메뉴 건너뛰기




Volumn 22, Issue 5, 2007, Pages 267-278

On the effects of authentication and authorisation infrastructures on e-commerce environments

Author keywords

Authentication and authorisation infrastructures; E commerce; IT outsourcing; IT security; Risk assessment

Indexed keywords

AUTHENTICATION; DATA PRIVACY; ECONOMIC ANALYSIS; INTERNET; OUTSOURCING; RISK ASSESSMENT; RISK MANAGEMENT; USER INTERFACES;

EID: 38949174954     PISSN: 02676192     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (2)

References (33)
  • 1
    • 0012208471 scopus 로고    scopus 로고
    • Finally, a Real Return on Security Spending
    • Feb
    • Berinato, S. (2002). Finally, a Real Return on Security Spending. CIO Magazin, Feb. 2002.
    • (2002) CIO Magazin
    • Berinato, S.1
  • 3
    • 0035575945 scopus 로고    scopus 로고
    • The PAPI system: Point of access to providers of information
    • Castro-Rojo, R. and López, D. R. (2001). The PAPI system: point of access to providers of information. Computer Networks, 37(6) 703-710.
    • (2001) Computer Networks , vol.37 , Issue.6 , pp. 703-710
    • Castro-Rojo, R.1    López, D.R.2
  • 6
    • 26844534244 scopus 로고    scopus 로고
    • Privacy Enhanced Technologies: Methods, Markets, Misuse
    • Proc. of the International Conference on Trust, Privacy & Security in Digital Business TrustBus '05, Copenhagen, Denmark, Springer
    • Federrath, H. (2005). Privacy Enhanced Technologies: Methods, Markets, Misuse. Proc. of the International Conference on Trust, Privacy & Security in Digital Business (TrustBus '05), Lecture Notes in Computer Science (LNCS), Vol. 3592, Copenhagen, Denmark, Springer.
    • (2005) Lecture Notes in Computer Science (LNCS , vol.3592
    • Federrath, H.1
  • 7
    • 38949183642 scopus 로고    scopus 로고
    • Anonyme und unbeobachtbare Kommunikaton im Internet
    • Jahrestagung der Gesellschaft für Informatik e.v, Dortmund, GI
    • Federrath, H., Köpseli, S. and Langos, H. (2002). Anonyme und unbeobachtbare Kommunikaton im Internet. Proc. of the 32. Jahrestagung der Gesellschaft für Informatik e.v., LNI 19, Dortmund, GI.
    • (2002) Proc. of the 32 , vol.LNI 19
    • Federrath, H.1    Köpseli, S.2    Langos, H.3
  • 8
    • 38949194207 scopus 로고    scopus 로고
    • Feigenbaum, J. (1998). Towards an Infrastructure for Authorization -Position Paper. Proc. of the 3rd USENIX Workshop on Electronic Commerce - Invited Talks Supplement, Boston, Massachusetts, USA, USENIX.
    • Feigenbaum, J. (1998). Towards an Infrastructure for Authorization -Position Paper. Proc. of the 3rd USENIX Workshop on Electronic Commerce - Invited Talks Supplement, Boston, Massachusetts, USA, USENIX.
  • 11
    • 38949105845 scopus 로고    scopus 로고
    • Kilger, M., Arkin, O. and Stutzman, a. J. (2004) In Know Your Enemy: Learning about Security Threats(Ed, Project, T. H.) Addison-Wesley Professional, pp. 505-556.
    • Kilger, M., Arkin, O. and Stutzman, a. J. (2004) In Know Your Enemy: Learning about Security Threats(Ed, Project, T. H.) Addison-Wesley Professional, pp. 505-556.
  • 12
    • 38949161871 scopus 로고    scopus 로고
    • Liberty Alliance (2004a). Liberty ID-FF Bindings and Profiles Specification. Accesible at http://www.projectliberty.org/liberty/content/ download/319/2369/file/draft-liberty-idff-bindings-profiles-1.2-errata-v2.0.pdf.
    • Liberty Alliance (2004a). Liberty ID-FF Bindings and Profiles Specification. Accesible at http://www.projectliberty.org/liberty/content/ download/319/2369/file/draft-liberty-idff-bindings-profiles-1.2-errata-v2.0.pdf.
  • 13
    • 38949083156 scopus 로고    scopus 로고
    • Liberty Alliance (2004b). Liberty ID-FF Protocols Schema Specification. Accesible at http://www.projectliberty.org/liberty/content/ download/2197/14625/file/draft-liberty-idff-protocols-schema1.2-errata-v3-0.pdf.
    • Liberty Alliance (2004b). Liberty ID-FF Protocols Schema Specification. Accesible at http://www.projectliberty.org/liberty/content/ download/2197/14625/file/draft-liberty-idff-protocols-schema1.2-errata-v3-0.pdf.
  • 14
    • 8344266879 scopus 로고    scopus 로고
    • Authentication and authorization infrastructures (AAIs): A comparative survey
    • Lopez, J., Oppliger, R. and Pernul, G. (2004). Authentication and authorization infrastructures (AAIs): a comparative survey. Computers & Security, 23(7) 578-590.
    • (2004) Computers & Security , vol.23 , Issue.7 , pp. 578-590
    • Lopez, J.1    Oppliger, R.2    Pernul, G.3
  • 16
    • 11844303949 scopus 로고    scopus 로고
    • Microsoft Inc, Accesible at
    • Microsoft Inc. (2003). Microsoft Passport Review Guide. Accesible at http://download.microsoft.com/download/a/f/4/af49b391-086e-4aa2-a84b- ef6d916b2f08/passport_reviewguide.doc.
    • (2003) Microsoft Passport Review Guide
  • 18
    • 38949205576 scopus 로고    scopus 로고
    • Nowey, T., Federrath, H., Klein, C. and Plößl, K. (2005). Ansätze zur Evaluierung von Sicherheitsinvestitionen. Proc. of the Annual Sicherheit Conference 2005, Lecture Notes in Informatics, Regensburg, Germany, GI.
    • Nowey, T., Federrath, H., Klein, C. and Plößl, K. (2005). Ansätze zur Evaluierung von Sicherheitsinvestitionen. Proc. of the Annual "Sicherheit" Conference 2005, Lecture Notes in Informatics, Regensburg, Germany, GI.
  • 19
    • 33745883651 scopus 로고    scopus 로고
    • OASIS eXtensible Access Control Markup Language Technical Committee, Accesible at
    • OASIS eXtensible Access Control Markup Language Technical Committee eXtensible Access Control Markup Language (XACML). Accesible at http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=xacml.
    • eXtensible Access Control Markup Language (XACML)
  • 20
    • 33646149431 scopus 로고    scopus 로고
    • OASIS Security Services Technical Committee, Accesible at
    • OASIS Security Services Technical Committee Security Assertion Markup Language (SAML). Accesible at http://www.oasis-open.org/committees/tc_home. php?wg_abbrev=security.
    • Security Assertion Markup Language (SAML)
  • 23
    • 0034271735 scopus 로고    scopus 로고
    • Risky business: What we have yet to learn about risk management
    • Pfleeger, S. L. (2000). Risky business: what we have yet to learn about risk management. Journal of Systems and Software, 53(3) 265-273.
    • (2000) Journal of Systems and Software , vol.53 , Issue.3 , pp. 265-273
    • Pfleeger, S.L.1
  • 24
    • 38949202991 scopus 로고
    • Risk Management for Software Development
    • Rook, P. (1993). Risk Management for Software Development. ESCOM Tutorial, 24.
    • (1993) ESCOM Tutorial , vol.24
    • Rook, P.1
  • 26
    • 33750036384 scopus 로고    scopus 로고
    • Towards a Risk Management Perspective on AAIs
    • Proc. of the International Conference on Trust, Privacy & Security in Digital Business TrustBus '06, Krakow, Poland, Springer
    • Schläger, C. and Nowey, T. (2006). Towards a Risk Management Perspective on AAIs. Proc. of the International Conference on Trust, Privacy & Security in Digital Business (TrustBus '06), Lecture Notes in Computer Science (LNCS), Vol. 4083, Krakow, Poland, Springer.
    • (2006) Lecture Notes in Computer Science (LNCS , vol.4083
    • Schläger, C.1    Nowey, T.2
  • 28
    • 26844573387 scopus 로고    scopus 로고
    • Schläger, C. and Pernul, G. (2005). Authentication and Authorisation Infrastructures in b2c E-Commerce. Proc. of the International Conference on E-Commerce and Web Technologies (EC-Web'05), Copenhagen, Denmark, Lecture Notes in Computer Science (LNCS), 3590, Copenhagen, Denmark, Springer.
    • Schläger, C. and Pernul, G. (2005). Authentication and Authorisation Infrastructures in b2c E-Commerce. Proc. of the International Conference on E-Commerce and Web Technologies (EC-Web'05), Copenhagen, Denmark, Lecture Notes in Computer Science (LNCS), Vol. 3590, Copenhagen, Denmark, Springer.
  • 29
    • 33750066953 scopus 로고    scopus 로고
    • Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers
    • Proc. of the International Conference on E-Commerce and Web Technologies EC-Web'06, Krakow, Poland, Krakow, Poland, Springer
    • Schläger, C., Sojer, M., Muschall, B. and Pernul, G. (2006). Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers. Proc. of the International Conference on E-Commerce and Web Technologies (EC-Web'06), Krakow, Poland, Lecture Notes in Computer Science (LNCS), Vol. 4082, Krakow, Poland, Springer.
    • (2006) Lecture Notes in Computer Science (LNCS , vol.4082
    • Schläger, C.1    Sojer, M.2    Muschall, B.3    Pernul, G.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.