-
1
-
-
84877004211
-
-
ActiveIdentity, Single Sign-On, http://www.actividentity.com/solutions/ technology/esso--overview.php
-
Single Sign-On
-
-
-
2
-
-
0029700344
-
Decentralized trust management
-
Blaze, M.; Feigenbaum, J.; Lacy, J., "Decentralized trust management," Proceedings of IEEE Symposium on Security and Privacy, pp. 164-173, 1996.
-
(1996)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
3
-
-
0042484568
-
On the Inability of an Unmodified Capability Machine to Enforce the *-property
-
Gaithersburg, MD, USA, September National Bureau of Standards
-
Boebert, W. E., On the Inability of an Unmodified Capability Machine to Enforce the *-property. In Proc. 7th DoD/NBS Computer Security Conference, pages 291-293, Gaithersburg, MD, USA, September 1984. National Bureau of Standards.
-
(1984)
Proc. 7th DoD/NBS Computer Security Conference
, pp. 291-293
-
-
Boebert, W.E.1
-
4
-
-
84877004211
-
-
Computer Associates, Single Sign-On, http://www.ca.com/us/products/ product.aspx?id=166
-
Single Sign-On
-
-
-
6
-
-
0000338326
-
Programming Semantics for Multiprogrammed Computations
-
Dennis, J. B. and Van Horn, E. C., Programming Semantics for Multiprogrammed Computations, Comm. of the ACM, 9, #3, 1966.
-
(1966)
Comm. of the ACM
, vol.9
, Issue.3
-
-
Dennis, J.B.1
Van Horn, E.C.2
-
8
-
-
0003593599
-
-
IETF RFC 2693
-
Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., and Ylonen, T., "SPKI Certificate Theory", IETF RFC 2693. http://www.ietf.org/ rfc/rfc2693.txt
-
SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
14
-
-
0024089972
-
The Confused Deputy: (or why capabilities might have been invented)
-
October
-
Hardy, N., "The Confused Deputy: (or why capabilities might have been invented)", ACM SIGOPS Operating Systems Review, Volume 22, Issue 4 (October 1988).
-
(1988)
ACM SIGOPS Operating Systems Review
, vol.22
, Issue.4
-
-
Hardy, N.1
-
17
-
-
34547531386
-
-
Technical Report HPL-2001-136, Hewlett Packard Laboratories
-
Karp, A. H., Gupta, R., Rozas, G., and Banerji, A., The Client Utility Architecture: The Precursor to E-Speak. Technical Report HPL-2001-136, Hewlett Packard Laboratories, 2001.
-
(2001)
The Client Utility Architecture: The Precursor to E-Speak
-
-
Karp, A.H.1
Gupta, R.2
Rozas, G.3
Banerji, A.4
-
18
-
-
34547474561
-
Authorization Based Access Control for the Services Oriented Architecture
-
IEEE Press, January Some of the introductory material comes from this paper
-
Karp, A. H., "Authorization Based Access Control for the Services Oriented Architecture", Proc. 4th Int. Conf. on Creating, Connecting and Collaborating through Computing (C5 2006), Berkeley, CA, IEEE Press, January (2006), http://www.hpl.hp.com/techreports/2006/HPL-2006-3.html. Some of the introductory material comes from this paper.
-
(2006)
Proc. 4th Int. Conf. on Creating, Connecting and Collaborating Through Computing (C5 2006), Berkeley, CA
-
-
Karp, A.H.1
-
19
-
-
77954001006
-
Zebra Copy: A Reference Implementation of Federated Access Management
-
Li, J. and Karp, A., "Zebra Copy: A Reference Implementation of Federated Access Management", HP Labs Technical Report HPL-2007-105, http://www.hpl.hp.com/techreports/2007/HPL-2007-105.html
-
HP Labs Technical Report HPL-2007-105
-
-
Li, J.1
Karp, A.2
-
22
-
-
77954017106
-
-
Liberty Alliance, http://www.projectliberty.org/.
-
-
-
-
25
-
-
0346955862
-
Paradigm Regained: Abstraction Mechanisms for Access Control
-
Tata Institute of Fundamental Research, Mumbai, India
-
Miller, M. S. and Shapiro, J. S. Paradigm Regained: Abstraction Mechanisms for Access Control. In Proc. Eighth Asian Computing Science Conference, pages 224-242, Tata Institute of Fundamental Research, Mumbai, India, 2003.
-
(2003)
Proc. Eighth Asian Computing Science Conference
, pp. 224-242
-
-
Miller, M.S.1
Shapiro, J.S.2
-
26
-
-
34547636298
-
-
Ph. D. Thesis, Johns Hopkins University, Baltimore, Maryland, USA
-
Miller, M. S, Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control, Ph. D. Thesis, Johns Hopkins University, Baltimore, Maryland, USA, 2006.
-
(2006)
Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control
-
-
Miller, M.S.1
-
28
-
-
4243048792
-
Service-Oriented Computing
-
Oct.
-
Papazoglou, M.P and Georgakopoulos, D., "Service- Oriented Computing," Communications of the ACM, Vol. 46, No. 10, pp. 25-8, Oct. 2003.
-
(2003)
Communications of the ACM
, vol.46
, Issue.10
, pp. 25-28
-
-
Papazoglou, M.P.1
Georgakopoulos, D.2
-
30
-
-
84877004211
-
-
Ping Identity, Single Sign-On, http://www.pingidentity.com/resources/88
-
Single Sign-On
-
-
-
32
-
-
77954017296
-
-
Security Token, see and http://www.oasisopen. org/committees/download. php/16785/wss-v1.1-specos- x509TokenProfile.pdf
-
Security Token, see http://www.oasisopen. org/committees/download.php/ 16790/wss-v1.1-specos- SOAPMessageSecurity.pdf, and http://www.oasisopen.org/ committees/download.php/16785/wss-v1.1-specos- x509TokenProfile.pdf
-
-
-
-
36
-
-
31644443147
-
-
The Open Group, CDSA Explained, http://www.opengroup.org/bookstore/ catalog/g905.htm,2001.
-
(2001)
CDSA Explained
-
-
-
37
-
-
2942654406
-
Certificate-Based Authorization Policy in a PKI Environment
-
Nov.
-
Thompson, M. R., Essiari, A., and Mudumbai, S., Certificate-Based Authorization Policy in a PKI Environment, ACM Trans. Information System Security, Vol. 6, No. 4, Nov. 2003, pp. 566-588.
-
(2003)
ACM Trans. Information System Security
, vol.6
, Issue.4
, pp. 566-588
-
-
Thompson, M.R.1
Essiari, A.2
Mudumbai, S.3
-
38
-
-
77953995529
-
-
Universal Description, Discovery, and Integration (UDDI), http://www.uddi.org/.
-
-
-
-
39
-
-
0031077602
-
CORBA: Integrating diverse applications within distributed heterogeneous environments
-
Vinoski, S., "CORBA: Integrating Diverse Applications within Distributed Heterogeneous Environments," IEEE Communications Magazine, vol.35, no.2, pp. 46-55, Feb. 1997. (Pubitemid 127641958)
-
(1997)
IEEE Communications Magazine
, vol.35
, Issue.2
, pp. 46-55
-
-
Vinoski, S.1
|