메뉴 건너뛰기




Volumn 6, Issue 1, 2009, Pages 49-68

Using web service enhancements to establish trust relationships with privacy protection (extended and invited from ICWS 2006 with id 47)

Author keywords

Privacy protection; Trust establishment; Trust management; Web service; Web service enhancements

Indexed keywords

WEB CRAWLER; WEBSITES;

EID: 70249099523     PISSN: 15457362     EISSN: 15465004     Source Type: Journal    
DOI: 10.4018/jwsr.2009092203     Document Type: Article
Times cited : (3)

References (30)
  • 1
    • 1542318699 scopus 로고    scopus 로고
    • A Joint White Paper from IBM Corporation and Microsoft Corporation, Retrieved on XXX from
    • A Joint White Paper from IBM Corporation and Microsoft Corporation (2002), Security in a Web Services World: A Proposed Architecture and Roadmap. Retrieved on XXX from, http://msdn.microsoft.com/library/en-us/dnwssecur/html/ securitywhitepaper.asp
    • (2002) Security in A Web Services World: A Proposed Architecture and Roadmap
  • 9
    • 0037362986 scopus 로고    scopus 로고
    • Implementing role based access controls using x.509 attribute certificates
    • Chadwick, D., Otenko, A., & Ball, E. (2003). Implementing Role Based Access Controls Using X.509 Attribute Certificates, IEEE Internet Computing, pp. 62-69.
    • (2003) IEEE Internet Computing , pp. 62-69
    • Chadwick, D.1    Otenko, A.2    Ball, E.3
  • 17
    • 85043057672 scopus 로고
    • Kent, S. (1993). Privacy Enhancement for Internet electronic Mail: Part II: Certificate-Based Key Management, Internet Report, RFC 1422.
    • (1993)
    • Kent, S.1
  • 19
    • 70249110485 scopus 로고    scopus 로고
    • Microsoft. Retrieved on XXX from
    • Microsoft (2006). Major Features of the Web Services Enhancements. Retrieved on XXX from, http://msdn.microsoft.com/library/en-us/wse/html/ 3c55ed70-6b66-4620-bba7-59c5b2f2191d.asp.
    • (2006) Major Features of the Web Services Enhancements
  • 23
    • 0026854374 scopus 로고
    • An axiomatic theory of trust in secure communication protocols
    • Rangan, P. (1992). An Axiomatic Theory of Trust in Secure Communication Protocols, Computers and Security, 11, pp. 163 - 172.
    • (1992) Computers and Security , vol.11 , pp. 163
    • Rangan, P.1
  • 24
    • 13244288768 scopus 로고    scopus 로고
    • Authentication metric analysis and design
    • Reiter, M. (1999). Authentication Metric Analysis and Design, ACM Trans. Information and System Security, 2(2), pp. 138-158.
    • (1999) ACM Trans. Information and System Security , vol.2 , Issue.2 , pp. 138-158
    • Reiter, M.1
  • 26
    • 24144480663 scopus 로고    scopus 로고
    • Least Privilege and More
    • Schneider, F. (2003). Least Privilege and More, IEEE Security and Privacy, 1(3), pp. 55-59.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.3 , pp. 55-59
    • Schneider, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.