-
1
-
-
0035035153
-
Mobile values, new names, and secure communication
-
ACM
-
Abadi, M.; and Fournet, C.; Mobile values, new names, and secure communication. In: POPL, pp. 104-115. ACM, 2001.
-
(2001)
POPL
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
3
-
-
26444497860
-
The AVISPA tool for the automated validation of internet security protocols and applications
-
Springer
-
Armando, A.; et al.; The AVISPA tool for the automated validation of internet security protocols and applications. In: CAV, LNCS, vol. 3576, pp. 281-285. Springer, 2005.
-
(2005)
CAV, LNCS
, vol.3576
, pp. 281-285
-
-
Armando, A.1
-
4
-
-
70349233792
-
Formal analysis of SAML 2.0 Web browser single sign-on: Breaking the SAML-based single sign-on for Google apps
-
ACM
-
Armando, A.; et al.; Formal analysis of SAML 2.0 Web browser single sign-on: Breaking the SAML-based single sign-on for Google apps. In: FMSE, pp. 1-10. ACM, 2008.
-
(2008)
FMSE
, pp. 1-10
-
-
Armando, A.1
-
5
-
-
84954139111
-
Secure sessions for Web services
-
ACM
-
Bhargavan, K.; Corin, R.; Fournet, C.; and Gordon, A.; Secure sessions for Web services. In: SWS, pp. 56-66. ACM, 2004.
-
(2004)
SWS
, pp. 56-66
-
-
Bhargavan, K.1
Corin, R.2
Fournet, C.3
Gordon, A.4
-
6
-
-
35048821943
-
TulaFale: A security tool for Web services
-
Springer
-
Bhargavan, K.; Fournet, C.; Gordon, A.; and Pucella, R.; TulaFale: A security tool for Web services. In: FMCO, LNCS, vol. 3188, pp. 197-222. Springer, 2004.
-
(2004)
FMCO, LNCS
, vol.3188
, pp. 197-222
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.3
Pucella, R.4
-
9
-
-
33644775252
-
On distributed security transactions that use secure transport protocols
-
IEEE Computer Society
-
Broadfoot, P.; and Lowe, G.; On distributed security transactions that use secure transport protocols. In: CSFW, pp. 141-151. IEEE Computer Society, 2003.
-
(2003)
CSFW
, pp. 141-151
-
-
Broadfoot, P.1
Lowe, G.2
-
11
-
-
0020720357
-
On the security of public key protocols
-
712376 0502.94005 10.1109/TIT.1983.1056650
-
Dolev, D.; and Yao, A.; On the security of public key protocols. IEEE Trans. Inf. Theory 29(2):198-207, 1983.
-
(1983)
IEEE Trans. Inf. Theory
, vol.29
, Issue.2
, pp. 198-207
-
-
Dolev, D.1
Yao, A.2
-
12
-
-
84873983385
-
-
EU Commission, M/403 EN: Standardisation mandate addressed to CEN European Commission Enterprise And Industry Directorate-General
-
EU Commission, M/403 EN: Standardisation mandate addressed to CEN, CENELEC and ETSI in the field of Information and Communication Technologies. Tech. rep.; European Commission Enterprise And Industry Directorate-General (2007). http://ec.europa.eu/enterprise/standards-policy/mandates/database/index. cfm?fuseaction=search.detail&id=363#
-
(2007)
CENELEC and ETSI in the Field of Information and Communication Technologies. Tech. Rep.
-
-
-
13
-
-
2442512413
-
-
eXtensible Access Control Markup Language TC v2.0 (XACML)
-
eXtensible Access Control Markup Language TC v2.0 (XACML), Extensible access control markup language (XACML) version 2.0 (2005). http://docs.oasis- open.org/xacml/2.0/XACML-2.0-OS-NORMATIVE.zip
-
(2005)
Extensible Access Control Markup Language (XACML) Version 2.0
-
-
-
14
-
-
45749114538
-
A model checking approach for verifying COWS specifications
-
Springer
-
Fantechi, A.; Gnesi, S.; Lapadula, A.; Mazzanti, F.; Pugliese, R.; and Tiezzi, F.; A model checking approach for verifying COWS specifications. In: FASE, LNCS, vol. 4961, pp. 230-245. Springer, 2008.
-
(2008)
FASE, LNCS
, vol.4961
, pp. 230-245
-
-
Fantechi, A.1
Gnesi, S.2
Lapadula, A.3
Mazzanti, F.4
Pugliese, R.5
Tiezzi, F.6
-
17
-
-
84944734046
-
Security analysis of the SAML single sign-on browser/artifact profile
-
IEEE Computer Society, 2003
-
Gro, T.; Security analysis of the SAML single sign-on browser/artifact profile. In: ACSAC, pp. 298-307. IEEE Computer Society, 2003.
-
ACSAC
, pp. 298-307
-
-
Gro, T.1
-
18
-
-
48949089630
-
25 years of model checking-History, achievements, perspectives
-
Springer
-
Grumberg, O.; and Veith, H. (eds.), 25 years of model checkingHistory, achievements, perspectives. In: LNCS, vol. 5000. Springer, 2008.
-
(2008)
LNCS
, vol.5000
-
-
Grumberg, O.1
Veith, H.2
-
19
-
-
23144437178
-
Using static analysis to validate the SAML single sign-on protocol
-
ACM
-
Hansen, S.; Skriver, J.; and Nielson, H.; Using static analysis to validate the SAML single sign-on protocol. In: WITS, pp. 27-40. ACM, 2005.
-
(2005)
WITS
, pp. 27-40
-
-
Hansen, S.1
Skriver, J.2
Nielson, H.3
-
20
-
-
71549129092
-
-
Health Level Seven organization
-
Health Level Seven organization, Hl7 standards. http://www.hl7.org, 2009.
-
(2009)
Hl7 Standards
-
-
-
21
-
-
33750483241
-
Formal specification of a Web services protocol
-
2319178 1178.68062 10.1016/j.jlap.2006.05.004
-
Johnson, J.; Langworthy, D.; Lamport, L.; and Vogt, F.; Formal specification of a Web services protocol. J. Log. Algebr. Program. 70(1):34-52, 2007.
-
(2007)
J. Log. Algebr. Program.
, vol.70
, Issue.1
, pp. 34-52
-
-
Johnson, J.1
Langworthy, D.2
Lamport, L.3
Vogt, F.4
-
22
-
-
33646244493
-
On the relationship between Web services security and traditional protocols
-
Elsevier
-
Kleiner, E.; and Roscoe, A.; On the relationship between Web services security and traditional protocols. In: MFPS, ENTCS, vol. 155, pp. 583-603. Elsevier, 2006.
-
(2006)
MFPS, ENTCS
, vol.155
, pp. 583-603
-
-
Kleiner, E.1
Roscoe, A.2
-
25
-
-
84856478153
-
A calculus for orchestration of Web services
-
2885409 10.1016/j.jal.2011.11.002
-
Pugliese, R.; and Tiezzi, F.; A calculus for orchestration of Web services. J. Applied Logic 10(1):2-31, 2012.
-
(2012)
J. Applied Logic
, vol.10
, Issue.1
, pp. 2-31
-
-
Pugliese, R.1
Tiezzi, F.2
-
26
-
-
45849121775
-
Specifying and analysing SOC applications with COWS
-
Springer
-
Lapadula, A.; Pugliese, R.; and Tiezzi, F.; Specifying and analysing SOC applications with COWS. In: Concurrency, Graphs and Models, LNCS, vol. 5065, pp. 701-720. Springer, 2008.
-
(2008)
Concurrency, Graphs and Models, LNCS
, vol.5065
, pp. 701-720
-
-
Lapadula, A.1
Pugliese, R.2
Tiezzi, F.3
-
27
-
-
0030708255
-
A hierarchy of authentication specifications
-
IEEE Computer Society
-
Lowe, G.; A hierarchy of authentication specifications. In: CSFW, pp. 31-44. IEEE Computer Society, 1997.
-
(1997)
CSFW
, pp. 31-44
-
-
Lowe, G.1
-
28
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
Lowe, G.; Casper: A compiler for the analysis of security protocols. J. Comp. Security 6(1-2):53-84, 1998.
-
(1998)
J. Comp. Security
, vol.6
, Issue.1-2
, pp. 53-84
-
-
Lowe, G.1
-
29
-
-
33750950058
-
Formal verification techniques for computer communication security protocols
-
Ma, L.; and Tsai, J.; Formal verification techniques for computer communication security protocols. SE&KE Handbook 1:23-46, 2001.
-
(2001)
SE&KE Handbook
, vol.1
, pp. 23-46
-
-
Ma, L.1
Tsai, J.2
-
30
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
10.1109/35.312841
-
Neuman, B.; and Ts'o, T.; Kerberos: An authentication service for computer networks. IEEE Comm. Magazine 32(9):33-38, 1994.
-
(1994)
IEEE Comm. Magazine
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.1
Ts'O, T.2
-
31
-
-
84873981680
-
-
OASIS Security Services TC, Assertions and protocols for the OASIS security assertion markup language (SAML) v2.02
-
OASIS Security Services TC, Assertions and protocols for the OASIS security assertion markup language (SAML) v2.02. http://docs.oasis-open.org/ security/saml/v2.0/saml-core-2.0-os.pdf, 2005.
-
(2005)
-
-
-
33
-
-
74349101040
-
-
OASIS Security Services TC
-
OASIS Security Services TC, SAML V2.0 Holder-of-Key Assertion Profile. http://docs.oasis-open.org/security/saml/Post2.0/sstc-saml2-holder-of-key-cd-01. pdf, 2009.
-
(2009)
SAML V2.0 Holder-of-Key Assertion Profile
-
-
-
34
-
-
84873981844
-
-
OASIS Web Services Security TC
-
OASIS Web Services Security TC, Username token profile v1.1. http://www.oasis-open.org/committees/download.php/16782/wss-v1. 1-spec-os-UsernameTokenProfile.pdf, 2006.
-
(2006)
Username Token Profile v1.1
-
-
-
35
-
-
84873982806
-
-
OASIS Web Services Security TC, WS-Trust 1.3 2007
-
OASIS Web Services Security TC, WS-Trust 1.3. http://docs.oasis-open.org/ ws-sx/ws-trust/200512/ws-trust-1.3-os.pdf, 2007.
-
-
-
-
37
-
-
84873984837
-
XML signature syntax and processing version 1.1
-
Roessler, T.; Yiu, K.; Solo, D.; Hirsch, F.; Reagle, J.; and Eastlake, D.; XML signature syntax and processing version 1.1. W3C working draft, W3C. http://www.w3.org/TR/2009/WD-xmldsig-core1-20090730/, 2009.
-
(2009)
W3C Working Draft, W3C
-
-
Roessler, T.1
Yiu, K.2
Solo, D.3
Hirsch, F.4
Reagle, J.5
Eastlake, D.6
-
43
-
-
80053957835
-
-
The Nationwide Health Information Network (NHIN)
-
The Nationwide Health Information Network (NHIN), An American eHealth Project. http://healthit.hhs.gov/portal/server.pt, 2009.
-
(2009)
An American EHealth Project
-
-
-
44
-
-
80054001127
-
-
The South African Department of Health
-
The South African Department of Health, EHR project in South Africa. http://southafrica.usembassy.gov/root/pdfs/pepfar-hmis-docs/ndoh-e-hr-for-south- africa.pdf, 2009.
-
(2009)
EHR Project in South Africa
-
-
|