메뉴 건너뛰기




Volumn 3670 LNCS, Issue , 2005, Pages 215-229

Application of formal methods to the analysis of Web Services Security

Author keywords

Protocols and standards for WS; Secure electronic commerce; Security of WS

Indexed keywords

COMPUTER SCIENCE; NETWORK PROTOCOLS; SECURITY OF DATA; TELECOMMUNICATION SERVICES;

EID: 33646140557     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11549970_16     Document Type: Conference Paper
Times cited : (11)

References (27)
  • 1
    • 0003286492 scopus 로고    scopus 로고
    • The TLS protocol. Version 1.0
    • Standards track, Network Working Group, January
    • T. Dierks; C. Allen. "The TLS Protocol. Version 1.0 ". RFC 2246. Standards track, Network Working Group, January 1999.
    • (1999) RFC , vol.2246
    • Dierks, T.1    Allen, C.2
  • 4
    • 35048821943 scopus 로고    scopus 로고
    • Tulafale: A security tool for Web services
    • Formal Methods for Components and Objects: Second International Symposium, FMCO 2003, Springer, November
    • K. Bhargavan, C. Fournet, and A.D. Gordon, and R. Pucella. Tulafale: A security tool for web services. In Formal Methods for Components and Objects: Second International Symposium, FMCO 2003, volume 3188 of Lecture Notes in Computer Science, pages 197 - 222. Springer, November 2003.
    • (2003) Lecture Notes in Computer Science , vol.3188 , pp. 197-222
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3    Pucella, R.4
  • 6
    • 33646122722 scopus 로고    scopus 로고
    • Formal Systems (Europe) Limited. FDR Manual. http://www.fsei.com/ fdr2_manual.html.
    • FDR Manual
  • 13
    • 0003470642 scopus 로고    scopus 로고
    • Security architecture for the internet protocol
    • October
    • S. Kent and K. Seo. Security architecture for the internet protocol. Internet Draft, October 2004.
    • (2004) Internet Draft
    • Kent, S.1    Seo, K.2
  • 15
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • G. Lowe. Casper: A Compiler for the Analysis of Security Protocols. Journal of Computer Security, 6:53-84, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 53-84
    • Lowe, G.1
  • 17
    • 84950150868 scopus 로고    scopus 로고
    • On verifying Web Services flows
    • January
    • S. Nakijima. "On verifying Web Services Flows". Proc. SAINT 2002 Workshop, pages 223-224, January 2002.
    • (2002) Proc. SAINT 2002 Workshop , pp. 223-224
    • Nakijima, S.1
  • 19
    • 24944582755 scopus 로고    scopus 로고
    • October
    • OASIS. "UDDI Version 3.0.2". http://www.oasis-open.org/ committees/uddi-spec/doc/tcspecs.htm#uddiv3, October 2004.
    • (2004) UDDI Version 3.0.2
  • 24
    • 1142264879 scopus 로고    scopus 로고
    • W3C. December
    • W3C. "XML Encryption Syntax and Processing". http://www.w3c.org/TR/2002/REC-xmldend-core-20021210, December 2002.
    • (2002) XML Encryption Syntax and Processing
  • 25
    • 0043026142 scopus 로고    scopus 로고
    • W3C. February
    • W3C. "XML Signature Syntax and Processing". http://www.w3c.org/TR/2002/REC-xmldsig-core-20020212, February 2002.
    • (2002) XML Signature Syntax and Processing
  • 27
    • 0142074003 scopus 로고    scopus 로고
    • W3C. February
    • W3C. "Web Services Architecture". http://www.w3c.org/TR/2004/ NOTE-ws-arch-20040211, February 2004.
    • (2004) Web Services Architecture


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.