-
1
-
-
63449115454
-
A Taxonomy of Single Sign-On Systems
-
R. Safavi-Naini and J. Seberry editors, Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11 2003, Proceedings, Springer-Verlag, Berlin
-
A. Pashalidis and C. J. Mitchell, "A Taxonomy of Single Sign-On Systems" , in R. Safavi-Naini and J. Seberry (editors), Information Security and Privacy - 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11 2003, Proceedings, Springer-Verlag (LNCS 2727), Berlin (2003), pp.249-264.
-
(2003)
LNCS
, vol.2727
, pp. 249-264
-
-
Pashalidis, A.1
Mitchell, C.J.2
-
2
-
-
0028514601
-
Kerberos: An Authentication Service for Computer Networks
-
Sept
-
B.C. Newman, and T Ts'o,., "Kerberos: An Authentication Service for Computer Networks," IEEE Communications, 32(9):33-38, Sept. 1994.
-
(1994)
IEEE Communications
, vol.32
, Issue.9
, pp. 33-38
-
-
Newman, B.C.1
Ts'o, T.2
-
4
-
-
0012625191
-
A One-Time Password System
-
Available
-
N. Haller, C. Metz, P. Nesser, and M. Straw, "A One-Time Password System ," Internet Engineering Task Force Request For Comments 2289, IETF Website, 1998. Available: http://www.ietf.org/rfc/rfc2289.txt
-
(1998)
Internet Engineering Task Force Request For Comments 2289, IETF Website
-
-
Haller, N.1
Metz, C.2
Nesser, P.3
Straw, M.4
-
6
-
-
71849088141
-
The J2EE™ 1.4 Tutorial.. 8.2
-
ed, E-book
-
E. Armstrong, J. Ball, S. Bodoff,, D. B. Carson, I. Evans , D. Green, et al., The J2EE™ 1.4 Tutorial.. 8.2 ed., Santa Clara, CA: Sun Microsystems, 2005. [E-book] Available: http://java.sun.com/j2ee/1.4/docs/tutorial/doc/ J2EETutorial.pdf
-
(2005)
Available
-
-
Armstrong, E.1
Ball, J.2
Bodoff, S.3
Carson, D.B.4
Evans, I.5
Green, D.6
-
7
-
-
71849119129
-
-
G. King, C. Bauer, M.R. Andersen, E. Bernard, E. Bernard, and S. Ebersole, Hibernate Reference Documentation, 3.3.2 GA, Raleigh North Carolina, USA: Red Hat, Inc., 2009. [E-book] Available: http://docs.jboss.org/hibernate/ stable/core/reference/en/pdf/hibernate-reference.pdf
-
G. King, C. Bauer, M.R. Andersen, E. Bernard, E. Bernard, and S. Ebersole, Hibernate Reference Documentation, 3.3.2 GA, Raleigh North Carolina, USA: Red Hat, Inc., 2009. [E-book] Available: http://docs.jboss.org/hibernate/ stable/core/reference/en/pdf/hibernate-reference.pdf
-
-
-
-
8
-
-
71849100966
-
-
National Institute of Standards and Technology,U.S. Department of Commerce. Secure Hash Standard, 2002. FIPS PUB180-2. Available: http://csrc.nist.gov/publications/fips/fips180-2/fips180-2withchangenotice.pdf
-
National Institute of Standards and Technology,U.S. Department of Commerce. Secure Hash Standard, 2002. FIPS PUB180-2. Available: http://csrc.nist.gov/publications/fips/fips180-2/fips180-2withchangenotice.pdf
-
-
-
-
9
-
-
77954334497
-
Single sign-on for java web start applications using myproxy
-
New York, NY, USA: ACM Press, Available
-
T. Fleury, J. Basney, and V. Welch, "Single sign-on for java web start applications using myproxy," in SWS '06: Proceedings of the 3rd ACM workshop on Secure web services. New York, NY, USA: ACM Press, 2006, pp. 95-102.Available: http://grid.ncsa.illinois.edu/papers/sws-myproxy-jws.pdf.
-
(2006)
SWS '06: Proceedings of the 3rd ACM workshop on Secure web services
, pp. 95-102
-
-
Fleury, T.1
Basney, J.2
Welch, V.3
|