메뉴 건너뛰기




Volumn 147, Issue , 2004, Pages 151-166

Interactive access control for web services

Author keywords

Business processes; Credential based systems; Interactive access cont rol; Internet comput ing; Logics for access control; Web services

Indexed keywords

ACCESS CONTROL; WEBSITES;

EID: 84902459113     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/1-4020-8143-x_10     Document Type: Conference Paper
Times cited : (25)

References (19)
  • 4
    • 0036311802 scopus 로고    scopus 로고
    • A unified framework for regulating access and information release on the web
    • BONATTI, P., and SAMARATI, P. A unified framework for regulating access and information release on the web. Journal of Computer Security 10,3 (2002), 241-272.
    • (2002) Journal of Computer Security , vol.10 , Issue.3 , pp. 241-272
    • Bonatti, P.1    Samarati, P.2
  • 10
    • 33747074188 scopus 로고
    • An overview of workflow management: From process modeling to workflow automation infrastructure
    • GEORGAKOPOULOS, D., HORNICK, M. F., and SIlETIl, A. P. An overview of workflow management: From process modeling to workflow automation infrastructure. Distributed and Parallel Databases 3, 2 (April 1995), 119-153.
    • (1995) Distributed and Parallel Databases , vol.3 , Issue.2 , pp. 119-153
    • Georgakopoulos, D.1    Hornick, M.F.2    Siletil, A.P.3
  • 13
    • 84902462150 scopus 로고    scopus 로고
    • Tech. Rep. 111' TR-1O/2003, First International Workshop on Formal Aspects of Security and Trust (FAST), Istituto di Informatica e Telernatica, Pisa, Italy, September 2003. Editors: Theo Dimitrakos and Fabio Martinelli
    • KOSHUTANSKI, H., and MASSACCI, F. A logical model for security of Web services. Tech. Rep. 111' TR-1O/2003, First International Workshop on Formal Aspects of Security and Trust (FAST), Istituto di Informatica e Telernatica, Pisa, Italy, September 2003. Editors: Theo Dimitrakos and Fabio Martinelli.
    • A Logical Model For Security of Web Services
    • Koshutanski, H.1    Massacci, F.2
  • 14
  • 16
    • 0037243196 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management
    • LI, N., WINSBOROUGH, W. H., and MITCHELL, J. C. Distributed credential chain discovery in trust management. Journal 01 Computer Security 11, 1 (February 2003), 35-86.
    • (2003) Journal 01 Computer Security , vol.11 , Issue.1 , pp. 35-86
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3
  • 18
    • 3543080168 scopus 로고    scopus 로고
    • Understanding trust management systems
    • IEEE Press
    • WEEKS, S. Understanding trust management systems. In IEEE SS&P-2001 (2001), IEEE Press.
    • (2001) IEEE SS&P-2001
    • Weeks, S.1
  • 19
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • Yu, T., WINSLETT, M., and SEAMONS, K. E. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security (TISSEC) 6, 1 (2003), 1-42.
    • (2003) ACM Transactions On Information and System Security (TISSEC) , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.