메뉴 건너뛰기




Volumn 30, Issue 6, 2008, Pages

Verifying policy-based web services security

Author keywords

Pi calculus; Web services; XML security

Indexed keywords

CALCULATIONS; FORMAL METHODS; SEMANTICS; SPECIFICATIONS; TELECOMMUNICATION SERVICES; WEBSITES;

EID: 56349105161     PISSN: 01640925     EISSN: 15584593     Source Type: Journal    
DOI: 10.1145/1391956.1391957     Document Type: Article
Times cited : (14)

References (41)
  • 2
    • 28144458017 scopus 로고    scopus 로고
    • ALLAMIGEON, X. ANDBLANCHET, B. 2005. Reconstruction of attacks against cryptographic protocols. In Proceedings of the 18th IEEE Computer Security Foundations Workshop (CSFW-18) (Aix-enProvence, France). IEEE Computer Society Press, Los Alamitos, CA, 140-154.
    • ALLAMIGEON, X. ANDBLANCHET, B. 2005. Reconstruction of attacks against cryptographic protocols. In Proceedings of the 18th IEEE Computer Security Foundations Workshop (CSFW-18) (Aix-enProvence, France). IEEE Computer Society Press, Los Alamitos, CA, 140-154.
  • 4
    • 18544363572 scopus 로고    scopus 로고
    • BHARGAVAN, K., FOURNET, C., ANDGORDON, A. D. 2005a. A semantics for web services authentication. Theor. Comput. Sci. 340, 1 (June), 102-153. (See also Microsoft Research Technical Report MSR-TR-2003-83).
    • BHARGAVAN, K., FOURNET, C., ANDGORDON, A. D. 2005a. A semantics for web services authentication. Theor. Comput. Sci. 340, 1 (June), 102-153. (See also Microsoft Research Technical Report MSR-TR-2003-83).
  • 5
    • 56349135315 scopus 로고    scopus 로고
    • BHARGAVAN, K., FOURNET, C., ANDG ORDON, A. D. 2005b. Verifying policy-based security for web services. Tech. Rep. MSR-TR-2004-84, Microsoft Research. Nov.
    • BHARGAVAN, K., FOURNET, C., ANDG ORDON, A. D. 2005b. Verifying policy-based security for web services. Tech. Rep. MSR-TR-2004-84, Microsoft Research. Nov.
  • 7
    • 33845212195 scopus 로고    scopus 로고
    • Verified reference implementations of WS-Security protocols
    • Proceedings of the 3rd International Workshop on Web Services and Formal Methods WS-FM 2006, Springer-Verlag, New York
    • BHARGAVAN, K., FOURNET, C., ANDGORDON, A. D. 2006C. Verified reference implementations of WS-Security protocols. In Proceedings of the 3rd International Workshop on Web Services and Formal Methods (WS-FM 2006). Lecture Notes in Computer Science, vol. 4184. Springer-Verlag, New York, 88-106.
    • (2006) Lecture Notes in Computer Science , vol.4184 , pp. 88-106
    • BHARGAVAN, K.1    FOURNET, C.2    ANDGORDON, A.D.3
  • 9
    • 35048821943 scopus 로고    scopus 로고
    • BHARGAVAN, K., FOURNET, C., GORDON, A. D., ANDPUCELLA, R. 2004. TulaFale: A security tool for web services. In Proceedings of the International Symposium on Formal Methods for Components and Objects (FMCO'03). Lecture Notes in Computer Science, 3188. Springer-Verlag, New York, 197-222. Tool download available from http://Securing.WS.
    • BHARGAVAN, K., FOURNET, C., GORDON, A. D., ANDPUCELLA, R. 2004. TulaFale: A security tool for web services. In Proceedings of the International Symposium on Formal Methods for Components and Objects (FMCO'03). Lecture Notes in Computer Science, vol. 3188. Springer-Verlag, New York, 197-222. Tool download available from http://Securing.WS.
  • 12
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on Prolog rules
    • IEEE Computer Society Press, Los Alamitos, CA
    • BLANCHET, B. 2001. An efficient cryptographic protocol verifier based on Prolog rules. In Proceedings of the 14th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos, CA, 82-96.
    • (2001) Proceedings of the 14th IEEE Computer Security Foundations Workshop , pp. 82-96
    • BLANCHET, B.1
  • 13
    • 84958749546 scopus 로고    scopus 로고
    • From secrecy to authenticity in security protocols
    • Proceedings of the 9th International Static Analysis Symposium, SAS'02, Springer-Verlag, New York
    • BLANCHET, B. 2002. From secrecy to authenticity in security protocols. In Proceedings of the 9th International Static Analysis Symposium, (SAS'02). Lecture Notes in Computer Science, vol. 2477. Springer-Verlag, New York, 342-359.
    • (2002) Lecture Notes in Computer Science , vol.2477 , pp. 342-359
    • BLANCHET, B.1
  • 15
    • 56349107805 scopus 로고    scopus 로고
    • BOX, D., CHRISTENSEN, E., CURBERA, F., FERGUSON, D., FREY, J., HADLEY, M., KALER, C., LANGWORTHY, D., LEYMANN, F., LOVERING, B., LUCCO, S., MILLET, S., MUKHI, N., NOTTINGHAM, M., ORCHARD, D., SHEWCHUK, J., SINDAMBIWE, E., STOREY, T., WEERAWARANA, S., ANDWINKLER, S. 2004. Web Services Addressing (WS-Addressing). W3C Submission.
    • BOX, D., CHRISTENSEN, E., CURBERA, F., FERGUSON, D., FREY, J., HADLEY, M., KALER, C., LANGWORTHY, D., LEYMANN, F., LOVERING, B., LUCCO, S., MILLET, S., MUKHI, N., NOTTINGHAM, M., ORCHARD, D., SHEWCHUK, J., SINDAMBIWE, E., STOREY, T., WEERAWARANA, S., ANDWINKLER, S. 2004. Web Services Addressing (WS-Addressing). W3C Submission.
  • 18
    • 56349159517 scopus 로고    scopus 로고
    • DELLA-LIBERA, G, HALLAM-BAKER, P, HONDO, M, JANCZUK, T, KALER, C, MARUYAMA, H, NAGARATNAM, N, NASH, A, PHILPOTT, R, PRAFULLCHANDRA, H, SHEWCHUK, J, WAINGOLD, E, ANDZOLFONOON, R. 2002. Web services security policy language WS-SecurityPolicy, Version 1.0
    • DELLA-LIBERA, G., HALLAM-BAKER, P., HONDO, M., JANCZUK, T., KALER, C., MARUYAMA, H., NAGARATNAM, N., NASH, A., PHILPOTT, R., PRAFULLCHANDRA, H., SHEWCHUK, J., WAINGOLD, E., ANDZOLFONOON, R. 2002. Web services security policy language (WS-SecurityPolicy). Version 1.0.
  • 19
    • 56349129127 scopus 로고    scopus 로고
    • DIERKS, T. ANDRESCORLA, E. 2006. The Transport Layer Security (TLS) Protocol Version 1.1. RFC 4346, Internet Engineering Task Force Proposed Standard
    • DIERKS, T. ANDRESCORLA, E. 2006. The Transport Layer Security (TLS) Protocol Version 1.1. RFC 4346, Internet Engineering Task Force Proposed Standard.
  • 20
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • DOLEV, D. ANDYAO, A. 1983. On the security of public key protocols. IEEE Trans. Inform. Theory IT-29, 2, 198-208.
    • (1983) IEEE Trans. Inform. Theory , vol.IT-29 , Issue.2 , pp. 198-208
    • DOLEV, D.1    ANDYAO, A.2
  • 21
    • 56349108022 scopus 로고    scopus 로고
    • EASTLAKE, D., REAGLE, J., IMAMURA, T., DILLAWAY, B., ANDSIMON, E. 2002a. XML Encryption Syntax and Processing. W3C Recommendation.
    • EASTLAKE, D., REAGLE, J., IMAMURA, T., DILLAWAY, B., ANDSIMON, E. 2002a. XML Encryption Syntax and Processing. W3C Recommendation.
  • 22
    • 56349146366 scopus 로고    scopus 로고
    • EASTLAKE, D., REAGLE, J., SOLO, D., BARTEL, M., BOYER, J., FOX, B., LAMACCHIA, B., ANDSIMON, E. 2002b. XML-Signature Syntax and Processing. W3C Recommendation.
    • EASTLAKE, D., REAGLE, J., SOLO, D., BARTEL, M., BOYER, J., FOX, B., LAMACCHIA, B., ANDSIMON, E. 2002b. XML-Signature Syntax and Processing. W3C Recommendation.
  • 23
    • 0141863341 scopus 로고    scopus 로고
    • Authenticity by typing for security protocols
    • GORDON, A. D. ANDJEFFREY, A. 2003. Authenticity by typing for security protocols. J. Comput. Secur. 11, 4, 451-521.
    • (2003) J. Comput. Secur , vol.11 , Issue.4 , pp. 451-521
    • GORDON, A.D.1    ANDJEFFREY, A.2
  • 24
    • 26844492006 scopus 로고    scopus 로고
    • Validating a web service security abstraction by typing
    • GORDON, A. D. ANDPUCELLA, R. 2005. Validating a web service security abstraction by typing. Formal Aspects of Comput. 17, 277-318.
    • (2005) Formal Aspects of Comput , vol.17 , pp. 277-318
    • GORDON, A.D.1    ANDPUCELLA, R.2
  • 25
    • 14844314179 scopus 로고    scopus 로고
    • Rigorous automated network security management
    • GUTTMAN, J. D. ANDHERZOG, A. L. 2005. Rigorous automated network security management. Int. J. Inform. Secur. 4, 1-2, 29-48.
    • (2005) Int. J. Inform. Secur , vol.4 , Issue.1-2 , pp. 29-48
    • GUTTMAN, J.D.1    ANDHERZOG, A.L.2
  • 28
    • 14844329713 scopus 로고    scopus 로고
    • MICROSOFT CORPORATION, Microsoft Corporation
    • MICROSOFT CORPORATION 2004. Web Services Enhancements (WSE) 2.0. Microsoft Corporation.
    • (2004) Web Services Enhancements (WSE) 2.0
  • 29
    • 3042673595 scopus 로고    scopus 로고
    • Cryptographic protocol generation from CAPSL
    • Tech. Rep. SRICSL-01-07, SRI
    • MULLER, F. ANDMILLEN, J. 2001. Cryptographic protocol generation from CAPSL. Tech. Rep. SRICSL-01-07, SRI.
    • (2001)
    • MULLER, F.1    ANDMILLEN, J.2
  • 34
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • NEEDHAM, R. ANDSCHROEDER, M. 1978. Using encryption for authentication in large networks of computers. Commun. ACM 21, 12, 993-999.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • NEEDHAM, R.1    ANDSCHROEDER, M.2
  • 35
    • 84958777572 scopus 로고    scopus 로고
    • AGVI - Automatic generation, verification, and implementation of security protocols
    • Proceedings of the 13th Conference on Computer Aided Verification CAV, Springer-Verlag, New York
    • PERRIG, A., SONG, D., ANDPHAN, D. 2001. AGVI - Automatic generation, verification, and implementation of security protocols. In Proceedings of the 13th Conference on Computer Aided Verification (CAV). Lecture Notes in Computer Science. Springer-Verlag, New York, 241-245.
    • (2001) Lecture Notes in Computer Science , pp. 241-245
    • PERRIG, A.1    SONG, D.2    ANDPHAN, D.3
  • 37
    • 4744347868 scopus 로고    scopus 로고
    • TATSUBORI, M., IMAMURA, T., ANDN AKAMURA, Y. 2004. Best practice patterns and tool support for configuring secure web services messaging. In Proceedings of the International Conference on Web Services (ICWS'04). 244-251.
    • TATSUBORI, M., IMAMURA, T., ANDN AKAMURA, Y. 2004. Best practice patterns and tool support for configuring secure web services messaging. In Proceedings of the International Conference on Web Services (ICWS'04). 244-251.
  • 38
    • 56349091327 scopus 로고    scopus 로고
    • W3C. 1999. XML Path Language (XPath) Version 1.0. W3C. W3C Recommendation
    • W3C. 1999. XML Path Language (XPath) Version 1.0. W3C. W3C Recommendation.
  • 39
    • 56349084091 scopus 로고    scopus 로고
    • W3C. 2003. SOAP Version 1.2. W3C. W3C Recommendation
    • W3C. 2003. SOAP Version 1.2. W3C. W3C Recommendation.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.