메뉴 건너뛰기




Volumn , Issue , 2009, Pages 409-418

Secure web 2.0 content sharing beyond walled gardens

Author keywords

Access control; Web 2.0 content sharing

Indexed keywords

ACCESS POLICIES; ACCESS-CONTROL MECHANISMS; CONTENT SHARING; POLICY STATEMENTS; SERVICE PROVIDER; WEB 2.0;

EID: 77950836598     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2009.45     Document Type: Conference Paper
Times cited : (9)

References (37)
  • 1
    • 51849123990 scopus 로고    scopus 로고
    • What is Web 2.0: Design patterns and business models for the next generation of software
    • T. Oreilly, "What is Web 2.0: Design patterns and business models for the next generation of software," Communications and Strategies, No.1, p. 17, 2007.
    • (2007) Communications and Strategies , Issue.1 , pp. 17
    • Oreilly, T.1
  • 6
    • 70849095240 scopus 로고    scopus 로고
    • Ph.D. Dissertation, Dalhousie University, Canada, Online. Available
    • T. Whalen, "Supporting file sharing through improved awareness," Ph.D. Dissertation, Dalhousie University, Canada, 2008. [Online]. Available: http://www.proquest.com/
    • (2008) Supporting File Sharing Through Improved Awareness
    • Whalen, T.1
  • 12
    • 76549094940 scopus 로고    scopus 로고
    • Internet2, "Shibboleth System," http://shibboleth.internet2. edu/, 2008.
    • (2008) Shibboleth System
  • 17
    • 77950821443 scopus 로고    scopus 로고
    • Microsoft Corporation
    • Microsoft Corporation, "Microsoft Live Mesh," https://www.mesh.com/, 2009.
    • (2009) Microsoft Live Mesh
  • 25
    • 77950839369 scopus 로고    scopus 로고
    • June
    • D. Fuelling and W. Norris, "Email Address to URL Transformation 1.0," http://eaut.org/specs/1.0/, June 2008.
    • (2008)
    • Fuelling, D.1    Norris, W.2
  • 27
    • 0037243196 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management
    • N. Li, W. H. Winsborough, , and J. C. Mitchell, "Distributed credential chain discovery in trust management," Journal of Computer Security, vol.11, no.1, pp. 35-86, 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.1 , pp. 35-86
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3
  • 30
    • 54049142548 scopus 로고    scopus 로고
    • Security and identification indicators for browsers against spoofing and phishing attacks
    • A. Herzberg and A. Jbara, "Security and identification indicators for browsers against spoofing and phishing attacks," ACM Trans. Interet Technology., vol.8, no.4, pp. 1-36, 2008.
    • (2008) ACM Trans. Interet Technology , vol.8 , Issue.4 , pp. 1-36
    • Herzberg, A.1    Jbara, A.2
  • 36
    • 77950854725 scopus 로고    scopus 로고
    • J. Bufu, "Openid4java," http://code.sxip.com/openid4java/, 2009.
    • (2009) Openid4java
    • Bufu, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.