메뉴 건너뛰기




Volumn , Issue , 2010, Pages 648-651

A framework for delivering rigorously trusted services

Author keywords

Policy; Protocol; Trust; Verification

Indexed keywords

POLICY; PROTOCOL; SERVICE PROVIDER; TRUST; TRUST POLICIES;

EID: 77957288746     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICWS.2010.61     Document Type: Conference Paper
Times cited : (2)

References (10)
  • 5
    • 34548168632 scopus 로고    scopus 로고
    • Bytecode verification for enhanced JVM access control
    • DOI 10.1109/ARES.2007.55, 4159800, Proceedings - The Second International Conference on Availability, Reliability and Security, ARES 2007
    • D. Liu, "Bytecode verification for enhanced jvm access control," in Proceedings of the The Second International Conference on Availability, Reliability and Security (ARES 2007), 2007, pp. 162-169. (Pubitemid 47304213)
    • (2007) Proceedings - Second International Conference on Availability, Reliability and Security, ARES 2007 , pp. 162-169
    • Liu, D.1
  • 7
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • F. B. Schneider, "Enforceable security policies," ACM Trans. Inf. Syst. Secur., vol.3, no.1, pp. 30-50, 2000.
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.B.1
  • 8
    • 67650211063 scopus 로고    scopus 로고
    • Tisa: Towards trustworthy services in a service-oriented architecture
    • H. Rajan and M. Hosamani, "Tisa: Towards trustworthy services in a service-oriented architecture," IEEE Transactions on Services Computing (TSC), vol.1, no.4, 2008.
    • (2008) IEEE Transactions on Services Computing (TSC) , vol.1 , Issue.4
    • Rajan, H.1    Hosamani, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.