메뉴 건너뛰기




Volumn , Issue , 2004, Pages 268-277

Verifying policy-based security for web services

Author keywords

Pi Calculus; Web Services; XML security

Indexed keywords

CRYPTOGRAPHY; DATA TRANSFER; FORMAL LANGUAGES; INFORMATION SERVICES; NETWORK PROTOCOLS; SEMANTICS; WORLD WIDE WEB; XML;

EID: 14844303360     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1030083.1030120     Document Type: Conference Paper
Times cited : (54)

References (24)
  • 2
    • 1442336684 scopus 로고    scopus 로고
    • A semantics for web services authentication
    • An extended version appears as Microsoft Research Technical Report MSR-TR-2003-83
    • K. Bhargavan, C. Fournet, and A. D. Gordon. A semantics for web services authentication. In 31st ACM Symposium on Principles of Programming Languages (POPL'04), pages 198-209, 2004. An extended version appears as Microsoft Research Technical Report MSR-TR-2003-83.
    • (2004) 31st ACM Symposium on Principles of Programming Languages (POPL'04) , pp. 198-209
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3
  • 3
    • 14844315856 scopus 로고    scopus 로고
    • Verifying policy-based security for web services
    • Microsoft Research
    • K. Bhargavan, C. Fournet, and A. D. Gordon. Verifying policy-based security for web services. Technical Report MSR-TR-2004-84, Microsoft Research, 2004.
    • (2004) Technical Report , vol.MSR-TR-2004-84
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3
  • 5
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on Prolog rules
    • IEEE Computer Society Press
    • B. Blanchet. An efficient cryptographic protocol verifier based on Prolog rules. In Proceedings of the 14th IEEE Computer Security Foundations Workshop, pages 82-96. IEEE Computer Society Press, 2001.
    • (2001) Proceedings of the 14th IEEE Computer Security Foundations Workshop , pp. 82-96
    • Blanchet, B.1
  • 6
    • 84958749546 scopus 로고    scopus 로고
    • From secrecy to authenticity in security protocols
    • Proceedings of the 9th International Static Analysis Symposium (SAS'02). Springer-Verlag
    • B. Blanchet. From secrecy to authenticity in security protocols. In Proceedings of the 9th International Static Analysis Symposium (SAS'02), volume 2477 of Lecture Notes in Computer Science, pages 342-359. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2477 , pp. 342-359
    • Blanchet, B.1
  • 11
  • 15
    • 14844329713 scopus 로고    scopus 로고
    • Microsoft Corporation. Web Services Enhancements (WSE) 2.0, 2004. At http://msdn.microsoft.com/webservices/building/wse/default.aspx.
    • (2004) Web Services Enhancements (WSE) 2.0
  • 16
    • 3042673595 scopus 로고    scopus 로고
    • Cryptographic protocol generation from CAPSL
    • SRI
    • F. Muller and J. Millen. Cryptographic protocol generation from CAPSL. Technical Report SRI-CSL-01-07, SRI, 2001.
    • (2001) Technical Report , vol.SRI-CSL-01-07
    • Muller, F.1    Millen, J.2
  • 18
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Commun. ACM, 21(12):993-999, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 19
    • 84958777572 scopus 로고    scopus 로고
    • AGVI - Automatic generation, verification, and implementation of security protocols
    • LNCS. Springer
    • A. Perrig, D. Song, and D. Phan. AGVI - automatic generation, verification, and implementation of security protocols. In 13th Conference on Computer Aided Verification (CAV), LNCS, pages 241-245. Springer, 2001.
    • (2001) 13th Conference on Computer Aided Verification (CAV) , pp. 241-245
    • Perrig, A.1    Song, D.2    Phan, D.3
  • 23
    • 9444277407 scopus 로고    scopus 로고
    • W3C Recommendation
    • W3C. SOAP Version 1.2, 2003. W3C Recommendation, at http://www.w3.org/TR/ soap12.
    • (2003) W3C. SOAP Version 1.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.