메뉴 건너뛰기




Volumn 4677 LNCS, Issue , 2007, Pages 24-74

Secure service orchestration

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); COMPUTER PROGRAMMING LANGUAGES; GRAPHIC METHODS; INFORMATION SERVICES; REQUIREMENTS ENGINEERING; VERIFICATION;

EID: 38049092991     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74810-6_2     Document Type: Conference Paper
Times cited : (14)

References (48)
  • 3
    • 24144435318 scopus 로고    scopus 로고
    • Banerjee, A., Naumann, D.A.: History-based access control and secure information flow. In: Barthe, G., Burdy, L., Huisman, M., Lanet, J.-L., Muntean, T. (eds.) CASSIS 2004. LNCS, 3362, Springer, Heidelberg (2005)
    • Banerjee, A., Naumann, D.A.: History-based access control and secure information flow. In: Barthe, G., Burdy, L., Huisman, M., Lanet, J.-L., Muntean, T. (eds.) CASSIS 2004. LNCS, vol. 3362, Springer, Heidelberg (2005)
  • 5
    • 24644498665 scopus 로고    scopus 로고
    • History based access control with local policies
    • Sassone, V, ed, FOSSACS 2005, Springer, Heidelberg
    • Bartoletti, M., Degano, P., Ferrari, G.L.: History based access control with local policies. In: Sassone, V. (ed.) FOSSACS 2005. LNCS, vol. 3441, Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3441
    • Bartoletti, M.1    Degano, P.2    Ferrari, G.L.3
  • 6
    • 38049054663 scopus 로고    scopus 로고
    • Bartoletti, M., Degano, P., Ferrari, G.L.: Planning and verifying service composition. Technical Report TR-07-02, Dip. Informatica, Univ. of Pisa, (to appear in Journal of Computer Security, 2007), http://compass2.di.unipi.it/TR/ Files/TR-07-02.pdf.gz
    • Bartoletti, M., Degano, P., Ferrari, G.L.: Planning and verifying service composition. Technical Report TR-07-02, Dip. Informatica, Univ. of Pisa, (to appear in Journal of Computer Security, 2007), http://compass2.di.unipi.it/TR/ Files/TR-07-02.pdf.gz
  • 15
    • 33845212195 scopus 로고    scopus 로고
    • Bhargavan, K., Fournet, C., Gordon, A.D.: Verified reference implementations of WS-security protocols. In: Bravetti, M., Ńñez, M., Zavattaro, G. (eds.) WS-FM 2006. LNCS, 4184, Springer, Heidelberg (2006)
    • Bhargavan, K., Fournet, C., Gordon, A.D.: Verified reference implementations of WS-security protocols. In: Bravetti, M., Ńñez, M., Zavattaro, G. (eds.) WS-FM 2006. LNCS, vol. 4184, Springer, Heidelberg (2006)
  • 18
    • 33845218651 scopus 로고    scopus 로고
    • Boreale, M., et al.: SCC: a service centered calculus. In: Bravetti, M., Ńñez, M., Zavattaro, G. (eds.) WS-FM 2006. LNCS, 4184, Springer, Heidelberg (2006)
    • Boreale, M., et al.: SCC: a service centered calculus. In: Bravetti, M., Ńñez, M., Zavattaro, G. (eds.) WS-FM 2006. LNCS, vol. 4184, Springer, Heidelberg (2006)
  • 19
    • 35048817930 scopus 로고    scopus 로고
    • Behavioural types and component adaptation
    • Rattray, C, Maharaj, S, Shankland, C, eds, AMAST 2004, Springer, Heidelberg
    • Brogi, A., Canal, C., Pimentel, E.: Behavioural types and component adaptation. In: Rattray, C., Maharaj, S., Shankland, C. (eds.) AMAST 2004. LNCS, vol. 3116, Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3116
    • Brogi, A.1    Canal, C.2    Pimentel, E.3
  • 24
    • 84982912143 scopus 로고    scopus 로고
    • History-based access control for mobile code
    • Vitek, J, ed, Secure Internet Programming, Springer, Heidelberg
    • Edjlali, G., Acharya, A., Chaudhary, V.: History-based access control for mobile code. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol. 1603, Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1603
    • Edjlali, G.1    Acharya, A.2    Chaudhary, V.3
  • 25
    • 85010943862 scopus 로고    scopus 로고
    • Esparza, J.: On the decidability of model checking for several μ-calculi and Petri nets. In: Tison, S. (ed.) CAAP 1994. LNCS, 787, Springer, Heidelberg (1994)
    • Esparza, J.: On the decidability of model checking for several μ-calculi and Petri nets. In: Tison, S. (ed.) CAAP 1994. LNCS, vol. 787, Springer, Heidelberg (1994)
  • 26
    • 33750564723 scopus 로고    scopus 로고
    • JSCL: A middleware for service coordination
    • Najm, E, Pradat-Peyre, J.F, Donzeau-Gouge, V.V, eds, FORTE 2006, Springer, Heidelberg
    • Ferrari, G.L., Guanciale, R., Strollo, D.: JSCL: A middleware for service coordination. In: Najm, E., Pradat-Peyre, J.F., Donzeau-Gouge, V.V. (eds.) FORTE 2006. LNCS, vol. 4229, Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4229
    • Ferrari, G.L.1    Guanciale, R.2    Strollo, D.3
  • 28
    • 38049061046 scopus 로고    scopus 로고
    • Garcia-Molina, H., Salem, K.: Sagas. In: Proc. ACM SIGMOD, ACM Press, New York (1987)
    • Garcia-Molina, H., Salem, K.: Sagas. In: Proc. ACM SIGMOD, ACM Press, New York (1987)
  • 31
    • 24344510232 scopus 로고    scopus 로고
    • Security policies as membranes in systems for global computing. Logical Methods in Computer
    • Gorla, D., Hennessy, M., Sassone, V.: Security policies as membranes in systems for global computing. Logical Methods in Computer Science 1(3) (2005)
    • (2005) Science , vol.1 , Issue.3
    • Gorla, D.1    Hennessy, M.2    Sassone, V.3
  • 32
    • 77049098553 scopus 로고    scopus 로고
    • SOCK: A calculus for service oriented computing
    • Dan, A, Lamersdorf, W, eds, ICSOC 2006, Springer, Heidelberg
    • Guidi, C., Lucchi, R., Gorrieri, R., Busi, N., Zavattaro, G.: SOCK: A calculus for service oriented computing. In: Dan, A., Lamersdorf, W. (eds.) ICSOC 2006. LNCS, vol. 4294, Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4294
    • Guidi, C.1    Lucchi, R.2    Gorrieri, R.3    Busi, N.4    Zavattaro, G.5
  • 33
    • 84947741770 scopus 로고    scopus 로고
    • Language primitives and type discipline for structures communication-based programming
    • Hankin, C, ed, ESOP 1998 and ETAPS 1998, Springer, Heidelberg
    • Honda, K., Vansconcelos, V., Kubo, M.: Language primitives and type discipline for structures communication-based programming. In: Hankin, C. (ed.) ESOP 1998 and ETAPS 1998. LNCS, vol. 1381, Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1381
    • Honda, K.1    Vansconcelos, V.2    Kubo, M.3
  • 36
    • 33646184170 scopus 로고    scopus 로고
    • Encoding requests to web service compositions as constraints
    • In: van Beek, P, ed, CP, Springer, Heidelberg
    • Lazovik, A., Aiello, M., Gennari, R.: Encoding requests to web service compositions as constraints. In: van Beek, P. (ed.) CP 2005. LNCS, vol. 3709, Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3709
    • Lazovik, A.1    Aiello, M.2    Gennari, R.3
  • 37
    • 0344583792 scopus 로고    scopus 로고
    • Marriott, K., Stuckey, P.J., Sulzmann, M.: Resource usage verification. In: Ohori, A. (ed.) APLAS 2003. LNCS, 2895, Springer, Heidelberg (2003)
    • Marriott, K., Stuckey, P.J., Sulzmann, M.: Resource usage verification. In: Ohori, A. (ed.) APLAS 2003. LNCS, vol. 2895, Springer, Heidelberg (2003)
  • 42
    • 0037272061 scopus 로고    scopus 로고
    • Secure composition of untrusted code: Box-π, wrappers and causality types
    • Sewell, P., Vitek, J.: Secure composition of untrusted code: box-π, wrappers and causality types. Journal of Computer Security 11(2) (2003)
    • (2003) Journal of Computer Security , vol.11 , Issue.2
    • Sewell, P.1    Vitek, J.2
  • 43
    • 35048838770 scopus 로고    scopus 로고
    • Skalka, C., Smith, S.: History effects and verification. In: Chin, W.-N. (ed.) APLAS 2004. LNCS, 3302, Springer, Heidelberg (2004)
    • Skalka, C., Smith, S.: History effects and verification. In: Chin, W.-N. (ed.) APLAS 2004. LNCS, vol. 3302, Springer, Heidelberg (2004)
  • 46
    • 28144444894 scopus 로고    scopus 로고
    • Typing the behaviours of objects and components using session types
    • Vallecillo, A., Vansconcelos, V., Ravara, A.: Typing the behaviours of objects and components using session types. In: Proc. of FOCLASA (2002)
    • (2002) Proc. of FOCLASA
    • Vallecillo, A.1    Vansconcelos, V.2    Ravara, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.