메뉴 건너뛰기




Volumn , Issue , 2010, Pages 46-53

Solving the transitive access problem for the services oriented architecture

Author keywords

ABAC; Access control; PBAC; RBAC; SOA; Web services; ZBAC

Indexed keywords

ABAC; ACCESS CONTROL MECHANISM; ACCESS DECISION; MANAGED SERVICE; SERVICE COMPOSITIONS; SERVICES ORIENTED ARCHITECTURE;

EID: 77952417674     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2010.34     Document Type: Conference Paper
Times cited : (12)

References (37)
  • 1
    • 84982994153 scopus 로고    scopus 로고
    • Distributed access-rights management with delegation certificates
    • [ed.] J. Vitek and C. D. Jensen Springer Lecture Notes in Computer Science 1603
    • Aura, Tuomas. Distributed Access-Rights Management with Delegation Certificates. [ed.] J. Vitek and C. D. Jensen. Secure Internet Programming - Security Issues for Distributed and Mobile Objects. s.l.: Springer, 1999, Vol. Lecture Notes in Computer Science 1603, pp. 211-235.
    • (1999) Secure Internet Programming - Security Issues for Distributed and Mobile objects. S.l. , pp. 211-235
    • Tuomas, A.1
  • 5
    • 77952392888 scopus 로고    scopus 로고
    • Web-key: Mashing with permission
    • Web 2.0 Security and Privacy. May
    • Close, T., "web-key: Mashing with Permission", IEEE W2SP 2008: Web 2.0 Security and Privacy. May 2008.
    • (2008) IEEE W2SP 2008
    • Close, T.1
  • 6
    • 0000338326 scopus 로고
    • Programming semantics for multiprogrammed computations
    • Dennis, J. B. and Van Horn, E. C., "Programming Semantics for Multiprogrammed Computations" Comm. ACM, 9(3):143-155, 1966.
    • (1966) Comm. ACM , vol.9 , Issue.3 , pp. 143-155
    • Dennis, J.B.1    Van Horn, E.C.2
  • 7
    • 77952367424 scopus 로고    scopus 로고
    • A security architecture for net-centric enterprise services (NCES)
    • DISA March
    • DISA, "A Security Architecture for Net-Centric Enterprise Services (NCES)", Defense Information Systems Agency, March 2004.
    • (2004) Defense Information Systems Agency
  • 9
    • 1942521913 scopus 로고    scopus 로고
    • SPKI requirements
    • September
    • C. Ellison, "SPKI Requirements", IETF RFC 2692, September 1999.
    • (1999) IETF RFC 2692
    • Ellison, C.1
  • 10
    • 0038150613 scopus 로고    scopus 로고
    • An internet attribute certificate profile for authorization
    • April
    • Farrell, S. and Housley, R. "An Internet Attribute Certificate Profile for Authorization", IETF RFC 3281, April 2002.
    • (2002) IETF RFC 3281
    • Farrell, S.1    Housley, R.2
  • 15
    • 33747129213 scopus 로고    scopus 로고
    • Graham, S., Karmarkar, A., Mischinsky, J., Robinson, I., and Sedukhin, I., eds.
    • Graham, S., Karmarkar, A., Mischinsky, J., Robinson, I., and Sedukhin, I., eds., "Web Services Resource 1.2", http://docs.oasis-open.org/ wsrf/wsrf-ws-resource-1.2-spec-os.pdf, 2006.
    • (2006) Web Services Resource 1.2
  • 17
    • 77952373419 scopus 로고    scopus 로고
    • Hirsch, F., ed.
    • Hirsch, F., ed., "ID-WSF 2.0 SecMech SAML Profile, Version v2.0", http://www.projectliberty.org/liberty/content/download/894/6258/ file/liberty-idwsf-security-mechanisms-saml-profile-v2.0.pdf
    • ID-WSF 2.0 SecMech SAML Profile, Version V2.0
  • 18
    • 3242801879 scopus 로고    scopus 로고
    • E-speak E-xplained
    • July
    • Karp, A. H. "E-speak E-xplained", CACM, 46(7):113-118, July 2003.
    • (2003) CACM , vol.46 , Issue.7 , pp. 113-118
    • Karp, A.H.1
  • 24
    • 70449504689 scopus 로고    scopus 로고
    • Access control for the services oriented architecture
    • ACM #459074 Fairfax, VA, November
    • Li, J. and Karp, A. H., "Access Control for the Services Oriented Architecture", ACM Workshop on Secure Web Services, ACM #459074, pp. 9-17, Fairfax, VA, November 2007.
    • (2007) ACM Workshop on Secure Web Services , pp. 9-17
    • Li, J.1    Karp, A.H.2
  • 30
    • 77952408841 scopus 로고    scopus 로고
    • OAUTH, http://oauth.net
  • 32
    • 77952403666 scopus 로고    scopus 로고
    • PlanetLab
    • PlanetLab, http://www.planet-lab.org/
  • 33
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Saltzer, J. H. and Schroeder, M. D. "The Protection of Information in Computer Systems", Proc. of the IEEE, 63(9):1278.1308, 1975.
    • (1975) Proc. of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 35
    • 77952412537 scopus 로고    scopus 로고
    • Version 0.9.7.1 November
    • Tom, A., Eaton, B. Hardt, D., Goland, Y., "Web Resource Authorization Protocol (WRAP), Version 0.9.7.1", http://groups.google.com/ group/WRAP-WG, November 2009.
    • (2009)
    • Tom, A.1    Eaton, B.2    Hardt, D.3    Goland, Y.4
  • 36
    • 33748549923 scopus 로고    scopus 로고
    • Polaris: Virus safe computing for windows XP
    • September
    • Stiegler, M., Yee, K-P., Close, T. and Karp, A. H. "Polaris: Virus Safe Computing for Windows XP", Comm. ACM, 49(9):83-88, September 2006.
    • (2006) Comm. ACM , vol.49 , Issue.9 , pp. 83-88
    • Stiegler, M.1    Yee, K.-P.2    Close, T.3    Karp, A.H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.