-
1
-
-
46849105197
-
-
Amoeba, http://www.cs.vu.nl/pub/amoeba/
-
Amoeba
-
-
-
2
-
-
46849110741
-
-
Axis2 Architecture.http://ws.apache.org/axis2/1_0/Axis2ArchitectureGuide. html
-
Axis2 Architecture
-
-
-
4
-
-
46849117251
-
-
D. E. Bell and L. La Padula. Secure computer system: Unified exposition and multics interpretation. T.R. MTR-2997, Rev. 1, MITRE Corp., Bedford, MA, March 1976.
-
D. E. Bell and L. La Padula. "Secure computer system: Unified exposition and multics interpretation". T.R. MTR-2997, Rev. 1, MITRE Corp., Bedford, MA, March 1976.
-
-
-
-
5
-
-
38949086163
-
ICWS 2006
-
Elisa Bertino, J. Crampton, Federica Paci. "Access Control and Authorization Constraints for WS-BPEL". ICWS 2006.
-
-
-
Elisa Bertino, J.C.1
Paci, F.2
-
7
-
-
46849086711
-
-
Trusted Computing Group
-
Trusted Computing Group. https://www.trustedcomputinggroup.org/home
-
-
-
-
8
-
-
0003969633
-
Trusted Computer System Evaluation Criteria (Orange Book)
-
Department of Defense, December
-
Department of Defense. Trusted Computer System Evaluation Criteria (Orange Book), December 1985. DoD 5200.28-STD.
-
(1985)
DoD 5200.28-STD
-
-
-
9
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
Dorothy E. Denning. "A lattice model of secure information flow". CACM, 19(5):236-243, May 1976.
-
(1976)
CACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
10
-
-
34047227263
-
Web Service Discovery and Composition for Virtual Enterprises
-
J. Dorn, P. Hrastnik, A. Rainer. "Web Service Discovery and Composition for Virtual Enterprises". In Intl. Journal of Web Services Research, Vol. 4, No. 1, page 23-29, 2007.
-
(2007)
Intl. Journal of Web Services Research
, vol.4
, Issue.1
, pp. 23-29
-
-
Dorn, J.1
Hrastnik, P.2
Rainer, A.3
-
11
-
-
84885664275
-
Labels and event processes in the Asbestos operating system
-
October
-
P. Efstathopoulos, et al. "Labels and event processes in the Asbestos operating system". In Proc. of the 20th SOSP, pages 17-30, October 2005.
-
(2005)
Proc. of the 20th SOSP
, pp. 17-30
-
-
Efstathopoulos, P.1
-
12
-
-
0015672289
-
-
Butler Lampson. A note on the confinement problem. CACM, 16, Issue 10 (Oct. 1973), 613-615.
-
Butler Lampson. "A note on the confinement problem". CACM, Vol. 16, Issue 10 (Oct. 1973), 613-615.
-
-
-
-
13
-
-
46849084484
-
Capability-Based Computer Systems
-
Henry M. Levy. "Capability-Based Computer Systems". Digital Press, 1984.
-
(1984)
Digital Press
-
-
Levy, H.M.1
-
14
-
-
0001048139
-
Protecting Privacy Using the Decentralized Label Model
-
October
-
Andrew C. Myers, Barbara Liskov. "Protecting Privacy Using the Decentralized Label Model". ACM TOSEM, Vol. 9, No. 4, October 2000.
-
(2000)
ACM TOSEM
, vol.9
, Issue.4
-
-
Andrew, C.1
Myers, B.L.2
-
17
-
-
46849109063
-
-
Axis2/Java - Rampart.http://ws.apache.org/axis2/modules/rampart/1_1/ security-module.html
-
Axis2/Java - Rampart
-
-
-
18
-
-
34748842601
-
Reducing TCB Complexity for Security-Sensitive Applications: Three Case Studies
-
L. Singaravelu, C. Pu, H. Haertig and C. Helmuth. "Reducing TCB Complexity for Security-Sensitive Applications: Three Case Studies". In Eurosys 2006.
-
Eurosys 2006
-
-
Singaravelu, L.1
Pu, C.2
Haertig, H.3
Helmuth, C.4
-
19
-
-
35048840741
-
-
Trail: The Reflection API. http://java.sun.com/docs/books/tutorial/ reflect/index.html
-
The Reflection API
-
-
Trail1
-
23
-
-
25144470629
-
-
Web Services Trust Language. ftp://www6.software.ibm.com/software/ developer/library/ws-trust.pdf
-
Web Services Trust Language
-
-
-
24
-
-
46849113989
-
-
WebTrust. http://www.webtrust.net/
-
WebTrust
-
-
-
25
-
-
3142738238
-
-
Li Xiong, Ling Liu. Peer-Trust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities. IEEE TKDE, 16, No. 7. Special issue on Peer to Peer Based Data Management, pp 843-857. July 2004.
-
Li Xiong, Ling Liu. "Peer-Trust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities". IEEE TKDE, Vol.16, No. 7. Special issue on Peer to Peer Based Data Management, pp 843-857. July 2004.
-
-
-
-
27
-
-
4644316411
-
WS-trustworthy: A Framework for Web Services Centered Trustworthy Computing
-
Jia Zhang, Liang-Jie Zhang, Jen-Yao Chung. "WS-trustworthy: A Framework for Web Services Centered Trustworthy Computing". In SCC 2004.
-
SCC 2004
-
-
Zhang, J.1
Zhang, L.-J.2
Chung, J.-Y.3
|