메뉴 건너뛰기




Volumn , Issue , 2007, Pages 313-318

Resource classification based negotiation in web services

Author keywords

Access control; Interoperability; Negotiation; Trust

Indexed keywords

INFORMATION SERVICES;

EID: 46749116030     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IAS.2007.54     Document Type: Conference Paper
Times cited : (2)

References (19)
  • 1
    • 46749116762 scopus 로고    scopus 로고
    • eXtensible Access Control Markup Language (XACML) Version 2. Standard, OASIS, February 2005
    • eXtensible Access Control Markup Language (XACML) Version 2. Standard, OASIS, February 2005.
  • 2
    • 46749086620 scopus 로고    scopus 로고
    • Web Services Security: Key Industry Standards and Emerging Specifications Used for Securing Web Services. White Paper, Computer Associates, January 2005.
    • Web Services Security: Key Industry Standards and Emerging Specifications Used for Securing Web Services. White Paper, Computer Associates, January 2005.
  • 3
    • 46749137865 scopus 로고    scopus 로고
    • D. Fensel and C. Bussler. The Web Service Modeling Framework WSMF. Submitted for Electronic Commerce Research and Applications, 2002.
    • D. Fensel and C. Bussler. The Web Service Modeling Framework WSMF. Submitted for Electronic Commerce Research and Applications, 2002.
  • 4
    • 33646516652 scopus 로고    scopus 로고
    • Ws-AC: A Fine Grained Access Control System for Web Services
    • September
    • E. Bertino, A. C. Squicciarini, I. Paloscia, and L. Martino. Ws-AC: A Fine Grained Access Control System for Web Services. World Wide Web, 9(2):143-171, September 2005.
    • (2005) World Wide Web , vol.9 , Issue.2 , pp. 143-171
    • Bertino, E.1    Squicciarini, A.C.2    Paloscia, I.3    Martino, L.4
  • 5
    • 1942532238 scopus 로고    scopus 로고
    • XML-Based Specification for Web Services Document Security
    • April
    • R. Bhatti, E. Bertino, A. Ghafoor, and J. B. Joshi. XML-Based Specification for Web Services Document Security. IEEE Computer Society, 37(4):41-49, April 2004.
    • (2004) IEEE Computer Society , vol.37 , Issue.4 , pp. 41-49
    • Bhatti, R.1    Bertino, E.2    Ghafoor, A.3    Joshi, J.B.4
  • 6
    • 85025819125 scopus 로고    scopus 로고
    • F. Cuppens, N. Cuppens-Boulahia, and C. Coma. 020: Virtual Private Organizations to Manage Security Policy Interoperability. In ICISS, pages 101-115, 2006.
    • F. Cuppens, N. Cuppens-Boulahia, and C. Coma. 020: Virtual Private Organizations to Manage Security Policy Interoperability. In ICISS, pages 101-115, 2006.
  • 7
    • 0035342199 scopus 로고    scopus 로고
    • Cover story management
    • F. Cuppens and A. Gabillon. Cover story management. Data Knowl. Eng., 37(2):177-201, 2001.
    • (2001) Data Knowl. Eng , vol.37 , Issue.2 , pp. 177-201
    • Cuppens, F.1    Gabillon, A.2
  • 10
    • 0037392527 scopus 로고    scopus 로고
    • Standards for XML and Web services security
    • April
    • Martin Naedele. Standards for XML and Web services security. Computer, 36(4):96-98, April 2003.
    • (2003) Computer , vol.36 , Issue.4 , pp. 96-98
    • Naedele, M.1
  • 14
    • 85056545124 scopus 로고    scopus 로고
    • Limiting the Disclosure of Access Control Policies During Automated Trust Negotiation
    • San Diego, CA, April
    • K. Seamons, M. Winslett, and T. Yu. Limiting the Disclosure of Access Control Policies During Automated Trust Negotiation. In Network and Distributed System Security Symposium, San Diego, CA, April 2001.
    • (2001) Network and Distributed System Security Symposium
    • Seamons, K.1    Winslett, M.2    Yu, T.3
  • 15
    • 60849099714 scopus 로고    scopus 로고
    • K. Seamons, M. Winslett, T. Yu, T. Chan, E. Child, M. Halcrow, A. Hess, J. Holt, J. Jacobson, R. Jarvis, A. Patty, B. Smith, T. Sundelin, and L. Yu. Trust Negotiation in Dynamic Coalitions. DARPA Information Survivability Conference and Exposition (DISCEX'03), 2:240-245, April 2003.
    • K. Seamons, M. Winslett, T. Yu, T. Chan, E. Child, M. Halcrow, A. Hess, J. Holt, J. Jacobson, R. Jarvis, A. Patty, B. Smith, T. Sundelin, and L. Yu. Trust Negotiation in Dynamic Coalitions. DARPA Information Survivability Conference and Exposition (DISCEX'03), 2:240-245, April 2003.
  • 18
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • February
    • T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security (TISSEC), 6(1):1-42, February 2003.
    • (2003) ACM Transactions on Information and System Security (TISSEC) , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3
  • 19
    • 34047244882 scopus 로고    scopus 로고
    • Attribute based access control (ABAC): A new access control approach for service oriented architectures
    • April
    • E. Yuan and J. Tong. Attribute based access control (ABAC): a new access control approach for service oriented architectures. Ottawa New Challenges for Access Control Workshop, April 2005.
    • (2005) Ottawa New Challenges for Access Control Workshop
    • Yuan, E.1    Tong, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.