-
2
-
-
1442336684
-
A semantics for web services authentication
-
An extended version appears as Microsoft Research Technical Report MSR-TR-2003-83
-
K. Bhargavan, C. Fournet, and A. D. Gordon. A semantics for web services authentication. In 31st ACM Symposium on Principles of Programming Languages (POPL'04), pages 198-209, 2004. An extended version appears as Microsoft Research Technical Report MSR-TR-2003-83.
-
(2004)
31st ACM Symposium on Principles of Programming Languages (POPL'04)
, pp. 198-209
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
-
3
-
-
14844315856
-
Verifying policy-based security for web services
-
Microsoft Research
-
K. Bhargavan, C. Fournet, and A. D. Gordon. Verifying policy-based security for web services. Technical Report MSR-TR-2004-84, Microsoft Research, 2004.
-
(2004)
Technical Report
, vol.MSR-TR-2004-84
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
-
5
-
-
0034822279
-
An efficient cryptographic protocol verifier based on Prolog rules
-
IEEE Computer Society Press
-
B. Blanchet. An efficient cryptographic protocol verifier based on Prolog rules. In Proceedings of the 14th IEEE Computer Security Foundations Workshop, pages 82-96. IEEE Computer Society Press, 2001.
-
(2001)
Proceedings of the 14th IEEE Computer Security Foundations Workshop
, pp. 82-96
-
-
Blanchet, B.1
-
6
-
-
84958749546
-
From secrecy to authenticity in security protocols
-
Proceedings of the 9th International Static Analysis Symposium (SAS'02). Springer-Verlag
-
B. Blanchet. From secrecy to authenticity in security protocols. In Proceedings of the 9th International Static Analysis Symposium (SAS'02), volume 2477 of Lecture Notes in Computer Science, pages 342-359. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2477
, pp. 342-359
-
-
Blanchet, B.1
-
8
-
-
4544279898
-
-
May
-
D. Box, F. Curbera, M. Hondo, C. Kaler, D. Langworthy, A. Nadalin, N. Nagaratnam, M. Nottingham, C. von Riegen, and J. Shewchuk. Web services policy framework (WS-Policy), May 2003.
-
(2003)
Web Services Policy Framework (WS-Policy)
-
-
Box, D.1
Curbera, F.2
Hondo, M.3
Kaler, C.4
Langworthy, D.5
Nadalin, A.6
Nagaratnam, N.7
Nottingham, M.8
Von Riegen, C.9
Shewchuk, J.10
-
9
-
-
4544335903
-
-
May
-
D. Box, M. Hondo, C. Kaler, H. Maruyama, A. Nadalin, N. Nagaratnam, P. Patrick, C. von Riegen, and J. Shewchuk. Web services policy assertions language (WS-Policy Assertions), May 2003.
-
(2003)
Web Services Policy Assertions Language (WS-Policy Assertions)
-
-
Box, D.1
Hondo, M.2
Kaler, C.3
Maruyama, H.4
Nadalin, A.5
Nagaratnam, N.6
Patrick, P.7
Von Riegen, C.8
Shewchuk, J.9
-
10
-
-
4544323391
-
-
Dec.
-
G. Della-Libera, P. Hallam-Baker, M. Hondo, T. Janczuk, C. Kaler, H. Maruyama, N. Nagaratnam, A. Nash, R. Philpott, H. Prafullchandra, J. Shewchuk, E. Waingold, and R. Zolfonoon. Web services security policy language (WS-SecurityPolicy), Dec. 2002.
-
(2002)
Web Services Security Policy Language (WS-SecurityPolicy)
-
-
Della-Libera, G.1
Hallam-Baker, P.2
Hondo, M.3
Janczuk, T.4
Kaler, C.5
Maruyama, H.6
Nagaratnam, N.7
Nash, A.8
Philpott, R.9
Prafullchandra, H.10
Shewchuk, J.11
Waingold, E.12
Zolfonoon, R.13
-
15
-
-
14844329713
-
-
Microsoft Corporation. Web Services Enhancements (WSE) 2.0, 2004. At http://msdn.microsoft.com/webservices/building/wse/default.aspx.
-
(2004)
Web Services Enhancements (WSE) 2.0
-
-
-
16
-
-
3042673595
-
Cryptographic protocol generation from CAPSL
-
SRI
-
F. Muller and J. Millen. Cryptographic protocol generation from CAPSL. Technical Report SRI-CSL-01-07, SRI, 2001.
-
(2001)
Technical Report
, vol.SRI-CSL-01-07
-
-
Muller, F.1
Millen, J.2
-
18
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Commun. ACM, 21(12):993-999, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
19
-
-
84958777572
-
AGVI - Automatic generation, verification, and implementation of security protocols
-
LNCS. Springer
-
A. Perrig, D. Song, and D. Phan. AGVI - automatic generation, verification, and implementation of security protocols. In 13th Conference on Computer Aided Verification (CAV), LNCS, pages 241-245. Springer, 2001.
-
(2001)
13th Conference on Computer Aided Verification (CAV)
, pp. 241-245
-
-
Perrig, A.1
Song, D.2
Phan, D.3
-
20
-
-
3042621964
-
Spi2Java: Automatic cryptographic protocol Java code generation from spi calculus
-
D. Pozza, R. Sisto, and L. Durante. Spi2Java: automatic cryptographic protocol Java code generation from spi calculus. In 18th International Conference on Advanced Information Networking and Applications (AINA 2004), volume 1, pages 400-405, 2004.
-
(2004)
18th International Conference on Advanced Information Networking and Applications (AINA 2004)
, vol.1
, pp. 400-405
-
-
Pozza, D.1
Sisto, R.2
Durante, L.3
-
23
-
-
9444277407
-
-
W3C Recommendation
-
W3C. SOAP Version 1.2, 2003. W3C Recommendation, at http://www.w3.org/TR/ soap12.
-
(2003)
W3C. SOAP Version 1.2
-
-
-
24
-
-
0038825029
-
Using replication and partitioning to build secure distributed systems
-
L. Zheng, S. Chong, A. C. Myers, and S. Zdancewic. Using replication and partitioning to build secure distributed systems. In IEEE Computer Society Symposium on Research in Security and Privacy, pages 236-250, 2003.
-
(2003)
IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 236-250
-
-
Zheng, L.1
Chong, S.2
Myers, A.C.3
Zdancewic, S.4
|