메뉴 건너뛰기




Volumn , Issue , 2008, Pages 173-182

Please permit me: Stateless delegated authorization in mashups

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS RIGHTS; FINE GRAINED; LEAST PRIVILEGES; LEGACY APPLICATIONS; MASHUPS; WEB 2.0;

EID: 60649094298     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2008.24     Document Type: Conference Paper
Times cited : (20)

References (31)
  • 4
    • 84868902143 scopus 로고    scopus 로고
    • Online at, 2007
    • OAuth Specification 1.0. Online at http://oauth.net/core/1.0, 2007.
    • OAuth Specification 1.0
  • 10
    • 0037362986 scopus 로고    scopus 로고
    • Role-based access control with x.509 attribute certificates
    • 62-69
    • D. Chadwick, A. Otenko, and E. Ball. Role-based access control with x.509 attribute certificates. IEEE Internet Computing, 07(2):62-69, 2003.
    • (2003) IEEE Internet Computing , vol.7 , Issue.2
    • Chadwick, D.1    Otenko, A.2    Ball, E.3
  • 11
    • 36849088195 scopus 로고    scopus 로고
    • Enterprise security for web 2.0
    • M. Davidson and E. Yoran. Enterprise security for web 2.0. COMPUTER, pages 117-119, 2007.
    • (2007) COMPUTER , pp. 117-119
    • Davidson, M.1    Yoran, E.2
  • 18
    • 0029290135 scopus 로고
    • A capability-based authorization model for the world-wide web
    • J. Kahan. A capability-based authorization model for the world-wide web. Computer Networks and ISDN Systems, 27(6):1055-1064, 1995.
    • (1995) Computer Networks and ISDN Systems , vol.27 , Issue.6 , pp. 1055-1064
    • Kahan, J.1
  • 19
    • 60649118708 scopus 로고    scopus 로고
    • Mashups legitimize man-in-the-middle attacks: A position paper
    • IEEE
    • P. Karger. Mashups legitimize man-in-the-middle attacks: A position paper. In IEEE Web 2.0 Security and Privacy Workshop. IEEE, 2007.
    • (2007) IEEE Web 2.0 Security and Privacy Workshop
    • Karger, P.1
  • 21
    • 34250637208 scopus 로고    scopus 로고
    • Mashups: Emerging application development paradigm for a digital journal
    • April
    • N. Kulathuramaiyer. Mashups: Emerging application development paradigm for a digital journal. Journal of Universal Computer Science, 13(4):531-542, April 2007.
    • (2007) Journal of Universal Computer Science , vol.13 , Issue.4 , pp. 531-542
    • Kulathuramaiyer, N.1
  • 22
    • 36248965112 scopus 로고    scopus 로고
    • Web 2.0 creates security challenges
    • G. Lawton. Web 2.0 creates security challenges. IEEE COMPUTER, 40:13-16, 2007.
    • (2007) IEEE COMPUTER , vol.40 , pp. 13-16
    • Lawton, G.1
  • 23
    • 0041524661 scopus 로고    scopus 로고
    • Delegation logic: A logic-based approach to distributed authorization
    • N. Li, B. Grosof, and J. Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur., 6(1):128-171, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur , vol.6 , Issue.1 , pp. 128-171
    • Li, N.1    Grosof, B.2    Feigenbaum, J.3
  • 25
    • 8344266879 scopus 로고    scopus 로고
    • Authentication and authorization infrastructures (aais): A comparative survey
    • J. Lopez, R. Oppliger, and G. Pernul. Authentication and authorization infrastructures (aais): a comparative survey. Computers & Security, 23(7):578-590, 2004.
    • (2004) Computers & Security , vol.23 , Issue.7 , pp. 578-590
    • Lopez, J.1    Oppliger, R.2    Pernul, G.3
  • 29
    • 37449014206 scopus 로고    scopus 로고
    • The coming functionality: Mash-up in personal learning environments
    • C. Severance, G. Hardin, and A. Whyte. The coming functionality: mash-up in personal learning environments. Interactive Learning Environments, 16(1):47-62, 2008.
    • (2008) Interactive Learning Environments , vol.16 , Issue.1 , pp. 47-62
    • Severance, C.1    Hardin, G.2    Whyte, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.