-
2
-
-
33646025538
-
An innovative policybased cross certification methodology for public key infrastructures
-
Lecture Notes in Computer Science, Springer-Verlag
-
V. Casola, A. Mazzeo, N. Mazzocca, M. Rak, "An innovative Policybased Cross Certification methodology for Public Key Infrastructures" , proc. of the 2nd European PKI Workshop: Research and Applications, EuroPKI 2005. Pp. 100-117. Lecture Notes in Computer Science, Springer-Verlag.
-
(2005)
Proc. of the 2nd European PKI Workshop: Research and Applications, EuroPKI
, pp. 100-117
-
-
Casola, V.1
Mazzeo, A.2
Mazzocca, N.3
Rak, M.4
-
4
-
-
33847411543
-
A security metric for public key infrastructures
-
January, IOSPress
-
V. Casola, A. Mazzeo, N. Mazzocca, V. Vittorini, "A security metric for public key infrastructures", In Journal of Computer Security, January 2007, IOSPress.
-
(2007)
Journal of Computer Security
-
-
Casola, V.1
Mazzeo, A.2
Mazzocca, N.3
Vittorini, V.4
-
5
-
-
77956614556
-
A decisional framework for legacy system management
-
IEEE CS Press
-
A. De Lucia, A.R. Fasolino, E. Pompella, "A decisional framework for legacy system management", proc. of the IEEE International Conference on Software Maintenance, 2001. IEEE CS Press, pp. 642 - 651.
-
(2001)
Proc. of the IEEE International Conference on Software Maintenance
, pp. 642-651
-
-
Lucia, A.D.1
Fasolino, A.R.2
Pompella, E.3
-
6
-
-
0003969633
-
-
DoD (Department of Defense), ", ", 26 December, (Orange Book
-
DoD (Department of Defense), "Trusted Computer System Evaluation Criteria", 26 December 1985 (Orange Book). European Communities - Commission. ITSEC: Information Technology Security Evaluation Criteria; (Provisional Harmonised Criteria, Version 1.2, 28 June 1991) Office for Official Publications of the European Communities, Luxembourg 1991
-
(1985)
Trusted Computer System Evaluation Criteria
-
-
-
11
-
-
34250687582
-
Semantic wsagreement partner selection
-
ACM Press, New York, NY
-
N. Oldham, K. Verma, A Sheth, F. Hakimpour, "Semantic WSAgreement Partner Selection", proc. of the 15th International Conference on World Wide Web, WWW '06. ACM Press, New York, NY, 697-706.
-
Proc. of the 15th International Conference on World Wide Web, WWW '06
, pp. 697-706
-
-
Oldham, N.1
Verma, K.2
Sheth, A.3
Hakimpour, F.4
-
12
-
-
70849136665
-
-
available at
-
QME: a Quality Model Editor, available at: http://www.seclab.unina.it/ uploads/publications/QME.zip.
-
QME: A Quality Model Editor
-
-
-
13
-
-
0033489646
-
Security service level agreements: Quantifiable security for the enterprise?
-
Ontario, Canada
-
R. Ronda, R. Henning, "Security Service Level Agreements: Quantifiable Security for the Enterprise?", ACM proc. of New Security Paradigm Workshop 1999, Ontario, Canada. Pp.54-60.
-
(1999)
ACM Proc. of New Security Paradigm Workshop
, pp. 54-60
-
-
Ronda, R.1
Henning, R.2
-
14
-
-
0025700933
-
How to make a decision: The analytic hierarchy process
-
Elsevier
-
T.L. Saaty, "How to make a decision: the analytic hierarchy process", European Journal of Operational Research, 1990. Vol. 48, n.1, Elsevier, pp. 9- 26.
-
(1990)
European Journal of Operational Research
, vol.48
, Issue.1
, pp. 9-26
-
-
Saaty, T.L.1
-
16
-
-
70849124137
-
-
February, Available at
-
W3C Working Group. Web Services Architecture, Note 11 February 2004. Available at http://www.w3.org/TR/ws-arch/.
-
(2004)
Web Services Architecture, Note
, vol.11
-
-
-
17
-
-
57349099752
-
-
version 2005/09. Available at, WS-Policy specification. Web Services Policy Framework, April 2006. Available at http://www.w3.org/Submission/WS- Policy/
-
WS-Agreements specification. Web Services Agreement Specification, version 2005/09. Available at http://www.gridforum.org/Public-Comment-Docs/ Documents/Oct-2005/WSAgreementSpecificationDraft050920. pdf.
-
Web Services Agreement Specification
-
-
-
19
-
-
70849111335
-
WS-trust specification
-
Available at
-
WS-Trust specification. Web Services Trust Language. Available at http://specs.xmlsoap.org/ws/2005/02/trust/WS-Trust.pdf.
-
Web Services Trust Language
-
-
-
20
-
-
27844542141
-
Tradeoff and sensitivity analysis in software architecture evaluation using analytic hierarchy process
-
Springer Netherlands,/December
-
L. Zhu, A. Aurum, I. Gorton and R. Jeffery, "Tradeoff and Sensitivity Analysis in Software Architecture Evaluation Using Analytic Hierarchy Process", Software Quality Journal, Springer Netherlands, Volume 13, Number 4/December, 2005.
-
(2005)
Software Quality Journal
, vol.13
, Issue.4
-
-
Zhu, L.1
Aurum, A.2
Gorton, I.3
Jeffery, R.4
|