-
1
-
-
1542318699
-
-
A Joint White Paper from IBM Corporation and Microsoft Corporation, Retrieved on XXX from
-
A Joint White Paper from IBM Corporation and Microsoft Corporation (2002), Security in a Web Services World: A Proposed Architecture and Roadmap. Retrieved on XXX from, http://msdn.microsoft.com/library/en-us/dnwssecur/html/ securitywhitepaper.asp
-
(2002)
Security in A Web Services World: A Proposed Architecture and Roadmap
-
-
-
6
-
-
0002863367
-
Valuation of trust in open networks
-
Beth, T., Borcherding, M., & Klein, B. (1994). Valuation of Trust in Open Networks, Proc. of the 3rd European Symposium on Research in Computer Security, pp. 3-18.
-
(1994)
Proc. of the 3rd European Symposium on Research in Computer Security
, pp. 3-18
-
-
Beth, T.1
Borcherding, M.2
Klein, B.3
-
9
-
-
0037362986
-
Implementing role based access controls using x.509 attribute certificates
-
Chadwick, D., Otenko, A., & Ball, E. (2003). Implementing Role Based Access Controls Using X.509 Attribute Certificates, IEEE Internet Computing, pp. 62-69.
-
(2003)
IEEE Internet Computing
, pp. 62-69
-
-
Chadwick, D.1
Otenko, A.2
Ball, E.3
-
11
-
-
33646543697
-
A WOWA-based Aggregation Technique on Trust Values Connected to Metadata
-
Damiani, E., Vimercati, S., Samarati, P., & Viviani, M. (2005). A WOWA-based Aggregation Technique on Trust Values Connected to Metadata, Proc. Of International Workshop on Security and Trust Management, pp. 131-142.
-
(2006)
Electronic Notes in Theoretical Computer Science
, vol.157
, Issue.3
, pp. 131-142
-
-
Damiani, E.1
De Capitani di Vimercati, S.2
Samarati, P.3
Viviani, M.4
-
14
-
-
0036376894
-
DRBAC: Distributed rolebased access control for dynamic coalition environments
-
Freudenthal, E., Pesin, T., Port, L., Keenan, E., & Karamcheti, V. (2002). dRBAC: Distributed Rolebased Access Control for Dynamic Coalition Environments, Proc. of 22nd International Conference on Distributed Computing Systems, pp. 411-420.
-
(2002)
Proc. of 22nd International Conference on Distributed Computing Systems
, pp. 411-420
-
-
Freudenthal, E.1
Pesin, T.2
Port, L.3
Keenan, E.4
Karamcheti, V.5
-
17
-
-
85043057672
-
-
Kent, S. (1993). Privacy Enhancement for Internet electronic Mail: Part II: Certificate-Based Key Management, Internet Report, RFC 1422.
-
(1993)
-
-
Kent, S.1
-
18
-
-
0036085965
-
Design of a role-based trust-management framework
-
Li, N., Mitchell, J., & Winsborough, W. (2002). Design of a Role-Based Trust-Management Framework, Proc. of the 2002 IEEE Symposium on Security and Privacy, pp. 114-130.
-
(2002)
Proc. of the 2002 IEEE Symposium on Security and Privacy
, pp. 114-130
-
-
Li, N.1
Mitchell, J.2
Winsborough, W.3
-
19
-
-
70249110485
-
-
Microsoft. Retrieved on XXX from
-
Microsoft (2006). Major Features of the Web Services Enhancements. Retrieved on XXX from, http://msdn.microsoft.com/library/en-us/wse/html/ 3c55ed70-6b66-4620-bba7-59c5b2f2191d.asp.
-
(2006)
Major Features of the Web Services Enhancements
-
-
-
21
-
-
4243048792
-
Service-oriented computing
-
Papazoglou, M. & Georgakopoulos, D. (2003). Service-oriented Computing, Communications of the ACM, 46(10), pp. 25-28.
-
(2003)
Communications of the ACM
, vol.46
, Issue.10
, pp. 25-28
-
-
Papazoglou, M.1
Georgakopoulos, D.2
-
23
-
-
0026854374
-
An axiomatic theory of trust in secure communication protocols
-
Rangan, P. (1992). An Axiomatic Theory of Trust in Secure Communication Protocols, Computers and Security, 11, pp. 163 - 172.
-
(1992)
Computers and Security
, vol.11
, pp. 163
-
-
Rangan, P.1
-
24
-
-
13244288768
-
Authentication metric analysis and design
-
Reiter, M. (1999). Authentication Metric Analysis and Design, ACM Trans. Information and System Security, 2(2), pp. 138-158.
-
(1999)
ACM Trans. Information and System Security
, vol.2
, Issue.2
, pp. 138-158
-
-
Reiter, M.1
-
25
-
-
0030086382
-
Role-based acess control models
-
Sandhu, R., Coyne, E., Feinstein, H., & Youman, C. (1996). Role-based acess control models, IEEE Computer, 20(2), pp. 38-47.
-
(1996)
IEEE Computer
, vol.20
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
26
-
-
24144480663
-
Least Privilege and More
-
Schneider, F. (2003). Least Privilege and More, IEEE Security and Privacy, 1(3), pp. 55-59.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.3
, pp. 55-59
-
-
Schneider, F.1
-
28
-
-
70249094705
-
Role based access control in distributed systems
-
Vandenwauver, M., Govaerts, R., & Vandewalle, J. (1997). Role based access control in distributed systems, Communications and Multimedia Security, 3, pp. 169-177.
-
(1997)
Communications and Multimedia Security
, vol.3
, pp. 169-177
-
-
Vandenwauver, M.1
Govaerts, R.2
Vandewalle, J.3
-
29
-
-
84944675667
-
Federated, secure trust networks for distributed healthcare it services
-
Weaver, A., Dwyer, S., Snyder, A., Van Dyke, J., Hu, J., Chen, X., & Mulholland, T. (2003). Federated, Secure Trust Networks for Distributed Healthcare IT Services, Proc. of IEEE International Conference on Industrial Informatics, pp. 162-169.
-
(2003)
Proc. of IEEE International Conference on Industrial Informatics
, pp. 162-169
-
-
Weaver, A.1
Dwyer, S.2
Snyder, A.3
Van, D.J.4
Hu, J.5
Chen, X.6
Mulholland, T.7
|