메뉴 건너뛰기




Volumn 19, Issue 3-4, 2000, Pages 212-221

Distributed component software security issues on deploying a secure electronic marketplace

Author keywords

Computer architectures; Computer software; Distributed data processing; Electronic funds transfer; Security

Indexed keywords


EID: 1642287672     PISSN: 15271161     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (1)

References (25)
  • 4
    • 6744229721 scopus 로고    scopus 로고
    • CORBA (1998b), Internet Inter-ORB Protocol v2.2, available at 〈ftp://ftp.omg.org/pub/docs/formal/98-07-01.pdf〉
    • (1998) Internet Inter-ORB Protocol V2.2
  • 5
    • 6744222776 scopus 로고    scopus 로고
    • CORBA (1998c), Security Services Specification, available at 〈ftp://ftp.omg.org/pub/docs/ptc/98-01-02.pdf〉
    • (1998) Security Services Specification
  • 6
    • 6744222775 scopus 로고    scopus 로고
    • COM security in practice
    • Dulepet, R. (1998), "COM security in practice" Microsoft Developer's Network Library, available at 〈http:// premium.microsoft.com/msdn/library/techart/ msdn_practicom.htm〉
    • (1998) Microsoft Developer's Network Library
    • Dulepet, R.1
  • 8
    • 0004256091 scopus 로고    scopus 로고
    • John Wiley & Sons, New York, NY.
    • Gollmann, D. (1999), Computer Security, John Wiley & Sons, New York, NY.
    • (1999) Computer Security
    • Gollmann, D.1
  • 9
    • 0030674187 scopus 로고    scopus 로고
    • New security architectural directions for Java
    • Gong, L. (1997), "New security architectural directions for Java", Proceedings of IEEE COMPCON.
    • (1997) Proceedings of IEEE COMPCON
    • Gong, L.1
  • 12
    • 0030265092 scopus 로고    scopus 로고
    • Towards a formal system-to-system authentication protocol
    • Elsevier
    • Gritzalis, D. and Katsikas, S. (1996), "Towards a formal system-to-system authentication protocol", Computer Communications, Vol. 19, Elsevier, pp. 954-61.
    • (1996) Computer Communications , vol.19 , pp. 954-961
    • Gritzalis, D.1    Katsikas, S.2
  • 14
    • 33748739286 scopus 로고    scopus 로고
    • Iona Information (1998), Orbix Home found at 〈http:// www.iona.com/info/orbixhome.html〉
    • (1998) Orbix Home
  • 15
    • 0003547217 scopus 로고    scopus 로고
    • Java Security (1998), available at 〈http://www-swiss.ai.mit.edu/∼jbank/javapaper/javapaper.html〉
    • (1998) Java Security
  • 16
    • 0003996705 scopus 로고    scopus 로고
    • Microsoft Corp. (1996), "DCOM Technical Overview", available at 〈http://www. microsoft.com/windows/downloads/bin/nts/ dcomtec.exe〉
    • (1996) DCOM Technical Overview
  • 17
    • 33748719028 scopus 로고    scopus 로고
    • Object Management Group (OMG) (1999), available at 〈http://www.omg.org〉
    • (1999)
  • 18
    • 33748736459 scopus 로고    scopus 로고
    • RMI Specification (1997a), available at 〈http:// www.javasoft.com/products/jdk/1.1/docs/guide/rmi/ spec/rmiTOC.doc.html〉
    • (1997)
  • 19
    • 33748737105 scopus 로고    scopus 로고
    • RMI Tutorial (1997b), available at 〈http:// www.javasoft.com/docs/books/tutorial/rmi/ index.html〉
    • (1997)
  • 20
    • 0003613518 scopus 로고    scopus 로고
    • Microsoft Press, Redwood, WA
    • Rogerson, D. (1997), Inside COM, Microsoft Press, Redwood, WA.
    • (1997) Inside COM
    • Rogerson, D.1
  • 21
    • 0003168891 scopus 로고    scopus 로고
    • Security requirements, risks, and recommendations for small enterprise and home-office environments
    • Spinellis, D., Kokolakis, S. and Gritzalis, S. (1999), "Security requirements, risks, and recommendations for small enterprise and home-office environments", Information Management and Computer Security, Vol. 7 No. 3, pp. 121-8.
    • (1999) Information Management and Computer Security , vol.7 , Issue.3 , pp. 121-128
    • Spinellis, D.1    Kokolakis, S.2    Gritzalis, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.