-
1
-
-
85036896374
-
-
Bajaj, S., Box, D., Chappell, D., Curbera, F., Daniels, G., Hallam-Baker, P. et al. (2006a). Web Services Policy Framework (WS-Policy). Version, 1.2, March. Retrieved March 28, 2006 from: http://download.boulder.ibm.com/ibmdl/pub/software/dw/specs/wspolfram/ ws-policy-2006-03-01.pdf
-
Bajaj, S., Box, D., Chappell, D., Curbera, F., Daniels, G., Hallam-Baker, P. et al. (2006a). Web Services Policy Framework (WS-Policy). Version, 1.2, March. Retrieved March 28, 2006 from: http://download.boulder.ibm.com/ibmdl/pub/software/dw/specs/wspolfram/ ws-policy-2006-03-01.pdf
-
-
-
-
2
-
-
33750246447
-
-
Version, 1.2, March. Retrieved March 28, 2006 from
-
Bajaj, S., Box, D., Chappell, D., Curbera, F., Daniels, G., Hallam-Baker, P. et al. (2006b). Web Services Policy Attachment (WS-PolicyAttachment). Version, 1.2, March. Retrieved March 28, 2006 from: http://download.boulder.ibm.com/ibmdl/pub/software/dw/specs/ ws-polatt/ws-polat-2006-03-01.pdf
-
(2006)
Web Services Policy Attachment (WS-PolicyAttachment)
-
-
Bajaj, S.1
Box, D.2
Chappell, D.3
Curbera, F.4
Daniels, G.5
Hallam-Baker, P.6
-
3
-
-
84893032364
-
Inter-Domains Policy Negotiation
-
Lake Como, Italy
-
Barrere, F., Benzekri, A., Grasset, F., Laborde, R., & Nasser, B. (2003). Inter-Domains Policy Negotiation. In Proceedings of the 4th International Workshop on Policies for Distributed Systems and Networks (POLICY'03), (pp. 239-242), Lake Como, Italy.
-
(2003)
Proceedings of the 4th International Workshop on Policies for Distributed Systems and Networks (POLICY'03)
, pp. 239-242
-
-
Barrere, F.1
Benzekri, A.2
Grasset, F.3
Laborde, R.4
Nasser, B.5
-
4
-
-
0035791550
-
On Specifying Security Policies for Web Documents with an XML-Based Language
-
Chantilly, Virginia
-
Bertino, E., Castano, S., & Ferrari, E. (2001). On Specifying Security Policies for Web Documents with an XML-Based Language. In Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, (pp. 57-65), Chantilly, Virginia.
-
(2001)
Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies
, pp. 57-65
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
-
5
-
-
3042777385
-
Trust negotiation: Concepts, systems, and languages
-
Bertino, E., Ferrari, E., & Squicciarini, A. (2004). Trust negotiation: Concepts, systems, and languages. Computing in Science and Engineering, July/August, 27-34.
-
(2004)
Computing in Science and Engineering, July/August
, pp. 27-34
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.3
-
6
-
-
77954342153
-
An Advisor for Web Services Security Policies
-
Fairfax, Virginia, USA
-
Bhargavan, K., Fournet, C., Gordon, A., & O'Shea, G. (2005). An Advisor for Web Services Security Policies. In Proceedings of the 2005 Workshop on Secure Web Services (SWS '05), (pp. 1-9), Fairfax, Virginia, USA.
-
(2005)
Proceedings of the 2005 Workshop on Secure Web Services (SWS '05)
, pp. 1-9
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.3
O'Shea, G.4
-
7
-
-
0036649992
-
Inside SSL: The secure sockets layer protocol
-
July-August
-
Chou, W. (2002, July-August). Inside SSL: The secure sockets layer protocol. IT Pro, 47-52.
-
(2002)
IT Pro
, pp. 47-52
-
-
Chou, W.1
-
8
-
-
85036900923
-
-
Della-Libera, G, Gudgin, M, Hallam-Baker, P, Hondo, M, Granqvist, H, Kaler, C. et al, 2005, Web Services Security Policy Language WS-Security-Policy, Version 1.1, July. Retrieved July 28, 2006 from
-
Della-Libera, G., Gudgin, M., Hallam-Baker, P., Hondo, M., Granqvist, H., Kaler, C. et al. (2005). Web Services Security Policy Language (WS-Security-Policy). Version 1.1, July. Retrieved July 28, 2006 from: ftp://www6.software.ibm.com/software/developer/library/ ws-secpol.pdf
-
-
-
-
9
-
-
84961696448
-
Policy-Based Security Management for Large Dynamic Groups: An Overview of the DCCM Project
-
Hilton Head, South Carolina
-
Dinsmore, P., Balenson, D., Heyman, M., Kruus, P., Scace, C., & Sherman, A. (2000). Policy-Based Security Management for Large Dynamic Groups: An Overview of the DCCM Project. In Proceedings, DARPA Information Survivability Conference and Exposition (DISCEX'00), Vol. 1, (pp. 64-73). Hilton Head, South Carolina.
-
(2000)
Proceedings, DARPA Information Survivability Conference and Exposition (DISCEX'00)
, vol.1
, pp. 64-73
-
-
Dinsmore, P.1
Balenson, D.2
Heyman, M.3
Kruus, P.4
Scace, C.5
Sherman, A.6
-
10
-
-
0038376757
-
An Architecture for Policy-Based Security Management for Distributed Multimedia Services
-
Juan-les-Pins, France
-
Duflos, S. (2002). An Architecture for Policy-Based Security Management for Distributed Multimedia Services. In Proceedings of the 10th ACM International Conference on Multimedia, (pp. 653-655), Juan-les-Pins, France.
-
(2002)
Proceedings of the 10th ACM International Conference on Multimedia
, pp. 653-655
-
-
Duflos, S.1
-
12
-
-
85053178227
-
Security Policy Coordination for Heterogeneous Information Systems
-
Scottsdale, Arizona
-
Hale, J., Galiasso, P., Papa, M., & Shenoi, S. (1999). Security Policy Coordination for Heterogeneous Information Systems. In Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC '99), (pp. 219-228), Scottsdale, Arizona.
-
(1999)
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC '99)
, pp. 219-228
-
-
Hale, J.1
Galiasso, P.2
Papa, M.3
Shenoi, S.4
-
13
-
-
33646697171
-
The attraction of personalized service for users in mobile commerce: An empirical study
-
Ho, S., & Kwok, S. (2003). The attraction of personalized service for users in mobile commerce: An empirical study. ACM SIGecom Exchanges, 3(4), 10-18,.
-
(2003)
ACM SIGecom Exchanges
, vol.3
, Issue.4
, pp. 10-18
-
-
Ho, S.1
Kwok, S.2
-
14
-
-
85036852062
-
-
International Organization for Standardization. (n.d.). IS0 7498-2, Information Processing Systems - Open Systems Interconnection - Basic Reference Model - Part 2: Security Architecture. Retrieved Feb. 11, 2004 from http://www.iso.org/
-
International Organization for Standardization. (n.d.). IS0 7498-2, Information Processing Systems - Open Systems Interconnection - Basic Reference Model - Part 2: Security Architecture. Retrieved Feb. 11, 2004 from http://www.iso.org/
-
-
-
-
15
-
-
85036905216
-
-
ITU-T. (n.d.). Recommendation X.800, Security Architecture for OSI. Retrieved Feb. 11, 2004 from: http://www.itu.int/rec/ recommendation.asp?type=items&lang=e&parent=T-REC-X.800-199103-I
-
ITU-T. (n.d.). Recommendation X.800, Security Architecture for OSI. Retrieved Feb. 11, 2004 from: http://www.itu.int/rec/ recommendation.asp?type=items&lang=e&parent=T-REC-X.800-199103-I
-
-
-
-
16
-
-
0000206310
-
Security models for Web-based applications
-
Joshi, J., Aref, W., Ghafoor, A., & Spafford, E. (2001). Security models for Web-based applications. Communications of the ACM, 44(2), 38-44.
-
(2001)
Communications of the ACM
, vol.44
, Issue.2
, pp. 38-44
-
-
Joshi, J.1
Aref, W.2
Ghafoor, A.3
Spafford, E.4
-
17
-
-
84942419353
-
-
Khurana, H., Gavrila1, S., Bobba, R., Koleva, R., Sonalker, A., Dinu, E., Gligor, V., & Baras, J. (2003). Integrated Security Services for Dynamic Coalitions. In Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX'03), 2, (pp. 38-40), Washington D.C..
-
Khurana, H., Gavrila1, S., Bobba, R., Koleva, R., Sonalker, A., Dinu, E., Gligor, V., & Baras, J. (2003). Integrated Security Services for Dynamic Coalitions. In Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX'03), Vol. 2, (pp. 38-40), Washington D.C..
-
-
-
-
18
-
-
33748089681
-
Traust: A Trust Negotiation-Based Authorization Service for Open Systems
-
Lake Tahoe, California
-
Lee, A.J., Winslett, M., Basney, J., & Welch, V. (2006). Traust: A Trust Negotiation-Based Authorization Service for Open Systems. In Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, (pp. 39-48), Lake Tahoe, California.
-
(2006)
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies
, pp. 39-48
-
-
Lee, A.J.1
Winslett, M.2
Basney, J.3
Welch, V.4
-
19
-
-
84865478260
-
Web Services Security: SOAP Message Security 1.1 (WS-Security 2004)
-
February 1. Retrieved March 28, 2006 from
-
OASIS (2006). Web Services Security: SOAP Message Security 1.1 (WS-Security 2004). OASIS Standard Specification, February 1. Retrieved March 28, 2006 from http://www.oasis-open.org/committees/ download.php/16790/wss-v1.1-spec-os-SOAPMessageSecurity.pdf
-
(2006)
OASIS Standard Specification
-
-
-
20
-
-
2642549597
-
-
McGraw-Hill/Osborne
-
O'Neill, M., Hallam-Baker, P., Cann, S.M., Sherma, M., Simon, E., Watters, P.A. & White, A. (2003). Web Services Security. McGraw-Hill/Osborne.
-
(2003)
Web Services Security
-
-
O'Neill, M.1
Hallam-Baker, P.2
Cann, S.M.3
Sherma, M.4
Simon, E.5
Watters, P.A.6
White, A.7
-
21
-
-
2342495359
-
Design of SPS Model Using Mobile Agent System
-
Taipei, Taiwan
-
Park, J., & Chung, J. (2003). Design of SPS Model Using Mobile Agent System. In Proceedings of the IEEE 37th Annual 2003 International Carnahan Conference on Security Technology, (pp. 38-42), Taipei, Taiwan.
-
(2003)
Proceedings of the IEEE 37th Annual 2003 International Carnahan Conference on Security Technology
, pp. 38-42
-
-
Park, J.1
Chung, J.2
-
22
-
-
0034593280
-
Multilateral Security a Concept and Examples for Balanced Security
-
Ballycotton, County Cork, Ireland
-
Rannenberg, K. (2001). Multilateral Security a Concept and Examples for Balanced Security. In Proceedings of the 2000 Workshop on New Security Paradigms, (pp. 151-162), Ballycotton, County Cork, Ireland.
-
(2001)
Proceedings of the 2000 Workshop on New Security Paradigms
, pp. 151-162
-
-
Rannenberg, K.1
-
23
-
-
30644473909
-
Adaptive Trust Negotiation and Access Control
-
Stockholm, Sweden
-
Ryutov, T., Zhou, L., Neuman, C., Leithead, T., & Seamons, K.E. (2005). Adaptive Trust Negotiation and Access Control. In Proceedings of the 10 ACM Symposium on Access Control Models and Technologies, (pp. 139-146), Stockholm, Sweden.
-
(2005)
Proceedings of the 10 ACM Symposium on Access Control Models and Technologies
, pp. 139-146
-
-
Ryutov, T.1
Zhou, L.2
Neuman, C.3
Leithead, T.4
Seamons, K.E.5
-
25
-
-
4544286227
-
Policy Driven Systems for Dynamic Security Reconfiguration
-
pp. 1274-1275, New York, New York
-
Tan, J.J., Poslad, S., & Xi, Y. (2004). Policy Driven Systems for Dynamic Security Reconfiguration. Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems, Vol. 3, (pp. 1274-1275), New York, New York.
-
(2004)
Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems
, vol.3
-
-
Tan, J.J.1
Poslad, S.2
Xi, Y.3
-
26
-
-
85036870444
-
-
Telecom Italia Lab. (n.d.). JADE (Java Agent Development Framework). Retrieved Feb. 14, 2005 from http://jade.tilab.com/
-
Telecom Italia Lab. (n.d.). JADE (Java Agent Development Framework). Retrieved Feb. 14, 2005 from http://jade.tilab.com/
-
-
-
-
29
-
-
33749051867
-
A Policy-Based Security Framework for Web-Enabled Applications
-
Dublin, Ireland
-
Ventuneac, M., Coffey, T., & Salomie, I. (2003). A Policy-Based Security Framework for Web-Enabled Applications. In Proceedings 1st International Symposium on Information and Communication Technologies, (pp. 487-492), Dublin, Ireland.
-
(2003)
Proceedings 1st International Symposium on Information and Communication Technologies
, pp. 487-492
-
-
Ventuneac, M.1
Coffey, T.2
Salomie, I.3
-
30
-
-
3543128965
-
Safety in Automated Trust Negotiation
-
Oakland, California
-
Winsborough, W., & Li, N. (2004). Safety in Automated Trust Negotiation. In Proceedings, 2004 IEEE Symposium on Security and Privacy (S&P'04), (pp. 147-160), Oakland, California.
-
(2004)
Proceedings, 2004 IEEE Symposium on Security and Privacy (S&P'04)
, pp. 147-160
-
-
Winsborough, W.1
Li, N.2
-
31
-
-
0036871183
-
Negotiating trust on the web
-
Winslett, M., Yu, T., Seamons, K., Hess, A., Jacobson, J., Jarvis, R. et al. (2002). Negotiating trust on the web. IEEE Internet Computing, November/December, 30-37,.
-
(2002)
IEEE Internet Computing, November/December
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
-
32
-
-
85036857157
-
-
World Wide Web Consortium (W3C) (n.d.). Extensible Markup Language (XML). Retrieved March 18, 2006 at http://www.w3.org/XML/
-
World Wide Web Consortium (W3C) (n.d.). Extensible Markup Language (XML). Retrieved March 18, 2006 at http://www.w3.org/XML/
-
-
-
-
33
-
-
84904312147
-
Bands: An Inter-Domain Internet Security Policy Management System for IPSEC/VPN
-
Colorado Springs, Colorado
-
Yang, Y., Fu, Z., & Wu, S. (2003). Bands: An Inter-Domain Internet Security Policy Management System for IPSEC/VPN. In Proceedings of the IFIP/IEEE 8th International Symposium on Integrated Network Management, (pp. 231-244), Colorado Springs, Colorado.
-
(2003)
Proceedings of the IFIP/IEEE 8th International Symposium on Integrated Network Management
, pp. 231-244
-
-
Yang, Y.1
Fu, Z.2
Wu, S.3
-
34
-
-
27544437710
-
An Adaptable Security Framework for Service-based Systems
-
Sedona, Arizona
-
Yau, S., Yao, Y., Chen, Z., & Zhu, L. (2005). An Adaptable Security Framework for Service-based Systems. In Proceedings 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2005), (pp. 28-35), Sedona, Arizona.
-
(2005)
Proceedings 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2005)
, pp. 28-35
-
-
Yau, S.1
Yao, Y.2
Chen, Z.3
Zhu, L.4
-
35
-
-
78649832628
-
Bilateral E-services Negotiation Under Uncertainty
-
Orlando, Florida
-
Yee, G., & Korba, L. (2003a). Bilateral E-services Negotiation Under Uncertainty. In Proceedings of the 2003 International Symposium on Applications and the Internet (SAINT2003), (pp. 352-355), Orlando, Florida.
-
(2003)
Proceedings of the 2003 International Symposium on Applications and the Internet (SAINT2003)
, pp. 352-355
-
-
Yee, G.1
Korba, L.2
-
36
-
-
3042575530
-
The Negotiation of Privacy Policies in Distance Education
-
Philadelphia, Pennsylvania
-
Yee, G., & Korba, L. (2003b). The Negotiation of Privacy Policies in Distance Education. In Proceedings of the 14th IRMA International Conference, (pp. 702-705), Philadelphia, Pennsylvania.
-
(2003)
Proceedings of the 14th IRMA International Conference
, pp. 702-705
-
-
Yee, G.1
Korba, L.2
-
37
-
-
85001837279
-
Semi-automatic derivation and use of personal privacy policies in e-business
-
Yee, G., & Korba, L. (2005a). Semi-automatic derivation and use of personal privacy policies in e-business. International Journal of E-Business Research, 1(1), 54-69.
-
(2005)
International Journal of E-Business Research
, vol.1
, Issue.1
, pp. 54-69
-
-
Yee, G.1
Korba, L.2
-
38
-
-
33749042338
-
Negotiated Security Policies for E-Services and Web Services
-
Orlando, Florida
-
Yee, G., & Korba, L. (2005b). Negotiated Security Policies for E-Services and Web Services. In Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005), Vol. 2, (pp. 605-612), Orlando, Florida.
-
(2005)
Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005)
, vol.2
, pp. 605-612
-
-
Yee, G.1
Korba, L.2
-
39
-
-
84902990727
-
Context-Aware Security Policy Agent for Mobile Internet Services
-
Montreal, Quebec, Canada
-
Yee, G., & Korba, L. (2005c). Context-Aware Security Policy Agent for Mobile Internet Services. In Proceedings of the 2005 IFIP International Conference on Intelligence in Communication Systems (INTELLCOMM 2005), (pp. 249-259), Montreal, Quebec, Canada.
-
(2005)
Proceedings of the 2005 IFIP International Conference on Intelligence in Communication Systems (INTELLCOMM 2005)
, pp. 249-259
-
-
Yee, G.1
Korba, L.2
|