-
1
-
-
0035035153
-
Mobile values, new names, and secure communication
-
M. Abadi, C. Fournet, Mobile values, new names, and secure communication, in: 28th ACM Symp. on Principles of Programming Languages (POPL'01), 2001, pp. 104-115.
-
(2001)
28th ACM Symp. on Principles of Programming Languages (POPL'01)
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
3
-
-
0033715532
-
Authentication primitives and their compilation
-
M. Abadi, C. Fournet, G. Gonthier, Authentication primitives and their compilation, in: 27th ACM Symp. on Principles of Programming Languages (POPL'00), 2000, pp. 302-315.
-
(2000)
27th ACM Symp. on Principles of Programming Languages (POPL'00)
, pp. 302-315
-
-
Abadi, M.1
Fournet, C.2
Gonthier, G.3
-
5
-
-
1442336684
-
A semantics for web services authentication
-
K. Bhargavan, C. Fournet, A.D. Gordon, A semantics for web services authentication, in: 31st ACM Symp. on Principles of Programming Languages (POPL'04), 2004, pp. 198-209.
-
(2004)
31st ACM Symp. on Principles of Programming Languages (POPL'04)
, pp. 198-209
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
-
6
-
-
1442308216
-
A semantics for web services authentication
-
Microsoft Research
-
K. Bhargavan, C. Fournet, A.D. Gordon, A semantics for web services authentication, Technical Report MSR-TR-2003-83, Microsoft Research, 2004.
-
(2004)
Technical Report
, vol.MSR-TR-2003-83
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
-
7
-
-
35048821943
-
TulaFale: A security tool for web services
-
Formal Methods for Components and Objects (FMCO'03) Springer, Berlin
-
K. Bhargavan, C. Fournet, A.D. Gordon, R. Pucella, TulaFale: a security tool for web services, in: Formal Methods for Components and Objects (FMCO'03), Lecture Notes in Computer Science, vol. 3188, Springer, Berlin, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3188
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
Pucella, R.4
-
8
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
IEEE Computer Society, Silver Spring, MD
-
B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, in: 14th IEEE Comput. Security Found. Workshop (CSFW-14), IEEE Computer Society, Silver Spring, MD, 2001, pp. 82-96.
-
(2001)
14th IEEE Comput. Security Found. Workshop (CSFW-14)
, pp. 82-96
-
-
Blanchet, B.1
-
9
-
-
0003357375
-
Simple object access protocol (SOAP) 1.1
-
D. Box, D. Ehnebuske, G. Kakivaya, A. Layman, N. Mendelsohn, H. Nielsen, S. Thatte, D. Winer, Simple Object Access Protocol (SOAP) 1.1, 2000, W3C Note, at http://www.w3.org/TR/2000/NOTE-SOAP-20000508/.
-
(2000)
W3C Note
-
-
Box, D.1
Ehnebuske, D.2
Kakivaya, G.3
Layman, A.4
Mendelsohn, N.5
Nielsen, H.6
Thatte, S.7
Winer, D.8
-
10
-
-
0347380526
-
Canonical XML
-
J. Boyer, Canonical XML, 2001, W3C Recommendation, at http://www.w3.org/TR/2001/REC-xml-c14n-20010315/.
-
(2001)
W3C Recommendation
-
-
Boyer, J.1
-
13
-
-
0033718532
-
TAPS: A first-order verifier for cryptographic protocols
-
IEEE Computer Society Press, Silver Spring, MD
-
E. Cohen, TAPS: a first-order verifier for cryptographic protocols, in: 13th IEEE Comput. Security Found. Workshop; IEEE Computer Society Press, Silver Spring, MD, 2000, pp. 144-158.
-
(2000)
13th IEEE Comput. Security Found. Workshop
, pp. 144-158
-
-
Cohen, E.1
-
14
-
-
0141977708
-
XML information set
-
J. Cowan, R. Tobin, XML Information Set, 2001, W3C Recommendation, at http://www.w3.org/TR/2001/REC-xml-infoset-20011024/.
-
(2001)
W3C Recommendation
-
-
Cowan, J.1
Tobin, R.2
-
15
-
-
0141908648
-
Securing SOAP e-services
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati Securing SOAP e-services Internat. J. Inform. Security 1 2 2002 100 115
-
(2002)
Internat. J. Inform. Security
, vol.1
, Issue.2
, pp. 100-115
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
16
-
-
0141998523
-
Towards securing XML web services
-
E. Damiani, S. De Capitani di Vimercati, P. Samarati, Towards securing XML web services, in: ACM Workshop on XML Security 2002, 2003, pp. 90-96.
-
(2003)
ACM Workshop on XML Security 2002
, pp. 90-96
-
-
Damiani, E.1
De Vimercati Di Capitani, S.2
Samarati, P.3
-
17
-
-
0003286492
-
The TLS protocol: Version 1.0
-
T. Dierks, C. Allen, The TLS protocol: Version 1.0, 1999, RFC 2246.
-
(1999)
RFC
, vol.2246
-
-
Dierks, T.1
Allen, C.2
-
18
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev, and A.C. Yao On the security of public key protocols IEEE Trans. Inform. Theory IT-29 2 1983 198 208
-
(1983)
IEEE Trans. Inform. Theory
, vol.IT-29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
19
-
-
1442357062
-
US secure hash algorithm 1
-
D. Eastlake, P. Jones, US Secure Hash Algorithm 1 (SHA1), 2001, RFC 3174.
-
(2001)
RFC
, vol.3174
-
-
Eastlake, D.1
Jones, P.2
-
20
-
-
0141977707
-
XML-signature syntax and processing
-
D. Eastlake, J. Reagle, D. Solo, M. Bartel, J. Boyer, B. Fox, B. LaMacchia, E. Simon, XML-Signature Syntax and Processing, 2002, W3C Recommendation, at http://www.w3.org/TR/2002/REC-xmldsig-core-20020212/.
-
(2002)
W3C Recommendation
-
-
Eastlake, D.1
Reagle, J.2
Solo, D.3
Bartel, M.4
Boyer, J.5
Fox, B.6
Lamacchia, B.7
Simon, E.8
-
22
-
-
0141863341
-
Authenticity by typing for security protocols
-
A.D. Gordon, and A. Jeffrey Authenticity by typing for security protocols J. Comput. Security 11 4 2003 451 521
-
(2003)
J. Comput. Security
, vol.11
, Issue.4
, pp. 451-521
-
-
Gordon, A.D.1
Jeffrey, A.2
-
24
-
-
2442476755
-
Public-key cryptography standards (PKCS) #1: RSA cryptography specifications version 2.1
-
J. Jonsson, B. Kaliski, Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1, 2003, RFC 3447.
-
(2003)
RFC
, vol.3447
-
-
Jonsson, J.1
Kaliski, B.2
-
25
-
-
0028385109
-
Three systems for cryptographic protocol analysis
-
R. Kemmerer, C. Meadows, and J. Millen Three systems for cryptographic protocol analysis J. Cryptol. 7 2 1994 79 130
-
(1994)
J. Cryptol.
, vol.7
, Issue.2
, pp. 79-130
-
-
Kemmerer, R.1
Meadows, C.2
Millen, J.3
-
26
-
-
0003196107
-
HMAC: Keyed-hashing for message authentication
-
H. Krawczyk, M. Bellare, R. Canetti, HMAC: keyed-hashing for message authentication, 1997, RFC 2104.
-
(1997)
RFC
, vol.2104
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
27
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR
-
Tools and Algorithms for the Construction and Analysis of Systems Springer, Berlin
-
G. Lowe, Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR, in: Tools and Algorithms for the Construction and Analysis of Systems, Lecture Notes in Computer Science, Vol. 1055, Springer, Berlin, 1996, pp. 147-166.
-
(1996)
Lecture Notes in Computer Science
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
28
-
-
0030708255
-
A hierarchy of authentication specifications
-
IEEE Computer Society Press, Silver Spring, MD, 1997
-
G. Lowe, A hierarchy of authentication specifications, in: Proc. 10th IEEE Comput. Security Found. Workshop, 1997, IEEE Computer Society Press, Silver Spring, MD, 1997, pp. 31-44.
-
(1997)
Proc. 10th IEEE Comput. Security Found. Workshop
, pp. 31-44
-
-
Lowe, G.1
-
29
-
-
1442357061
-
-
Microsoft Corporation, Microsoft. NET Pet Shop, 2002, at http://www.gotdotnet.com/team/compare/petshop.aspx.
-
(2002)
Microsoft. NET Pet Shop
-
-
-
30
-
-
1442308215
-
-
December
-
Microsoft Corporation, Web Services Enhancements for Microsoft. NET, December 2002, at http://msdn.microsoft.com/webservices/building/wse/default. aspx.
-
(2002)
Web Services Enhancements for Microsoft. NET
-
-
-
32
-
-
21244462147
-
-
(WS-Security 2004), March
-
A. Nadalin, C. Kaler, P. Hallam-Baker, R. Monzillo, OASIS Web Services Security: SOAP Message Security 1.0 (WS-Security 2004), March 2004, at http://www.oasis-open.org/committees/download.php/5941/oasis-200401-wss- soap-message-security-1.0.pdf.
-
(2004)
OASIS Web Services Security: SOAP Message Security 1.0
-
-
Nadalin, A.1
Kaler, C.2
Hallam-Baker, P.3
Monzillo, R.4
-
33
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R.M. Needham, and M.D. Schroeder Using encryption for authentication in large networks of computers Comm. Assoc. Comput. Mach. 21 12 1978 993 999
-
(1978)
Comm. Assoc. Comput. Mach.
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
35
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L.C. Paulson The inductive approach to verifying cryptographic protocols J. Comput. Security 6 1998 85 128
-
(1998)
J. Comput. Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
37
-
-
0024714097
-
Integrating security in a large distributed system
-
M. Satyanarayanan Integrating security in a large distributed system ACM Trans. Comput. Systems 7 3 1989 247 280
-
(1989)
ACM Trans. Comput. Systems
, vol.7
, Issue.3
, pp. 247-280
-
-
Satyanarayanan, M.1
-
40
-
-
0029697576
-
Secure network objects
-
L. van Doorn, M. Abadi, M. Burrows, E. Wobber, Secure network objects, in: IEEE Comput. Soc. Symp. on Research in Security and Privacy, 1996, pp. 211-221.
-
(1996)
IEEE Comput. Soc. Symp. on Research in Security and Privacy
, pp. 211-221
-
-
Van Doorn, L.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
41
-
-
1142277649
-
Web services are not distributed objects
-
W. Vogels Web services are not distributed objects IEEE Internet Comput. 7 6 2003 59 66
-
(2003)
IEEE Internet Comput.
, vol.7
, Issue.6
, pp. 59-66
-
-
Vogels, W.1
|