메뉴 건너뛰기




Volumn , Issue , 2007, Pages 9-17

Access control for the services oriented architecture

Author keywords

access control; federated identity management; fidm; services oriented architecture; SOA; web services

Indexed keywords

ACCESS MANAGEMENT; ACCESS POLICIES; FEDERATED IDENTITY; FIDM; SERVICES ORIENTED ARCHITECTURE; WEB SERVICES STANDARDS;

EID: 70449504689     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1314418.1314421     Document Type: Conference Paper
Times cited : (22)

References (41)
  • 1
    • 84877004211 scopus 로고    scopus 로고
    • ActiveIdentity, Single Sign-On, http://www.actividentity.com/solutions/ technology/esso--overview.php
    • Single Sign-On
  • 3
    • 0042484568 scopus 로고
    • On the Inability of an Unmodified Capability Machine to Enforce the *-property
    • Gaithersburg, MD, USA, September National Bureau of Standards
    • Boebert, W. E., On the Inability of an Unmodified Capability Machine to Enforce the *-property. In Proc. 7th DoD/NBS Computer Security Conference, pages 291-293, Gaithersburg, MD, USA, September 1984. National Bureau of Standards.
    • (1984) Proc. 7th DoD/NBS Computer Security Conference , pp. 291-293
    • Boebert, W.E.1
  • 4
    • 84877004211 scopus 로고    scopus 로고
    • Computer Associates, Single Sign-On, http://www.ca.com/us/products/ product.aspx?id=166
    • Single Sign-On
  • 6
    • 0000338326 scopus 로고
    • Programming Semantics for Multiprogrammed Computations
    • Dennis, J. B. and Van Horn, E. C., Programming Semantics for Multiprogrammed Computations, Comm. of the ACM, 9, #3, 1966.
    • (1966) Comm. of the ACM , vol.9 , Issue.3
    • Dennis, J.B.1    Van Horn, E.C.2
  • 14
    • 0024089972 scopus 로고
    • The Confused Deputy: (or why capabilities might have been invented)
    • October
    • Hardy, N., "The Confused Deputy: (or why capabilities might have been invented)", ACM SIGOPS Operating Systems Review, Volume 22, Issue 4 (October 1988).
    • (1988) ACM SIGOPS Operating Systems Review , vol.22 , Issue.4
    • Hardy, N.1
  • 18
    • 34547474561 scopus 로고    scopus 로고
    • Authorization Based Access Control for the Services Oriented Architecture
    • IEEE Press, January Some of the introductory material comes from this paper
    • Karp, A. H., "Authorization Based Access Control for the Services Oriented Architecture", Proc. 4th Int. Conf. on Creating, Connecting and Collaborating through Computing (C5 2006), Berkeley, CA, IEEE Press, January (2006), http://www.hpl.hp.com/techreports/2006/HPL-2006-3.html. Some of the introductory material comes from this paper.
    • (2006) Proc. 4th Int. Conf. on Creating, Connecting and Collaborating Through Computing (C5 2006), Berkeley, CA
    • Karp, A.H.1
  • 19
    • 77954001006 scopus 로고    scopus 로고
    • Zebra Copy: A Reference Implementation of Federated Access Management
    • Li, J. and Karp, A., "Zebra Copy: A Reference Implementation of Federated Access Management", HP Labs Technical Report HPL-2007-105, http://www.hpl.hp.com/techreports/2007/HPL-2007-105.html
    • HP Labs Technical Report HPL-2007-105
    • Li, J.1    Karp, A.2
  • 22
    • 77954017106 scopus 로고    scopus 로고
    • Liberty Alliance, http://www.projectliberty.org/.
  • 25
    • 0346955862 scopus 로고    scopus 로고
    • Paradigm Regained: Abstraction Mechanisms for Access Control
    • Tata Institute of Fundamental Research, Mumbai, India
    • Miller, M. S. and Shapiro, J. S. Paradigm Regained: Abstraction Mechanisms for Access Control. In Proc. Eighth Asian Computing Science Conference, pages 224-242, Tata Institute of Fundamental Research, Mumbai, India, 2003.
    • (2003) Proc. Eighth Asian Computing Science Conference , pp. 224-242
    • Miller, M.S.1    Shapiro, J.S.2
  • 30
    • 84877004211 scopus 로고    scopus 로고
    • Ping Identity, Single Sign-On, http://www.pingidentity.com/resources/88
    • Single Sign-On
  • 32
    • 77954017296 scopus 로고    scopus 로고
    • Security Token, see and http://www.oasisopen. org/committees/download. php/16785/wss-v1.1-specos- x509TokenProfile.pdf
    • Security Token, see http://www.oasisopen. org/committees/download.php/ 16790/wss-v1.1-specos- SOAPMessageSecurity.pdf, and http://www.oasisopen.org/ committees/download.php/16785/wss-v1.1-specos- x509TokenProfile.pdf
  • 36
    • 31644443147 scopus 로고    scopus 로고
    • The Open Group, CDSA Explained, http://www.opengroup.org/bookstore/ catalog/g905.htm,2001.
    • (2001) CDSA Explained
  • 37
    • 2942654406 scopus 로고    scopus 로고
    • Certificate-Based Authorization Policy in a PKI Environment
    • Nov.
    • Thompson, M. R., Essiari, A., and Mudumbai, S., Certificate-Based Authorization Policy in a PKI Environment, ACM Trans. Information System Security, Vol. 6, No. 4, Nov. 2003, pp. 566-588.
    • (2003) ACM Trans. Information System Security , vol.6 , Issue.4 , pp. 566-588
    • Thompson, M.R.1    Essiari, A.2    Mudumbai, S.3
  • 38
    • 77953995529 scopus 로고    scopus 로고
    • Universal Description, Discovery, and Integration (UDDI), http://www.uddi.org/.
  • 39
    • 0031077602 scopus 로고    scopus 로고
    • CORBA: Integrating diverse applications within distributed heterogeneous environments
    • Vinoski, S., "CORBA: Integrating Diverse Applications within Distributed Heterogeneous Environments," IEEE Communications Magazine, vol.35, no.2, pp. 46-55, Feb. 1997. (Pubitemid 127641958)
    • (1997) IEEE Communications Magazine , vol.35 , Issue.2 , pp. 46-55
    • Vinoski, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.