메뉴 건너뛰기




Volumn , Issue , 2007, Pages 90-98

Security-by-contract for web services

Author keywords

automated trust negotiation; security by contract; web services

Indexed keywords

AUTOMATED TRUST NEGOTIATION; CLASSICAL APPROACH; NEGOTIATION FRAMEWORK; NEGOTIATION PROTOCOL; NEGOTIATION STRATEGY; PERSONAL ATTRIBUTES; SECURITY-BY-CONTRACT; SERVICE PROVIDER; TRUST NEGOTIATIONS;

EID: 50149088324     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1314418.1314433     Document Type: Conference Paper
Times cited : (16)

References (20)
  • 1
    • 0038613719 scopus 로고    scopus 로고
    • Secure mediation: Requirements, design, and architecture
    • C. Altenschmidt, J. Biskup, U. Flegel, and Y. Karabulut. Secure mediation: Requirements, design, and architecture. JCS, 11(3):365-398, 2003.
    • (2003) JCS , vol.11 , Issue.3 , pp. 365-398
    • Altenschmidt, C.1    Biskup, J.2    Flegel, U.3    Karabulut, Y.4
  • 2
    • 33745270070 scopus 로고    scopus 로고
    • Designing the mobile ipv6 security protocol
    • T. Aura and M. Roe. Designing the mobile ipv6 security protocol. Annales des Télécommunications, 61(3-4):332-356, 2006.
    • (2006) Annales des Télécommunications , vol.61 , Issue.3-4 , pp. 332-356
    • Aura, T.1    Roe, M.2
  • 4
    • 0036311802 scopus 로고    scopus 로고
    • A unified framework for regulating access and information release on the web
    • P. Bonatti and P. Samarati. A unified framework for regulating access and information release on the web. JCS, 10(3):241-272, 2002.
    • (2002) JCS , vol.10 , Issue.3 , pp. 241-272
    • Bonatti, P.1    Samarati, P.2
  • 5
    • 0002817535 scopus 로고    scopus 로고
    • The PERMIS X.509 role-based privilege management infrastructure
    • ACM Press
    • D. W. Chadwick and A. Otenko. The PERMIS X.509 role-based privilege management infrastructure. In Proc. of SACMAT'02, pages 135-140. ACM Press, 2002.
    • (2002) Proc. of SACMAT'02 , pp. 135-140
    • Chadwick, D.W.1    Otenko, A.2
  • 7
    • 37849002157 scopus 로고    scopus 로고
    • Security-by-contract: Toward a semantics for digital signatures on mobile code
    • Springer-Verlag
    • N. Dragoni, F. Massacci, K. Naliuka, and I. Siahaan. Security-by- contract: Toward a semantics for digital signatures on mobile code. In Proc. of EuroPKI'07, pages 297-312. Springer-Verlag, 2007.
    • (2007) Proc. of EuroPKI'07 , pp. 297-312
    • Dragoni, N.1    Massacci, F.2    Naliuka, K.3    Siahaan, I.4
  • 9
    • 37349029082 scopus 로고    scopus 로고
    • Towards contract-based testing of web services
    • Proc. of the Int. Workshop on Test and Analysis of Component Based Systems (TACoS 2004), of Elsevier Sci.
    • R. Heckel and M. Lohmann. Towards contract-based testing of web services. In Proc. of the Int. Workshop on Test and Analysis of Component Based Systems (TACoS 2004), volume 82 of ENTCS. Elsevier Sci., 2004.
    • (2004) ENTCS , vol.82
    • Heckel, R.1    Lohmann, M.2
  • 11
    • 33947544647 scopus 로고    scopus 로고
    • A negotiation scheme for access rights establishment in autonomic communication
    • H. Koshutanski and F. Massacci. A negotiation scheme for access rights establishment in autonomic communication. J. of Net. and Sys. Managment, 15(1):117-136, 2007.
    • (2007) J. of Net. and Sys. Managment , vol.15 , Issue.1 , pp. 117-136
    • Koshutanski, H.1    Massacci, F.2
  • 12
    • 33745764834 scopus 로고    scopus 로고
    • Automated trust negotiation using cryptographic credentials
    • ACM Press
    • J. Li, N. Li, and W. H. Winsborough. Automated trust negotiation using cryptographic credentials. In Proc. of CCS'05, pages 46-57. ACM Press, 2005.
    • (2005) Proc. of CCS'05 , pp. 46-57
    • Li, J.1    Li, N.2    Winsborough, W.H.3
  • 13
    • 0347720836 scopus 로고    scopus 로고
    • An adaptive policy based framework for network services management
    • L. Lymberopoulos, E. Lupu, and M. Sloman. An adaptive policy based framework for network services management. J. of Net. and Sys. Managment, 11(3):277-303, 2003.
    • (2003) J. of Net. and Sys. Managment , vol.11 , Issue.3 , pp. 277-303
    • Lymberopoulos, L.1    Lupu, E.2    Sloman, M.3
  • 14
    • 34250616363 scopus 로고    scopus 로고
    • Access control enforcement for conversation-based web services
    • ACM Press
    • M. Mecella, M. Ouzzani, F. Paci, and E. Bertino. Access control enforcement for conversation-based web services. In Proc. of WWW'06, pages 257-266. ACM Press, 2006.
    • (2006) Proc. of WWW'06 , pp. 257-266
    • Mecella, M.1    Ouzzani, M.2    Paci, F.3    Bertino, E.4
  • 15
    • 0000685151 scopus 로고    scopus 로고
    • Distributed rational decision making
    • G. Weiss, editor The MIT Press, Cambridge, Massachusetts
    • T. Sandholm. Distributed rational decision making. In G. Weiss, editor, Multiagent Systems, pages 201-259. The MIT Press, Cambridge, Massachusetts, 1999.
    • (1999) Multiagent Systems , pp. 201-259
    • Sandholm, T.1
  • 16
    • 33845533762 scopus 로고    scopus 로고
    • Automated trust negotiation
    • Technical report, US Patent and Trademark Office, IBM Corporation, patent application filed March 7, 2000
    • K. Seamons and W. Winsborough. Automated trust negotiation. Technical report, US Patent and Trademark Office, 2002. IBM Corporation, patent application filed March 7, 2000.
    • (2002)
    • Seamons, K.1    Winsborough, W.2
  • 17
    • 21644444136 scopus 로고    scopus 로고
    • Model-carrying code: A practical approach for safe execution of untrusted applications
    • ACM Press
    • R. Sekar, V. Venkatakrishnan, S. Basu, S. Bhatkar, and D. DuVarney. Model-carrying code: a practical approach for safe execution of untrusted applications. In Proc. of ACM SOSP'03., pages 15-28. ACM Press, 2003.
    • (2003) Proc. of ACM SOSP'03 , pp. 15-28
    • Sekar, R.1    Venkatakrishnan, V.2    Basu, S.3    Bhatkar, S.4    DuVarney, D.5
  • 19
    • 35248824719 scopus 로고    scopus 로고
    • PhD thesis Univ. of Cambridge, Computer Laboratory, Technical report UCAM-CL-TR-608, ISSN 1476-2986
    • W. Yao. Trust management for widely distributed systems. PhD thesis, Univ. of Cambridge, Computer Laboratory, 2004. Technical report UCAM-CL-TR-608, ISSN 1476-2986.
    • (2004) Trust Management for Widely Distributed Systems
    • Yao, W.1
  • 20
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. TISSEC, 6(1):1-42, 2003.
    • (2003) TISSEC , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.