메뉴 건너뛰기




Volumn 2692, Issue , 2003, Pages 75-90

Trust-based protection of software component users and designers

Author keywords

[No Author keywords available]

Indexed keywords

COST EFFECTIVENESS; DESIGN; INFORMATION SERVICES; MOBILE SECURITY; NETWORK SECURITY;

EID: 34250724930     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44875-6_6     Document Type: Article
Times cited : (21)

References (34)
  • 3
    • 35248888647 scopus 로고    scopus 로고
    • Sun Microsystems: Java Beans Specification. Available via WWW: java.sun.com /beans/docs/spec.html (1998)
    • (1998) Java Beans Specification
  • 4
    • 35248884523 scopus 로고    scopus 로고
    • Technical Report #00-28, University of California, Irvine, Department of Information and Computer Science
    • Lüer, C., Rosenblum, D.S.: WREN - An Environment for Component-Based Development. Technical Report #00-28, University of California, Irvine, Department of Information and Computer Science (2000)
    • (2000) WREN - An Environment for Component-Based Development
    • Lüer, C.1    Rosenblum, D.S.2
  • 6
    • 0344416225 scopus 로고    scopus 로고
    • Microsoft
    • Microsoft: The Microsoft COM Technologies. Available via WWW: http://www. microsoft.com/com/comPapers.asp (1998)
    • (1998) The Microsoft COM Technologies
  • 8
    • 0032097883 scopus 로고    scopus 로고
    • A Map of Security Risks Associated with Using COTS
    • Lindqvist, U., Jonsson, E.: A Map of Security Risks Associated with Using COTS. IEEE Computer 31 (1998) 60-66
    • (1998) IEEE Computer , vol.31 , pp. 60-66
    • Lindqvist, U.1    Jonsson, E.2
  • 10
    • 0034872904 scopus 로고    scopus 로고
    • Trust-adapted enforcement of security policies in distributed component-structured applications
    • Hammamet, IEEE Computer Society Press
    • Herrmann, P., Krumm, H.: Trust-adapted enforcement of security policies in distributed component-structured applications. In: Proceedings of the 6th IEEE Symposium on Computers and Communications, Hammamet, IEEE Computer Society Press (2001) 2-8
    • (2001) Proceedings of the 6th IEEE Symposium on Computers and Communications , pp. 2-8
    • Herrmann, P.1    Krumm, H.2
  • 11
    • 84904244303 scopus 로고    scopus 로고
    • State-Based Security Policy Enforcement in Component-Based E-Commerce Applications
    • E-Business & E-Government (I3E), Lisbon, Kluwer Academic Publisher
    • Herrmann, P., Wiebusch, L., Krumm, H.: State-Based Security Policy Enforcement in Component-Based E-Commerce Applications. In: Proceedings of the 2nd IFIP Conference on E-Commerce, E-Business & E-Government (I3E), Lisbon, Kluwer Academic Publisher (2002) 195-209
    • (2002) Proceedings of the 2nd IFIP Conference on E-Commerce , pp. 195-209
    • Herrmann, P.1    Wiebusch, L.2    Krumm, H.3
  • 15
    • 85084161255 scopus 로고    scopus 로고
    • Cryptographic Support for Secure Logs on Untrusted Machines
    • San Antonio, USENIX Press
    • Schneier, B., Kelsey, J.: Cryptographic Support for Secure Logs on Untrusted Machines. In: Proceedings of the 7th USENIX Security Symposium, San Antonio, USENIX Press (1998) 53-62
    • (1998) Proceedings of the 7th USENIX Security Symposium , pp. 53-62
    • Schneier, B.1    Kelsey, J.2
  • 16
    • 0038223020 scopus 로고    scopus 로고
    • Technical report, Computer Science and Engineering Department, University of California at San Diego
    • Bellare, M., Yee, B.: Forward Integrity for Secure Audit Logs. Technical report, Computer Science and Engineering Department, University of California at San Diego (1997)
    • (1997) Forward Integrity for Secure Audit Logs
    • Bellare, M.1    Yee, B.2
  • 18
    • 0002863367 scopus 로고
    • Valuation of Trust in Open Networks
    • Proceedings of the European Symposium on Research in Security (ESORICS). Brighton, Springer-Verlag
    • Beth, T., Borcherding, M., Klein, B.: Valuation of Trust in Open Networks. In: Proceedings of the European Symposium on Research in Security (ESORICS). Lecture Notes in Computer Science 875, Brighton, Springer-Verlag (1994) 3-18
    • (1994) Lecture Notes in Computer Science , vol.875 , pp. 3-18
    • Beth, T.1    Borcherding, M.2    Klein, B.3
  • 24
    • 35248830154 scopus 로고    scopus 로고
    • Building Trust for E-Commerce: Collaborating Label Bureaus
    • Kou, W., Yesha, Y., Tan, C.J., eds.: Proceedings of the 2nd International Symposium on Electronic Commerce Technologies (ISEC'2001). Hong Kong, Springer-Verlag
    • Shepherd, M., Dhonde, A., Watters, C.: Building Trust for E-Commerce: Collaborating Label Bureaus. In Kou, W., Yesha, Y., Tan, C.J., eds.: Proceedings of the 2nd International Symposium on Electronic Commerce Technologies (ISEC'2001). LNCS 2040, Hong Kong, Springer-Verlag (2001) 42-56
    • (2001) LNCS , vol.2040 , pp. 42-56
    • Shepherd, M.1    Dhonde, A.2    Watters, C.3
  • 26
    • 35248858024 scopus 로고    scopus 로고
    • eBay Inc.: Feedback Forum. Available via WWW: pages.ebay.com/services/forum /feedback.html (2002)
    • (2002) Feedback Forum
  • 28
    • 84871044906 scopus 로고    scopus 로고
    • Immunizing Online Reputation Reporting Systems Against Unfair Ratings and Discriminatory Behavior
    • ACM Press
    • Dellarocas, C.: Immunizing Online Reputation Reporting Systems Against Unfair Ratings and Discriminatory Behavior. In: Proceedings of the 2nd ACM Conference on Electronic Commerce (EC'00), ACM Press (2000) 150-157
    • (2000) Proceedings of the 2nd ACM Conference on Electronic Commerce (EC'00) , pp. 150-157
    • Dellarocas, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.