메뉴 건너뛰기




Volumn 10, Issue 2, 2007, Pages

Secure sessions for Web services

Author keywords

Web services; XML security

Indexed keywords

FORMAL SCRIPTING LANGUAGE; SECURITY PROTOCOLS; WS-SECURECONVERSATION; XML SECURITY;

EID: 34249658491     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/1237500.1237504     Document Type: Article
Times cited : (23)

References (61)
  • 2
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • ABADI, M. AND GORDON, A. D. 1999. A calculus for cryptographic protocols: The spi calculus. Information and Computation 148, 1-70.
    • (1999) Information and Computation , vol.148 , pp. 1-70
    • ABADI, M.1    GORDON, A.D.2
  • 3
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • ABADI, M. AND ROGAWAY, P. 2002. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology 15, 2, 103-127.
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • ABADI, M.1    ROGAWAY, P.2
  • 4
    • 35048861871 scopus 로고    scopus 로고
    • Just fast keying in the pi calculus
    • 13th European Symposium on Programming ESOP'04, Springer, New York
    • ABADI, M., BLANCHET, B., AND FOURNET, C. 2004. Just fast keying in the pi calculus. In 13th European Symposium on Programming (ESOP'04). LNCS, vol. 2986. Springer, New York. 340-354.
    • (2004) LNCS , vol.2986 , pp. 340-354
    • ABADI, M.1    BLANCHET, B.2    FOURNET, C.3
  • 5
    • 26444497860 scopus 로고    scopus 로고
    • ARMANDO, A., BASIN, D., BOICHUT, Y., CHEVALIER, Y., COMPAGNA, L., CUELLAR, J., HANKES DRIELSMA, P., HEÁM, P.-C., MANTOVANI, J., MÖDERSHEIM, S., VON OHEIMB, D., RUSINOWITCH, M., SANTIAGO, J., TURUANI, M., VIGANÒ, L., AND VIGNERON, L. 2005. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In 17th International Conference on Computer Aided Verification (CAV'05), K. Etessami and S. K. Rajamani, Eds. LNCS, 3576. Springer, New York. Available at http://www.avispa-project.org/publications.html.
    • ARMANDO, A., BASIN, D., BOICHUT, Y., CHEVALIER, Y., COMPAGNA, L., CUELLAR, J., HANKES DRIELSMA, P., HEÁM, P.-C., MANTOVANI, J., MÖDERSHEIM, S., VON OHEIMB, D., RUSINOWITCH, M., SANTIAGO, J., TURUANI, M., VIGANÒ, L., AND VIGNERON, L. 2005. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In 17th International Conference on Computer Aided Verification (CAV'05), K. Etessami and S. K. Rajamani, Eds. LNCS, vol. 3576. Springer, New York. Available at http://www.avispa-project.org/publications.html.
  • 8
    • 34249721199 scopus 로고    scopus 로고
    • BARBIR, A, GOODNER, M, GUDGIN, M, GRANQVIST, H, NADALIN, A, ET AL. 2006. Web Services Secure Conversation Language (WS-SecureConversation) Oasis Committee Draft Version 0.1. At
    • BARBIR, A., GOODNER, M., GUDGIN, M., GRANQVIST, H., NADALIN, A., ET AL. 2006. Web Services Secure Conversation Language (WS-SecureConversation) Oasis Committee Draft Version 0.1. At http://www.oasis-open.org/committees/download.php/ 20158/ws-secureconversation-1.3-spec-cd-01.pdf.
  • 10
    • 33646131882 scopus 로고    scopus 로고
    • Secure sessions for web services
    • Tech. Rep. MSR-TR-2004-114, Microsoft Research
    • BHARGAVAN, K., CORIN, R., FOURNET, C., AND GORDON, A. D. 2004d. Secure sessions for web services. Tech. Rep. MSR-TR-2004-114, Microsoft Research.
    • (2004)
    • BHARGAVAN, K.1    CORIN, R.2    FOURNET, C.3    GORDON, A.D.4
  • 12
    • 35048821943 scopus 로고    scopus 로고
    • TulaFale: A security tool for web services
    • International Symposium on Formal Methods for Components and Objects FMCO'03, Springer, New York
    • BHARGAVAN, K., FOURNET, C., GORDON, A. D., AND PUCELLA, R. 2004d. TulaFale: A security tool for web services. In International Symposium on Formal Methods for Components and Objects (FMCO'03). LNCS, vol. 3188. Springer, New York. 197-222.
    • (2004) LNCS , vol.3188 , pp. 197-222
    • BHARGAVAN, K.1    FOURNET, C.2    GORDON, A.D.3    PUCELLA, R.4
  • 13
    • 18544363572 scopus 로고    scopus 로고
    • A semantics for web services authentication
    • June
    • BHARGAVAN, K., FOURNET, C., AND GORDON, A. D. 2005. A semantics for web services authentication. Theor. Comput. Sci. 340, 1 (June), 102-153.
    • (2005) Theor. Comput. Sci , vol.340 , Issue.1 , pp. 102-153
    • BHARGAVAN, K.1    FOURNET, C.2    GORDON, A.D.3
  • 15
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on Prolog rules
    • IEEE Computer Society, Washington, D.C
    • BLANCHET, B. 2001. An efficient cryptographic protocol verifier based on Prolog rules. In 14th IEEE Computer Security Foundations Workshop (CSFW-14). IEEE Computer Society, Washington, D.C. 82-96.
    • (2001) 14th IEEE Computer Security Foundations Workshop (CSFW-14) , pp. 82-96
    • BLANCHET, B.1
  • 16
    • 84958749546 scopus 로고    scopus 로고
    • From secrecy to authenticity in security protocols
    • 9th International Static Analysis Symposium SAS'02, Springer, New York
    • BLANCHET, B. 2002. From secrecy to authenticity in security protocols. In 9th International Static Analysis Symposium (SAS'02). LNCS, vol. 2477. Springer, New York. 342-359.
    • (2002) LNCS , vol.2477 , pp. 342-359
    • BLANCHET, B.1
  • 17
    • 33751067991 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols
    • BLANCHET, B. 2006. A computationally sound mechanized prover for security protocols. In IEEE Symposium on Security and Privacy. 140-154.
    • (2006) IEEE Symposium on Security and Privacy , pp. 140-154
    • BLANCHET, B.1
  • 20
    • 0033718532 scopus 로고    scopus 로고
    • TAPS: A first-order verifier for cryptographic protocols
    • IEEE Computer Society Press, Washington, D.C
    • COHEN, E. 2000. TAPS: A first-order verifier for cryptographic protocols. In 13th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, Washington, D.C. 144-158.
    • (2000) 13th IEEE Computer Security Foundations Workshop , pp. 144-158
    • COHEN, E.1
  • 21
    • 34249744190 scopus 로고    scopus 로고
    • DAMIANI, E., DE CAPITANI DI VIMERCATI, S., PARABOSCHI, S., AND SAMARATI, P. 2002. Securing SOAP e-services. International Journal of Information Security 1, 2, 100-115.
    • DAMIANI, E., DE CAPITANI DI VIMERCATI, S., PARABOSCHI, S., AND SAMARATI, P. 2002. Securing SOAP e-services. International Journal of Information Security 1, 2, 100-115.
  • 23
    • 0017018484 scopus 로고    scopus 로고
    • DIFFIE, W. AND HELLMAN, M. 1976. New directions in cryptography. IEEE Transactions on Information Theory IT-22, 6 (Nov.), 644-654.
    • DIFFIE, W. AND HELLMAN, M. 1976. New directions in cryptography. IEEE Transactions on Information Theory IT-22, 6 (Nov.), 644-654.
  • 24
  • 25
    • 0141751776 scopus 로고    scopus 로고
    • A compositional logic for proving security properties of protocols
    • DURGIN, N. A., MITCHELL, J. C., AND PAVLOVIC, D. 2003. A compositional logic for proving security properties of protocols. Journal of Computer Security 11, 4, 677-721.
    • (2003) Journal of Computer Security , vol.11 , Issue.4 , pp. 677-721
    • DURGIN, N.A.1    MITCHELL, J.C.2    PAVLOVIC, D.3
  • 27
    • 34249664652 scopus 로고    scopus 로고
    • FREIER, A. O, KARLTON, P, AND KOCHER, P. C. November 1996. The SSL protocol: Version 3.0
    • FREIER, A. O., KARLTON, P., AND KOCHER, P. C. November 1996. The SSL protocol: Version 3.0. http://home.netscape.com/eng/ssl3/draft302.txt.
  • 29
    • 26844492006 scopus 로고    scopus 로고
    • Validating a web service security abstraction by typing
    • GORDON, A. D. AND PUCELLA, R. 2005. Validating a web service security abstraction by typing. Formal Aspects of Computing 17, 277-318.
    • (2005) Formal Aspects of Computing , vol.17 , pp. 277-318
    • GORDON, A.D.1    PUCELLA, R.2
  • 31
    • 34249703740 scopus 로고    scopus 로고
    • Using WS-Trust and WS-SecureConversation
    • At
    • GUDGIN, M. 2004. Using WS-Trust and WS-SecureConversation. MSDN. At http://msdn.microsoft.com/library/default.asp?url=/library/en- us/dnwebsrv/html/ws-trustandsecureconv.asp.
    • (2004) MSDN
    • GUDGIN, M.1
  • 32
    • 34249704265 scopus 로고    scopus 로고
    • GUDGIN, M, NADALIN, A, ET AL. 2005a. Web Services Secure Conversation Language (WS-SecureConversation) Version 1.2. At
    • GUDGIN, M., NADALIN, A., ET AL. 2005a. Web Services Secure Conversation Language (WS-SecureConversation) Version 1.2. At http://www.oasis-open.org/committees/download.php/17364/lists.oasis-open. orgarchivesws-sx200512zip00000.zip.
  • 33
    • 34249657122 scopus 로고    scopus 로고
    • GUDGIN, M, NADALIN, A, ET AL. 2005b. Web Services Trust Language (WS-Trust) Version 1.2. At
    • GUDGIN, M., NADALIN, A., ET AL. 2005b. Web Services Trust Language (WS-Trust) Version 1.2. At http://www.oasis-open. org/committees/download.php/17364/lists.oasis-open.orgarchivesws- sx200512zip00000.zip.
  • 34
    • 34249736128 scopus 로고    scopus 로고
    • GUDGIN, M, NADALIN, A, ET AL. 2005e. Web Services Trust Language (WS-Trust) Version 1.2. At
    • GUDGIN, M., NADALIN, A., ET AL. 2005e. Web Services Trust Language (WS-Trust) Version 1.2. At http://www.oasis-open. org/committees/download.php/20160/ws-trust-1.3-spec-cd-01.pdf.
  • 36
    • 0035067667 scopus 로고    scopus 로고
    • Fault-preserving simplifying transformations for security protocols
    • HUI, M. L. AND LOWE, G. 2001. Fault-preserving simplifying transformations for security protocols. Journal of Computer Security 9, 1/2, 3-46.
    • (2001) Journal of Computer Security , vol.9 , Issue.1-2 , pp. 3-46
    • HUI, M.L.1    LOWE, G.2
  • 38
    • 34249654831 scopus 로고    scopus 로고
    • KALER, C, NADALIN, A, ET AL. 2003a. Web Services Federation Language (WS-Federation) Version 1.0. At
    • KALER, C., NADALIN, A., ET AL. 2003a. Web Services Federation Language (WS-Federation) Version 1.0. At http://msdn.microsoft.com/ws/2003/07/ws-federation/.
  • 39
    • 34249707066 scopus 로고    scopus 로고
    • KALER, C, NADALIN, A, ET AL. 2003b. WS-Federation: Passive Requestor Profile Version 1.0. At
    • KALER, C., NADALIN, A., ET AL. 2003b. WS-Federation: Passive Requestor Profile Version 1.0. At ftp://www6.software.ibm.com/software/developer/library/ws-fedpass.pdf.
  • 40
    • 34249660303 scopus 로고    scopus 로고
    • KALER, C, NADALIN, A, ET AL. 2004a. Web Services Secure Conversation Language (WS-SecureConversation) Version 1.1. At
    • KALER, C., NADALIN, A., ET AL. 2004a. Web Services Secure Conversation Language (WS-SecureConversation) Version 1.1. At http://msdn.microsoft.com/ws/2004/04/ws-secure-conversation/.
  • 41
    • 34249719751 scopus 로고    scopus 로고
    • KALER, C, NADALIN, A, ET AL. 2004b. Web Services Trust Language (WS-Trust) Version 1.1. At
    • KALER, C., NADALIN, A., ET AL. 2004b. Web Services Trust Language (WS-Trust) Version 1.1. At http://msdn.microsoft. com/ws/2004/04/ws-trust/.
  • 42
    • 0028385109 scopus 로고
    • Three systems for cryptographic protocol analysis
    • KEMMERER, R., MEADOWS, C., AND MILLEN, J. 1994. Three systems for cryptographic protocol analysis. Journal of Cryptology 7, 2, 79-130.
    • (1994) Journal of Cryptology , vol.7 , Issue.2 , pp. 79-130
    • KEMMERER, R.1    MEADOWS, C.2    MILLEN, J.3
  • 46
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR
    • Tools and Algorithms for the Construction and Analysis of Systems, Springer, New York
    • LOWE, G. 1996. Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR. In Tools and Algorithms for the Construction and Analysis of Systems. LNCS, vol. 1055. Springer, New York. 147-166.
    • (1996) LNCS , vol.1055 , pp. 147-166
    • LOWE, G.1
  • 48
    • 33646239197 scopus 로고    scopus 로고
    • Microsoft Corporation, Microsoft Corporation. At
    • Microsoft Corporation 2004. Web Services Enhancements (WSE) 2.0 SP1. Microsoft Corporation. At http://msdn.microsoft.com/webservices/ building/wse/default.aspx.
    • (2004) Web Services Enhancements (WSE) 2.0 SP1
  • 51
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • NEEDHAM, R. AND SCHROEDER, M. 1978. Using encryption for authentication in large networks of computers. Commun. ACM 21, 12, 993-999.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • NEEDHAM, R.1    SCHROEDER, M.2
  • 52
    • 34249741269 scopus 로고    scopus 로고
    • OASIS Security Services TC 2005. Security Assertion Markup Language FAQ. OASIS Security Services TC. At http://www.oasis-open.org/committees/ security/faq.php.
    • OASIS Security Services TC 2005. Security Assertion Markup Language FAQ. OASIS Security Services TC. At http://www.oasis-open.org/committees/ security/faq.php.
  • 53
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • PAULSON, L. 1998. The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6, 85-128.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • PAULSON, L.1
  • 54
    • 85024252307 scopus 로고    scopus 로고
    • Inductive analysis of the internet protocol TLS
    • PAULSON, L. C. 1999. Inductive analysis of the internet protocol TLS. ACM Trans. Inf. Syst. Secur. 2, 3, 332-351.
    • (1999) ACM Trans. Inf. Syst. Secur , vol.2 , Issue.3 , pp. 332-351
    • PAULSON, L.C.1
  • 57
    • 1142277649 scopus 로고    scopus 로고
    • Web services are not distributed objects
    • VOGELS, W. 2003. Web services are not distributed objects. IEEE Internet Computing 7, 6, 59-66.
    • (2003) IEEE Internet Computing , vol.7 , Issue.6 , pp. 59-66
    • VOGELS, W.1
  • 58
    • 34249711615 scopus 로고    scopus 로고
    • W3C 2003. SOAP Version 1.2. W3C. W3C Recommendation, at
    • W3C 2003. SOAP Version 1.2. W3C. W3C Recommendation, at http://www.w3.org/TR/soap12.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.