-
1
-
-
70349243955
-
Security against the business partner
-
ser. SWS 08. New York, NY, USA: ACM Available
-
F. Kerschbaum and R. J. Deitos, Security against the business partner, in Proceedings of the 2008 ACM workshop on Secure web services, ser. SWS 08. New York, NY, USA: ACM, 2008, pp. 1-10. [Online]. Available: http://doi. acm.org/10. 1145/1456492. 1456493
-
(2008)
Proceedings of the 2008 ACM Workshop on Secure Web Services
, pp. 1-10
-
-
Kerschbaum, F.1
Deitos, R.J.2
-
2
-
-
73649147773
-
Privacy against the business partner: Issues for realizing end-to-end confidentiality in web service compositions
-
ser. DEXA 09. Washington, DC, USA IEEE Computer Society Available
-
M. Jensen and N. Gruschka, Privacy against the business partner: Issues for realizing end-to-end confidentiality in web service compositions, in Proceedings of the 2009 20th International Workshop on Database and Expert Systems Application, ser. DEXA 09. Washington, DC, USA: IEEE Computer Society, 2009, pp. 117-121. [Online]. Available: http://dx. doi.org/10. 1109/DEXA. 2009. 38
-
(2009)
Proceedings of the 2009 20th International Workshop on Database and Expert Systems Application
, pp. 117-121
-
-
Jensen, M.1
Gruschka, N.2
-
3
-
-
84865479777
-
Privacy protection goals and their implications for eid systems
-
IFIP Advances in Information and Communication Technology, J. Camenisch, B. Crispo, S. Fischer-Hbner, R. Leenes, and G. Russello, Eds Springer Berlin Heidelberg
-
H. Zwingelberg and M. Hansen, Privacy protection goals and their implications for eid systems, in Privacy and Identity Management for Life, ser. IFIP Advances in Information and Communication Technology, J. Camenisch, B. Crispo, S. Fischer-Hbner, R. Leenes, and G. Russello, Eds. Springer Berlin Heidelberg, 2012, vol. 375, pp. 245-260. [Online]. Available: http://dx. doi.org/10. 1007/978-3-642-31668-5 19
-
(2012)
Privacy and Identity Management for Life
, vol.375
, pp. 245-260
-
-
Zwingelberg, H.1
Hansen, M.2
-
4
-
-
79957981304
-
Datenschutz-schutzziele-revisited
-
M. Rost and A. Pfitzmann, Datenschutz-schutzziele-revisited, Datenschutz und Datensicherheit, vol. 33, no. 6, pp. 353-358, 2009.
-
(2009)
Datenschutz und Datensicherheit
, vol.33
, Issue.6
, pp. 353-358
-
-
Rost, M.1
Pfitzmann, A.2
-
5
-
-
84945944391
-
Privacy by design and the new protection goals
-
M. Rost and K. Bock, Privacy by design and the new protection goals, EuroPriSe Whitepaper. [Online]. Available: https://www.european-privacyseal. eu/results/articles/BockRost-PbD-DPG-en.pdf
-
EuroPriSe Whitepaper
-
-
Rost, M.1
Bock, K.2
-
6
-
-
84885635998
-
-
A. Pfitzmann and M. Hansen, A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, URL: http://dud. inf. Tu-dresden. de/literatur/Anon Terminology v0, vol. 34, 2010.
-
(2010)
A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
, vol.34
-
-
Pfitzmann, A.1
Hansen, M.2
-
8
-
-
38949158021
-
Security conscious web service composition
-
B. Carminati, E. Ferrari, and P. C. K. Hung, Security conscious web service composition, in Web Services, 2006. ICWS 2006. International Conference on, 2006, pp. 489-496.
-
(2006)
Web Services 2006. ICWS 2006. International Conference on
, pp. 489-496
-
-
Carminati, B.1
Ferrari, E.2
Hung, P.C.K.3
-
9
-
-
35448984481
-
Security-oriented service composition and evolution
-
J. Han, R. Kowalczyk, and K. Khan, Security-oriented service composition and evolution, in Software Engineering Conference, 2006. APSEC 2006. 13th Asia Pacific, 2006, pp. 71-78.
-
(2006)
Software Engineering Conference 2006. APSEC 2006. 13th Asia Pacific
, pp. 71-78
-
-
Han, J.1
Kowalczyk, R.2
Khan, K.3
-
10
-
-
78049336616
-
Towards automated processing of the right of access in interorganizational web service compositions
-
R. Herkenhoner, H. de Meer, M. Jensen, and H. C. Pohls, Towards automated processing of the right of access in interorganizational web service compositions, in SERVICES, 2010, pp. 645-652.
-
(2010)
SERVICES
, pp. 645-652
-
-
Herkenhoner, R.1
De Meer, H.2
Jensen, M.3
Pohls, H.C.4
-
11
-
-
1242286176
-
Web Services Description Language (WSDL)
-
E. Christensen, F. Curbera, G. Meredith, and S. Weerawarana, Web Services Description Language (WSDL), W3C Note, 2001.
-
(2001)
W3C Note
-
-
Christensen, E.1
Curbera, F.2
Meredith, G.3
Weerawarana, S.4
-
12
-
-
84855729971
-
Web services policy 1. 2-framework (ws-policy)
-
S. Bajaj, D. Box, D. Chappell, F. Curbera, G. Daniels, P. Hallam-Baker, M. Hondo, C. Kaler, D. Langworthy, A. Nadalin, N. Nagaratnam, H. Prafullchandra, C. von Riegen, D. Roth, J. Schlimmer, C. Sharp, J. Shewchuk, A. Vedamuthu, mit Yalinalp, and D. Orchard, Web services policy 1. 2-framework (ws-policy), W3C Member Submission, 2006. [Online]. Available: http://www.w3.org/Submission/WS- Policy/
-
(2006)
W3C Member Submission
-
-
Bajaj, S.1
Box, D.2
Chappell, D.3
Curbera, F.4
Daniels, G.5
Hallam-Baker, P.6
Hondo, M.7
Kaler, C.8
Langworthy, D.9
Nadalin, A.10
Nagaratnam, N.11
Prafullchandra, H.12
Von Riegen, C.13
Roth, D.14
Schlimmer, J.15
Sharp, C.16
Shewchuk, J.17
Vedamuthu, M.18
Yalinalp, A.19
Orchard, D.20
more..
-
14
-
-
84864228303
-
A model-based approach to reliability certification of services
-
C. Ardagna, E. Damiani, R. Jhawar, and V. Piuri, A Model-Based Approach to Reliability Certification of Services, in in Proc. of the 6th IEEE International Conference on Digital Ecosystem Technologies-Complex Environment Engineering, 2012.
-
(2012)
Proc. of the 6th IEEE International Conference on Digital Ecosystem Technologies-Complex Environment Engineering
-
-
Ardagna, C.1
Damiani, E.2
Jhawar, R.3
Piuri, V.4
-
16
-
-
27144508833
-
-
Prentice Hall PTR
-
S. Weerawarana, F. Curbera, F. Leymann, T. Storey, and D. F. Ferguson, Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More. Prentice Hall PTR, 2005.
-
(2005)
Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More
-
-
Weerawarana, S.1
Curbera, F.2
Leymann, F.3
Storey, T.4
Ferguson, D.F.5
-
17
-
-
80052826972
-
Secure collaborative supply-chain management
-
F. Kerschbaum, A. Schropfer, A. Zilli, R. Pibernik, O. Catrina, S. de Hoogh, B. Schoenmakers, S. Cimato, and E. Damiani, Secure collaborative supply-chain management, IEEE Computer, vol. 44, no. 9, pp. 38-43, 2011.
-
(2011)
IEEE Computer
, vol.44
, Issue.9
, pp. 38-43
-
-
Kerschbaum, F.1
Schropfer, A.2
Zilli, A.3
Pibernik, R.4
Catrina, O.5
De Hoogh, S.6
Schoenmakers, B.7
Cimato, S.8
Damiani, E.9
|