-
1
-
-
85076213051
-
-
Los Angeles, CA, USA, 6-10 July 2009 IEEE
-
IEEE International Conference on Web Services, ICWS 2009, Los Angeles, CA, USA, 6-10 July 2009 (2009), IEEE.
-
(2009)
IEEE International Conference on Web Services, ICWS 2009
-
-
-
2
-
-
79960855364
-
From multiple credentials to browser-based single sign-on: Are we more secure?
-
J. Camenisch, S. Fischer-Hbner, Y. Murayama, A. Portmann, and C. Rieder, Eds.,. of IFIP Advances in Information and Communication Technology. Springer Boston
-
ARMANDO, A., CARBONE, R., COMPAGNA, L., CUÉLLAR, J., PELLEGRINO, G., AND SORNIOTTI, A. From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure? In Future Challenges in Security and Privacy for Academia and Industry, J. Camenisch, S. Fischer-Hbner, Y. Murayama, A. Portmann, and C. Rieder, Eds., vol. 354 of IFIP Advances in Information and Communication Technology. Springer Boston, 2011.
-
(2011)
Future Challenges in Security and Privacy for Academia and Industry
, vol.354
-
-
Armando, A.1
Carbone, R.2
Compagna, L.3
Cuéllar, J.4
Pellegrino, G.5
Sorniotti, A.6
-
3
-
-
70349233792
-
Formal analysis of SAML 2.0 web browser single sign-on: Breaking the SAML-based Single Sign-On for Google Apps
-
Shmatikov, Ed. ACM, Alexandria and VA and USA
-
ARMANDO, A., CARBONE, R., COMPAGNA, L., CUÉLLAR, J., AND TOBARRA, M. L. Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps. In Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, FMSE 2008, V. Shmatikov, Ed. ACM, Alexandria and VA and USA, 2008.
-
(2008)
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, FMSE 2008
-
-
Armando, A.1
Carbone, R.2
Compagna, L.3
Cuéllar, J.4
Tobarra, M.L.5
-
4
-
-
77954339058
-
Tailoring the dolev-yao abstraction to web services realities
-
E. Damiani and H. Maruyama, Eds., ACM
-
BACKES, M., AND GROSS, T. Tailoring the dolev-yao abstraction to web services realities. In SWS (2005), E. Damiani and H. Maruyama, Eds., ACM, pp. 65–74.
-
(2005)
SWS
, pp. 65-74
-
-
Backes, M.1
Gross, T.2
-
5
-
-
77954095439
-
A challenging but feasible blockwise-adaptive chosen-plaintext attack on SSL
-
M. Malek, E. Fernández-Medina, and J. Hernando, Eds., INSTICC Press
-
BARD, G. V. A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL. In SECRYPT (2006), M. Malek, E. Fernández-Medina, and J. Hernando, Eds., INSTICC Press, pp. 99–109.
-
(2006)
SECRYPT
, pp. 99-109
-
-
Bard, G.V.1
-
6
-
-
70349242702
-
XML rewriting attacks: Existing solutions and their limitations
-
Apr. IADIS Press
-
BENAMEUR, A., KADIR, F. A., AND FENET, S. XML Rewriting Attacks: Existing Solutions and their Limitations. In IADIS Applied Computing 2008 (Apr. 2008), IADIS Press.
-
(2008)
IADIS Applied Computing 2008
-
-
Benameur, A.1
Kadir, F.A.2
Fenet, S.3
-
7
-
-
14844303360
-
Verifying policy-based security for web services
-
BHARGAVAN, K., FOURNET, C., AND GORDON, A. D. Verifying policy-based security for web services. In CCS’04: Proceedings of the 11th ACM conference on Computer and communications security (2004), pp. 268–277.
-
(2004)
CCS’04: Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 268-277
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
-
8
-
-
77954342153
-
An advisor for web services security policies
-
New York, NY, USA, ACM
-
BHARGAVAN, K., FOURNET, C., GORDON, A. D., AND O’SHEA, G. An advisor for web services security policies. In SWS’05: Proceedings of the 2005 workshop on Secure web services (New York, NY, USA, 2005), ACM, pp. 1–9.
-
(2005)
SWS’05: Proceedings of the 2005 Workshop on Secure Web Services
, pp. 1-9
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
O’Shea, G.4
-
9
-
-
84957693225
-
Chosen ciphertext attacks against protocols based on the rsa encryption standard pkcs #1
-
BLEICHENBACHER, D. Chosen ciphertext attacks against protocols based on the rsa encryption standard pkcs #1. In CRYPTO (1998), pp. 1–12.
-
(1998)
CRYPTO
, pp. 1-12
-
-
Bleichenbacher, D.1
-
10
-
-
44949218700
-
Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0
-
15.03. 2005
-
CANTOR, S., KEMP, J., MALER, E., AND PHILPOTT, R. Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0. OASIS Standard, 15.03.2005, 2005. http://docs.oasis-open.org/security/saml/v2.0/saml-profiles-2.0-os.pdf.
-
(2005)
OASIS Standard
-
-
Cantor, S.1
Kemp, J.2
Maler, E.3
Philpott, R.4
-
11
-
-
44949218700
-
Assertions and protocol for the OASIS security Assertion Markup Language (SAML) V2.0
-
15.03. 2005
-
CANTOR, S., KEMP, J., PHILPOTT, R., AND MALER, E. Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V2.0. OASIS Standard, 15.03.2005, 2005. http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf.
-
(2005)
OASIS Standard
-
-
Cantor, S.1
Kemp, J.2
Philpott, R.3
Maler, E.4
-
12
-
-
44949218700
-
Metadata for the OASIS security assertion markup Language (SAML) v2.0
-
15.03. 2005
-
CANTOR, S., MOREH, J., PHILPOTT, R., AND MALER, E. Metadata for the OASIS Security Assertion Markup Language (SAML) V2.0. OASIS Standard, 15.03.2005, 2005. http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf.
-
(2005)
OASIS Standard
-
-
Cantor, S.1
Moreh, J.2
Philpott, R.3
Maler, E.4
-
13
-
-
33745907804
-
Weakest link attack on single sign-on and its case in saml v2.0 web sso
-
M. Gavrilova, O. Gervasi, Kumar, C. Tan, D. Taniar, A. Lagan, Y. Mun, and H. Choo, Eds.,. of Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 10.1007/11751595 54
-
CHAN, Y.-Y. Weakest link attack on single sign-on and its case in saml v2.0 web sso. In Computational Science and Its Applications - ICCSA 2006, M. Gavrilova, O. Gervasi, V. Kumar, C. Tan, D. Taniar, A. Lagan, Y. Mun, and H. Choo, Eds., vol. 3982 of Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2006, pp. 507–516. 10.1007/11751595 54.
-
(2006)
Computational Science and Its Applications - ICCSA 2006
, vol.3982
, pp. 507-516
-
-
Chan, Y.-Y.1
-
14
-
-
0038394738
-
-
Second Edition
-
EASTLAKE, D., REAGLE, J., SOLO, D., HIRSCH, F., AND ROESSLER, T. XML Signature Syntax and Processing (Second Edition), 2008. http://www.w3.org/TR/xmldsig-core/.
-
(2008)
XML Signature Syntax and Processing
-
-
Eastlake, D.1
Reagle, J.2
Solo, D.3
Hirsch, F.4
Roessler, T.5
-
15
-
-
70449469222
-
Analysis of signature wrapping attacks and countermeasures
-
GAJEK, S., JENSEN, M., LIAO, L., AND SCHWENK, J. Analysis of signature wrapping attacks and countermeasures. In ICWS [1], pp. 575–582.
-
ICWS
, Issue.1
, pp. 575-582
-
-
Gajek, S.1
Jensen, M.2
Liao, L.3
Schwenk, J.4
-
16
-
-
74049118181
-
Breaking and fixing the inline approach
-
New York, NY, USA, ACM
-
GAJEK, S., LIAO, L., AND SCHWENK, J. Breaking and fixing the inline approach. In SWS’07: Proceedings of the 2007 ACM workshop on Secure web services (New York, NY, USA, 2007), ACM, pp. 37–43.
-
(2007)
SWS’07: Proceedings of the 2007 ACM Workshop on Secure Web Services
, pp. 37-43
-
-
Gajek, S.1
Liao, L.2
Schwenk, J.3
-
18
-
-
84944734046
-
Security analysis of the SAML SSO browser/artifact profile
-
IEEE Computer Society
-
GROSS, T. Security Analysis of the SAML SSO Browser/Artifact Profile. In ACSAC (2003), IEEE Computer Society, pp. 298–307.
-
(2003)
ACSAC
, pp. 298-307
-
-
Gross, T.1
-
19
-
-
74049120319
-
SAML artifact information flow revisited
-
In Berkeley, May IEEE
-
GROSS, T., AND PFITZMANN, B. SAML artifact information flow revisited. In In IEEE Workshop on Web Services Security (WSSS) (Berkeley, May 2006), IEEE, pp. 84–100.
-
(2006)
IEEE Workshop on Web Services Security (WSSS)
, pp. 84-100
-
-
Gross, T.1
Pfitzmann, B.2
-
20
-
-
70449472667
-
Vulnerable cloud: Soap message security validation revisited
-
GRUSCHKA, N., AND IACONO, L. L. Vulnerable cloud: Soap message security validation revisited. In ICWS [1], pp. 625–631.
-
ICWS
, Issue.1
, pp. 625-631
-
-
Gruschka, N.1
Iacono, L.L.2
-
21
-
-
20744457033
-
SOAP version 1.2 Part 1: Messaging framework
-
GUDGIN, M., HADLEY, M., MENDELSOHN, N., MOREAU, J.J., AND NIELSEN, H. F. SOAP Version 1.2 Part 1: Messaging Framework. W3C Recommendation (2003).
-
(2003)
W3C Recommendation
-
-
Gudgin, M.1
Hadley, M.2
Mendelsohn, N.3
Moreau, J.J.4
Nielsen, H.F.5
-
22
-
-
41949121126
-
Dynamic security assertion markup language: Simplifying single sign-on
-
march-april
-
HARDING, P., JOHANSSON, L., AND KLINGENSTEIN, N. Dynamic security assertion markup language: Simplifying single sign-on. Security Privacy, IEEE 6, 2 (march-april 2008), 83 – 85.
-
(2008)
Security Privacy, IEEE
, vol.6
, Issue.2
, pp. 83-85
-
-
Harding, P.1
Johansson, L.2
Klingenstein, N.3
-
23
-
-
74049141131
-
The curse of names-paces in the domain of xml signature
-
E. Damiani, S. Proctor, and A. Singhal, Eds., ACM
-
JENSEN, M., LIAO, L., AND SCHWENK, J. The curse of names-paces in the domain of xml signature. In SWS (2009), E. Damiani, S. Proctor, and A. Singhal, Eds., ACM, pp. 29–36.
-
(2009)
SWS
, pp. 29-36
-
-
Jensen, M.1
Liao, L.2
Schwenk, J.3
-
24
-
-
80455150347
-
On the effectiveness of xml schema validation for countering xml signature wrapping attacks
-
sept
-
JENSEN, M., MEYER, C., SOMOROVSKY, J., AND SCHWENK, J. On the effectiveness of xml schema validation for countering xml signature wrapping attacks. In Securing Services on the Cloud (IWSSC), 2011 1st International Workshop on (sept. 2011), pp. 7 –13.
-
(2011)
Securing Services on the Cloud (IWSSC), 2011 1st International Workshop on
, pp. 7-13
-
-
Jensen, M.1
Meyer, C.2
Somorovsky, J.3
Schwenk, J.4
-
26
-
-
41949086982
-
The venn of identity: Options and issues in federated identity management
-
march-april
-
MALER, E., AND REED, D. The venn of identity: Options and issues in federated identity management. Security Privacy, IEEE 6, 2 (march-april 2008), 16 –23.
-
(2008)
Security Privacy, IEEE
, vol.6
, Issue.2
, pp. 16-23
-
-
Maler, E.1
Reed, D.2
-
27
-
-
77954328275
-
XML signature element wrapping attacks and countermeasures
-
New York, NY, USA, ACM Press
-
MCINTOSH, M., AND AUSTEL, P. XML Signature Element Wrapping Attacks and Countermeasures. In SWS’05: Proceedings of the 2005 workshop on Secure web services (New York, NY, USA, 2005), ACM Press, pp. 20–27.
-
(2005)
SWS’05: Proceedings of the 2005 Workshop on Secure Web Services
, pp. 20-27
-
-
McIntosh, M.1
Austel, P.2
-
29
-
-
21244462147
-
Web services security: SoAP Message Security 1.1 (WS-Security 2004)
-
OASIS Standard
-
NADALIN, A., KALER, C., MONZILLO, R., AND HALLAMBAKER, P. Web Services Security: SOAP Message Security 1.1 (WS-Security 2004). OASIS Standard (2006).
-
(2006)
-
-
Nadalin, A.1
Kaler, C.2
Monzillo, R.3
Hallambaker, P.4
-
30
-
-
70449511744
-
An inline approach for secure soap requests and early validation
-
RAHAMAN, M. A., MARTEN, R., AND SCHAAD, A. An inline approach for secure soap requests and early validation. OWASP AppSec Europe, 2006.
-
(2006)
OWASP AppSec Europe
-
-
Rahaman, M.A.1
Marten, R.2
Schaad, A.3
-
31
-
-
46849100465
-
Soap-based secure conversation and collaboration
-
RAHAMAN, M. A., AND SCHAAD, A. Soap-based secure conversation and collaboration. In ICWS (2007), pp. 471–480.
-
(2007)
ICWS
, pp. 471-480
-
-
Rahaman, M.A.1
Schaad, A.2
-
33
-
-
80955143542
-
All your clouds are belong to us – Security analysis of cloud management interfaces
-
Oct
-
SOMOROVSKY, J., HEIDERICH, M., JENSEN, M., SCHWENK, J., GRUSCHKA, N., AND IACONO, L. L. All Your Clouds are Belong to us – Security Analysis of Cloud Management Interfaces. In The ACM Cloud Computing Security Workshop (CCSW) (Oct. 2011).
-
(2011)
The ACM Cloud Computing Security Workshop (CCSW)
-
-
Somorovsky, J.1
Heiderich, M.2
Jensen, M.3
Schwenk, J.4
Gruschka, N.5
Iacono, L.L.6
-
34
-
-
84940569741
-
-
THE APACHE SOFTWARE FOUNDATION. Apache Xerces.
-
Apache Xerces
-
-
-
35
-
-
33750012696
-
Using saml to protect the session initiation protocol (sip)
-
sept.-oct
-
TSCHOFENIG, H., FALK, R., PETERSON, J., HODGES, J., SICKER, D., AND POLK, J. Using saml to protect the session initiation protocol (sip). Network, IEEE 20, 5 (sept.-oct. 2006), 14 –17.
-
(2006)
Network, IEEE
, vol.20
, Issue.5
, pp. 14-17
-
-
Tschofenig, H.1
Falk, R.2
Peterson, J.3
Hodges, J.4
Sicker, D.5
Polk, J.6
-
38
-
-
84878355933
-
Signing me onto your accounts through Facebook and Google: A traffic-guided security study of commercially deployed single-sign-on web services
-
IEEE Computer Society May
-
WANG, R., CHEN, S., AND WANG, X. Signing Me onto Your Accounts through Facebook and Google: a Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services. In IEEE Symposium on Security and Privacy (Oakland), IEEE Computer Society (May 2012).
-
(2012)
IEEE Symposium on Security and Privacy (Oakland),
-
-
Wang, R.1
Chen, S.2
Wang, X.3
-
39
-
-
78049349550
-
Research of dynamic authentication mechanism crossing domains for web services based on saml
-
YONG-SHENG, Z., AND JING, Y. Research of dynamic authentication mechanism crossing domains for web services based on saml. In Future Computer and Communication (ICFCC), 2010 2nd International Conference on (may 2010), vol. 2, pp. V2–395 –V2–398.
-
Future Computer and Communication (ICFCC), 2010 2nd International Conference on (May 2010)
, vol.2
, pp. 395-398
-
-
Yong-Sheng, Z.1
Jing, Y.2
|