메뉴 건너뛰기




Volumn 55, Issue 4, 2009, Pages 224-232

Security architecture for virtual organizations of business web services

Author keywords

Access control derivation; Virtual organization; Virtual organization management security; Web service security

Indexed keywords

COMPUTATION THEORY; SECURITY SYSTEMS; WEB SERVICES;

EID: 63649096038     PISSN: 13837621     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.sysarc.2008.10.001     Document Type: Article
Times cited : (18)

References (24)
  • 7
    • 0035455653 scopus 로고    scopus 로고
    • I. Foster, C. Kesselman, S. Tuecke, The anatomy of the grid: enabling scalable virtual organizations, Int. J. High Perform. Computing, 2001.
    • I. Foster, C. Kesselman, S. Tuecke, The anatomy of the grid: enabling scalable virtual organizations, Int. J. High Perform. Computing, 2001.
  • 9
    • 63649164732 scopus 로고    scopus 로고
    • R. Housley, W. Polk, W. Ford, D. Solo, Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. IETF RFC 3280. Available from: , 2002.
    • R. Housley, W. Polk, W. Ford, D. Solo, Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. IETF RFC 3280. Available from: , 2002.
  • 11
    • 33646021047 scopus 로고    scopus 로고
    • Comparison of performance of web services, WS-Security, RMI, and RMI-SSL
    • Juric M., Rozman I., Brumen B., Colnaric M., and Hericko M. Comparison of performance of web services, WS-Security, RMI, and RMI-SSL. J. Syst. Software 79 5 (2006)
    • (2006) J. Syst. Software , vol.79 , Issue.5
    • Juric, M.1    Rozman, I.2    Brumen, B.3    Colnaric, M.4    Hericko, M.5
  • 13
    • 63649108391 scopus 로고    scopus 로고
    • N. Kavantzas, D. Burdett, G. Ritzinger, T. Fletcher, Y. Lafon, C. Barreto, Web Services Choreography Description Language Version 1.0. W3C. Available from:, 2005
    • N. Kavantzas, D. Burdett, G. Ritzinger, T. Fletcher, Y. Lafon, C. Barreto, Web Services Choreography Description Language Version 1.0. W3C. Available from: , 2005.
  • 18
    • 63649165145 scopus 로고    scopus 로고
    • T. Moses, eXtensible Access Control Markup Language 2 (XACML) Version 2.0 Specification, OASIS. Available from: , 2005.
    • T. Moses, eXtensible Access Control Markup Language 2 (XACML) Version 2.0 Specification, OASIS. Available from: , 2005.
  • 20
    • 63649147851 scopus 로고    scopus 로고
    • P. Robinson, F. Kerschbaum, A. Schaad, From business process choreography to authorization policies, in: Proceedings of the 20th IFIP WG 11.3 Working Conference on Data and Applications Security, 2006.
    • P. Robinson, F. Kerschbaum, A. Schaad, From business process choreography to authorization policies, in: Proceedings of the 20th IFIP WG 11.3 Working Conference on Data and Applications Security, 2006.
  • 21
    • 0037848141 scopus 로고    scopus 로고
    • Access control: Policies, models, and mechanisms, Foundations of Security Analysis and Design
    • P. Samarati, S. De Capitani di Vimercati, Access control: policies, models, and mechanisms, Foundations of Security Analysis and Design, LNCS 2171, 2001.
    • (2001) LNCS , vol.2171
    • Samarati, P.1    De Capitani di Vimercati, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.