-
2
-
-
10644252403
-
-
IBM Web Services Architecture Team, "IBM Web Services architecture overview," http://www-106.ibm.com/developerworks/web/library/w-ovr/?dwzone= ibm, 2000.
-
(2000)
IBM Web Services Architecture Overview
-
-
-
5
-
-
0037392527
-
Standards for XML and Web services security
-
M. Naedele, "Standards for XML and Web services security," IEEE Computer, Vol.36(4), 2003, pp.96-98.
-
(2003)
IEEE Computer
, vol.36
, Issue.4
, pp. 96-98
-
-
Naedele, M.1
-
6
-
-
27544448578
-
-
WS-Security, http://www-106.ibm.com/developerworks/webservices/library/ ws-secure/.
-
-
-
-
7
-
-
27544453020
-
-
WS Security Policy, http://www-106.ibm.com/developer works/library/ws- secpol/
-
WS Security Policy
-
-
-
8
-
-
0142161484
-
Reconfigurable context-sensitive middleware for pervasive computing
-
S. S. Yau, F. Karim, Y. Wang, B. Wang and S. K. S. Gupta, "Reconfigurable context-sensitive middleware for pervasive computing," IEEE Pervasive Computing, vol. 1(3), 2002, pp. 33-40.
-
(2002)
IEEE Pervasive Computing
, vol.1
, Issue.3
, pp. 33-40
-
-
Yau, S.S.1
Karim, F.2
Wang, Y.3
Wang, B.4
Gupta, S.K.S.5
-
11
-
-
0003226048
-
The KeyNote trust management system (version 2)
-
M. Blaze, et al., "The KeyNote Trust Management System (version 2)," RFC2704, 1999
-
(1999)
RFC2704
-
-
Blaze, M.1
-
13
-
-
0001843009
-
REFEREE: Trust management for Web applications
-
Y. Chu, et al., "REFEREE: Trust Management for Web Applications." World Wide Web Jour, vol 2(3), 1997, pp. 127-139.
-
(1997)
World Wide Web Jour
, vol.2
, Issue.3
, pp. 127-139
-
-
Chu, Y.1
-
17
-
-
49149147322
-
A logic for default reasoning
-
R. Reiter, "A Logic for Default Reasoning," Artificial Intelligence, vol. 13, 1980, pp.81-132.
-
(1980)
Artificial Intelligence
, vol.13
, pp. 81-132
-
-
Reiter, R.1
-
18
-
-
0034505834
-
Temporal authorization bases: From Specification to integration
-
E. Bertino, P. A. Bonatti, E. Ferrari and M. L. Sapino, "Temporal Authorization Bases: From Specification to Integration," J. Computer Security, vol. 8(4), 2000, pp. 309-354.
-
(2000)
J. Computer Security
, vol.8
, Issue.4
, pp. 309-354
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
Sapino, M.L.4
-
19
-
-
0001619596
-
Flexible supporting for multiple access control policies
-
S. Jajodia, Pamarati. S, M.L. Sapino, and V.S. Subrahmanian, "Flexible Supporting for Multiple Access Control Policies," ACM Trans. on Database Systems, vol. 26(2), 2001, pp.214-260.
-
(2001)
ACM Trans. on Database Systems
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Pamarati, S.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
20
-
-
0003727420
-
-
Cambridge University Press
-
F. Baader, D. Calvanese, D.L. McGuinness, D. Nardi and P.F. Patel-Schneider, editors, "The Description Logic Handbook," Cambridge University Press 2003
-
(2003)
The Description Logic Handbook
-
-
Baader, F.1
Calvanese, D.2
McGuinness, D.L.3
Nardi, D.4
Patel-Schneider, P.F.5
-
21
-
-
0031704255
-
Designing a distributed authorization service
-
T. Y. C. Woo and S.S. Lam, "Designing a Distributed Authorization Service," Proc. IEEE INFOCOM '98, 1998. pp. 419-429.
-
(1998)
Proc. IEEE INFOCOM '98
, pp. 419-429
-
-
Woo, T.Y.C.1
Lam, S.S.2
-
22
-
-
0036506787
-
Security and management policy specification
-
M. Sloman and E. Lupu, "Security and management policy specification," IEEE Network, vol. 16(2), 2002, pp. 10-19.
-
(2002)
IEEE Network
, vol.16
, Issue.2
, pp. 10-19
-
-
Sloman, M.1
Lupu, E.2
-
25
-
-
0029333530
-
Logic foundations of object-oriented and frame-based languages
-
M. Kifer, G. Lausen, and J. Wu, "Logic Foundations of Object-Oriented and Frame-Based Languages," J. ACM, vol. 42(4), 1995. pp. 741-843.
-
(1995)
J. ACM
, vol.42
, Issue.4
, pp. 741-843
-
-
Kifer, M.1
Lausen, G.2
Wu, J.3
|