-
2
-
-
84982994153
-
Distributed access-rights management with delegation certificates
-
LNCS 1603
-
Aura, T. (2001). Distributed access-rights management with delegation certificates. In secure internet programming (LNCS 1603, pp. 211-235).
-
(2001)
Secure Internet Programming
, pp. 211-235
-
-
Aura, T.1
-
4
-
-
33646516652
-
Ws-AC: A fine grained access control system for web services
-
doi:10.1007/s11280-005-3045-4
-
Bertino, E., Squicciarini, A. C., Paloscia, I., & Martino, L. (2006). Ws-AC: A fine grained access control system for web services. World Wide Web (Bussum), 9(2), 143-171. doi:10.1007/s11280-005-3045-4
-
(2006)
World Wide Web (Bussum)
, vol.9
, Issue.2
, pp. 143-171
-
-
Bertino, E.1
Squicciarini, A.C.2
Paloscia, I.3
Martino, L.4
-
5
-
-
20844435938
-
A trust-based context-aware access control model for web-services
-
DOI 10.1007/s10619-005-1075-7
-
Bhatti, R., Bertino, E., & Ghafoor, A. (2005). A trust-based context-aware access control model for web-services. Distributed and Parallel Databases, 18(1), 83-105. doi:10.1007/s10619-005-1075-7 (Pubitemid 40859651)
-
(2005)
Distributed and Parallel Databases
, vol.18
, Issue.1
, pp. 83-105
-
-
Bhatti, R.1
Bertino, E.2
Ghafoor, A.3
-
8
-
-
1342337728
-
The web service modeling framework WSMF
-
doi:10.1016/S1567-4223(02)00015-7
-
Fenser, D., & Bussler, C. (2002). The Web Service Modeling Framework WSMF. Electronic Commerce Research and Applications, 1(2), 113-137. doi:10.1016/S1567-4223(02)00015-7
-
(2002)
Electronic Commerce Research and Applications
, vol.1
, Issue.2
, pp. 113-137
-
-
Fenser, D.1
Bussler, C.2
-
10
-
-
76449118628
-
-
IBM. Retrieved from
-
IBM. (2006). Microsoft, RSA, and Verisign. Retrieved from http://specs.xmlsoap.org
-
(2006)
Microsoft, RSA, and Verisign
-
-
-
13
-
-
76449084466
-
-
OASIS. Retrieved from
-
OASIS. (2006). Index. Retrieved from http://docs. oasis-open.org
-
(2006)
Index
-
-
-
14
-
-
6344223426
-
SXRSRPM: A security integrated model for Web services
-
Rao, Y., Feng, B., Han, J., & Li, Z. (2004). SXRSRPM: A security integrated model for Web services. In Proceedings of the 2004 International Conference on Machine Learning and Cybernetics (Vol. 5, pp. 26-29).
-
(2004)
Proceedings of the 2004 International Conference on Machine Learning and Cybernetics
, vol.5
, pp. 26-29
-
-
Rao, Y.1
Feng, B.2
Han, J.3
Li, Z.4
-
17
-
-
1142301944
-
Model-driven trust negotiation for web services
-
doi:10.1109/ MIC.2003.1250583
-
Skogsrud, H., Benatallah, B., & Casati, F. (2003). Model-driven trust negotiation for web services. IEEE Internet Computing, 45-51. doi:10.1109/ MIC.2003.1250583
-
(2003)
IEEE Internet Computing
, pp. 45-51
-
-
Skogsrud, H.1
Benatallah, B.2
Casati, F.3
-
19
-
-
76449092695
-
-
Paper presented at the 3rd Annual PKI R&D Workshop
-
Welch, V., Foster, I., Kesselman, C., Mulmo, O., Pearlman, L., Tuecke, S., et al. (2004). X.509 proxy certificates for dynamic delegation. Paper presented at the 3rd Annual PKI R&D Workshop.
-
(2004)
X.509 Proxy Certificates for Dynamic Delegation
-
-
Welch, V.1
Foster, I.2
Kesselman, C.3
Mulmo, O.4
Pearlman, L.5
Tuecke, S.6
-
20
-
-
38949158735
-
A framework for building privacy-conscious composite web services
-
Xu, W., Venkatakrishnan, V. N., Sekar, R., & Ramakrishnan, I. V. (2006). A framework for building privacy-conscious composite web services. In Proceedings of the IEEE International Conference on Web Services (pp. 655-662).
-
(2006)
Proceedings of the IEEE International Conference on Web Services
, pp. 655-662
-
-
Xu, W.1
Venkatakrishnan, V.N.2
Sekar, R.3
Ramakrishnan, I.V.4
-
22
-
-
77952903906
-
A rule-based framework for role-based constrained delegation
-
Yin, G., Wang, H., Shi, D., Jia, Y., & Teng, M. (2004). A rule-based framework for role-based constrained delegation. In Proceedings of the 3rd International Conference on Information Security (pp. 186-191).
-
(2004)
Proceedings of the 3rd International Conference on Information Security
, pp. 186-191
-
-
Yin, G.1
Wang, H.2
Shi, D.3
Jia, Y.4
Teng, M.5
-
23
-
-
3042684910
-
A rule-based framework for role-based delegation and revocation
-
doi:10.1145/937527.937530
-
Zhang, L., Ahn, G.-J., & Chu, B.-T. (2003). A rule-based framework for role-based delegation and revocation. ACM Transactions on Information and System Security, 6(3), 404-441. doi:10.1145/937527.937530
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.3
, pp. 404-441
-
-
Zhang, L.1
Ahn, G.-J.2
Chu, B.-T.3
|