-
2
-
-
51449095607
-
-
CERT Coordination of the Carnegie Mellow Software Engineering, Retrieved May 20, 2006, from
-
CERT Coordination of the Carnegie Mellow Software Engineering. (2006). Retrieved May 20, 2006, from: http://www.cert.org
-
(2006)
-
-
-
4
-
-
33144458586
-
Software security and SOA: Danger, Will Robinson!
-
Epstein, J., Matsumoto, S., & McGraw, G. (2006). Software security and SOA: Danger, Will Robinson! IEEE Security and Privacy, 4(1), 80-83.
-
(2006)
IEEE Security and Privacy
, vol.4
, Issue.1
, pp. 80-83
-
-
Epstein, J.1
Matsumoto, S.2
McGraw, G.3
-
6
-
-
51449106809
-
-
International Data Group, Retrieved May 11, 2006, from
-
International Data Group. (2006). CIO and Computerworld research: The forecast for SOA. Retrieved May 11, 2006, from: http://www2.cio.com/research/ surveyreport.cfm?id=106
-
(2006)
CIO and Computerworld research: The forecast for SOA
-
-
-
8
-
-
33749040692
-
Model-driven security based on web services security architecture
-
Paper presented
-
Nakamura, Y., Tatsubori, M., Imamura, T., & Ono, K. (2005). Model-driven security based on web services security architecture. Paper presented in Proceedings of the 2005 IEEE International Conference on Services Computing (SCC'05), 1, 7-15.
-
(2005)
in Proceedings of the 2005 IEEE International Conference on Services Computing (SCC'05)
, vol.1
, pp. 7-15
-
-
Nakamura, Y.1
Tatsubori, M.2
Imamura, T.3
Ono, K.4
-
9
-
-
51449099259
-
-
SANS Institute, Retrieved May 20, 2006, from
-
SANS Institute. (2006). Retrieved May 20, 2006, from: http://www.sans.org
-
(2006)
-
-
-
10
-
-
84954104016
-
Trust by verify: Authorization for web services
-
Paper presented
-
Skalka, C., & Wang, X. (2004). Trust by verify: Authorization for web services. Paper presented in ACM Workshop on Secure Web Services, 47-55.
-
(2004)
in ACM Workshop on Secure Web Services
, pp. 47-55
-
-
Skalka, C.1
Wang, X.2
-
11
-
-
33750490069
-
-
Upper Saddle River, NJ: Pearson
-
Steel, C., Nagappan, R., & Lai, R. (2006). Core security patterns: Best practices and strategies for J2EE, web services, and identity management. Upper Saddle River, NJ: Pearson.
-
(2006)
Core security patterns: Best practices and strategies for J2EE, web services, and identity management
-
-
Steel, C.1
Nagappan, R.2
Lai, R.3
-
12
-
-
33645533244
-
A dynamic label checking approach for information flow control in web services
-
Tari, Z., Bertok, P., & Simic, D. (2006). A dynamic label checking approach for information flow control in web services. International Journal of Web Services Research, 3(1), 1-28.
-
(2006)
International Journal of Web Services Research
, vol.3
, Issue.1
, pp. 1-28
-
-
Tari, Z.1
Bertok, P.2
Simic, D.3
-
14
-
-
0019009078
-
OSI reference model - the ISO model of architecture for open systems connection
-
Zimmerman, H. (1980). OSI reference model - the ISO model of architecture for open systems connection. IEEE Transactions on Communication 28(4), 425-432.
-
(1980)
IEEE Transactions on Communication
, vol.28
, Issue.4
, pp. 425-432
-
-
Zimmerman, H.1
|