메뉴 건너뛰기




Volumn 1, Issue , 2008, Pages 5-12

Verification of access control requirements in web services choreography

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; COMPUTER NETWORKS; GRAPH THEORY; SECURITY SYSTEMS; WORLD WIDE WEB;

EID: 51749118702     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SCC.2008.116     Document Type: Conference Paper
Times cited : (20)

References (10)
  • 2
    • 0742268963 scopus 로고    scopus 로고
    • Web service conversation modeling: A cornerstone for e-business automation
    • Benatallah, B., Casati, F., and Toumani, F. Web service conversation modeling: A cornerstone for e-business automation. IEEE Internet Computing 8, 1, 46-54.
    • IEEE Internet Computing , vol.8 , Issue.1 , pp. 46-54
    • Benatallah, B.1    Casati, F.2    Toumani, F.3
  • 5
    • 84947096948 scopus 로고    scopus 로고
    • Foster, H., Uchitel, S., Magee, J., Kramer, J. WS-Engineer: A Rigorous Approach to Engineering Web Service Compositions and Choreography. In Proc. of XML 2006 Conference, Boston, USA, December, 2006.
    • Foster, H., Uchitel, S., Magee, J., Kramer, J. WS-Engineer: A Rigorous Approach to Engineering Web Service Compositions and Choreography. In Proc. of XML 2006 Conference, Boston, USA, December, 2006.
  • 6
    • 84947096949 scopus 로고    scopus 로고
    • Kavantzas, N. at al. Web Services Choreography Description Language Version 1.0, W3C Candidate Recommendation, 2005. Online at
    • Kavantzas, N. at al. Web Services Choreography Description Language Version 1.0, W3C Candidate Recommendation, 2005. Online at: http://www.w3.org/ TR/ws-cdl-10/.
  • 9
    • 84947067557 scopus 로고    scopus 로고
    • Using SAML and XACML for Web Service Security & Privacy
    • Namli, T., Dogac, A. Using SAML and XACML for Web Service Security & Privacy. A Chapter Proposal, 2007.
    • (2007) A Chapter Proposal
    • Namli, T.1    Dogac, A.2
  • 10
    • 84947096950 scopus 로고    scopus 로고
    • Robinson, P., Kerschbaum, F., Schaad, A.: From Business Process Choreography to Authorization Policies. In Proceedings of 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006.
    • Robinson, P., Kerschbaum, F., Schaad, A.: From Business Process Choreography to Authorization Policies. In Proceedings of 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.