메뉴 건너뛰기




Volumn 39, Issue 1, 2004, Pages 198-209

A semantics for web services authentication

Author keywords

Applied Pi calculus; Web services; XML security

Indexed keywords

COMPUTER HARDWARE DESCRIPTION LANGUAGES; COMPUTER SIMULATION; CRYPTOGRAPHY; DIFFERENTIATION (CALCULUS); ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; FORMAL LANGUAGES; NETWORK PROTOCOLS; SECURITY OF DATA; SEMANTICS; XML;

EID: 1442336684     PISSN: 03621340     EISSN: None     Source Type: Journal    
DOI: 10.1145/982962.964018     Document Type: Conference Paper
Times cited : (20)

References (37)
  • 4
    • 1442308216 scopus 로고    scopus 로고
    • A semantics for web services authentication
    • Technical Report MSR-TR-2003-83, Microsoft Research
    • K. Bhargavan, C. Fournet, and A. D. Gordon. A semantics for web services authentication. Technical Report MSR-TR-2003-83, Microsoft Research, 2003.
    • (2003)
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3
  • 7
    • 1442332546 scopus 로고    scopus 로고
    • Canonical XML
    • W3C Recommendation
    • J. Boyer. Canonical XML, 2001. W3C Recommendation, http://www.w3.org/TR/2001/REC-xml-c14n-20010315/.
    • (2001)
    • Boyer, J.1
  • 10
    • 0033718532 scopus 로고    scopus 로고
    • TAPS: A first-order verifier for cryptographic protocols
    • IEEE Computer Society Press
    • E. Cohen. TAPS: A first-order verifier for cryptographic protocols. In 13th IEEE Computer Security Foundations Workshop, pages 144-158. IEEE Computer Society Press, 2000.
    • (2000) 13th IEEE Computer Security Foundations Workshop , pp. 144-158
    • Cohen, E.1
  • 11
    • 12844252596 scopus 로고    scopus 로고
    • W3C Recommendation
    • J. Cowan and R. Tobin. XML Information Set, 2001. W3C Recommendation, http://www.w3.org/TR/2001/REC-xml-infoset-20011204/
    • (2001) XML Information Set
    • Cowan, J.1    Tobin, R.2
  • 14
    • 0004035649 scopus 로고    scopus 로고
    • The TLS protocol: Version 1.0
    • RFC 2246
    • T. Dierks and C. Allen. The TLS protocol: Version 1.0, 1999. RFC 2246.
    • (1999)
    • Dierks, T.1    Allen, C.2
  • 15
  • 19
    • 0141863341 scopus 로고    scopus 로고
    • Authenticity by typing for security protocols
    • A. Gordon and A. Jeffrey. Authenticity by typing for security protocols. Journal of Computer Security, 11(4):451-521, 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.4 , pp. 451-521
    • Gordon, A.1    Jeffrey, A.2
  • 20
    • 0141998527 scopus 로고    scopus 로고
    • Validating a web service security abstraction by typing
    • A. Gordon and R. Pucella. Validating a web service security abstraction by typing. In ACM Workshop on XML Security 2002, pages 18-29, 2003.
    • (2003) ACM Workshop on XML Security 2002 , pp. 18-29
    • Gordon, A.1    Pucella, R.2
  • 22
    • 0028385109 scopus 로고
    • Three systems for cryptographic protocol analysis
    • R. Kemmerer, C. Meadows, and J. Millen. Three systems for cryptographic protocol analysis. Journal of Cryptology, 7(2):79-130, 1994.
    • (1994) Journal of Cryptology , vol.7 , Issue.2 , pp. 79-130
    • Kemmerer, R.1    Meadows, C.2    Millen, J.3
  • 23
    • 0003729341 scopus 로고    scopus 로고
    • HMAC: Keyed-hashing for message authentication
    • RFC 2104
    • H. Krawczyk, M. Bellare, and R. Canetti. HMAC: Keyed-hashing for message authentication, 1997. RFC 2104.
    • (1997)
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 25
    • 1442357061 scopus 로고    scopus 로고
    • Microsoft.net pet shop
    • Microsoft Corporation. Microsoft.NET Pet Shop, 2002. http://www.gotdotnet.com/team/compare/petshop.aspx.
    • (2002)
  • 26
    • 1442308215 scopus 로고    scopus 로고
    • Web services enhancements for microsoft.net
    • Dec.
    • Microsoft Corporation. Web Services Enhancements for Microsoft.NET, Dec. 2002. http://msdn.microsoft.com/webservices/building/wse/default.aspx.
    • (2002)
  • 28
    • 2642571009 scopus 로고    scopus 로고
    • Web services security: SOAP message security
    • Aug.
    • A. Nadalin, C. Kaler, P. Hallam-Baker, and R. Monzillo. Web Services Security: SOAP Message Security, Aug. 2003. Available from http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=wss.
    • (2003)
    • Nadalin, A.1    Kaler, C.2    Hallam-Baker, P.3    Monzillo, R.4
  • 29
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Commun. ACM, 21(12):993-999, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 30
    • 1442358010 scopus 로고    scopus 로고
    • Web services routing protocol (WS-routing)
    • October
    • H. F. Nielsen and S. Thatte. Web services routing protocol (WS-Routing). http://msdn.microsoft.com/library/en-us/dnglobspec/html/ws-routing.asp, October 2001.
    • (2001)
    • Nielsen, H.F.1    Thatte, S.2
  • 31
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.1
  • 33
    • 0024714097 scopus 로고
    • Integrating security in a large distributed system
    • M. Satyanarayanan. Integrating security in a large distributed system. ACM Trans. Comput. Syst., 7(3):247-280, 1989.
    • (1989) ACM Trans. Comput. Syst. , vol.7 , Issue.3 , pp. 247-280
    • Satyanarayanan, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.