-
1
-
-
21244462147
-
OASIS Web Services Security: SOAP Message Security 1.0 (WS-Security 2004)
-
Tech. Rep. OASIS Standard 200401, March
-
A. Nadalin, C. Kaler, P. Hallam-Baker and R. Monzillo., "OASIS Web Services Security: SOAP Message Security 1.0 (WS-Security 2004)," Tech. Rep. OASIS Standard 200401, March 2004.
-
(2004)
-
-
Nadalin, A.1
Kaler, C.2
Hallam-Baker, P.3
Monzillo, R.4
-
2
-
-
33847127924
-
Web services security policy language (WS-SecurityPolicy)," December 2002. [4] J.D. Guttman and A.L. Herzog, "Rigorous automated network security management
-
February
-
G. Della-Libera, P. Hallam-Baker, M. Hondo, T. Janczuk, C. Kaler, H. Maruyama, N. Nagaratnam, A. Nash, R. Philpott, H. Prafullchandra, J. Shewchuk, E. Waingold and R. Zolfonoon, "Web services security policy language (WS-SecurityPolicy)," December 2002. [4] J.D. Guttman and A.L. Herzog, "Rigorous automated network security management," International Journal of Information Security, vol. 4, pp. 29-48, February 2005.
-
(2005)
International Journal of Information Security
, vol.4
, pp. 29-48
-
-
Della-Libera, G.1
Hallam-Baker, P.2
Hondo, M.3
Janczuk, T.4
Kaler, C.5
Maruyama, H.6
Nagaratnam, N.7
Nash, A.8
Philpott, R.9
Prafullchandra, H.10
Shewchuk, J.11
Waingold, E.12
Zolfonoon, R.13
-
5
-
-
33847144975
-
-
D. Song, A. Perrig and D.E.-. Phan, AGVI - Automatic Generation, Verification, and Implementation of Security Protocols, 2001.
-
(2001)
AGVI - Automatic Generation, Verification, and Implementation of Security Protocols
-
-
Song, D.1
Perrig, A.2
Phan, D.E.3
-
7
-
-
3042621964
-
Spi2Java: Automatic Cryptographic Protocol Java Code Generation from spi calculus
-
D. Pozza, R. Sisto and L. Durante, "Spi2Java: Automatic Cryptographic Protocol Java Code Generation from spi calculus," in AINA '04: Proceedings of the 18th International Conference on Advanced Information Networking and Applications Volume 2, 2004, pp. 400.
-
(2004)
AINA '04: Proceedings of the 18th International Conference on Advanced Information Networking and Applications
, vol.2
, pp. 400
-
-
Pozza, D.1
Sisto, R.2
Durante, L.3
-
9
-
-
33750045529
-
Federated Security: The Shibboleth Approach
-
R.L. Morgan, S. Cantor, S. carmody, W. Hoehn and K. Klingenstein, "Federated Security: The Shibboleth Approach," Educause Quaterly, pp. 12-17, 2004.
-
(2004)
Educause Quaterly
, pp. 12-17
-
-
Morgan, R.L.1
Cantor, S.2
carmody, S.3
Hoehn, W.4
Klingenstein, K.5
-
10
-
-
33847163216
-
-
J. Tourzan and Y. Koga, Liberty ID-WSF Architecture Overview. Version 1.0, Liberty Alliance Project, 2004
-
J. Tourzan and Y. Koga, "Liberty ID-WSF Architecture Overview. Version 1.0," Liberty Alliance Project., 2004.
-
-
-
-
11
-
-
33847128817
-
-
T. Scavo, Shibboleth Architecture: Technical Overview, Working Draft 01, January 9, 2005, http://shibboleth.internets.edu/docs/draft- scavo-shib-techoverview-01.pdf.
-
T. Scavo, "Shibboleth Architecture: Technical Overview," Working Draft 01, January 9, 2005, http://shibboleth.internets.edu/docs/draft- scavo-shib-techoverview-01.pdf.
-
-
-
-
12
-
-
33750959944
-
The interoperability of learning object repositories and services: Standards, implementations and lessons learned
-
M. Hatala, G. Richards, T. Eap and J. Willms, "The interoperability of learning object repositories and services: standards, implementations and lessons learned," in Proceedings of the 13th international World Wide Web conference, 2004, pp. 19-27.
-
(2004)
Proceedings of the 13th international World Wide Web conference
, pp. 19-27
-
-
Hatala, M.1
Richards, G.2
Eap, T.3
Willms, J.4
-
13
-
-
33750953447
-
-
May 5
-
S. Carmody, M. Erdos, K. Hazelton, W. Hoehn, B. Morgan, T. Scavo and D. Wasley, "InCommon Technical Requirements and Information," vol. 2005, pp. 5, May 5, 2005.
-
(2005)
InCommon Technical Requirements and Information
, vol.2005
, pp. 5
-
-
Carmody, S.1
Erdos, M.2
Hazelton, K.3
Hoehn, W.4
Morgan, B.5
Scavo, T.6
Wasley, D.7
|