메뉴 건너뛰기




Volumn , Issue , 2006, Pages 71-78

Security-oriented service composition and evolution

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION THEORY; MODAL ANALYSIS; MODEL CHECKING; SOFTWARE ENGINEERING; STRUCTURE (COMPOSITION);

EID: 35448984481     PISSN: 15301362     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/APSEC.2006.51     Document Type: Conference Paper
Times cited : (19)

References (26)
  • 2
    • 46149113595 scopus 로고    scopus 로고
    • Issue on Service -Oriented Computing
    • ACM. Special Issue on Service -Oriented Computing. Comm. of the ACM, 46(10), 2003.
    • (2003) Comm. of the ACM , vol.46 , Issue.10
    • Special, A.C.M.1
  • 4
    • 19244381332 scopus 로고
    • Logic Programming and Knowledge Representation
    • Baral, C., Gelfond, M., "Logic Programming and Knowledge Representation", Journal of Logic Programming, 19, 20:73-148, 1994.
    • (1994) Journal of Logic Programming , vol.19 , Issue.20 , pp. 73-148
    • Baral, C.1    Gelfond, M.2
  • 6
    • 0035441026 scopus 로고    scopus 로고
    • Dynamic Adaptation and Deployment of Distributed Components in Hadas
    • September
    • Ben-Shaul, I., Holder, A., Lavva, B., "Dynamic Adaptation and Deployment of Distributed Components in Hadas", IEEE Transactions on Software Engineering, Vol. 27, No. 9, September 2001.
    • (2001) IEEE Transactions on Software Engineering , vol.27 , Issue.9
    • Ben-Shaul, I.1    Holder, A.2    Lavva, B.3
  • 8
    • 4344571569 scopus 로고    scopus 로고
    • Security for DAML Web Services: Annotation and Matchmaking
    • USA
    • Denker, G. et al., Security for DAML Web Services: Annotation and Matchmaking. In Proc. 2nd Intl Semantic Web Conf., Sanibel, USA, 2003.
    • (2003) Proc. 2nd Intl Semantic Web Conf., Sanibel
    • Denker, G.1
  • 9
    • 0036145519 scopus 로고    scopus 로고
    • Building Software Securely from the Ground Up
    • Ghosh, A.K. et al. Building Software Securely from the Ground Up. IEEE Software, 19(1): 14-16, 2002.
    • (2002) IEEE Software , vol.19 , Issue.1 , pp. 14-16
    • Ghosh, A.K.1
  • 11
    • 46149112493 scopus 로고    scopus 로고
    • ISO/IEC-15408. Common Criteria for Information Technology Security Evaluation, Version 2.0. NIST, 1999, USA
    • ISO/IEC-15408. Common Criteria for Information Technology Security Evaluation, Version 2.0. NIST, 1999, USA. http://csrc.nist.gov/cc/.
  • 13
    • 0036143326 scopus 로고    scopus 로고
    • Composing Security-Aware Software
    • Khan, K., Han, J., "Composing Security-Aware Software", IEEE Software, 19(1):34-41, 2002.
    • (2002) IEEE Software , vol.19 , Issue.1 , pp. 34-41
    • Khan, K.1    Han, J.2
  • 14
    • 0344235406 scopus 로고    scopus 로고
    • Khan, K, Han, J, A Security Characterisation Framework for Trustworthy Component Based Software Systems, In Proc. 27th Annual Int'l Computer Software and Applications Conf, Dallas, pages 164-169, 2003. IEEE CS Press
    • Khan, K., Han, J.," A Security Characterisation Framework for Trustworthy Component Based Software Systems", In Proc. 27th Annual Int'l Computer Software and Applications Conf., Dallas, pages 164-169, 2003. IEEE CS Press.
  • 15
    • 84945177135 scopus 로고    scopus 로고
    • On Constraintbased Reasoning in eNegotiation Agents
    • F. Dignum and U. Corts Eds, Agent Mediated Electronic Commerce III, Springer-Verlag, pp
    • Kowalczyk, R., Bui, V., "On Constraintbased Reasoning in eNegotiation Agents", In F. Dignum and U. Corts (Eds.) Agent Mediated Electronic Commerce III, LNAI, Springer-Verlag, pp. 31-46, 2000.
    • (2000) LNAI , pp. 31-46
    • Kowalczyk, R.1    Bui, V.2
  • 16
    • 34250752124 scopus 로고    scopus 로고
    • Agent Technologies, Infrastructures, Tools, and Applications for e-Services
    • Kowalczyk, R, Mller, J, Tianfield, H, Unland, R, Eds, Springer-Verlag
    • Kowalczyk, R., Mller, J., Tianfield, H., Unland, R. (Eds), Agent Technologies, Infrastructures, Tools, and Applications for e-Services. LNAI 2592, Springer-Verlag, 2003.
    • (2003) LNAI , vol.2592
  • 18
    • 0025438880 scopus 로고    scopus 로고
    • McCullough, D., A HookUp Theorem for Multilevel Security. IEEE Trans. on Software Engineering, pp. 563-568, 1990.
    • McCullough, D., A HookUp Theorem for Multilevel Security. IEEE Trans. on Software Engineering, pp. 563-568, 1990.
  • 19
    • 46149098231 scopus 로고    scopus 로고
    • Preist, C., Byde, A., Bartolini, C., Piccinelli, G., Towards Agent-based Service Composition through Negotiation in Multiple Auctions. TR hpl-2001-71, Hewlett Packard, 2002.
    • Preist, C., Byde, A., Bartolini, C., Piccinelli, G., Towards Agent-based Service Composition through Negotiation in Multiple Auctions. TR hpl-2001-71, Hewlett Packard, 2002.
  • 24
    • 0032099189 scopus 로고    scopus 로고
    • The Challenges of Using COTS Software in Component-Based Development
    • June, pp
    • Voas, J., The Challenges of Using COTS Software in Component-Based Development. IEEE Computer, June, pp. 44-45, 1998.
    • (1998) IEEE Computer , pp. 44-45
    • Voas, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.