메뉴 건너뛰기




Volumn 4184 LNCS, Issue , 2006, Pages 88-106

Verified reference implementations of WS-security protocols

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; INTEROPERABILITY; NETWORK PROTOCOLS; SECURITY SYSTEMS; TELECOMMUNICATION SERVICES; THEOREM PROVING;

EID: 33845212195     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11841197_6     Document Type: Conference Paper
Times cited : (39)

References (27)
  • 1
    • 23144463868 scopus 로고    scopus 로고
    • Analyzing security protocols with secrecy types and logic programs
    • M. Abadi and B. Blanchet. Analyzing security protocols with secrecy types and logic programs, J. ACM, 52(1):102-146, 2005.
    • (2005) J. ACM , vol.52 , Issue.1 , pp. 102-146
    • Abadi, M.1    Blanchet, B.2
  • 3
    • 33845204881 scopus 로고    scopus 로고
    • Apache Software Foundation. Apache WSS4J, 2006. At http://ws.apache.org/ wss4j/.
    • (2006) Apache WSS4J
  • 6
    • 35048821943 scopus 로고    scopus 로고
    • TulaFale: A security tool for web services
    • International Symposium on Formal Methods for Components and Objects (FMCO'03), Springer
    • K. Bhargavan, C. Fournet, A. D. Gordon, and R. Pucella. TulaFale: A security tool for web services. In International Symposium on Formal Methods for Components and Objects (FMCO'03), volume 3188 of LNCS, pages 197-222. Springer, 2004.
    • (2004) LNCS , vol.3188 , pp. 197-222
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3    Pucella, R.4
  • 14
    • 0141998527 scopus 로고    scopus 로고
    • Validating a web service security abstraction by typing
    • A. D. Gordon and R. Pucella. Validating a web service security abstraction by typing. In 2002 ACM workshop on XML Security, pages 18-29, 2002.
    • (2002) 2002 ACM Workshop on XML Security , pp. 18-29
    • Gordon, A.D.1    Pucella, R.2
  • 15
    • 24144470036 scopus 로고    scopus 로고
    • Cryptographic protocol analysis on real C code
    • 6th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05), Springer
    • J. Goubault-Larrecq and F. Parrennes. Cryptographic protocol analysis on real C code. In 6th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05),volume 3385 of LNCS, pages 363-379. Springer, 2005.
    • (2005) LNCS , vol.3385 , pp. 363-379
    • Goubault-Larrecq, J.1    Parrennes, F.2
  • 20
    • 14844329713 scopus 로고    scopus 로고
    • Microsoft Corporation. Web Services Enhancements (WSE) 2.0, 2004. At http://msdn.microsoft.com/webservices/building/wse/default.aspx.
    • (2004) Web Services Enhancements (WSE) 2.0
  • 25
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 26
    • 84941174007 scopus 로고    scopus 로고
    • D. Syme. F#, 2005. At http://research.microsoft.com/fsharp/fsharp.aspx.
    • (2005) F#
    • Syme, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.