메뉴 건너뛰기




Volumn 31, Issue , 2004, Pages 198-209

A semantics for web services authentication

Author keywords

Applied Pi Calculus; Web Services; XML Security

Indexed keywords

CRYPTOGRAPHY; DATABASE SYSTEMS; PROBLEM SOLVING; ROUTERS; SAMPLING; SECURITY OF DATA; SEMANTICS; XML;

EID: 2442519269     PISSN: 07308566     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/964001.964018     Document Type: Conference Paper
Times cited : (22)

References (37)
  • 4
    • 1442308216 scopus 로고    scopus 로고
    • A semantics for web services authentication
    • Microsoft Research
    • K. Bhargavan, C. Fournet, and A. D. Gordon. A semantics for web services authentication. Technical Report MSR-TR-2003-83, Microsoft Research, 2003.
    • (2003) Technical Report , vol.MSR-TR-2003-83
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3
  • 7
    • 1442332546 scopus 로고    scopus 로고
    • W3C Recommendation
    • J. Boyer. Canonical XML, 2001. W3C Recommendation, http://www.w3.org/TR/ 2001/REC-xml-c14n-20010315/.
    • (2001) Canonical XML
    • Boyer, J.1
  • 10
    • 0033718532 scopus 로고    scopus 로고
    • TAPS: A first-order verifier for cryptographic protocols
    • IEEE Computer Society Press
    • E. Cohen. TAPS: A first-order verifier for cryptographic protocols. In 13th IEEE Computer Security Foundations Workshop, pages 144-158. IEEE Computer Society Press, 2000.
    • (2000) 13th IEEE Computer Security Foundations Workshop , pp. 144-158
    • Cohen, E.1
  • 11
    • 12844252596 scopus 로고    scopus 로고
    • W3C Recommendation
    • J. Cowan and R. Tobin. XML Information Set, 2001. W3C Recommendation, http://www.w3.org/TR/2001/REC-xml-infoset-20011024/.
    • (2001) XML Information Set
    • Cowan, J.1    Tobin, R.2
  • 14
    • 0003286492 scopus 로고    scopus 로고
    • The TLS protocol: Version 1.0
    • T. Dierks and C. Allen. The TLS protocol: Version 1.0, 1999. RFC 2246.
    • (1999) RFC , vol.2246
    • Dierks, T.1    Allen, C.2
  • 15
  • 16
    • 1542265638 scopus 로고    scopus 로고
    • US secure hash algorithm 1 (SHA1)
    • D. Eastlake and P. Jones. US Secure Hash Algorithm 1 (SHA1), 2001. RFC 3174.
    • (2001) RFC , vol.3174
    • Eastlake, D.1    Jones, P.2
  • 19
    • 0141863341 scopus 로고    scopus 로고
    • Authenticity by typing for security protocols
    • A. Gordon and A. Jeffrey. Authenticity by typing for security protocols. Journal of Computer Security, 11(4):451-521, 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.4 , pp. 451-521
    • Gordon, A.1    Jeffrey, A.2
  • 20
    • 0141998527 scopus 로고    scopus 로고
    • Validating a web service security abstraction by typing
    • A. Gordon and R. Pucella. Validating a web service security abstraction by typing. In ACM Workshop on XML Security 2002, pages 18-29, 2003.
    • (2003) ACM Workshop on XML Security 2002 , pp. 18-29
    • Gordon, A.1    Pucella, R.2
  • 21
    • 2442476755 scopus 로고    scopus 로고
    • Public-key cryptography standards (PKCS) #1: RSA cryptography specifications version 2.1
    • J. Jonsson and B. Kaliski. Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1, 2003. RFC 3447.
    • (2003) RFC , vol.3447
    • Jonsson, J.1    Kaliski, B.2
  • 22
    • 0028385109 scopus 로고
    • Three systems for cryptographic protocol analysis
    • R. Kemmerer, C. Meadows, and J. Millen. Three systems for cryptographic protocol analysis. Journal of Cryptology, 7(2):79-130, 1994.
    • (1994) Journal of Cryptology , vol.7 , Issue.2 , pp. 79-130
    • Kemmerer, R.1    Meadows, C.2    Millen, J.3
  • 23
    • 0003196107 scopus 로고    scopus 로고
    • HMAC: Keyed-hashing for message authentication
    • H. Krawczyk, M. Bellare, and R. Canetti. HMAC: Keyed-hashing for message authentication, 1997. RFC 2104.
    • (1997) RFC , vol.2104
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 25
    • 1442357061 scopus 로고    scopus 로고
    • Microsoft Corporation. Microsoft .NET Pet Shop, 2002. http://www.gotdotnet.com/team/compare/petshop.aspx.
    • (2002) Microsoft .NET Pet Shop
  • 29
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Commun. ACM, 21(12):993-999, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 31
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.1
  • 33
    • 0024714097 scopus 로고
    • Integrating security in a large distributed system
    • M. Satyanarayanan. Integrating security in a large distributed system. ACM Trans. Comput. Syst., 7(3):247-280, 1989.
    • (1989) ACM Trans. Comput. Syst. , vol.7 , Issue.3 , pp. 247-280
    • Satyanarayanan, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.