메뉴 건너뛰기




Volumn , Issue , 2008, Pages

A holistic anonymity framework for web services

Author keywords

Connection anonymity; Hidden web serives; Service Oriented Architecture (SOA); Web services (WS)

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; INFORMATION SERVICES; INTEROPERABILITY; MARKUP LANGUAGES; SOFTWARE ARCHITECTURE; WEB SERVICES; WORLD WIDE WEB;

EID: 57549114898     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1389586.1389632     Document Type: Conference Paper
Times cited : (2)

References (37)
  • 2
    • 0037392527 scopus 로고    scopus 로고
    • Standards for XML and Web Services Security
    • G. M. Naedele, "Standards for XML and Web Services Security", IEEE Computer, pp. 96-98, 2003.
    • (2003) IEEE Computer , pp. 96-98
    • Naedele, G.M.1
  • 3
    • 57549115685 scopus 로고    scopus 로고
    • ETSI TS 101 903 v. 1.2.2, XML Advanced Electronic Signatures (XAdES), Technical Specification, 2004, http://uri.etsi.org/01903/v1.2.2/ ts-101903v010202p.pdf
    • ETSI TS 101 903 v. 1.2.2, "XML Advanced Electronic Signatures (XAdES)", Technical Specification, 2004, http://uri.etsi.org/01903/v1.2.2/ ts-101903v010202p.pdf
  • 4
    • 57549115150 scopus 로고    scopus 로고
    • A. Pfitzmann, M. Hansen. (2005). Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology. Version v0.23 Aug. 25, 2005.
    • A. Pfitzmann, M. Hansen. (2005). Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology. Version v0.23 Aug. 25, 2005.
  • 5
    • 0012207557 scopus 로고    scopus 로고
    • Consistent, yet anonymous, Web access with LPWA
    • Feb
    • E. Gabber, P. Gibbons, D. Kristol, Y. Matias, and A. Mayer, "Consistent, yet anonymous, Web access with LPWA," Communication ACM, vol. 42, no. 2, pp. 42-47, Feb. 1999.
    • (1999) Communication ACM , vol.42 , Issue.2 , pp. 42-47
    • Gabber, E.1    Gibbons, P.2    Kristol, D.3    Matias, Y.4    Mayer, A.5
  • 6
    • 40249087829 scopus 로고    scopus 로고
    • Towards a framework for connection anonymity. Annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
    • H. Tillwick, M. Olivier. Towards a framework for connection anonymity. Annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries. ACM International Conference Proceeding Series, vol. 150, pp. 113-122, 2005.
    • (2005) ACM International Conference Proceeding Series , vol.150 , pp. 113-122
    • Tillwick, H.1    Olivier, M.2
  • 7
    • 57549092421 scopus 로고    scopus 로고
    • Øverlier, L., and Syverson, P.. Valet services: Improving hidden servers with a personal touch. In Proceedings of The 6th Workshop on Privacy Enhancing Technologies, Springer-Verlag, LNCS 4285, Cambridge, UK, June 28-30 (2006).
    • Øverlier, L., and Syverson, P.. Valet services: Improving hidden servers with a personal touch. In Proceedings of The 6th Workshop on Privacy Enhancing Technologies, Springer-Verlag, LNCS 4285, Cambridge, UK, June 28-30 (2006).
  • 9
    • 84937555407 scopus 로고    scopus 로고
    • Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
    • H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag, July
    • J. F. Raymond, Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 10-29. Springer-Verlag, LNCS 2009, July 2000.
    • (2000) LNCS , pp. 10-29
    • Raymond, J.F.1
  • 10
    • 0019532104 scopus 로고    scopus 로고
    • D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, in Communications of the ACM v 24 no 2 (Feb 1981).
    • D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms", in Communications of the ACM v 24 no 2 (Feb 1981).
  • 11
    • 20444447364 scopus 로고    scopus 로고
    • Mixmaster protocol version 2
    • Technical report, Network Working Group, Internet-Draft
    • U. Moeller et al., Mixmaster protocol version 2, Technical report, Network Working Group, 2004, Internet-Draft.
    • (2004)
    • Moeller, U.1
  • 14
  • 15
    • 57549118624 scopus 로고    scopus 로고
    • Anonymizer, Inc
    • Anonymizer, Inc. http://www.anonymizer.com/.
  • 17
    • 34547284919 scopus 로고    scopus 로고
    • Tor rendezvous specification
    • Technical report, The Free Haven Project, February 2006
    • R. Dingledine and N. Mathewson. Tor rendezvous specification. Technical report, The Free Haven Project, February 2006. http://tor.eff.org/cvs/doc/rend- spec.txt.
    • Dingledine, R.1    Mathewson, N.2
  • 18
    • 14544273666 scopus 로고    scopus 로고
    • The predecessor attack: An analysis of a threat to anonymous communications systems
    • M. K. Wright, M. Adler, B. N. Levine, C. Shields. The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur. 7 (2004) 489-522.
    • (2004) ACM Trans. Inf. Syst. Secur , vol.7 , pp. 489-522
    • Wright, M.K.1    Adler, M.2    Levine, B.N.3    Shields, C.4
  • 20
    • 33750277833 scopus 로고    scopus 로고
    • L. Øverlier, P. Syverson. Locating hidden servers. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy, IEEE CS.
    • L. Øverlier, P. Syverson. Locating hidden servers. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy, IEEE CS.
  • 24
    • 57449122183 scopus 로고    scopus 로고
    • Blind Certification of Public Keys
    • HPL-96-71, May 16, 1996
    • W. Mao. Blind Certification of Public Keys, HP Labs Technical Reports, HPL-96-71, May 16, 1996.
    • HP Labs Technical Reports
    • Mao, W.1
  • 25
    • 0003791651 scopus 로고    scopus 로고
    • Web Services Description Language (WSDL) 1.1
    • W3C Note
    • E. Christenssen et al. (2001). "Web Services Description Language (WSDL) 1.1", W3C Note, www.w3.org/TR/wsdl.
    • (2001)
    • Christenssen, E.1
  • 26
    • 27544460647 scopus 로고    scopus 로고
    • Schlimmer J, ed, September, Available
    • Schlimmer J., ed., (2004). "Web Services Policy Framework (WS-Policy)". September 2004. Available http://www-128.ibm.com/ developerworks/webservices/library/specificati on/ws-polfram/
    • (2004) Web Services Policy Framework (WS-Policy)
  • 27
    • 33749072655 scopus 로고    scopus 로고
    • UDDI version 2.04 API Specification
    • T. Bellwood editor, Standard
    • T. Bellwood (editor). (2002). "UDDI version 2.04 API Specification", UDDI Committee Specification, OASIS Standard, www.oasis-open.org/committees/uddispec/doc/tcspecs.htm#uddiv2.
    • (2002) UDDI Committee Specification
  • 30
    • 57549089317 scopus 로고    scopus 로고
    • Papastergiou S, Kaliontzoglou A., Polemi D.. Targeted SOA-based Identity Management Solutions. Computer Standards and Interfaces, Elsevier (to be accepted).
    • Papastergiou S, Kaliontzoglou A., Polemi D.. "Targeted SOA-based Identity Management Solutions". Computer Standards and Interfaces, Elsevier (to be accepted).
  • 33
    • 34047267150 scopus 로고    scopus 로고
    • A Secure e-Ordering Web Service
    • Springer Boston, ISBN 978-0-387-39226-4, pp
    • Polemi, D., Papastergiou, S.. "A Secure e-Ordering Web Service", Project E-Society: Building Bricks, Springer Boston, Volume 226/2006, ISBN 978-0-387-39226-4, pp. 352-365.
    • (2006) Project E-Society: Building Bricks , vol.226 , pp. 352-365
    • Polemi, D.1    Papastergiou, S.2
  • 34
    • 57549086345 scopus 로고    scopus 로고
    • A Secure and Trustful e-Ordering Architecture (TOES) for Small and Medium size Enterprises (SMEs)
    • IdeaGroup Inc
    • Papastergiou, S., Polemi, D.. "A Secure and Trustful e-Ordering Architecture (TOES) for Small and Medium size Enterprises (SMEs)". International Journal of Information Security and Privacy, IdeaGroup Inc., 2007.
    • (2007) International Journal of Information Security and Privacy
    • Papastergiou, S.1    Polemi, D.2
  • 35
    • 57549097722 scopus 로고    scopus 로고
    • A. Serjantov, R. Dingledine, and P. Syverson. From a trickle to a flood: Active attacks on several mix types. In F. Petitcolas, editor, Information Hiding (IH 2002). Springer-Verlag, LNCS (forthcoming), 2002.
    • A. Serjantov, R. Dingledine, and P. Syverson. From a trickle to a flood: Active attacks on several mix types. In F. Petitcolas, editor, Information Hiding (IH 2002). Springer-Verlag, LNCS (forthcoming), 2002.
  • 36
    • 34249080831 scopus 로고    scopus 로고
    • Service Oriented Architectures: Approaches, Technologies and Research Issues
    • M. Papazoglou, W. Heuvel, "Service Oriented Architectures: Approaches, Technologies and Research Issues", The VLDB Journal, Vol. 16, Issue 3, pp. 389-415, 2007
    • (2007) The VLDB Journal , vol.16 , Issue.3 , pp. 389-415
    • Papazoglou, M.1    Heuvel, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.