메뉴 건너뛰기




Volumn 340, Issue 1, 2005, Pages 102-153

A semantics for web services authentication

Author keywords

Applied pi calculus; Web services; XML security

Indexed keywords

ABSTRACTING; CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; MATHEMATICAL MODELS; NETWORK PROTOCOLS; SECURITY OF DATA; SEMANTICS; XML;

EID: 18544363572     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.tcs.2005.03.005     Document Type: Article
Times cited : (23)

References (42)
  • 2
    • 4043116941 scopus 로고    scopus 로고
    • Private authentication
    • M. Abadi, C. Fournet, Private authentication, Theoret. Comput. Sci. 322 (3) (2004) 427-476.
    • (2004) Theoret. Comput. Sci. , vol.322 , Issue.3 , pp. 427-476
    • Abadi, M.1    Fournet, C.2
  • 6
    • 1442308216 scopus 로고    scopus 로고
    • A semantics for web services authentication
    • Microsoft Research
    • K. Bhargavan, C. Fournet, A.D. Gordon, A semantics for web services authentication, Technical Report MSR-TR-2003-83, Microsoft Research, 2004.
    • (2004) Technical Report , vol.MSR-TR-2003-83
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3
  • 7
    • 35048821943 scopus 로고    scopus 로고
    • TulaFale: A security tool for web services
    • Formal Methods for Components and Objects (FMCO'03) Springer, Berlin
    • K. Bhargavan, C. Fournet, A.D. Gordon, R. Pucella, TulaFale: a security tool for web services, in: Formal Methods for Components and Objects (FMCO'03), Lecture Notes in Computer Science, vol. 3188, Springer, Berlin, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3188
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3    Pucella, R.4
  • 8
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • IEEE Computer Society, Silver Spring, MD
    • B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, in: 14th IEEE Comput. Security Found. Workshop (CSFW-14), IEEE Computer Society, Silver Spring, MD, 2001, pp. 82-96.
    • (2001) 14th IEEE Comput. Security Found. Workshop (CSFW-14) , pp. 82-96
    • Blanchet, B.1
  • 10
    • 0347380526 scopus 로고    scopus 로고
    • Canonical XML
    • J. Boyer, Canonical XML, 2001, W3C Recommendation, at http://www.w3.org/TR/2001/REC-xml-c14n-20010315/.
    • (2001) W3C Recommendation
    • Boyer, J.1
  • 13
    • 0033718532 scopus 로고    scopus 로고
    • TAPS: A first-order verifier for cryptographic protocols
    • IEEE Computer Society Press, Silver Spring, MD
    • E. Cohen, TAPS: a first-order verifier for cryptographic protocols, in: 13th IEEE Comput. Security Found. Workshop; IEEE Computer Society Press, Silver Spring, MD, 2000, pp. 144-158.
    • (2000) 13th IEEE Comput. Security Found. Workshop , pp. 144-158
    • Cohen, E.1
  • 14
    • 0141977708 scopus 로고    scopus 로고
    • XML information set
    • J. Cowan, R. Tobin, XML Information Set, 2001, W3C Recommendation, at http://www.w3.org/TR/2001/REC-xml-infoset-20011024/.
    • (2001) W3C Recommendation
    • Cowan, J.1    Tobin, R.2
  • 17
    • 0003286492 scopus 로고    scopus 로고
    • The TLS protocol: Version 1.0
    • T. Dierks, C. Allen, The TLS protocol: Version 1.0, 1999, RFC 2246.
    • (1999) RFC , vol.2246
    • Dierks, T.1    Allen, C.2
  • 18
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • D. Dolev, and A.C. Yao On the security of public key protocols IEEE Trans. Inform. Theory IT-29 2 1983 198 208
    • (1983) IEEE Trans. Inform. Theory , vol.IT-29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 19
    • 1442357062 scopus 로고    scopus 로고
    • US secure hash algorithm 1
    • D. Eastlake, P. Jones, US Secure Hash Algorithm 1 (SHA1), 2001, RFC 3174.
    • (2001) RFC , vol.3174
    • Eastlake, D.1    Jones, P.2
  • 21
  • 22
    • 0141863341 scopus 로고    scopus 로고
    • Authenticity by typing for security protocols
    • A.D. Gordon, and A. Jeffrey Authenticity by typing for security protocols J. Comput. Security 11 4 2003 451 521
    • (2003) J. Comput. Security , vol.11 , Issue.4 , pp. 451-521
    • Gordon, A.D.1    Jeffrey, A.2
  • 23
  • 24
    • 2442476755 scopus 로고    scopus 로고
    • Public-key cryptography standards (PKCS) #1: RSA cryptography specifications version 2.1
    • J. Jonsson, B. Kaliski, Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1, 2003, RFC 3447.
    • (2003) RFC , vol.3447
    • Jonsson, J.1    Kaliski, B.2
  • 25
    • 0028385109 scopus 로고
    • Three systems for cryptographic protocol analysis
    • R. Kemmerer, C. Meadows, and J. Millen Three systems for cryptographic protocol analysis J. Cryptol. 7 2 1994 79 130
    • (1994) J. Cryptol. , vol.7 , Issue.2 , pp. 79-130
    • Kemmerer, R.1    Meadows, C.2    Millen, J.3
  • 26
    • 0003196107 scopus 로고    scopus 로고
    • HMAC: Keyed-hashing for message authentication
    • H. Krawczyk, M. Bellare, R. Canetti, HMAC: keyed-hashing for message authentication, 1997, RFC 2104.
    • (1997) RFC , vol.2104
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 27
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR
    • Tools and Algorithms for the Construction and Analysis of Systems Springer, Berlin
    • G. Lowe, Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR, in: Tools and Algorithms for the Construction and Analysis of Systems, Lecture Notes in Computer Science, Vol. 1055, Springer, Berlin, 1996, pp. 147-166.
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 28
    • 0030708255 scopus 로고    scopus 로고
    • A hierarchy of authentication specifications
    • IEEE Computer Society Press, Silver Spring, MD, 1997
    • G. Lowe, A hierarchy of authentication specifications, in: Proc. 10th IEEE Comput. Security Found. Workshop, 1997, IEEE Computer Society Press, Silver Spring, MD, 1997, pp. 31-44.
    • (1997) Proc. 10th IEEE Comput. Security Found. Workshop , pp. 31-44
    • Lowe, G.1
  • 29
    • 1442357061 scopus 로고    scopus 로고
    • Microsoft Corporation, Microsoft. NET Pet Shop, 2002, at http://www.gotdotnet.com/team/compare/petshop.aspx.
    • (2002) Microsoft. NET Pet Shop
  • 30
    • 1442308215 scopus 로고    scopus 로고
    • December
    • Microsoft Corporation, Web Services Enhancements for Microsoft. NET, December 2002, at http://msdn.microsoft.com/webservices/building/wse/default. aspx.
    • (2002) Web Services Enhancements for Microsoft. NET
  • 33
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R.M. Needham, and M.D. Schroeder Using encryption for authentication in large networks of computers Comm. Assoc. Comput. Mach. 21 12 1978 993 999
    • (1978) Comm. Assoc. Comput. Mach. , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 35
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L.C. Paulson The inductive approach to verifying cryptographic protocols J. Comput. Security 6 1998 85 128
    • (1998) J. Comput. Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 37
    • 0024714097 scopus 로고
    • Integrating security in a large distributed system
    • M. Satyanarayanan Integrating security in a large distributed system ACM Trans. Comput. Systems 7 3 1989 247 280
    • (1989) ACM Trans. Comput. Systems , vol.7 , Issue.3 , pp. 247-280
    • Satyanarayanan, M.1
  • 41
    • 1142277649 scopus 로고    scopus 로고
    • Web services are not distributed objects
    • W. Vogels Web services are not distributed objects IEEE Internet Comput. 7 6 2003 59 66
    • (2003) IEEE Internet Comput. , vol.7 , Issue.6 , pp. 59-66
    • Vogels, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.