메뉴 건너뛰기




Volumn , Issue , 2007, Pages 455-462

Guarding sensitive information streams through the jungle of composite web services

Author keywords

[No Author keywords available]

Indexed keywords

CANNING; CHEMICAL ANALYSIS; INFORMATION SERVICES; WEB SERVICES; WORLD WIDE WEB;

EID: 46849121607     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICWS.2007.93     Document Type: Conference Paper
Times cited : (8)

References (27)
  • 1
    • 46849105197 scopus 로고    scopus 로고
    • Amoeba, http://www.cs.vu.nl/pub/amoeba/
    • Amoeba
  • 2
    • 46849110741 scopus 로고    scopus 로고
    • Axis2 Architecture.http://ws.apache.org/axis2/1_0/Axis2ArchitectureGuide. html
    • Axis2 Architecture
  • 4
    • 46849117251 scopus 로고    scopus 로고
    • D. E. Bell and L. La Padula. Secure computer system: Unified exposition and multics interpretation. T.R. MTR-2997, Rev. 1, MITRE Corp., Bedford, MA, March 1976.
    • D. E. Bell and L. La Padula. "Secure computer system: Unified exposition and multics interpretation". T.R. MTR-2997, Rev. 1, MITRE Corp., Bedford, MA, March 1976.
  • 5
    • 38949086163 scopus 로고    scopus 로고
    • ICWS 2006
    • Elisa Bertino, J. Crampton, Federica Paci. "Access Control and Authorization Constraints for WS-BPEL". ICWS 2006.
    • Elisa Bertino, J.C.1    Paci, F.2
  • 7
    • 46849086711 scopus 로고    scopus 로고
    • Trusted Computing Group
    • Trusted Computing Group. https://www.trustedcomputinggroup.org/home
  • 8
    • 0003969633 scopus 로고
    • Trusted Computer System Evaluation Criteria (Orange Book)
    • Department of Defense, December
    • Department of Defense. Trusted Computer System Evaluation Criteria (Orange Book), December 1985. DoD 5200.28-STD.
    • (1985) DoD 5200.28-STD
  • 9
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • Dorothy E. Denning. "A lattice model of secure information flow". CACM, 19(5):236-243, May 1976.
    • (1976) CACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 10
    • 34047227263 scopus 로고    scopus 로고
    • Web Service Discovery and Composition for Virtual Enterprises
    • J. Dorn, P. Hrastnik, A. Rainer. "Web Service Discovery and Composition for Virtual Enterprises". In Intl. Journal of Web Services Research, Vol. 4, No. 1, page 23-29, 2007.
    • (2007) Intl. Journal of Web Services Research , vol.4 , Issue.1 , pp. 23-29
    • Dorn, J.1    Hrastnik, P.2    Rainer, A.3
  • 11
    • 84885664275 scopus 로고    scopus 로고
    • Labels and event processes in the Asbestos operating system
    • October
    • P. Efstathopoulos, et al. "Labels and event processes in the Asbestos operating system". In Proc. of the 20th SOSP, pages 17-30, October 2005.
    • (2005) Proc. of the 20th SOSP , pp. 17-30
    • Efstathopoulos, P.1
  • 12
    • 0015672289 scopus 로고    scopus 로고
    • Butler Lampson. A note on the confinement problem. CACM, 16, Issue 10 (Oct. 1973), 613-615.
    • Butler Lampson. "A note on the confinement problem". CACM, Vol. 16, Issue 10 (Oct. 1973), 613-615.
  • 13
    • 46849084484 scopus 로고
    • Capability-Based Computer Systems
    • Henry M. Levy. "Capability-Based Computer Systems". Digital Press, 1984.
    • (1984) Digital Press
    • Levy, H.M.1
  • 14
    • 0001048139 scopus 로고    scopus 로고
    • Protecting Privacy Using the Decentralized Label Model
    • October
    • Andrew C. Myers, Barbara Liskov. "Protecting Privacy Using the Decentralized Label Model". ACM TOSEM, Vol. 9, No. 4, October 2000.
    • (2000) ACM TOSEM , vol.9 , Issue.4
    • Andrew, C.1    Myers, B.L.2
  • 17
    • 46849109063 scopus 로고    scopus 로고
    • Axis2/Java - Rampart.http://ws.apache.org/axis2/modules/rampart/1_1/ security-module.html
    • Axis2/Java - Rampart
  • 18
    • 34748842601 scopus 로고    scopus 로고
    • Reducing TCB Complexity for Security-Sensitive Applications: Three Case Studies
    • L. Singaravelu, C. Pu, H. Haertig and C. Helmuth. "Reducing TCB Complexity for Security-Sensitive Applications: Three Case Studies". In Eurosys 2006.
    • Eurosys 2006
    • Singaravelu, L.1    Pu, C.2    Haertig, H.3    Helmuth, C.4
  • 19
    • 35048840741 scopus 로고    scopus 로고
    • Trail: The Reflection API. http://java.sun.com/docs/books/tutorial/ reflect/index.html
    • The Reflection API
    • Trail1
  • 23
    • 25144470629 scopus 로고    scopus 로고
    • Web Services Trust Language. ftp://www6.software.ibm.com/software/ developer/library/ws-trust.pdf
    • Web Services Trust Language
  • 24
    • 46849113989 scopus 로고    scopus 로고
    • WebTrust. http://www.webtrust.net/
    • WebTrust
  • 25
    • 3142738238 scopus 로고    scopus 로고
    • Li Xiong, Ling Liu. Peer-Trust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities. IEEE TKDE, 16, No. 7. Special issue on Peer to Peer Based Data Management, pp 843-857. July 2004.
    • Li Xiong, Ling Liu. "Peer-Trust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities". IEEE TKDE, Vol.16, No. 7. Special issue on Peer to Peer Based Data Management, pp 843-857. July 2004.
  • 27
    • 4644316411 scopus 로고    scopus 로고
    • WS-trustworthy: A Framework for Web Services Centered Trustworthy Computing
    • Jia Zhang, Liang-Jie Zhang, Jen-Yao Chung. "WS-trustworthy: A Framework for Web Services Centered Trustworthy Computing". In SCC 2004.
    • SCC 2004
    • Zhang, J.1    Zhang, L.-J.2    Chung, J.-Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.