-
2
-
-
33749385337
-
Secure sessions for web services
-
October
-
K. Bhargavan, R. Corin, C. Fournet, and A. D. Gordon. Secure sessions for web services. In 2004 ACM Workshop on Secure Web Services (SWS), pages 11-22, October 2004.
-
(2004)
2004 ACM Workshop on Secure Web Services (SWS)
, pp. 11-22
-
-
Bhargavan, K.1
Corin, R.2
Fournet, C.3
Gordon, A.D.4
-
4
-
-
18544363572
-
A semantics for web services authentication
-
June, See also Microsoft Research Technical Report MSR-TR-2003-83.
-
K. Bhargavan, C. Fournet, and A. D. Gordon. A semantics for web services authentication. Theoretical Computer Science, 340(1):102-153, June 2005. See also Microsoft Research Technical Report MSR-TR-2003-83.
-
(2005)
Theoretical Computer Science
, vol.340
, Issue.1
, pp. 102-153
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
-
5
-
-
35048821943
-
TulaFale: A security tool for web services
-
K. Bhargavan, C. Fournet, A. D. Gordon, and R. Pucella. TulaFale: A security tool for web services. In International Symposium on Formal Methods for Components and Objects (FMCO'03), volume 3188 of LNCS, pages 197-222. Springer, 2004. Tool available from http://Securing.WS. (Pubitemid 39749529)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3188
, pp. 197-222
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
Pucella, R.4
-
6
-
-
0034822279
-
An efficient cryptographic protocol verifier based on Prolog rules
-
IEEE Computer Society Press
-
B. Blanchet. An efficient cryptographic protocol verifier based on Prolog rules. In Proceedings of the 14th IEEE Computer Security Foundations Workshop, pages 82-96. IEEE Computer Society Press, 2001.
-
(2001)
Proceedings of the 14th IEEE Computer Security Foundations Workshop
, pp. 82-96
-
-
Blanchet, B.1
-
8
-
-
4544279898
-
-
May, Version 1.1
-
D. Box, F. Curbera, M. Hondo, C. Kaler, D. Langworthy, A. Nadalin, N. Nagaratnam, M. Nottingham, C. von Riegen, and J. Shewchuk. Web services policy framework (WS-Policy), May 2003. Version 1.1.
-
(2003)
Web Services Policy Framework (WS-Policy)
-
-
Box, D.1
Curbera, F.2
Hondo, M.3
Kaler, C.4
Langworthy, D.5
Nadalin, A.6
Nagaratnam, N.7
Nottingham, M.8
Von Riegen, C.9
Shewchuk, J.10
-
9
-
-
4544335903
-
-
May, Version 1.1
-
D. Box, M. Hondo, C. Kaler, H. Maruyama, A. Nadalin, N. Nagaratnam, P. Patrick, C. von Riegen, and J. Shewchuk. Web services policy assertions language (WS-PolicyAssertions), May 2003. Version 1.1.
-
(2003)
Web Services Policy Assertions Language (WS-PolicyAssertions)
-
-
Box, D.1
Hondo, M.2
Kaler, C.3
Maruyama, H.4
Nadalin, A.5
Nagaratnam, N.6
Patrick, P.7
Von Riegen, C.8
Shewchuk, J.9
-
10
-
-
33749060324
-
-
July, Version 1.1
-
G. Della-Libera, M. Gudgin, P. Hallam-Baker, M. Hondo, H. Granqvist, C. Kaler, H. Maruyama, M. McIntosh, A. Nadalin, N. Nagaratnam, R. Philpott, H. Prafullchandra, J. Shewchuk, D. Walter, and R. Zolfonoon. Web services security policy language (WS-SecurityPolicy), July 2005. Version 1.1.
-
(2005)
Web Services Security Policy Language (WS-SecurityPolicy)
-
-
Della-Libera, G.1
Gudgin, M.2
Hallam-Baker, P.3
Hondo, M.4
Granqvist, H.5
Kaler, C.6
Maruyama, H.7
McIntosh, M.8
Nadalin, A.9
Nagaratnam, N.10
Philpott, R.11
Prafullchandra, H.12
Shewchuk, J.13
Walter, D.14
Zolfonoon, R.15
-
11
-
-
4544323391
-
-
December, Version 1.0
-
G. Della-Libera, P. Hallam-Baker, M. Hondo, T. Janczuk, C. Kaler, H. Maruyama, A. Nadalin, N. Nagaratnam, A. Nash, R. Philpott, H. Prafullchandra, J. Shewchuk, E. Waingold, and R. Zolfonoon. Web services security policy language (WS-SecurityPolicy), December 2002. Version 1.0.
-
(2002)
Web Services Security Policy Language (WS-SecurityPolicy)
-
-
Della-Libera, G.1
Hallam-Baker, P.2
Hondo, M.3
Janczuk, T.4
Kaler, C.5
Maruyama, H.6
Nadalin, A.7
Nagaratnam, N.8
Nash, A.9
Philpott, R.10
Prafullchandra, H.11
Shewchuk, J.12
Waingold, E.13
Zolfonoon, R.14
-
13
-
-
0038394738
-
-
W3C Recommendation
-
D. Eastlake, J. Reagle, D. Solo, M. Bartel, J. Boyer, B. Fox, B. LaMacchia, and E. Simon. XML-Signature Syntax and Processing, 2002. W3C Recommendation, at http://www.w3.org/TR/2002/REC-xmldsig-core-20020212/.
-
(2002)
XML-Signature Syntax and Processing
-
-
Eastlake, D.1
Reagle, J.2
Solo, D.3
Bartel, M.4
Boyer, J.5
Fox, B.6
Lamacchia, B.7
Simon, E.8
-
14
-
-
77954324835
-
-
July
-
Foundstone. WSDigger, July 2005. At www.foundstone.com/resources/ proddesc/wsdigger.htm.
-
(2005)
-
-
-
17
-
-
77954335920
-
-
Microsoft Corporation June, Preview release for the.NET Framework version 1.1
-
J. Hogg, H. de Lahitte, D. Gonzalez, P. Cibraro, P. Coupland, M. Bhao, and P. Slater. Microsoft WS-IBasic Security Profile 1.0 Sample Application. Microsoft Corporation, June 2005. Preview release for the.NET Framework version 1.1.
-
(2005)
Microsoft WS-IBasic Security Profile 1.0 Sample Application
-
-
Hogg, J.1
De Lahitte, H.2
Gonzalez, D.3
Cibraro, P.4
Coupland, P.5
Bhao, M.6
Slater, P.7
-
19
-
-
14844329713
-
-
Microsoft Corporation
-
Microsoft Corporation. Web Services Enhancements (WSE) 2.0, 2004. At http://msdn.microsoft.com/webservices/building/wse/default.aspx.
-
(2004)
Web Services Enhancements (WSE) 2.0
-
-
-
20
-
-
21244462147
-
-
March, OASIS Standard 200401
-
A. Nadalin, C. Kaler, P. Hallam-Baker, and R. Monzillo. OASIS Web Services Security: SOAP Message Security 1.0 (WS-Security 2004), March 2004. OASIS Standard 200401, at http://docs.oasis-open.org/wss/2004/01/oasis-200401- wss-soap-message-security-1.0.pdf.
-
(2004)
OASIS Web Services Security: SOAP Message Security 1.0 (WS-Security 2004)
-
-
Nadalin, A.1
Kaler, C.2
Hallam-Baker, P.3
Monzillo, R.4
-
21
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R.M. Needham and M.D. Schroeder. Using encryption for authentication in large networks ofcomputers. Communications of the ACM, 21(12):993-999, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
26
-
-
33646140557
-
Application of formal methods to the analysis of web services security
-
Sep
-
L. Tobarra, D. Cazorla, F. Cuartero, and G. Diaz. Application of formal methods to the analysis of web services security. In 2nd International Workshop on Web Services and Formal Methods (WS-FM2005), pages 215-229, Sep 2005.
-
(2005)
2nd International Workshop on Web Services and Formal Methods (WS-FM2005)
, pp. 215-229
-
-
Tobarra, L.1
Cazorla, D.2
Cuartero, F.3
Diaz, G.4
-
27
-
-
77954329811
-
-
J. Udell. Threat modeling, 2004. At http://weblog.infoworld.com/udell/ 2004/05/25.html.
-
(2004)
Threat Modeling
-
-
Udell, J.1
-
28
-
-
77954341289
-
-
W3C. SOAP Version 1.2, W3C Recommendation
-
W3C. SOAP Version 1.2, 2003. W3C Recommendation, at http://www.w3.org/TR/ soap12.
-
(2003)
-
-
-
29
-
-
34748920594
-
-
A. Wiesmann, M. Curphey, A. van der Stock, and R. Stirbei, editors, 2.0 Black Hat edition
-
A. Wiesmann, M. Curphey, A. van der Stock, and R. Stirbei, editors. A Guide to Building Secure Web Applications and Web Services. OWASP, 2.0 Black Hat edition, 2005. At http://www.owasp.org.
-
(2005)
A Guide to Building Secure Web Applications and Web Services
-
-
|