메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 589-596

3PAC: Enforcing access policies for Web Services

Author keywords

Distributed access control; Policy enforcement; Web Services security

Indexed keywords

COMPUTER ARCHITECTURE; DATA PRIVACY; INTEROPERABILITY; SECURITY OF DATA; WORLD WIDE WEB;

EID: 33749067816     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICWS.2005.2     Document Type: Conference Paper
Times cited : (4)

References (17)
  • 1
    • 33749053418 scopus 로고    scopus 로고
    • Vinci: A service-oriented architecture for rapid development of web applications
    • May 01
    • R. Agrawal et al, "Vinci: A service-oriented architecture for rapid development of web applications", in WWW 10 Hongkong, May 01
    • WWW 10 Hongkong
    • Agrawal, R.1
  • 2
    • 4744370524 scopus 로고    scopus 로고
    • A trust-based context-aware access control model for web-services
    • R. Bhatti, E. Bertino and A. Ghafoor, "A Trust-based Context-Aware Access Control Model for Web-Services", Proc. ICWS04 pp. 184-192
    • Proc. ICWS04 , pp. 184-192
    • Bhatti, R.1    Bertino, E.2    Ghafoor, A.3
  • 5
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • IEEE Press
    • R. S. Sandhu, et al. "Role-Based Access Control Models", IEEE Computer 29(2): 38-47, IEEE Press, 1996
    • (1996) IEEE Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.S.1
  • 7
    • 4143055831 scopus 로고    scopus 로고
    • Towards a credential-based implementation of compound access control policies
    • J. Biskup and S. Wortmann, "Towards a credential-based implementation of compound access control policies", Proceedings of SACMAT'04 pp 31-40
    • Proceedings of SACMAT'04 , pp. 31-40
    • Biskup, J.1    Wortmann, S.2
  • 9
    • 3042684910 scopus 로고    scopus 로고
    • A rule-based framework for role-based delegation and revocation
    • L. Zhang, G. Ahn and B. Chu, "A rule-based framework for role-based delegation and revocation", ACM Transactions on Inf. Syst. Security, vol 6 no 3 2003 pp. 404-441
    • (2003) ACM Transactions on Inf. Syst. Security , vol.6 , Issue.3 , pp. 404-441
    • Zhang, L.1    Ahn, G.2    Chu, B.3
  • 10
    • 14844363625 scopus 로고    scopus 로고
    • Service oriented computing: Key concepts and principles
    • M. N. Huhns and M. P. Singh, "Service Oriented Computing: Key Concepts and Principles", IEEE Internet Computing, vol. 9, no. 1, 2005, pp.75-81.
    • (2005) IEEE Internet Computing , vol.9 , Issue.1 , pp. 75-81
    • Huhns, M.N.1    Singh, M.P.2
  • 12
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • September
    • B. Clifford Neuman and Theodore Ts'o, "Kerberos: An Authentication Service for Computer Networks", IEEE Communications, 32(9):33-38. September 1994
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Ts'o, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.