메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 206-215

Towards a framework of authentication and authorization patterns for ensuring availability in service composition

Author keywords

[No Author keywords available]

Indexed keywords

PATTERN RECOGNITION; PRODUCT DESIGN; SECURITY OF DATA; SECURITY SYSTEMS; USER INTERFACES;

EID: 33750954905     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2006.135     Document Type: Conference Paper
Times cited : (9)

References (24)
  • 1
    • 0034501876 scopus 로고    scopus 로고
    • Windows of vulnerability: A case study analysis
    • W. A. Arbaugh, W. L. Fithen, and J. McHugh. Windows of vulnerability: A case study analysis. IEEE Computer, 33(12):52- 59, 2000.
    • (2000) IEEE Computer , vol.33 , Issue.12 , pp. 52-59
    • Arbaugh, W.A.1    Fithen, W.L.2    McHugh, J.3
  • 17
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. In Communications of the ACM, pages 993-999, 1978.
    • (1978) Communications of the ACM , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 18
    • 0003683075 scopus 로고    scopus 로고
    • Object Management Group
    • Object Management Group. Unified Modeling Language. http://www.omg.org/ uml/.
    • Unified Modeling Language
  • 21
    • 33646188126 scopus 로고    scopus 로고
    • Using UML 2.0 collaborations for compositional service specification
    • R. Sanders, H. N. Castejón, E Kraemer, and R. Bræk. Using UML 2.0 collaborations for compositional service specification. In MoDELS 2005, pages 460-475, 2005.
    • (2005) MoDELS 2005 , pp. 460-475
    • Sanders, R.1    Castejón, H.N.2    Kraemer, E.3    Bræk, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.