-
2
-
-
35248861245
-
Logic-based management of security in web services
-
DOI 10.1109/SCC.2007.77, 4278659, Proceedings - 2007 IEEE International Conference on Services Computing, SCC 2007
-
C. Tziviskou and E.D. Nitto, "Logic-Based Management of Security in Web Services," Proc. IEEE Int'l Conf. Service Computing (SCC '07), pp. 228-235, 2007. (Pubitemid 47565600)
-
(2007)
Proceedings - 2007 IEEE International Conference on Services Computing, SCC 2007
, pp. 228-235
-
-
Tziviskou, C.1
Di Nitto, E.2
-
3
-
-
34547271784
-
Defeasible security policy composition for web services
-
DOI 10.1145/1180337.1180342, Proceedings of the Fourth ACM Workshop on Formal Methods in Security Engineering, FMSE'06. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
-
A.J. Lee, J.P. Boyer, L.E. Olson, and C.A. Gunter, "Defeasible Security Policy Composition for Web Services," Proc. Fourth ACM Workshop Formal Methods in Security (FMSE '06), pp. 45-54, 2006. (Pubitemid 47154950)
-
(2006)
Proceedings of the Fourth ACM Workshop on Formal Methods in Security Engineering, FMSE'06. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 45-54
-
-
Lee, A.J.1
Boyer, J.P.2
Olson, L.E.3
Gunter, C.A.4
-
8
-
-
78649982254
-
-
Web Services Security
-
Web Services Security: SOAP Message Security 1.1, http://www.oasis-open. org/committees/download.php/16790/wss-v1.1-spec-os-SOAPMessageSecurity.pdf, 2011.
-
(2011)
SOAP Message Security 1.1
-
-
-
9
-
-
81455154276
-
-
WS-SecurityPolicy 1.2, http://www.oasis-open.org/committees/download.php/ 23821/ws-securitypolicy-1.2-spec-cs.pdf, 2011.
-
(2011)
WS-SecurityPolicy 1.2
-
-
-
11
-
-
14844303360
-
Verifying policy-based security for web services
-
K. Bhargavan, C. Fournet, and A.D. Gordon, "Verifying Policy-Based Security for Web Services," Proc. 11th ACM Conf. Computer and Comm. Security, pp. 268-277, 1992.
-
(1992)
Proc. 11th ACM Conf. Computer and Comm. Security
, pp. 268-277
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
-
12
-
-
35248827653
-
Formal consistency verification between BPEL process and privacy policy
-
Y.H. Li, H. Paik, B. Benatallah, and S. Benbernou, "Formal Consistency Verification between BPEL Process and Privacy Policy," Proc. Int'l Conf. Privacy Security and Trust Conf.: Bridge the Gap between PST Technologies and Business Services (PST '06), 2006.
-
(2006)
Proc. Int'l Conf. Privacy Security and Trust Conf.: Bridge the Gap between PST Technologies and Business Services (PST '06)
-
-
Li, Y.H.1
Paik, H.2
Benatallah, B.3
Benbernou, S.4
-
13
-
-
35248865383
-
Security policy specification and integration in business collaboration
-
DOI 10.1109/SCC.2007.96, 4278633, Proceedings - 2007 IEEE International Conference on Services Computing, SCC 2007
-
D.D. He and J. Yang, "Security Policy Specification and Integration in Business Collaboration," Proc. IEEE Int'l Conf. Service Computing (SCC '07), pp. 20-27. 2007. (Pubitemid 47565574)
-
(2007)
Proceedings - 2007 IEEE International Conference on Services Computing, SCC 2007
, pp. 20-27
-
-
He, D.D.1
Yang, J.2
-
14
-
-
46849122230
-
An access control system for web service compositions
-
M. Srivatsa, A. Iyengar, T. Mikalsen, I. Rouvellou, and J. Yin, "An Access Control System for Web Service Compositions," Proc. IEEE Int'l Conf. Web Services (ICWS '07), pp. 1-8, 2007.
-
(2007)
Proc. IEEE Int'l Conf. Web Services (ICWS '07)
, pp. 1-8
-
-
Srivatsa, M.1
Iyengar, A.2
Mikalsen, T.3
Rouvellou, I.4
Yin, J.5
-
15
-
-
33746357234
-
Using aspects for security engineering of web service compositions
-
DOI 10.1109/ICWS.2005.126, 1530783, Proceedings - 2005 IEEE International Conference on Web Services, ICWS 2005
-
A. Charfi and M. Mezini, "Using Aspects for Security Engineering of Web Service Compositions," Proc. IEEE Int'l Conf. Web Services (ICWS '05), pp. 59-66, 2005. (Pubitemid 44460193)
-
(2005)
Proceedings - 2005 IEEE International Conference on Web Services, ICWS 2005
, vol.2005
, pp. 59-66
-
-
Charfi, A.1
Mezini, M.2
-
17
-
-
51749120335
-
Security policy composition for composite services
-
F. Satoh and T. Tokuda, "Security Policy Composition for Composite Services," Proc. Int'l Conf. Web Eng., pp. 86-97, 2008.
-
(2008)
Proc. Int'l Conf. Web Eng.
, pp. 86-97
-
-
Satoh, F.1
Tokuda, T.2
-
18
-
-
2442459936
-
Flexible consistency checking
-
C. Nentwich, W. Emmerich, A. Finkelstein, and E. Ellmer, "Flexible Consistency Checking," ACM Trans. Software Eng. and Methodology, vol. 12, no. 1, pp. 28-63, 2003.
-
(2003)
ACM Trans. Software Eng. and Methodology
, vol.12
, Issue.1
, pp. 28-63
-
-
Nentwich, C.1
Emmerich, W.2
Finkelstein, A.3
Ellmer, E.4
-
21
-
-
0026900438
-
A logic for reasoning about security
-
J. Glasgow, G. Macewen, and P. Panangaden, "A Logic for Reasoning about Security," ACM Trans. Computer Systems, vol. 10, no. 3, pp. 226-264, 1992.
-
(1992)
ACM Trans. Computer Systems
, vol.10
, Issue.3
, pp. 226-264
-
-
Glasgow, J.1
MacEwen, G.2
Panangaden, P.3
|