메뉴 건너뛰기




Volumn , Issue , 2006, Pages 42-47

Security attack ontology for Web services

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SYSTEM FIREWALLS; INTRUSION DETECTION; ONTOLOGY; SECURITY SYSTEMS; SEMANTICS; WEBSITES; WEB SERVICES;

EID: 44949240818     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SKG.2006.85     Document Type: Conference Paper
Times cited : (48)

References (24)
  • 1
    • 0004309520 scopus 로고    scopus 로고
    • Research in Intrusion-Detection Systems: A Survey
    • Technical report 98-17, Chalmers University of Technology
    • S. Axelsson, "Research in Intrusion-Detection Systems: A Survey", Technical report 98-17, Chalmers University of Technology, 1998.
    • (1998)
    • Axelsson, S.1
  • 3
    • 44949259605 scopus 로고    scopus 로고
    • OWL-S Semantics of Security Web Services: A Case Study
    • Menlo Park, California, USA
    • G. Denker, S. Nguyen, and A. Ton, "OWL-S Semantics of Security Web Services: a Case Study", SRI International, Menlo Park, California, USA., 2004.
    • (2004) SRI International
    • Denker, G.1    Nguyen, S.2    Ton, A.3
  • 5
    • 84863643277 scopus 로고    scopus 로고
    • SOAP Web Services Attacks: Are your web applications vulnerable?
    • S. Faust, "SOAP Web Services Attacks: Are your web applications vulnerable?", SPIDynamics, 2003.
    • (2003) SPIDynamics
    • Faust, S.1
  • 6
    • 44949257742 scopus 로고    scopus 로고
    • Indra: A peer-to-peer approach to network intrusion detection and prevention
    • Austria, June
    • R. Janakiraman, M. Waldvogel, and Q. Zhang, "Indra: A peer-to-peer approach to network intrusion detection and prevention", IEEE WETICE2003, Austria, June 2003.
    • (2003) IEEE WETICE2003
    • Janakiraman, R.1    Waldvogel, M.2    Zhang, Q.3
  • 7
    • 44949160343 scopus 로고    scopus 로고
    • Security in a Web Services World: A Proposed Architecture and Roadmap
    • IBM and Microsoft, April
    • IBM and Microsoft, "Security in a Web Services World: A Proposed Architecture and Roadmap", A joint security whitepaper from IBM and Microsoft, April 2002.
    • (2002) A joint security whitepaper from IBM and Microsoft
  • 8
    • 44949194395 scopus 로고    scopus 로고
    • KAoS. http://www.ihmc.us/research/projects/KAoS/.
    • KAoS
  • 9
    • 8344261545 scopus 로고    scopus 로고
    • PacketScore: Statistical-based Overload Control against Distributed Denial-of-Service Attacks
    • March
    • Y. Kim, W. C. Lau, M. C. Chuah, and J. H. Chao, "PacketScore: Statistical-based Overload Control against Distributed Denial-of-Service Attacks", IEEE INFOCOM, March 2004.
    • (2004) IEEE INFOCOM
    • Kim, Y.1    Lau, W.C.2    Chuah, M.C.3    Chao, J.H.4
  • 10
    • 44949173600 scopus 로고    scopus 로고
    • A Security Characterisation Framework for Trustworthy Component Based Software Systems
    • USA
    • K. Khan and J. Han, "A Security Characterisation Framework for Trustworthy Component Based Software Systems", COMPSAC2003, USA, 2003.
    • (2003) COMPSAC2003
    • Khan, K.1    Han, J.2
  • 11
    • 44949151258 scopus 로고    scopus 로고
    • Security Characterisation and Compositional Analysis for Component-based Software Systems
    • PhD thesis, Monash University, April
    • K. Khan, "Security Characterisation and Compositional Analysis for Component-based Software Systems", PhD thesis, Monash University, April 2005.
    • (2005)
    • Khan, K.1
  • 12
    • 62749155242 scopus 로고    scopus 로고
    • Security Ontology for Annotating Resources
    • Cyprus
    • A. Kim, J. Luo, and M. Kang, "Security Ontology for Annotating Resources", ODBASE 2005, Cyprus, 2005
    • (2005) ODBASE 2005
    • Kim, A.1    Luo, J.2    Kang, M.3
  • 13
    • 33845548325 scopus 로고    scopus 로고
    • Attacking and Defending Web Services
    • January
    • P. Lindstrom, "Attacking and Defending Web Services", A Spire Research Report, January 2004.
    • (2004) A Spire Research Report
    • Lindstrom, P.1
  • 14
    • 44949142636 scopus 로고    scopus 로고
    • METEOR-S
    • METEOR-S, http://lsdis.cs.uga.edu/projects/meteor-s/.
  • 15
    • 25844488402 scopus 로고    scopus 로고
    • D-WARD: Source-End Defence Against Distributed Denial-of-Service Attacks
    • University of California
    • J. Mirkovic, "D-WARD: Source-End Defence Against Distributed Denial-of-Service Attacks", The PhD thesis, University of California, 2003.
    • (2003) The PhD thesis
    • Mirkovic, J.1
  • 17
    • 33645830920 scopus 로고    scopus 로고
    • What Is Web 2.0, Design Patterns and Business Models for the Next Generation of Software
    • T. O'Reilly, "What Is Web 2.0, Design Patterns and Business Models for the Next Generation of Software", 2005.
    • (2005)
    • O'Reilly, T.1
  • 18
    • 44949121280 scopus 로고    scopus 로고
    • OWL
    • OWL, http:w3.org/TR/owl-features/.
  • 19
    • 44949107802 scopus 로고    scopus 로고
    • OWL-S
    • OWL-S, http://www.daml.org/services/.
  • 20
    • 44949237611 scopus 로고    scopus 로고
    • Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps
    • USA
    • A. Stamos and S. Stender, "Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps", BlackHat2005, USA, 2005.
    • (2005) BlackHat2005
    • Stamos, A.1    Stender, S.2
  • 21
    • 44949190993 scopus 로고    scopus 로고
    • SWSL
    • SWSL, http://www.daml.org/services/swsl/.
  • 23
    • 44949110433 scopus 로고    scopus 로고
    • Specifying Dynamic Security Properties of Web Service Based Systems, SKG2006, Guilin, China, 2006
    • To appear
    • A. Vorobiev and J. Han, "Specifying Dynamic Security Properties of Web Service Based Systems", SKG2006, Guilin, China, 2006. To appear.
    • Vorobiev, A.1    Han, J.2
  • 24
    • 44949156941 scopus 로고    scopus 로고
    • WSMO
    • WSMO, http://www.wsmo.org/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.