메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 612-619

Negotiated security policies for E-services and Web Services

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; INTERNET; SECURITY OF DATA; SECURITY SYSTEMS; WORLD WIDE WEB;

EID: 33749042338     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICWS.2005.85     Document Type: Conference Paper
Times cited : (16)

References (20)
  • 1
    • 0000206310 scopus 로고    scopus 로고
    • Security models for web-based applications
    • February
    • J. Joshi et al, "Security Models for Web-Based Applications", Communications of the ACM, Vol. 44, No. 2, pp. 38-44, February 2001.
    • (2001) Communications of the ACM , vol.44 , Issue.2 , pp. 38-44
    • Joshi, J.1
  • 3
    • 33749075159 scopus 로고    scopus 로고
    • An architecture for policy-based security management for distributed multimedia services
    • Juan-les-Pins, France, Dec. 1-6
    • S. Duflos, "An Architecture for Policy-Based Security Management for Distributed Multimedia Services", Proceedings, Multimedia '02, Juan-les-Pins, France, Dec. 1-6, 2002.
    • (2002) Proceedings, Multimedia '02
    • Duflos, S.1
  • 12
    • 0036871183 scopus 로고    scopus 로고
    • Negotiating trust on the web
    • November/December
    • M. Winslett et al, "Negotiating Trust on the Web", IEEE Internet Computing, pp. 30-37, November/December 2002.
    • (2002) IEEE Internet Computing , pp. 30-37
    • Winslett, M.1
  • 14
    • 85001837279 scopus 로고    scopus 로고
    • Semi-automatic derivation and use of personal privacy policies in E-business
    • Idea Group Publishing
    • G. Yee, L. Korba, "Semi-Automatic Derivation and Use of Personal Privacy Policies in E-Business", International Journal of E-Business Research, Vol. 1, No. 1, Idea Group Publishing, 2005.
    • (2005) International Journal of E-business Research , vol.1 , Issue.1
    • Yee, G.1    Korba, L.2
  • 16
    • 84860035325 scopus 로고    scopus 로고
    • as of Feb. 11
    • International Telecommunication Union Telecommunication Standardization Sector (ITU-T), "Recommendation X.800, Security Architecture for OSI", as of Feb. 11, 2004, available from: http://www.itu.intlrec/recommendation.asp? type=items&lang=e&parent=T-REC-X.800-199103-1
    • (2004) Recommendation X.800, Security Architecture for OSI
  • 17
    • 3042575530 scopus 로고    scopus 로고
    • The negotiation of privacy policies in distance education
    • Philadelphia, Pennsylvania, May 18-21
    • G. Yee, L. Korba, "The Negotiation of Privacy Policies in Distance Education", Proceedings, 14th IRMA International Conference, Philadelphia, Pennsylvania, May 18-21, 2003.
    • (2003) Proceedings, 14th IRMA International Conference
    • Yee, G.1    Korba, L.2
  • 20
    • 26944484878 scopus 로고    scopus 로고
    • available as of Feb. 14
    • Telecom Italia Lab, "JADE (Java Agent Development Framework)", available as of Feb. 14, 2005, from: http://jade.tilab.com/
    • (2005) JADE (Java Agent Development Framework)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.