-
4
-
-
84868902143
-
-
Online at, 2007
-
OAuth Specification 1.0. Online at http://oauth.net/core/1.0, 2007.
-
OAuth Specification 1.0
-
-
-
5
-
-
85011044859
-
Damia: A data mashup fabric for intranet applications
-
VLDB Endowment
-
M. Altinel, P. Brown, S. Cline, R. Kartha, E. Louie, V. Markl, L. Mau, Y. Ng, D. Simmen, and A. Singh. Damia: a data mashup fabric for intranet applications. In Proceedings of the 33rd International Conference on Very Large Data Bases, pages 1370-1373. VLDB Endowment, 2007.
-
(2007)
Proceedings of the 33rd International Conference on Very Large Data Bases
, pp. 1370-1373
-
-
Altinel, M.1
Brown, P.2
Cline, S.3
Kartha, R.4
Louie, E.5
Markl, V.6
Mau, L.7
Ng, Y.8
Simmen, D.9
Singh, A.10
-
6
-
-
22144453211
-
The myproxy online credential repository
-
J. Basney, M. Humphrey, and V. Welch. The myproxy online credential repository. Software-Practice & Experience, 35(9):801-816, 2005.
-
(2005)
Software-Practice & Experience
, vol.35
, Issue.9
, pp. 801-816
-
-
Basney, J.1
Humphrey, M.2
Welch, V.3
-
7
-
-
0029700344
-
Decentralized trust management
-
Oakland, CA
-
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 164-173, Oakland, CA, 1996.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
9
-
-
52249089799
-
A mashup-based strategy for migration to service-oriented computing
-
S. Cetin, N. Altintas, H. Oguztuzun, A. Dogru, O. Tufekci, and S. Suloglu. A mashup-based strategy for migration to service-oriented computing. In Proceedings of the IEEE International Conference on Pervasive Services, pages 169-172, 2007.
-
(2007)
Proceedings of the IEEE International Conference on Pervasive Services
, pp. 169-172
-
-
Cetin, S.1
Altintas, N.2
Oguztuzun, H.3
Dogru, A.4
Tufekci, O.5
Suloglu, S.6
-
10
-
-
0037362986
-
Role-based access control with x.509 attribute certificates
-
62-69
-
D. Chadwick, A. Otenko, and E. Ball. Role-based access control with x.509 attribute certificates. IEEE Internet Computing, 07(2):62-69, 2003.
-
(2003)
IEEE Internet Computing
, vol.7
, Issue.2
-
-
Chadwick, D.1
Otenko, A.2
Ball, E.3
-
11
-
-
36849088195
-
Enterprise security for web 2.0
-
M. Davidson and E. Yoran. Enterprise security for web 2.0. COMPUTER, pages 117-119, 2007.
-
(2007)
COMPUTER
, pp. 117-119
-
-
Davidson, M.1
Yoran, E.2
-
12
-
-
33745816410
-
Why phishing works
-
ACM Press New York, NY, USA
-
R. Dhamija, J. Tygar, and M. Hearst. Why phishing works. In Proceedings of the SIGCHI conference on Human Factors in computing systems, pages 581-590. ACM Press New York, NY, USA, 2006.
-
(2006)
Proceedings of the SIGCHI conference on Human Factors in computing systems
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.2
Hearst, M.3
-
14
-
-
58049172633
-
Mashing up the deep web - research in progress
-
Funchal, Madeira, Portugal, May
-
T. Hornung, K. Simon, and G. Lausen. Mashing up the deep web - research in progress. In 4th International Conference on Web Information Systems and Technologies (WEBIST) 2008, pages 58-66, Funchal, Madeira, Portugal, May 2008.
-
(2008)
4th International Conference on Web Information Systems and Technologies (WEBIST)
, pp. 58-66
-
-
Hornung, T.1
Simon, K.2
Lausen, G.3
-
18
-
-
0029290135
-
A capability-based authorization model for the world-wide web
-
J. Kahan. A capability-based authorization model for the world-wide web. Computer Networks and ISDN Systems, 27(6):1055-1064, 1995.
-
(1995)
Computer Networks and ISDN Systems
, vol.27
, Issue.6
, pp. 1055-1064
-
-
Kahan, J.1
-
19
-
-
60649118708
-
Mashups legitimize man-in-the-middle attacks: A position paper
-
IEEE
-
P. Karger. Mashups legitimize man-in-the-middle attacks: A position paper. In IEEE Web 2.0 Security and Privacy Workshop. IEEE, 2007.
-
(2007)
IEEE Web 2.0 Security and Privacy Workshop
-
-
Karger, P.1
-
20
-
-
57449096326
-
Smash: Secure component model for cross-domain mashups on unmodified browsers
-
New York, NY, USA, ACM
-
F. D. Keukelaere, S. Bhola, M. Steiner, S. Chari, and S. Yoshihama. Smash: secure component model for cross-domain mashups on unmodified browsers. In WWW '08: Proceeding of the 17th International Conference on World Wide Web, pages 535-544, New York, NY, USA, 2008. ACM.
-
(2008)
WWW '08: Proceeding of the 17th International Conference on World Wide Web
, pp. 535-544
-
-
Keukelaere, F.D.1
Bhola, S.2
Steiner, M.3
Chari, S.4
Yoshihama, S.5
-
21
-
-
34250637208
-
Mashups: Emerging application development paradigm for a digital journal
-
April
-
N. Kulathuramaiyer. Mashups: Emerging application development paradigm for a digital journal. Journal of Universal Computer Science, 13(4):531-542, April 2007.
-
(2007)
Journal of Universal Computer Science
, vol.13
, Issue.4
, pp. 531-542
-
-
Kulathuramaiyer, N.1
-
22
-
-
36248965112
-
Web 2.0 creates security challenges
-
G. Lawton. Web 2.0 creates security challenges. IEEE COMPUTER, 40:13-16, 2007.
-
(2007)
IEEE COMPUTER
, vol.40
, pp. 13-16
-
-
Lawton, G.1
-
23
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
N. Li, B. Grosof, and J. Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur., 6(1):128-171, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.2
Feigenbaum, J.3
-
24
-
-
46849101030
-
Towards service composition based on mashup
-
X. Liu, Y. Hui, W. Sun, and H. Liang. Towards service composition based on mashup. In Proceedings of the IEEE Congress on Services, pages 332-339, 2007.
-
(2007)
Proceedings of the IEEE Congress on Services
, pp. 332-339
-
-
Liu, X.1
Hui, Y.2
Sun, W.3
Liang, H.4
-
25
-
-
8344266879
-
Authentication and authorization infrastructures (aais): A comparative survey
-
J. Lopez, R. Oppliger, and G. Pernul. Authentication and authorization infrastructures (aais): a comparative survey. Computers & Security, 23(7):578-590, 2004.
-
(2004)
Computers & Security
, vol.23
, Issue.7
, pp. 578-590
-
-
Lopez, J.1
Oppliger, R.2
Pernul, G.3
-
28
-
-
34547448344
-
Openid 2.0: A platform for user-centric identity management
-
New York, NY, USA, ACM
-
D. Recordon and D. Reed. Openid 2.0: a platform for user-centric identity management. In DIM '06: Proceedings of the second ACM workshop on Digital identity management, pages 11-16, New York, NY, USA, 2006. ACM.
-
(2006)
DIM '06: Proceedings of the second ACM workshop on Digital identity management
, pp. 11-16
-
-
Recordon, D.1
Reed, D.2
-
29
-
-
37449014206
-
The coming functionality: Mash-up in personal learning environments
-
C. Severance, G. Hardin, and A. Whyte. The coming functionality: mash-up in personal learning environments. Interactive Learning Environments, 16(1):47-62, 2008.
-
(2008)
Interactive Learning Environments
, vol.16
, Issue.1
, pp. 47-62
-
-
Severance, C.1
Hardin, G.2
Whyte, A.3
-
30
-
-
57049159282
-
Mashups: Who? what? why?
-
New York, NY, USA, ACM
-
N. Zang, M. Rosson, and V. Nasser. Mashups: who? what? why? In CHI '08: CHI '08 extended abstracts on Human factors in computing systems, pages 3171-3176, New York, NY, USA, 2008. ACM.
-
(2008)
CHI '08: CHI '08 extended abstracts on Human factors in computing systems
, pp. 3171-3176
-
-
Zang, N.1
Rosson, M.2
Nasser, V.3
|