-
1
-
-
51149111717
-
-
Apache Software Foundation, Axis2 Architecture Guide (ws.apache.org/ axis2/0_95/Axis2ArchitectureGuide.html), 2006.
-
(2006)
Axis2 Architecture Guide
-
-
-
2
-
-
51149105358
-
Specifying SOAP handlers for a web service
-
San Jose, California
-
BEA Systems, Specifying SOAP handlers for a web service, BEA WebLogic Workshop Help (Online), San Jose, California (edocs.bea.com/workshop/ docs81/doc/en/core/index.html).
-
BEA WebLogic Workshop Help (Online)
-
-
Systems, B.E.A.1
-
3
-
-
33749059207
-
Fair BPEL processes transaction using non-repudiation protocols
-
M. Bilal, J. Thomas, M. Thomas and S. Abraham, Fair BPEL processes transaction using non-repudiation protocols, Proceedings of the IEEE International Conference on Services Computing, pp. 337-340, 2005.
-
(2005)
Proceedings of the IEEE International Conference on Services Computing
, pp. 337-340
-
-
Bilal, M.1
Thomas, J.2
Thomas, M.3
Abraham, S.4
-
4
-
-
0029732592
-
Non-repudiation with mandatory proof of receipt
-
T. Coffey and P. Saidha, Non-repudiation with mandatory proof of receipt, ACM SIGCOMM Computer Communication Review, vol. 26(1), pp. 6-17, 1996.
-
(1996)
ACM SIGCOMM Computer Communication Review
, vol.26
, Issue.1
, pp. 6-17
-
-
Coffey, T.1
Saidha, P.2
-
6
-
-
4744374362
-
Monitoring e-business web service usage through a log based architecture
-
S. da Cruz, M. Campos, P. Pires and L. Campos, Monitoring e-business web service usage through a log based architecture, Proceedings of the IEEE International Conference on Web Services, pp. 61-69, 2004.
-
(2004)
Proceedings of the IEEE International Conference on Web Services
, pp. 61-69
-
-
da Cruz, S.1
Campos, M.2
Pires, P.3
Campos, L.4
-
9
-
-
51149122447
-
Attacking and defending web services
-
presented at the
-
D. Green, Attacking and defending web services, presented at the Nebraska CERT Conference (www.certconf.org/presentations/2006/files/TA2.pdf), 2006.
-
(2006)
Nebraska CERT Conference
-
-
Green, D.1
-
10
-
-
51149094243
-
The Delivery and Evidence Layer, Report 2007/ 139, Cryptology ePrint Archive
-
A. Herzberg and I. Yoffe, The Delivery and Evidence Layer, Report 2007/ 139, Cryptology ePrint Archive (eprint.iacr.org/2007/139.pdf), 2007.
-
(2007)
-
-
Herzberg, A.1
Yoffe, I.2
-
11
-
-
33745196859
-
Digital evidence bag
-
C. Hosmer, Digital evidence bag, Communications of the ACM, vol. 49(2), pp. 69-70, 2006.
-
(2006)
Communications of the ACM
, vol.49
, Issue.2
, pp. 69-70
-
-
Hosmer, C.1
-
12
-
-
51149114287
-
-
Armonk, New York
-
IBM Corporation, JAX-RPC handlers collection, Armonk, New York (publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/ com.ibm.websphere.pmc.express.doc/sibusresources/JAXRPC Handler CollectionForm.html), 2007.
-
(2007)
JAX-RPC handlers collection
-
-
-
15
-
-
21644490164
-
Backtracking intrusions
-
S. King and P. Chen, Backtracking intrusions, ACM SIGOPS Operating Systems Review, vol. 37(5), pp. 223-236, 2003.
-
(2003)
ACM SIGOPS Operating Systems Review
, vol.37
, Issue.5
, pp. 223-236
-
-
King, S.1
Chen, P.2
-
16
-
-
0036836682
-
An intensive survey of fair non-repudiation protocols
-
S. Kremer, O. Markowitch and J. Zhou, An intensive survey of fair non-repudiation protocols, Computer Communications, vol. 25(17), pp. 1606-1621, 2002.
-
(2002)
Computer Communications
, vol.25
, Issue.17
, pp. 1606-1621
-
-
Kremer, S.1
Markowitch, O.2
Zhou, J.3
-
17
-
-
84926508224
-
-
California
-
J. Mallery, J. Zahn, P. Kelly, W. Noonan, E. Seagren, P. Love, R. Kraft and M. O'Neill, Hardening Network Security, McGraw-Hill/Osborne, Emeryville, California, 2005.
-
(2005)
Hardening Network Security, McGraw-Hill/Osborne, Emeryville
-
-
Mallery, J.1
Zahn, J.2
Kelly, P.3
Noonan, W.4
Seagren, E.5
Love, P.6
Kraft, R.7
O'Neill, M.8
-
21
-
-
51149093592
-
-
OASIS Web Services Secure Exchange Technical Committee, WS-Trust V1.0, OASIS (www.oasis-open.org/committees/download.php/16138/ oasis-wssx-ws-trust-1.0.pdf), 2006.
-
OASIS Web Services Secure Exchange Technical Committee, WS-Trust V1.0, OASIS (www.oasis-open.org/committees/download.php/16138/ oasis-wssx-ws-trust-1.0.pdf), 2006.
-
-
-
-
22
-
-
51149120488
-
-
OASIS Web Services Secure Exchange Technical Committee, WS-SecureConversation 1.3, OASIS (docs.oasis-open.org/ws-sx/ ws-secureconversation/200512/ws-secureconversation-1.3-os.html), 2007.
-
OASIS Web Services Secure Exchange Technical Committee, WS-SecureConversation 1.3, OASIS (docs.oasis-open.org/ws-sx/ ws-secureconversation/200512/ws-secureconversation-1.3-os.html), 2007.
-
-
-
-
23
-
-
84944070321
-
Intermediary non-repudiation protocols
-
J. Onieva, J. Zhou, M. Carbonell and J. Lopez, Intermediary non-repudiation protocols, Proceedings of the IEEE International Conference on E-Commerce Technology, pp. 207-214, 2003.
-
(2003)
Proceedings of the IEEE International Conference on E-Commerce Technology
, pp. 207-214
-
-
Onieva, J.1
Zhou, J.2
Carbonell, M.3
Lopez, J.4
-
24
-
-
51149089858
-
-
Oracle, Using JAX-RPC handlers, Oracle Application Server Web Services Developer's Guide, Redwood Shores, California (download.oracle.com/docs/cd/B31017 01/web.1013/b28974/ jaxrpchandlers.htm), 2006.
-
Oracle, Using JAX-RPC handlers, Oracle Application Server Web Services Developer's Guide, Redwood Shores, California (download.oracle.com/docs/cd/B31017 01/web.1013/b28974/ jaxrpchandlers.htm), 2006.
-
-
-
-
25
-
-
38949205195
-
Axis2: Middleware for next generation web services
-
S. Perera, C. Herath, J. Ekanayake, A. Ranabahu. D. Jayasinghe, S. Weerawarana and G. Daniels, Axis2: Middleware for next generation web services, Proceedings of the IEEE International Conference on Web Services, pp. 833-840, 2006.
-
(2006)
Proceedings of the IEEE International Conference on Web Services
, pp. 833-840
-
-
Perera, S.1
Herath, C.2
Ekanayake, J.3
Ranabahu, A.4
Jayasinghe, D.5
Weerawarana, S.6
Daniels, G.7
-
27
-
-
24344435004
-
-
Sams Publishing, Indianapolis, Indiana
-
J. Rosenberg and D. Remy, Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature and XML Encryption, Sams Publishing, Indianapolis, Indiana, 2004.
-
(2004)
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature and XML Encryption
-
-
Rosenberg, J.1
Remy, D.2
-
29
-
-
35248838230
-
ForNet: A distributed forensics network
-
K. Shanmugasundaram, N. Memon, A. Savant and H. Bronnimann, ForNet: A distributed forensics network, Proceedings of the Second International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, pp. 1-16, 2003.
-
(2003)
Proceedings of the Second International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security
, pp. 1-16
-
-
Shanmugasundaram, K.1
Memon, N.2
Savant, A.3
Bronnimann, H.4
|