jarrell, D.1
  • 38
    • 84955565977 scopus 로고
    • A proposed architecture for trusted third party services
    • E. Dawson & J. O. Golie (Eds.), Cryptography Policy and Algorithms Conference. Heidelberg, Germany: Springer
    • Jefferies, N., Mitchell, C., & Walker, M. (1995). A proposed architecture for trusted third party services. In E. Dawson & J. O. Golie (Eds.), Cryptography Policy and Algorithms Conference. Springer LNCS (Vol. 1029, pp. 98-104). Heidelberg, Germany: Springer.
    • (1995) Springer LNCS , vol.1029 , pp. 98-104
    • Jefferies, N.1    Mitchell, C.2    Walker, M.3
  • 39
    • 84949942881 scopus 로고    scopus 로고
    • The right type of trust for distributed systems
    • T. Haigh, B. Blakey, M. E. Zurbo, & C. Meadows (Eds.), ACM. New York: ACM
    • Josang, A. (1996). The right type of trust for distributed systems. In T. Haigh, B. Blakey, M. E. Zurbo, & C. Meadows (Eds.), the Proceedings of New Security Paradigm Workshop, ACM. New York: ACM.
    • (1996) The Proceedings of New Security Paradigm Workshop
    • Josang, A.1
  • 40
    • 36649033444 scopus 로고    scopus 로고
    • An algebra for assessing trust in certification chains
    • S. Kent & G. Tsudik (Eds.), Reston, VA: The Internet Society
    • Josang, A. (1999). An algebra for assessing trust in certification chains. In S. Kent & G. Tsudik (Eds.), The Proceedings of Network and Distributed Systems Security Symposium. Reston, VA: The Internet Society.
    • (1999) The Proceedings of Network and Distributed Systems Security Symposium
    • Josang, A.1
  • 41
    • 0242624675 scopus 로고    scopus 로고
    • A reputation-based trust model for peer-to-peer e-commerce communities
    • New York: ACM
    • Liu, L., & Xiong, L. (2003). A reputation-based trust model for peer-to-peer e-commerce communities. In the Proceedings of 4th ACM Conference on Electronic Commerce (pp. 228-229). New York: ACM.
    • (2003) The Proceedings of 4th ACM Conference on Electronic Commerce , pp. 228-229
    • Liu, L.1    Xiong, L.2
  • 44
    • 84898266558 scopus 로고    scopus 로고
    • The Open Group. Retrieved July 27, 2003
    • Open Resource Group. (1999). Technical reference model in detail. The Open Group. Retrieved July 27, 2003, from http://www.opengroup.org/architecture/ togaf7/presents/togaf_ovu.pdf
    • (1999) Technical Reference Model in Detail
  • 45
    • 0036887434 scopus 로고    scopus 로고
    • Integrating role graphs: A tool for security integration
    • Osborn, S.L. (2002). Integrating role graphs: A tool for security integration. Data and Knowledge Engineering, 43(3), 317-333.
    • (2002) Data and Knowledge Engineering , vol.43 , Issue.3 , pp. 317-333
    • Osborn, S.L.1
  • 46
    • 85056545124 scopus 로고    scopus 로고
    • Limiting the disclosure of access control policies during automated trust negotiation
    • February. Paper presented at the San Diego, CA
    • Seamons, K.E., Winslett, M., & Yu, T. (2001, February). Limiting the disclosure of access control policies during automated trust negotiation. Paper presented at the Network and Distributed System Security Symposium, San Diego, CA.
    • (2001) Network and Distributed System Security Symposium
    • Seamons, K.E.1    Winslett, M.2    Yu, T.3
  • 47
    • 84860075362 scopus 로고    scopus 로고
    • Understanding XML namespaces. DevelopMentor. Retrieved July 27, 2003
    • Skonnard, A. (2002). Understanding XML namespaces. DevelopMentor. Retrieved July 27, 2003, from http://msdn.microsoft.com/msdnmag/issues/01/07/ xml/default.aspx
    • (2002)
    • Skonnard, A.1
  • 48
    • 0002688881 scopus 로고    scopus 로고
    • Atomicity versus anonymity: Distributed transactions for electronic commerce
    • August. Paper presented at the New York
    • Tygar, J.D. (1998, August). Atomicity versus anonymity: Distributed transactions for electronic commerce. Paper presented at the 24th VLDB Conference, New York.
    • (1998) 24th VLDB Conference
    • Tygar, J.D.1
  • 49
    • 84860091848 scopus 로고    scopus 로고
    • An insider's look at homeland security and technology
    • Retrieved July 27, 2003
    • Utanoff, L. (2002). An insider's look at homeland security and technology. PC Magazine. Retrieved July 27, 2003, from http://www.pcmag.com/ articled0,4149,652467,00.asp
    • (2002) PC Magazine
    • Utanoff, L.1
  • 50
    • 6344247257 scopus 로고    scopus 로고
    • Microsoft Corporation. Retrieved July 27, 2003
    • Wolter, R. (2001). XML web services basics. Microsoft Corporation. Retrieved July 27, 2003, from http://msdn.microsoft.com/library/default.asp?url= /library/enus/dnwebsrv/html/webservbasics.asp
    • (2001) XML Web Services Basics
    • Wolter, R.1
  • 51
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • October. Paper presented at the Toronto, Canada
    • Yao, A.C. (1986, October). How to generate and exchange secrets. Paper presented at the 27th Annual Symposium on Foundations of Computer Science, Toronto, Canada.
    • (1986) 27th Annual Symposium on Foundations of Computer Science
    • Yao, A.C.1
  • 52
    • 84860080307 scopus 로고    scopus 로고
    • Battling the cyberthreat
    • Retrieved July 27, 2003
    • York, S. (1997). Battling the cyberthreat. Wabash Magazine. Retrieved July 27, 2003, from http://www.wabash.edu/magazine/1997/fall/features/ face_of_conflict/cyber_threat.htm
    • (1997) Wabash Magazine
    • York, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.