메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Trust Negotiation as an Authorization Service forWeb Services

Author keywords

[No Author keywords available]

Indexed keywords

SCALABILITY; TECHNICAL PRESENTATIONS; WEBSITES;

EID: 79956107600     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDEW.2006.154     Document Type: Conference Paper
Times cited : (12)

References (23)
  • 3
    • 3142676730 scopus 로고    scopus 로고
    • Trust-x: A peerto- peer framework for trust establishment
    • July
    • E. Bertino, E. Ferrari, and A. Squicciarini, "Trust-X: A Peerto- Peer Framework for Trust Establishment, " IEEE TKDE, July 2004, pp. 827-842.
    • (2004) IEEE TKDE , pp. 827-842
    • Bertino, E.1    Ferrari, E.2    Squicciarini, A.3
  • 10
    • 0034829512 scopus 로고    scopus 로고
    • Sd3: A trust management system with certified evaluation
    • May
    • T. Jim, "SD3: A Trust Management System with Certified Evaluation, " IEEE Symp. on Security and Privacy, May 2001.
    • (2001) IEEE Symp. on Security and Privacy
    • Jim, T.1
  • 12
    • 1642399823 scopus 로고    scopus 로고
    • A stateless network architecture for inter-enterprise authentication, authorization and accounting
    • June
    • H. Kung, F. Zhu, and M. Iansiti, "A Stateless Network Architecture for Inter-enterprise Authentication, Authorization and Accounting, " Intl. Conf. on Web Services, June 2003.
    • (2003) Intl. Conf. on Web Services
    • Kung, H.1    Zhu, F.2    Iansiti, M.3
  • 14
    • 84990974702 scopus 로고    scopus 로고
    • Developer web services: Creating web services, part 2
    • March/April
    • M. Lehmann, "Developer Web Services: Creating Web Services, Part 2, " Oracle Magazine, March/April 2004.
    • (2004) Oracle Magazine
    • Lehmann, M.1
  • 16
    • 35048841281 scopus 로고    scopus 로고
    • Peer trust: Automated trust negotiation for peers on the semantic web
    • W. Nejdl, D. Olmedilla, and M. Winslett, "Peer Trust: Automated Trust Negotiation for Peers on the Semantic Web, " Secure Data Management Workshop, 118-132, 2004.
    • (2004) Secure Data Management Workshop , pp. 118-132
    • Nejdl, W.1    Olmedilla, D.2    Winslett, M.3
  • 18
    • 33745921872 scopus 로고    scopus 로고
    • Internet2 Working Draft, 8 June
    • Shibboleth Architecture Technical Overview, Internet2 Working Draft, 8 June 2005, http://shibboleth.internet2.edu/docs/draft-mace-shibbolethtech-overview-latest.pdf.
    • (2005) Shibboleth Architecture Technical Overview
  • 21
    • 0141945393 scopus 로고    scopus 로고
    • Xml-signature syntax and processing
    • 12 February
    • XML-Signature Syntax and Processing, W3C Recommendation, 12 February 2002, http://www.w3.org/TR/2002/RECxmldsig-core-20020212/.
    • (2002) W3C Recommendation
  • 22
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • T. Yu, M. Winslett, and K. E. Seamons, "Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation, " ACM Transactions on Information Systems Security, 6(1): 1-42, 2003.
    • (2003) ACM Transactions on Information Systems Security , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.