메뉴 건너뛰기




Volumn 3934 LNCS, Issue , 2006, Pages 196-210

Information flow control to secure dynamic web service composition

Author keywords

[No Author keywords available]

Indexed keywords

CONTEXT SENSITIVE LANGUAGES; DATA ACQUISITION; INFORMATION DISSEMINATION; INTELLIGENT AGENTS; SECURITY OF DATA;

EID: 33745823075     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11734666_15     Document Type: Conference Paper
Times cited : (33)

References (32)
  • 2
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and multics interpretation
    • MITRE
    • D. E. Bell and L. LaPadula. Secure computer systems: Unified exposition and multics interpretation. Technical Report MTR-2997, MITRE, 1976.
    • (1976) Technical Report , vol.MTR-2997
    • Bell, D.E.1    LaPadula, L.2
  • 6
    • 10444241533 scopus 로고    scopus 로고
    • Agent-based composite services in DAML-S: The behavior-oriented design of an intelligent semantic web
    • Ning Zhong, Jiming Liu, and Yiyu Lao, editors. Springer Verlag
    • J. Bryson, D. Martin, S.I. McIlraith, and L.A. Stein. Agent-based composite services in DAML-S: The behavior-oriented design of an intelligent semantic web. In Ning Zhong, Jiming Liu, and Yiyu Lao, editors, Web Intelligence. Springer Verlag, 2002.
    • (2002) Web Intelligence
    • Bryson, J.1    Martin, D.2    McIlraith, S.I.3    Stein, L.A.4
  • 12
    • 0035577649 scopus 로고    scopus 로고
    • Trust based security for pervasive computing enviroments
    • December
    • L. Kagal, T. Finin, and A. Joshi. Trust based security for pervasive computing enviroments. IEEE Computer, 24(12):154-157, December 2001.
    • (2001) IEEE Computer , vol.24 , Issue.12 , pp. 154-157
    • Kagal, L.1    Finin, T.2    Joshi, A.3
  • 17
    • 84974747891 scopus 로고
    • Proving noninterference and functional correctness using traces
    • J. D. McLean. Proving Noninterference and Functional Correctness using Traces. Journal of Computer Security, 1(1):37-57, 1992.
    • (1992) Journal of Computer Security , vol.1 , Issue.1 , pp. 37-57
    • McLean, J.D.1
  • 18
    • 0028058408 scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • IEEE Computer Society
    • J.D. McLean. A general theory of composition for trace sets closed under selective interleaving functions. In Proceedings of IEEE Symposium on Security and Privacy. IEEE Computer Society, 1994.
    • (1994) Proceedings of IEEE Symposium on Security and Privacy
    • McLean, J.D.1
  • 20
    • 13244259327 scopus 로고    scopus 로고
    • Enforcing policies in pervasive environments
    • Anand Patwardhan, Vlad Korolev, Lalana Kagal, and Anupam Joshi. Enforcing policies in pervasive environments. In MobiQuitous, pages 299-308, 2004.
    • (2004) MobiQuitous , pp. 299-308
    • Patwardhan, A.1    Korolev, V.2    Kagal, L.3    Joshi, A.4
  • 21
    • 33745757810 scopus 로고    scopus 로고
    • Web service composition as ai planning - A survey
    • University of St. Gallen, March
    • Joachim Peer. Web service composition as ai planning - a survey. Technical report, University of St. Gallen, March 2005.
    • (2005) Technical Report
    • Peer, J.1
  • 27
    • 35048886021 scopus 로고    scopus 로고
    • Applying kaos services to ensure policy compliance for semantic web services workflow composition and enactment
    • Andrzej Uszok, Jeffrey M. Bradshaw, Renia Jeffers, Austin Tate, and Jeff Dalton. Applying kaos services to ensure policy compliance for semantic web services workflow composition and enactment. In International Semantic Web Conference, pages 425-440, 2004.
    • (2004) International Semantic Web Conference , pp. 425-440
    • Uszok, A.1    Bradshaw, J.M.2    Jeffers, R.3    Tate, A.4    Dalton, J.5
  • 28
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • Dennis M. Volpano and Geoffrey Smith. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, 1996.
    • (1996) Journal of Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.M.1    Smith, G.2
  • 29
    • 84956989228 scopus 로고    scopus 로고
    • A type-based approach to program security
    • Dennis M. Volpano and Geoffrey Smith. A type-based approach to program security. In TAPSOFT, pages 607-621, 1997.
    • (1997) TAPSOFT , pp. 607-621
    • Volpano, D.M.1    Smith, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.