-
1
-
-
26844573387
-
-
C. Schläger and G. Pernul, Authentication and Authorisation Infrastructures in b2c E-Commerce, Proc. of the International Conference on E-Commerce and Web Technologies (EC-Web'05), Copenhagen, Denmark, Lecture Notes in Computer Science (LNCS), 3590, Copenhagen, Denmark, 2005.
-
C. Schläger and G. Pernul, "Authentication and Authorisation Infrastructures in b2c E-Commerce", Proc. of the International Conference on E-Commerce and Web Technologies (EC-Web'05), Copenhagen, Denmark, Lecture Notes in Computer Science (LNCS), Vol. 3590, Copenhagen, Denmark, 2005.
-
-
-
-
2
-
-
12744277616
-
Architectural patterns for enabling application security
-
B. F. N. Harrison, and H. Rohnert, Ed. Harlow, England: Addison-Wesley
-
J. Yoder and J. Barcalow, "Architectural patterns for enabling application security", in Pattern Languages of Program Design, vol. 4, B. F. N. Harrison, and H. Rohnert, Ed. Harlow, England: Addison-Wesley, 2000.
-
(2000)
Pattern Languages of Program Design
, vol.4
-
-
Yoder, J.1
Barcalow, J.2
-
3
-
-
33750050331
-
-
John Wiley & Sons
-
M. Schumacher, E. B. Fernández, D. Hybertson, F. Buschmann, and P. Sommerlad, Security Patterns: Integrating Security and Systems Engineering: John Wiley & Sons, 2006.
-
(2006)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernández, E.B.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
4
-
-
8344266879
-
Authentication and authorization infrastructures (AAIs): A comparative survey
-
J. Lopez, R. Oppliger, and G. Pernul, "Authentication and authorization infrastructures (AAIs): a comparative survey", Computers & Security, vol. 23, pp. 578-590, 2004.
-
(2004)
Computers & Security
, vol.23
, pp. 578-590
-
-
Lopez, J.1
Oppliger, R.2
Pernul, G.3
-
5
-
-
33750085639
-
-
C. Schläger, T. Nowey, and J. A. Montenegro, A reference model for Authentication and Authorisation Infrastructures respecting privacy and flexibility in b2c E-Commerce, Proc. of the 1st International Conference on Availability, Reliability and Security (ARES 2006), Vienna, Austria, Vienna, Austria, 2006.
-
C. Schläger, T. Nowey, and J. A. Montenegro, "A reference model for Authentication and Authorisation Infrastructures respecting privacy and flexibility in b2c E-Commerce", Proc. of the 1st International Conference on Availability, Reliability and Security (ARES 2006), Vienna, Austria, Vienna, Austria, 2006.
-
-
-
-
6
-
-
33750066953
-
-
C. Schläger, M. Sojer, B. Muschall, and G. Pernul, Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers, Proc. of the International Conference on E-Commerce and Web Technologies (EC-Web'06), Krakow, Poland, Lecture Notes in Computer Science (LNCS), 4082, Krakow, Poland, 2006.
-
C. Schläger, M. Sojer, B. Muschall, and G. Pernul, "Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers", Proc. of the International Conference on E-Commerce and Web Technologies (EC-Web'06), Krakow, Poland, Lecture Notes in Computer Science (LNCS), Vol. 4082, Krakow, Poland, 2006.
-
-
-
-
7
-
-
33646149431
-
-
OASIS Security Services Technical Committee, online
-
OASIS Security Services Technical Committee, "Security Assertion Markup Language (SAML)", 2005, online: http://www.oasis-open.org/ committees/tc_home.php?wg_abbrev=security.
-
(2005)
Security Assertion Markup Language (SAML)
-
-
-
8
-
-
33745883651
-
eXtensible Access Control Markup Language (XACML)
-
OASIS eXtensible Access Control Markup Language Technical Committee, online
-
OASIS eXtensible Access Control Markup Language Technical Committee, "eXtensible Access Control Markup Language (XACML)", 2005, online: http://www.oasis-open. org/committees/tc_home.php?wg_abbrev=xacml.
-
(2005)
-
-
-
9
-
-
47849104691
-
-
A. Anderson and H. Lockhart, SAML 2.0 profile of XACML v2.0 (OASIS Standard), 2005, online: http://docs.oasis-open.org/xacml/2.0/ access_control-xacml-2.0-saml-profile-spec-os.pdf.
-
A. Anderson and H. Lockhart, "SAML 2.0 profile of XACML v2.0 (OASIS Standard)", 2005, online: http://docs.oasis-open.org/xacml/2.0/ access_control-xacml-2.0-saml-profile-spec-os.pdf.
-
-
-
-
10
-
-
47849109263
-
Patterns for Web Services Security
-
Portland, Oregon, USA
-
E. B. Fernandez, N. Delessy, and M. M. Larrondo-Petrie, "Patterns for Web Services Security", Proc. of the 4th Intl. Workshop on Service-Oriented Architecture and Web Services, part of OOPSLA 2006, Portland, Oregon, USA, 2006.
-
(2006)
Proc. of the 4th Intl. Workshop on Service-Oriented Architecture and Web Services, part of OOPSLA
-
-
Fernandez, E.B.1
Delessy, N.2
Larrondo-Petrie, M.M.3
-
11
-
-
49049109969
-
A Pattern Language for Identity Management
-
N. Delessy, E. B. Fernández, and M. M. Larrondo-Petrie, "A Pattern Language for Identity Management", 2nd IEEE Int. Multiconference on Computing in the Global Information Technology (ICCGI 2007), Guadeloupe, French Caribbean, 2007.
-
(2007)
2nd IEEE Int. Multiconference on Computing in the Global Information Technology (ICCGI 2007), Guadeloupe, French Caribbean
-
-
Delessy, N.1
Fernández, E.B.2
Larrondo-Petrie, M.M.3
-
12
-
-
67449087408
-
The Credential Pattern
-
Portland, Oregon, USA
-
P. Morrison and E. B. Fernandez, "The Credential Pattern", Pattern Languages of Programs (PLoP 2006) conference, Portland, Oregon, USA, 2006.
-
(2006)
Pattern Languages of Programs (PLoP 2006) conference
-
-
Morrison, P.1
Fernandez, E.B.2
-
13
-
-
12744262690
-
-
E. B. Fernández, Two patterns for web services security, Proc. International Symposium on Web Services and Applications (ISWS'04), Las Vegas, NV, Las Vegas, NV, USA, 2004.
-
E. B. Fernández, "Two patterns for web services security", Proc. International Symposium on Web Services and Applications (ISWS'04), Las Vegas, NV, Las Vegas, NV, USA, 2004.
-
-
-
-
14
-
-
84892902868
-
-
T. Priebe, E. B. Fernández, J. I. Mehlau, and G. Pernul, A Pattern System for Access Control, Proc. of the Annual IFIP WG 11.3 Working Conference on Data and Application Security Sitges, Spain, 2004.
-
T. Priebe, E. B. Fernández, J. I. Mehlau, and G. Pernul, "A Pattern System for Access Control", Proc. of the Annual IFIP WG 11.3 Working Conference on Data and Application Security Sitges, Spain, 2004.
-
-
-
-
15
-
-
33750490069
-
-
Upper Saddle River, NJ: Prentice Hall PTR
-
C. Steel, R. Nagappan, and R. Lai, Core security patterns: best practices and strategies for J2EE, Web services, and identity management. Upper Saddle River, NJ: Prentice Hall PTR, 2006.
-
(2006)
Core security patterns: Best practices and strategies for J2EE, Web services, and identity management
-
-
Steel, C.1
Nagappan, R.2
Lai, R.3
-
16
-
-
67449107159
-
Patterns for Session-Based Access Control
-
Portland, Oregon, USA
-
E. B. Fernandez and G. Pernul, "Patterns for Session-Based Access Control", Proc. of the Intl. Conference on Pattern Languages of Programming (PLoP'06), Portland, Oregon, USA, 2006.
-
(2006)
Proc. of the Intl. Conference on Pattern Languages of Programming (PLoP'06)
-
-
Fernandez, E.B.1
Pernul, G.2
-
17
-
-
47849088955
-
Patterns for the eXtensible Access Control Markup Language
-
Allerton Park, IL, USA
-
N. Delessy and E. B. Fernández, "Patterns for the eXtensible Access Control Markup Language", Proc. of the Pattern Languages of Programs Conference (PloP 2005), Allerton Park, IL, USA, 2005.
-
(2005)
Proc. of the Pattern Languages of Programs Conference (PloP
-
-
Delessy, N.1
Fernández, E.B.2
|