메뉴 건너뛰기




Volumn 1, Issue 4, 2008, Pages 201-213

Tisa: Toward Trustworthy Services in a Service-Oriented Architecture

Author keywords

client side data privacy; Service Oriented Architecture (SOA); trust; verification; Web services

Indexed keywords

CLIENT-SIDE DATA PRIVACY; HARDWARE AND SOFTWARES; HARDWARE SOLUTIONS; NON-FUNCTIONAL; SERVICE-LEVEL AGREEMENTS; TRUST;

EID: 67650211063     PISSN: 19391374     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSC.2008.18     Document Type: Article
Times cited : (31)

References (51)
  • 1
    • 78651441477 scopus 로고    scopus 로고
    • Service Oriented Computing Is Overrated: Information Infrastructure Problems Cannot be Solved by Service Oriented Computing (soc) Alone. Pro or Con?
    • Nov
    • L.-J. Zhang and D.A. Grier, “Service Oriented Computing Is Overrated: Information Infrastructure Problems Cannot be Solved by Service Oriented Computing (soc) Alone. Pro or Con?” Business Week, Nov. 2008
    • (2008) Business Week
    • Zhang, L.-J.1    Grier, D.A.2
  • 2
    • 4243048792 scopus 로고    scopus 로고
    • Service-Oriented Computing: Introduction
    • M.P. Papazoglou and D. Georgakopoulos, “Service-Oriented Computing: Introduction,” Comm. ACM, vol. 46, no. 10, pp. 24–28, 2003
    • (2003) Comm. ACM , vol.46 , Issue.10 , pp. 24-28
    • Papazoglou, M.P.1    Georgakopoulos, D.2
  • 3
    • 0003791651 scopus 로고    scopus 로고
    • Web Services Description Language (WSDL) 1.1
    • technical report, World Wide Web Consortium
    • E. Christensen, F. Curbera, G. Meredith, and S. Weerawarana, “Web Services Description Language (WSDL) 1.1,” technical report, World Wide Web Consortium, 2001
    • (2001)
    • Christensen, E.1    Curbera, F.2    Meredith, G.3    Weerawarana, S.4
  • 6
    • 33747127813 scopus 로고    scopus 로고
    • Run-Time Monitoring of Requirements for Systems Composed of Web-Services: Initial Implementation and Evaluation Experience
    • K. Mahbub and G. Spanoudakis, “Run-Time Monitoring of Requirements for Systems Composed of Web-Services: Initial Implementation and Evaluation Experience,” Proc. Int'l Conf. Web Services (ICWS '05), pp. 257–265, 2005
    • (2005) Proc. Int'l Conf. Web Services (ICWS '05) , pp. 257-265
    • Mahbub, K.1    Spanoudakis, G.2
  • 12
    • 85084162270 scopus 로고    scopus 로고
    • Design and Implementation of a TCG-Based Integrity Measurement Architecture
    • Aug
    • R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn, “Design and Implementation of a TCG-Based Integrity Measurement Architecture,” Proc. 13th Usenix Security Symp., pp. 223–238, Aug. 2004
    • (2004) Proc. 13th Usenix Security Symp , pp. 223-238
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    van Doorn, L.4
  • 13
    • 19944361984 scopus 로고    scopus 로고
    • The Role of TPM in Enterprise Security
    • Technical Report, IBM Research, Oct
    • R. Sailer, L. van Doorn, and J.P. Ward, “The Role of TPM in Enterprise Security,” Technical Report, IBM Research, Oct. 2004
    • (2004)
    • Sailer, R.1    van Doorn, L.2    Ward, J.P.3
  • 16
    • 85008051994 scopus 로고    scopus 로고
    • Web Services Security (ws-security)
    • C. Kaler et al., “Web Services Security (ws-security),” http://msdn.microsoft.com/library/enus/dnglobspec/html/ ws-security.asp, 2008
    • (2008)
    • Kaler, C.1
  • 17
    • 78651466129 scopus 로고    scopus 로고
    • Web Services Trust Language (wstrust)
    • S. Anderson et al., “Web Services Trust Language (wstrust),” http://msdn.microsoft.com/ws/2004/04/ws-trust, 2008
    • (2008)
    • Anderson, S.1
  • 19
    • 78650450194 scopus 로고    scopus 로고
    • Trusted Computing Group
    • “Trusted Computing Group,” http://www.trustedcomputing group.org, 2009
    • (2009)
  • 20
    • 78651462536 scopus 로고    scopus 로고
    • TPM Main Part 1 Design Principles Specification Version 1.2
    • “TPM Main Part 1 Design Principles Specification Version 1.2,” http://www.trustedcomputinggroup.org/specs/TPM, 2009
    • (2009)
  • 21
    • 78651446842 scopus 로고    scopus 로고
    • Microsoft Next-Generation Secure Computing Base
    • “Microsoft Next-Generation Secure Computing Base,” http://www.microsoft.com/resources/ngscb, 2008
    • (2008)
  • 22
    • 77954339628 scopus 로고    scopus 로고
    • Trusted Platform Module (TPM) Based Security on Notebook PCs—white paper
    • S. Bajikar, “Trusted Platform Module (TPM) Based Security on Notebook PCs—white paper,” Technical Report, Mobile Platforms Group Intel Corporation, June 2002
    • (2002)
    • Bajikar, S.1
  • 24
    • 85008066812 scopus 로고    scopus 로고
    • The Perseus Architecture
    • Technical Report RZ3335 (#93381), IBM Research Division, Apr
    • B. Pfitzmann, J. Riordan, C. Stuble, M. Waidner, and A. Weber, “The Perseus Architecture,” Technical Report RZ3335 (#93381), IBM Research Division, Apr. 2001
    • (2001)
    • Pfitzmann, B.1    Riordan, J.2    Stuble, C.3    Waidner, M.4    Weber, A.5
  • 26
    • 26844578344 scopus 로고    scopus 로고
    • Collision Search Attacks on SHA1
    • X. Wang, Y.L. Yin, and H. Yu, “Collision Search Attacks on SHA1,” http://www.cryptome.org/sha-attacks.htm, 2008
    • (2008)
    • Wang, X.1    Yin, Y.L.2    Yu, H.3
  • 27
    • 0001867722 scopus 로고    scopus 로고
    • The Temporal Logic of Programs
    • Technical Report, Weizmann Science Press
    • A. Pnueli, “The Temporal Logic of Programs,” Technical Report, Weizmann Science Press, 1997
    • (1997)
    • Pnueli, A.1
  • 28
    • 41149100339 scopus 로고    scopus 로고
    • Projektvorstellung tpm4java Trusted Computing fur Java
    • E. Tews and M. Hermanowski, “Projektvorstellung tpm4java Trusted Computing fur Java,” http://tpm4java.datenzone.de, 2009
    • (2009)
    • Tews, E.1    Hermanowski, M.2
  • 29
    • 85008031879 scopus 로고    scopus 로고
    • TM
    • TM,” http://www.tangentum.biz, 2009
    • (2009)
  • 34
    • 78651451351 scopus 로고    scopus 로고
    • Tisa: A Language Design and Modular Verification Technique for Temporal Policies in Web Services
    • Technical Report, Mar
    • H. Rajan, J. Tao, S.M. Shaner, and G.T. Leavens, “Tisa: A Language Design and Modular Verification Technique for Temporal Policies in Web Services,” Technical Report, Mar. 2009
    • (2009)
    • Rajan, H.1    Tao, J.2    Shaner, S.M.3    Leavens, G.T.4
  • 36
    • 85008005638 scopus 로고    scopus 로고
    • BCEL Homepage
    • BCEL Homepage, http://jakarta.apache.org/bcel, 2009
    • (2009)
  • 43
  • 49
    • 33646721094 scopus 로고    scopus 로고
    • Testing Services and Service-Centric Systems: Challenges and Opportunities
    • G. Canfora and M.D. Penta, “Testing Services and Service-Centric Systems: Challenges and Opportunities,” IT Professional, vol. 8, no. 2, pp. 1–17, 2006
    • (2006) IT Professional , vol.8 , Issue.2 , pp. 1-17
    • Canfora, G.1    Penta, M.D.2
  • 51
    • 26844492006 scopus 로고    scopus 로고
    • Validating a Web Service Security Abstraction by Typing
    • Oct
    • A.D. Gordon and R. Pucella, “Validating a Web Service Security Abstraction by Typing,” Formal Aspects of Computing, vol. 17, no. 3, pp. 277–318, Oct. 2005
    • (2005) Formal Aspects of Computing , vol.17 , Issue.3 , pp. 277-318
    • Gordon, A.D.1    Pucella, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.