-
3
-
-
1642394689
-
-
Draft submitted to OASIS Web Services Security TC, April
-
B. Atkinson, G. Della-Libera, S. Hada, M. Hondo, P. Hallam-Baker, C. Kaler, J. Klein, B. LaMacchia, P. Leach, J. Manferdelli, H. Maruyama, A. Nadalin, N. Nagaratnam, H. Prafullchandra, J. Shewchuk, and D. Simon. Web services security (WS-Security), version 1.0. http://msdn.microsoft.com/library/ en-us/dnglobspec/html/ws-security.asp. Draft submitted to OASIS Web Services Security TC, April 2002.
-
(2002)
Web Services Security (WS-security), Version 1.0
-
-
Atkinson, B.1
Della-Libera, G.2
Hada, S.3
Hondo, M.4
Hallam-Baker, P.5
Kaler, C.6
Klein, J.7
Lamacchia, B.8
Leach, P.9
Manferdelli, J.10
Maruyama, H.11
Nadalin, A.12
Nagaratnam, N.13
Prafullchandra, H.14
Shewchuk, J.15
Simon, D.16
-
4
-
-
1442308216
-
A semantics for web services authentication
-
Microsoft Research
-
K. Bhargavan, C. Fournet, and A. D. Gordon. A semantics for web services authentication. Technical Report MSR-TR-2003-83, Microsoft Research, 2003.
-
(2003)
Technical Report
, vol.MSR-TR-2003-83
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
-
6
-
-
0004175734
-
-
W3C Note
-
D. Box, D. Ehnebuske, G. Kakivaya, A. Layman, N. Mendelsohn, H. Nielsen, S. Thatte, and D. Winer. Simple Object Access Protocol (SOAP) 1.1, 2000. W3C Note, http://www.w3.org/TR/2000/NOTE-SOAP-20000508/.
-
(2000)
Simple Object Access Protocol (SOAP) 1.1
-
-
Box, D.1
Ehnebuske, D.2
Kakivaya, G.3
Layman, A.4
Mendelsohn, N.5
Nielsen, H.6
Thatte, S.7
Winer, D.8
-
7
-
-
1442332546
-
-
W3C Recommendation
-
J. Boyer. Canonical XML, 2001. W3C Recommendation, http://www.w3.org/TR/ 2001/REC-xml-c14n-20010315/.
-
(2001)
Canonical XML
-
-
Boyer, J.1
-
10
-
-
0033718532
-
TAPS: A first-order verifier for cryptographic protocols
-
IEEE Computer Society Press
-
E. Cohen. TAPS: A first-order verifier for cryptographic protocols. In 13th IEEE Computer Security Foundations Workshop, pages 144-158. IEEE Computer Society Press, 2000.
-
(2000)
13th IEEE Computer Security Foundations Workshop
, pp. 144-158
-
-
Cohen, E.1
-
11
-
-
12844252596
-
-
W3C Recommendation
-
J. Cowan and R. Tobin. XML Information Set, 2001. W3C Recommendation, http://www.w3.org/TR/2001/REC-xml-infoset-20011024/.
-
(2001)
XML Information Set
-
-
Cowan, J.1
Tobin, R.2
-
12
-
-
0141908648
-
Securing SOAP e-services
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati. Securing SOAP e-services. International Journal of Information Security, 1(2):100-115, 2002.
-
(2002)
International Journal of Information Security
, vol.1
, Issue.2
, pp. 100-115
-
-
Damiani, E.1
De Capitani di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
14
-
-
0003286492
-
The TLS protocol: Version 1.0
-
T. Dierks and C. Allen. The TLS protocol: Version 1.0, 1999. RFC 2246.
-
(1999)
RFC
, vol.2246
-
-
Dierks, T.1
Allen, C.2
-
16
-
-
1542265638
-
US secure hash algorithm 1 (SHA1)
-
D. Eastlake and P. Jones. US Secure Hash Algorithm 1 (SHA1), 2001. RFC 3174.
-
(2001)
RFC
, vol.3174
-
-
Eastlake, D.1
Jones, P.2
-
17
-
-
0038394738
-
-
W3C Recommendation
-
D. Eastlake, J. Reagle, D. Solo, M. Bartel, J. Boyer, B. Fox, B. LaMacchia, and E. Simon. XML-Signature Syntax and Processing, 2002. W3C Recommendation, http://www.w3.org/TR/2002/REC-xmldsig-core-20020212/.
-
(2002)
XML-signature Syntax and Processing
-
-
Eastlake, D.1
Reagle, J.2
Solo, D.3
Bartel, M.4
Boyer, J.5
Fox, B.6
Lamacchia, B.7
Simon, E.8
-
18
-
-
35248847052
-
Hiding names: Private authentication in the applied pi calculus
-
M. Okada, B. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, editors, Springer
-
C. Fournet and M. Abadi. Hiding names: Private authentication in the applied pi calculus. In M. Okada, B. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, editors, Software Security - Theories and Systems, Mext-NSF-JSPS International Symposium, Tokyo, Nov. 2002 (ISSS'02), volume 2609 of LNCS, pages 317-338. Springer, 2003.
-
(2003)
Software Security - Theories and Systems, Mext-NSF-JSPS International Symposium, Tokyo, Nov. 2002 (ISSS'02), Volume 2609 of LNCS
, vol.2609
, pp. 317-338
-
-
Fournet, C.1
Abadi, M.2
-
19
-
-
0141863341
-
Authenticity by typing for security protocols
-
A. Gordon and A. Jeffrey. Authenticity by typing for security protocols. Journal of Computer Security, 11(4):451-521, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.4
, pp. 451-521
-
-
Gordon, A.1
Jeffrey, A.2
-
20
-
-
0141998527
-
Validating a web service security abstraction by typing
-
A. Gordon and R. Pucella. Validating a web service security abstraction by typing. In ACM Workshop on XML Security 2002, pages 18-29, 2003.
-
(2003)
ACM Workshop on XML Security 2002
, pp. 18-29
-
-
Gordon, A.1
Pucella, R.2
-
21
-
-
2442476755
-
Public-key cryptography standards (PKCS) #1: RSA cryptography specifications version 2.1
-
J. Jonsson and B. Kaliski. Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1, 2003. RFC 3447.
-
(2003)
RFC
, vol.3447
-
-
Jonsson, J.1
Kaliski, B.2
-
22
-
-
0028385109
-
Three systems for cryptographic protocol analysis
-
R. Kemmerer, C. Meadows, and J. Millen. Three systems for cryptographic protocol analysis. Journal of Cryptology, 7(2):79-130, 1994.
-
(1994)
Journal of Cryptology
, vol.7
, Issue.2
, pp. 79-130
-
-
Kemmerer, R.1
Meadows, C.2
Millen, J.3
-
23
-
-
0003196107
-
HMAC: Keyed-hashing for message authentication
-
H. Krawczyk, M. Bellare, and R. Canetti. HMAC: Keyed-hashing for message authentication, 1997. RFC 2104.
-
(1997)
RFC
, vol.2104
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
25
-
-
1442357061
-
-
Microsoft Corporation. Microsoft .NET Pet Shop, 2002. http://www.gotdotnet.com/team/compare/petshop.aspx.
-
(2002)
Microsoft .NET Pet Shop
-
-
-
29
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Commun. ACM, 21(12):993-999, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
31
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.1
-
32
-
-
84976845043
-
End-to-end arguments in system design
-
November
-
J. H. Saltzer, D. P. Reed, and D. D. Clark. End-to-end arguments in system design. ACM Transactions in Computer Systems, 2(4):277-288, November 1984.
-
(1984)
ACM Transactions in Computer Systems
, vol.2
, Issue.4
, pp. 277-288
-
-
Saltzer, J.H.1
Reed, D.P.2
Clark, D.D.3
-
33
-
-
0024714097
-
Integrating security in a large distributed system
-
M. Satyanarayanan. Integrating security in a large distributed system. ACM Trans. Comput. Syst., 7(3):247-280, 1989.
-
(1989)
ACM Trans. Comput. Syst.
, vol.7
, Issue.3
, pp. 247-280
-
-
Satyanarayanan, M.1
-
36
-
-
0029697576
-
Secure network objects
-
L. van Doom, M. Abadi, M. Burrows, and E. Wobber. Secure network objects. In IEEE Computer Society Symposium on Research in Security and Privacy, pages 211-221, 1996.
-
(1996)
IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 211-221
-
-
Van Doom, L.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
|