메뉴 건너뛰기




Volumn 34, Issue 1, 2008, Pages 33-49

Semantics-based design for secure web services

Author keywords

Call by contract; Language based security; Static analysis; System verification; Web services

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; GRAPH THEORY; MATHEMATICAL MODELS; MODEL CHECKING; SECURITY OF DATA; SEMANTICS; SOFTWARE DESIGN; SOFTWARE ENGINEERING;

EID: 40449126543     PISSN: 00985589     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSE.2007.70740     Document Type: Article
Times cited : (51)

References (51)
  • 3
    • 25144470629 scopus 로고    scopus 로고
    • Web Services Trust Language (WS-Trust),
    • S. Anderson et al., "Web Services Trust Language (WS-Trust)," technical report, 2005.
    • (2005) technical report
    • Anderson, S.1
  • 4
    • 1642394689 scopus 로고    scopus 로고
    • Web Services Security (WS-Security),
    • B. Atkinson et al., "Web Services Security (WS-Security)," technical report, 2002.
    • (2002) technical report
    • Atkinson, B.1
  • 8
    • 40449117517 scopus 로고    scopus 로고
    • M. Bartoletti, P. Degano, and G.L. Ferrari, Planning and Verifying Service Composition, Technical Report TR-07-02, Dept. of Informatics, Univ. of Pisa, 2007, J. Computer Security, to appear.
    • M. Bartoletti, P. Degano, and G.L. Ferrari, "Planning and Verifying Service Composition," Technical Report TR-07-02, Dept. of Informatics, Univ. of Pisa, 2007, J. Computer Security, to appear.
  • 16
    • 40449087509 scopus 로고    scopus 로고
    • B. Bloch et al, Web Services Business Process Execution Language Version 2.0, TC OASIS technical report, 2005
    • B. Bloch et al., "Web Services Business Process Execution Language Version 2.0," TC OASIS technical report, 2005.
  • 17
    • 40449090281 scopus 로고    scopus 로고
    • D. Booth et al, Web Service Description Language (WSDL) Version 2.0, technical report, 2006
    • D. Booth et al., "Web Service Description Language (WSDL) Version 2.0," technical report, 2006.
  • 24
    • 33845199948 scopus 로고    scopus 로고
    • Building Systems Using a Service-Oriented Architecture
    • SCA Consortium, white paper
    • "Building Systems Using a Service-Oriented Architecture," SCA Consortium, white paper, 2005.
    • (2005)
  • 33
    • 10444246889 scopus 로고    scopus 로고
    • UML 1.4 Profile for Automated Business Process with a Mapping to the BPEL 1.0
    • white paper
    • T. Gardner et al., "UML 1.4 Profile for Automated Business Process with a Mapping to the BPEL 1.0," white paper, 2003.
    • (2003)
    • Gardner, T.1
  • 39
    • 40449093388 scopus 로고    scopus 로고
    • Barbed Model-Driven Software Development: A Case Study,
    • IST-2005-016004, 2007
    • C. Montangero and L. Semini, "Barbed Model-Driven Software Development: A Case Study," SENSORIA Technical Report IST-2005-016004, 2007.
    • SENSORIA Technical Report
    • Montangero, C.1    Semini, L.2
  • 45
    • 0041732124 scopus 로고    scopus 로고
    • M. Stal, Web Services: Beyond Component-Based Computing, Comm. ACM, 55, no. 10, 2002.
    • M. Stal, "Web Services: Beyond Component-Based Computing," Comm. ACM, vol. 55, no. 10, 2002.
  • 47
    • 4544279898 scopus 로고    scopus 로고
    • Web Services Policy Framework (WS-Policy),
    • Vedamuthu et al., "Web Services Policy Framework (WS-Policy)," technical report, 2006.
    • (2006) technical report
    • Vedamuthu1
  • 48
    • 1142277649 scopus 로고    scopus 로고
    • Web Services Are Not Distributed Objects
    • Nov./Dec
    • W. Vogels, "Web Services Are Not Distributed Objects," IEEE Internet Computing, vol. 7, no. 6, Nov./Dec. 2003.
    • (2003) IEEE Internet Computing , vol.7 , Issue.6
    • Vogels, W.1
  • 49
    • 40449142373 scopus 로고    scopus 로고
    • UDDI technical white paper, W3C, 2000.
    • "UDDI technical white paper," W3C, 2000.
  • 51
    • 0027266208 scopus 로고
    • Trust Relationships in Secure Systems: A Distributed Authentication Perspective
    • R. Yahalom, B. Klein, and Th. Beth, "Trust Relationships in Secure Systems: A Distributed Authentication Perspective," Proc. IEEE Symp. Security and Privacy, 1993.
    • (1993) Proc. IEEE Symp. Security and Privacy
    • Yahalom, R.1    Klein, B.2    Beth, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.