-
1
-
-
26644472329
-
-
Version 3.0 RFC 6101, IETF
-
A. Freier, P. Karlton, and P. Kocher, "The Secure Sockets Layer (SSL) Protocol Version 3.0," RFC 6101, IETF, 2011.
-
(2011)
The Secure Sockets Layer (SSL) Protocol
-
-
Freier, A.1
Karlton, P.2
Kocher, P.3
-
3
-
-
0003415244
-
-
RFC 2616, IETF
-
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee, "Hypertext Transfer Protocol-HTTP/1.1," RFC 2616, IETF, 1999.
-
(1999)
Hypertext Transfer Protocol-HTTP/1.1
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
4
-
-
84899768173
-
-
Amazon Web Services Inc. Elastic Load Balancing [Online]. Available
-
Amazon Web Services, Inc., "Elastic Load Balancing," 2013. [Online]. Available: http://aws.amazon.com/elasticloadbalancing/
-
(2013)
-
-
-
6
-
-
84897745085
-
Deriving a distributed cloud proxy architecture for managed cloud service consumption
-
Santa Clara, California, USA: IEEE, Jun 2013, [Online]. Available
-
D. Thatmann, M. Slawik, S. Zickau, and A. Küpper, "Deriving a distributed cloud proxy architecture for managed cloud service consumption," in Proceedings of the 6th Intl. Conference on Cloud Computing (CLOUD 2013). Santa Clara, California, USA: IEEE, Jun 2013, pp. 614-620. [Online]. Available: http://dx.doi.org/10.1109/CLOUD.2013.56
-
Proceedings of the 6th Intl. Conference on Cloud Computing (CLOUD 2013
, pp. 614-620
-
-
Thatmann, D.1
Slawik, M.2
Zickau, S.3
Küpper, A.4
-
8
-
-
84899706058
-
Tunneling tcp based protocols through web proxy servers
-
[Online]. Available
-
A. Luotonen, "Tunneling TCP based protocols through Web proxy servers," IETF, 1998. [Online]. Available: http://tools.ietf.org/html/ draft-luotonen-web-proxy-tunneling-01
-
(1998)
IETF
-
-
Luotonen, A.1
-
9
-
-
84899733191
-
-
German Federal Ministry of Justice, german
-
German Federal Ministry of Justice, "StGB 203 Verletzung von Privatgeheimnissen," http://www.gesetze-im-internet.de/stgb/203.html, 2013, german.
-
(2013)
StGB 203 Verletzung von Privatgeheimnissen
-
-
-
12
-
-
0043026142
-
-
[Online]. Available
-
M. Bartel, J. Boyer, B. Fox, B. LaMacchia, and E. Simon, "XML-Signature Syntax and Processing," 2001. [Online]. Available: http://www.w3.org/TR/2001/PR-xmldsig-core-20010820/
-
(2001)
XML-Signature Syntax and Processing
-
-
Bartel, M.1
Boyer, J.2
Fox, B.3
LaMacchia, B.4
Simon, E.5
-
13
-
-
4944250931
-
-
Version 1.2 Part 1: Messaging Framework (Second Edition) [Online]. Available
-
M. Gudgin, M. Hadley, N. Mendelsohn, J.-J. Moreau, H. F. Nielsen, A. Karmarkar, and Y. Lafon, "SOAP Version 1.2 Part 1: Messaging Framework (Second Edition)," 2007. [Online]. Available: http://www.w3.org/TR/soap12- part1
-
(2007)
SOAP
-
-
Gudgin, M.1
Hadley, M.2
Mendelsohn, N.3
Moreau, J.-J.4
Nielsen, H.F.5
Karmarkar, A.6
Lafon, Y.7
-
15
-
-
84899746065
-
-
OSCI-Startseite [Online]. Available
-
Koordinierungsstelle für IT-Standards, "OSCI-Startseite," 2013. [Online]. Available: http://www.osci.de
-
(2013)
Koordinierungsstelle für IT-Standards
-
-
-
17
-
-
84899734821
-
-
[Online]. Available
-
[Online]. Available: http://web.archive.org/web/20100926084623/http:// www.httpsec.org/
-
-
-
-
19
-
-
35048891868
-
Keying hash functions for message authentication
-
N. Koblitz, Ed. Springer Berlin Heidelberg, [Online]. Available
-
M. Bellare, R. Canetti, and H. Krawczyk, "Keying hash functions for message authentication," in Advances in Cryptology CRYPTO '96, ser. Lecture Notes in Computer Science, N. Koblitz, Ed. Springer Berlin Heidelberg, 1996, vol. 1109, pp. 1-15. [Online]. Available: http://dx.doi.org/10.1007/3-540-68697- 5 1
-
(1996)
Advances in Cryptology CRYPTO '96, ser. Lecture Notes in Computer Science
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
20
-
-
84878412297
-
-
The OpenSSL project, [Online]. Available
-
The OpenSSL project, "OpenSSL: The Open Source toolkit for SSL/TLS," 2013. [Online]. Available: http://www.openssl.org
-
(2013)
OpenSSL: The Open Source toolkit for SSL/TLS
-
-
-
21
-
-
84899732275
-
-
Microsoft Inc. [Online]. Available
-
Microsoft, Inc., "Transport Layer Security Protocol (Windows)," 2013. [Online]. Available: http://msdn.microsoft.com/en-us/library/aa380516(v= vs.85).aspx
-
(2013)
Transport Layer Security Protocol (Windows)
-
-
-
23
-
-
84899747814
-
-
[Online]. Available
-
[Online]. Available: http://docs.oracle.com/javase/7/docs/technotes/ guides/security/jsse/JSSERefGuide.htmljBoss.org
-
-
-
-
25
-
-
85057266423
-
-
[Online]. Available
-
S. Souders, "The HTTP archive," 2013. [Online]. Available: http://httparchive.org
-
(2013)
The HTTP archive
-
-
Souders, S.1
-
26
-
-
84869429339
-
The most dangerous code in the world: Validating ssl certificates in non-browser software
-
New York, NY, USA: ACM
-
M. Georgiev, S. Iyengar, S. Jana, R. Anubhai, D. Boneh, and V. Shmatikov, "The most dangerous code in the world: validating SSL certificates in non-browser software," in Proceedings of the 2012 ACM conference on Computer and communications security, ser. CCS '12. New York, NY, USA: ACM, 2012, pp. 38-49.
-
(2012)
Proceedings of the 2012 ACM conference on Computer and communications security, ser. CCS '12
, pp. 38-49
-
-
Georgiev, M.1
Iyengar, S.2
Jana, S.3
Anubhai, R.4
Boneh, D.5
Shmatikov, V.6
-
28
-
-
84871965286
-
-
[Online]. Available
-
M. Belshe and R. Peon, "SPDY Protocol-Draft 1," 2012. [Online]. Available: http://www.chromium.org/spdy/spdy-protocol/spdy-protocol-draft1
-
(2012)
SPDY Protocol-Draft 1
-
-
Belshe, M.1
Peon, R.2
-
31
-
-
84899727774
-
-
[Online]. Available
-
[Online]. Available: http://www.cloud-tresor.com/
-
-
-
|