메뉴 건너뛰기




Volumn , Issue , 2005, Pages 1-9

An advisor for web services security policies

Author keywords

Policy Driven Security; Web Services; WS Security; XML Security

Indexed keywords

MICROSOFT; PLUG-INS; POLICY DRIVEN; POLICY-DRIVEN SECURITY; SECURITY VULNERABILITIES; WEB SERVICES SECURITY; XML SECURITY;

EID: 77954342153     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1103022.1103024     Document Type: Conference Paper
Times cited : (32)

References (29)
  • 4
    • 18544363572 scopus 로고    scopus 로고
    • A semantics for web services authentication
    • June, See also Microsoft Research Technical Report MSR-TR-2003-83.
    • K. Bhargavan, C. Fournet, and A. D. Gordon. A semantics for web services authentication. Theoretical Computer Science, 340(1):102-153, June 2005. See also Microsoft Research Technical Report MSR-TR-2003-83.
    • (2005) Theoretical Computer Science , vol.340 , Issue.1 , pp. 102-153
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3
  • 6
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on Prolog rules
    • IEEE Computer Society Press
    • B. Blanchet. An efficient cryptographic protocol verifier based on Prolog rules. In Proceedings of the 14th IEEE Computer Security Foundations Workshop, pages 82-96. IEEE Computer Society Press, 2001.
    • (2001) Proceedings of the 14th IEEE Computer Security Foundations Workshop , pp. 82-96
    • Blanchet, B.1
  • 14
    • 77954324835 scopus 로고    scopus 로고
    • July
    • Foundstone. WSDigger, July 2005. At www.foundstone.com/resources/ proddesc/wsdigger.htm.
    • (2005)
  • 19
    • 14844329713 scopus 로고    scopus 로고
    • Microsoft Corporation
    • Microsoft Corporation. Web Services Enhancements (WSE) 2.0, 2004. At http://msdn.microsoft.com/webservices/building/wse/default.aspx.
    • (2004) Web Services Enhancements (WSE) 2.0
  • 21
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R.M. Needham and M.D. Schroeder. Using encryption for authentication in large networks ofcomputers. Communications of the ACM, 21(12):993-999, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 27
    • 77954329811 scopus 로고    scopus 로고
    • J. Udell. Threat modeling, 2004. At http://weblog.infoworld.com/udell/ 2004/05/25.html.
    • (2004) Threat Modeling
    • Udell, J.1
  • 28
    • 77954341289 scopus 로고    scopus 로고
    • W3C. SOAP Version 1.2, W3C Recommendation
    • W3C. SOAP Version 1.2, 2003. W3C Recommendation, at http://www.w3.org/TR/ soap12.
    • (2003)
  • 29
    • 34748920594 scopus 로고    scopus 로고
    • A. Wiesmann, M. Curphey, A. van der Stock, and R. Stirbei, editors, 2.0 Black Hat edition
    • A. Wiesmann, M. Curphey, A. van der Stock, and R. Stirbei, editors. A Guide to Building Secure Web Applications and Web Services. OWASP, 2.0 Black Hat edition, 2005. At http://www.owasp.org.
    • (2005) A Guide to Building Secure Web Applications and Web Services


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.