메뉴 건너뛰기




Volumn 1, Issue 2, 2008, Pages 75-87

A Secure Information Flow Architecture for Web Service Platforms

Author keywords

security; TCBs; Web services

Indexed keywords

APPLICATION CODES; DIRECT MANIPULATIONS; END-TO-END SECURITIES; INFORMATION FLOWS; LEGACY APPLICATIONS; PROTECTION DOMAINS; PROTOTYPE IMPLEMENTATIONS; SECURE INFORMATION FLOWS; SECURITY; SENSITIVE DATUM; SENSITIVE INFORMATIONS; SERVICE PLATFORMS; SOFTWARE COMPLEXITY; TCBS; TRUSTED COMPONENTS; UNTRUSTED CODES;

EID: 70849096059     PISSN: 19391374     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSC.2008.10     Document Type: Article
Times cited : (20)

References (35)
  • 1
    • 78651467191 scopus 로고    scopus 로고
    • Apache WSS4J, http://ws.apache.org/wss4j/, 2008
    • (2008) Apache WSS4J
  • 2
    • 78651442999 scopus 로고    scopus 로고
    • Axis2 Architecture Guide, http://ws.apache.org/axis2/1_0/Axis2 ArchitectureGuide.html, 2008
    • (2008) Axis2 Architecture Guide
  • 3
    • 0003400251 scopus 로고
    • Secure Computer Systems: Unified Exposition and MULTICS Interpretation
    • MITRE Corp
    • D.E. Bell and L.J. La Padula, Secure Computer Systems: Unified Exposition and MULTICS Interpretation. MITRE Corp., 1976
    • (1976)
    • Bell, D.E.1    La Padula, L.J.2
  • 5
    • 85008045826 scopus 로고    scopus 로고
    • JavaNCSS, http://www.kclee.de/clemens/java/javancss/, 2008
    • (2008) JavaNCSS
  • 8
    • 85008055617 scopus 로고    scopus 로고
    • RUBiS, http://rubis.objectweb.org/index.html, 2008
    • (2008) RUBiS
  • 10
    • 85008066776 scopus 로고    scopus 로고
    • Secunia, Microsoft, NET Framework 1.x—Vulnerability Report
    • Secunia, Microsoft, NET Framework 1.x—Vulnerability Report, http://secunia.com/product/667/?task=advisories, 2008
    • (2008)
  • 11
    • 85008066830 scopus 로고    scopus 로고
    • Trusted Computing Group, https://www.trustedcomputinggroup.org/home, 2008
    • (2008)
  • 22
    • 0017291489 scopus 로고
    • A Complexity Measure
    • Dec
    • T.J. McCabe, “A Complexity Measure,” IEEE Trans. Software Eng., vol. SE-2, no. 4, pp. 308–320, Dec. 1976
    • (1976) IEEE Trans. Software Eng , vol.SE-2 , Issue.4 , pp. 308-320
    • McCabe, T.J.1
  • 24
    • 38949205195 scopus 로고    scopus 로고
    • Axis2, Middleware for Next Generation Web Services
    • Sept
    • S. Perera et al., “Axis2, Middleware for Next Generation Web Services,” Proc. IEEE Int'l Conf. Web Services (ICWS '06), pp. 833–840, Sept. 2006
    • (2006) Proc. IEEE Int'l Conf. Web Services (ICWS '06) , pp. 833-840
    • Perera, S.1
  • 25
    • 0037251378 scopus 로고    scopus 로고
    • Language-Based Information-Flow Security
    • Jan
    • A. Sabelfeld and A.C. Myers, “Language-Based Information-Flow Security,” IEEE J. Selected Areas in Comm., vol. 21, no. 1, pp. 5–19, Jan. 2003
    • (2003) IEEE J. Selected Areas in Comm , vol.21 , Issue.1 , pp. 5-19
    • Sabelfeld, A.1    Myers, A.C.2
  • 27
    • 0016555241 scopus 로고
    • The Protection of Information in Computer Systems
    • Sept
    • J.H. Saltzer and M.D. Schroeder, “The Protection of Information in Computer Systems,” Proc. IEEE, vol. 63, no. 9, pp. 1278–1308, Sept. 1975
    • (1975) Proc. IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 32
    • 0016069660 scopus 로고
    • HYDRA: The Kernel of a Multiprocessor Operating System
    • June
    • W. Wulf, E. Cohen, W. Corwin, A. Jones, R. Levin, C. Pierson, and F. Pollack, “HYDRA: The Kernel of a Multiprocessor Operating System,” Comm. ACM, vol. 17, no. 6, pp. 337–345, June 1974
    • (1974) Comm. ACM , vol.17 , Issue.6 , pp. 337-345
    • Wulf, W.1    Cohen, E.2    Corwin, W.3    Jones, A.4    Levin, R.5    Pierson, C.6    Pollack, F.7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.