-
3
-
-
70350041616
-
Security for web services: Standards and research issues
-
L. Martino and E. Bertino, "Security for web services: Standards and research issues," Int. J. of Web Services Research (IJWSR), vol. 6, no. 4, pp. 48-74, 2009.
-
(2009)
Int J. of Web Services Research (IJWSR)
, vol.6
, Issue.4
, pp. 48-74
-
-
Martino, L.1
Bertino, E.2
-
4
-
-
4544228476
-
Towards standardized web services privacy technologies
-
P. C. K. Hung, E. Ferrari, and B. Carminati, "Towards standardized web services privacy technologies," in ICWS, 2004.
-
(2004)
ICWS
-
-
Hung, P.C.K.1
Ferrari, E.2
Carminati, B.3
-
5
-
-
27644439041
-
Exploring privacy issues in Web services discovery agencies
-
DOI 10.1109/MSP.2005.121
-
B. Carminati, E. Ferrari, and P. C. Hung, "Exploring privacy issues in web services discovery agencies," IEEE Security and Privacy, vol. 3, pp. 14-21, 2005. (Pubitemid 41560439)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.5
, pp. 14-21
-
-
Carminati, B.1
Ferrari, E.2
Hung, P.C.K.3
-
6
-
-
77950336442
-
Estimating the privacy protection capability of a web service provider
-
G. O. M. Yee, "Estimating the privacy protection capability of a web service provider," Int. J. Web Service Res., vol. 6, no. 2, pp. 20-41, 2009.
-
(2009)
Int. J. Web Service Res.
, vol.6
, Issue.2
, pp. 20-41
-
-
Yee, G.O.M.1
-
10
-
-
80455176032
-
-
European Data Protection Supervisor (EDPS), "Glossary of protectoin of personal data," http://www.edps.europa.eu/EDPSWEB/edps/cache/ off/EDPS/Dataprotection/Glossary.
-
Glossary of Protectoin of Personal Data
-
-
-
12
-
-
79952129678
-
-
OASIS, "Privacy policy profile of XACML v2.0," http://docs.oasis-open. org/xacml/2.0/access control-xacml-2.0-privacy profile-spec-os.pdf, 2005.
-
(2005)
Privacy Policy Profile of XACML v2.0
-
-
-
13
-
-
35248815151
-
A privacy agreement model for Web services
-
DOI 10.1109/SCC.2007.14, 4278655, Proceedings - 2007 IEEE International Conference on Services Computing, SCC 2007
-
S. Benbernou, H. Meziane, Y. H. Li, and M. Hacid, "A privacy agreement model forWeb services," in Services Computing, IEEE International Conference on. Los Alamitos, CA, USA: IEEE Computer Society, 2007, pp. 196-203. (Pubitemid 47565596)
-
(2007)
Proceedings - 2007 IEEE International Conference on Services Computing, SCC 2007
, pp. 196-203
-
-
Benbernou, S.1
Meziane, H.2
Li, Y.H.3
Hacid, M.-S.4
-
15
-
-
80455142353
-
PROVIDENCE: A framework for private data propagation control in Service-Oriented systems
-
R. Khazankin and S. Dustdar, "PROVIDENCE: a framework for private data propagation control in Service-Oriented systems," in Towards a Service-Based Internet, 2010.
-
(2010)
Towards A Service-Based Internet
-
-
Khazankin, R.1
Dustdar, S.2
-
16
-
-
79960433512
-
Aggregating hierarchical service level agreements in business value networks
-
I. Haq, A. Huqqani, and E. Schikuta, "Aggregating hierarchical service level agreements in business value networks," in Business Process Management, 2009.
-
(2009)
Business Process Management
-
-
Haq, I.1
Huqqani, A.2
Schikuta, E.3
-
17
-
-
38949158021
-
Security conscious web service composition
-
Los Alamitos, CA, USA: IEEE Computer Society
-
B. Carminati, E. Ferrari, and P. C. K. Hung, "Security conscious web service composition," in Web Services, IEEE International Conference on. Los Alamitos, CA, USA: IEEE Computer Society, 2006, pp. 489- 496.
-
(2006)
Web Services IEEE International Conference on
, pp. 489-496
-
-
Carminati, B.1
Ferrari, E.2
Hung, P.C.K.3
-
18
-
-
41949117635
-
Privacy and identity management
-
DOI 10.1109/MSP.2008.41, 4480462
-
M. Hansen, A. Schwartz, and A. Cooper, "Privacy and identity management," IEEE Security and Privacy, vol. 6, pp. 38-45, 2008. (Pubitemid 351506254)
-
(2008)
IEEE Security and Privacy
, vol.6
, Issue.2
, pp. 38-45
-
-
Hansen, M.1
Schwartz, A.2
Cooper, A.3
-
19
-
-
70449570465
-
Enhancing consumer privacy in the liberty alliance identity federation and web services frameworks
-
M. Alsaleh and C. Adams, "Enhancing consumer privacy in the liberty alliance identity federation and web services frameworks," in Privacy Enhancing Technologies, 2006, pp. 59-77.
-
(2006)
Privacy Enhancing Technologies
, pp. 59-77
-
-
Alsaleh, M.1
Adams, C.2
-
20
-
-
13844285637
-
-
[Last access: 02/12/2011]. [Online]
-
A. Andrieux, K. Czajkowski, A. Dan, K. Keahey, H. Ludwig, T. Nakata, J. Pruyne, J. Rofrano, S. Tuecke, and M. Xu, "Web services agreement specification (WS-Agreement), 2007," 2004, [Last access: 02/12/2011]. [Online]. Available: http://www.gridforum.org/documents/GFD.107.pdf
-
(2004)
Web Services Agreement Specification (WS-Agreement), 2007
-
-
Andrieux, A.1
Czajkowski, K.2
Dan, A.3
Keahey, K.4
Ludwig, H.5
Nakata, T.6
Pruyne, J.7
Rofrano, J.8
Tuecke, S.9
Xu, M.10
-
21
-
-
34748824842
-
WS-agreement concepts and use-agreement- based service-oriented architectures
-
[Last access: 02/12/2011]. [Online]
-
H. Ludwig, "WS-Agreement concepts and Use-Agreement- Based Service-Oriented architectures," IBM Research Division, Technical Report, 2006, [Last access: 02/12/2011]. [Online]. Available: http://citeseerx.ist.psu. edu/viewdoc/download?doi=10. 1.1.121.476&rep=rep1&type=pdf
-
(2006)
IBM Research Division, Technical Report
-
-
Ludwig, H.1
-
22
-
-
77949731185
-
-
Boca Raton, FL, USA, CRC Press Inc.
-
U. Khedker, A. Sanyal, and B. Karkare, Data Flow Analysis: Theory and Practice. Boca Raton, FL, USA: CRC Press, Inc., 2009.
-
(2009)
Data Flow Analysis Theory and Practice
-
-
Khedker, U.1
Sanyal, A.2
Karkare, B.3
-
23
-
-
70449625216
-
Automatic discovery and quantification of information leaks
-
M. Backes, B. Köpf, and A. Rybalchenko, "Automatic discovery and quantification of information leaks," in IEEE Symposium on Security and Privacy, 2009, pp. 141-153.
-
(2009)
IEEE Symposium on Security and Privacy
, pp. 141-153
-
-
Backes, M.1
Köpf, B.2
Rybalchenko, A.3
|