-
2
-
-
70449504111
-
SOAP version 1.2 part 1: Messaging framework (second edition)
-
M. Gudgin, M. Hadley, N. Mendelsohn, J.-J. Moreau, H. F. Nielsen, A. Karmarkar, and Y. Lafon, "SOAP Version 1.2 Part 1: Messaging Framework (Second Edition)," W3C, Recommendation, 2007. [Online]. Available: http://www.w3.org/TR/soap12-part1/
-
(2007)
W3C, Recommendation
-
-
Gudgin, M.1
Hadley, M.2
Mendelsohn, N.3
Moreau, J.-J.4
Nielsen, H.F.5
Karmarkar, A.6
Lafon, Y.7
-
4
-
-
67049129622
-
Web services security: Soap message security 1.1
-
A. Nadalin, C. Kaler, R. Monzillo, and H.-B. Phillip, "Web Services Security: SOAP Message Security 1.1," OASIS, Standard Specification, 2006. [Online]. Available: http://docs.oasis-open.org/wss/v1.1/wss-v1. 1-spec-os-SOAPMessageSecurity.pdf
-
(2006)
OASIS, Standard Specification
-
-
Nadalin, A.1
Kaler, C.2
Monzillo, R.3
Phillip, H.-B.4
-
6
-
-
70450184286
-
The transport layer security (tls) protocol version 1.2
-
T. Dierks and E. Rescorla, "The Transport Layer Security (TLS) Protocol Version 1.2," IETF, RFC 5246, 2008. [Online]. Available: http://www.ietf.org/rfc/rfc5246.txt
-
(2008)
IETF, RFC
, vol.5246
-
-
Dierks, T.1
Rescorla, E.2
-
7
-
-
84895539842
-
The oauth 2.0 authorization framework
-
D. Hardt, "The OAuth 2.0 Authorization Framework," IETF, RFC 6749, 2012. [Online]. Available: https://tools.ietf.org/html/rfc6749
-
(2012)
IETF, RFC
, vol.6749
-
-
Hardt, D.1
-
8
-
-
78650118674
-
The oauth 1.0 protocol
-
E. Hammer-Lahav, "The OAuth 1.0 Protocol," IETF, RFC 5849, 2010. Available: https://tools.ietf.org/html/rfc5849
-
(2010)
IETF, RFC
, vol.5849
-
-
Hammer-Lahav, E.1
-
9
-
-
84919614372
-
-
IETF Javascript Object Signing and Encryption (jose) 2014
-
IETF, "Javascript Object Signing and Encryption (jose)," 2014. Available: http://datatracker.ietf.org/wg/jose/
-
-
-
-
10
-
-
84919614371
-
WS-security policy 1.3
-
A. Nadalin, M. Goodner, M. Gudgin, D. Turner, A. Barbir, and H. Granqvist, "WS-SecurityPolicy 1.3," OASIS, Standard, 2012. Available: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/ v1.3/errata01/ws-securitypolicy-1.3-errata01-complete.html
-
(2012)
OASIS, Standard
-
-
Nadalin, A.1
Goodner, M.2
Gudgin, M.3
Turner, D.4
Barbir, A.5
Granqvist, H.6
-
11
-
-
70349313755
-
Web services policy 1.5-framework
-
A. S. Vedamuthu, D. Orchard, F. Hirsch, M. Hondo, P. Yendluri, T. Boubez, and Y. Umit, "Web Services Policy 1.5-Framework," W3C, Recommendation, 2007. [Online]. Available: http://www.w3.org/ TR/ws-policy
-
(2007)
W3C, Recommendation
-
-
Vedamuthu, A.S.1
Orchard, D.2
Hirsch, F.3
Hondo, M.4
Yendluri, P.5
Boubez, T.6
Umit, Y.7
-
12
-
-
41949111529
-
WS -trust 1.3
-
A. Nadalin, M. Goodner, M. Gudgin, A. Barbir, and H. Granqvist, "WS-Trust 1.3," OASIS, Standard, 2007. [Online]. Available: http: //docs.oasis-open.org/ws-sx/ws-trust/200512/ws-trust-1.3-os.html
-
(2007)
OASIS, Standard
-
-
Nadalin, A.1
Goodner, M.2
Gudgin, M.3
Barbir, A.4
Granqvist, H.5
-
13
-
-
77952493943
-
Web services federation language (wsfederation) version 1.2
-
M. Goodner and A. Nadalin, "Web Services Federation Language (WSFederation) Version 1.2," OASIS, Standard, 2009. [Online]. Available: http://docs.oasis-open.org/wsfed/federation/v1.2/ws-federation.html
-
(2009)
OASIS, Standard
-
-
Goodner, M.1
Nadalin, A.2
-
14
-
-
84919635357
-
EXtensible access control markup language (xacml) version 3.0
-
E. Rissanen, "eXtensible Access Control Markup Language (XACML) Version 3.0," OASIS, Standard, 2013. [Online]. Available: http: //www.oasis-open.org/committees/xacml
-
(2013)
OASIS, Standard
-
-
Rissanen, E.1
-
15
-
-
33746205188
-
Assertions and protocols for the oasis security assertion markup language (saml) v2.0
-
S. Cantor, J. Kemp, R. Philpott, and E. Maler, "Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0," OASIS, Standard, 2005. [Online]. Available: http: //docs.oasis-open.org/security/saml/v2.0/saml-2.0-os.zip
-
(2005)
OASIS, Standard
-
-
Cantor, S.1
Kemp, J.2
Philpott, R.3
Maler, E.4
-
16
-
-
84919614369
-
XML encryption syntax and processing version 1.1
-
T. Imamura, B. Dillaway, E. Simon, Y. Kelvin, and M. Nystrom, "XML Encryption Syntax and Processing Version 1.1," W3C, Recommendation, 2013. [Online]. Available: http://www.w3.org/TR/ xmlenc-core1/
-
(2013)
W3C, Recommendation
-
-
Imamura, T.1
Dillaway, B.2
Simon, E.3
Kelvin, Y.4
Nystrom, M.5
-
17
-
-
0043026142
-
XML signature syntax and processing (second edition)
-
M. Bartel, J. Boyer, B. Fox, B. LaMacchia, and E. Simon, "XML Signature Syntax and Processing (Second Edition)," W3C, Recommendation, 2008. [Online]. Available: http://www.w3.org/TR/ xmldsig-core/
-
(2008)
W3C, Recommendation
-
-
Bartel, M.1
Boyer, J.2
Fox, B.3
Lamacchia, B.4
Simon, E.5
-
18
-
-
70349313758
-
XML key management specification (xkms 2.0)
-
P. Hallam-Baker and H. M. Shivaram, "XML Key Management Specification (XKMS 2.0)," W3C, Recommendation, 2005. [Online]. Available: http://www.w3.org/TR/xkms2/
-
(2005)
W3C, Recommendation
-
-
Hallam-Baker, P.1
Shivaram, H.M.2
-
19
-
-
84919614368
-
Basic profile version 1.1
-
K. Ballinger, D. Ehnebuske, C. Ferris, M. Gudgin, C. K. Liu, M. Nottingham, and P. Yendluri, "Basic Profile Version 1.1," WS-I, Final Material, 2006. [Online]. Available: http://www.ws-i.org/Profiles/ BasicProfile-1.1.html
-
(2006)
WS-I, Final Material
-
-
Ballinger, K.1
Ehnebuske, D.2
Ferris, C.3
Gudgin, M.4
Liu, C.K.5
Nottingham, M.6
Yendluri, P.7
-
20
-
-
84919614367
-
Basic security profile version 1.1
-
M. McIntosh, M. Gudgin, K. S. Morrison, and A. Barbir, "Basic Security Profile Version 1.1," WS-I, Final Material, 2010. [Online]. Available: http://www.ws-i.org/Profiles/BasicSecurityProfile-1.1.html
-
(2010)
WS-I, Final Material
-
-
McIntosh, M.1
Gudgin, M.2
Morrison, K.S.3
Barbir, A.4
-
21
-
-
77958579020
-
Extensible markup language (xml) 1.0 (fifth edition)
-
T. Bray, J. Paoli, C. M. Sperberg-McQueen, E. Maler, and F. Yergeau, "Extensible Markup Language (XML) 1.0 (Fifth Edition)," W3C, Recommendation, 2008. [Online]. Available: http: //www.w3.org/TR/2008/REC-xml-20081126
-
(2008)
W3C, Recommendation
-
-
Bray, T.1
Paoli, J.2
Sperberg-Mcqueen, C.M.3
Maler, E.4
Yergeau, F.5
-
22
-
-
0003355701
-
Hypertext transfer protocol-http/1.1
-
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee, "Hypertext Transfer Protocol-HTTP/1.1," IETF, RFC 2616, 1999. [Online]. Available: http://www.ietf.org/rfc/rfc2616.txt
-
(1999)
IETF, RFC
, vol.2616
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
23
-
-
84919614366
-
Java message service version 2.0
-
M. Hapner, R. Burridge, R. Sharma, J. Fialli, K. Stout, and N. Deakin, "Java Message Service Version 2.0," Oracle America, Inc, JSR 000343, 2013. [Online]. Available: https://jcp.org/aboutJava/communityprocess/ final/jsr343/index.html
-
(2013)
Oracle America, Inc, JSR 000343
-
-
Hapner, M.1
Burridge, R.2
Sharma, R.3
Fialli, J.4
Stout, K.5
Deakin, N.6
-
24
-
-
78650878882
-
Simple mail transfer protocol
-
J. Klensin, "Simple Mail Transfer Protocol," IETF, RFC 5321, 2008. Available: https://tools.ietf.org/html/rfc5321
-
(2008)
IETF, RFC
, vol.5321
-
-
Klensin, J.1
-
25
-
-
70349328704
-
WS-secure conversation 1.4
-
A. Nadalin, M. Goodner, M. Gudgin, A. Barbir, and H. Granqvist, "WS-SecureConversation 1.4," OASIS, Standard, 2009. [Online]. Available: http://docs.oasis-open.org/ws-sx/ws-secureconversation/v1. 4/ws-secureconversation.html
-
(2009)
OASIS, Standard
-
-
Nadalin, A.1
Goodner, M.2
Gudgin, M.3
Barbir, A.4
Granqvist, H.5
-
26
-
-
24344435004
-
-
Pearson Higher Education
-
J. Rosenberg and D. Remy, Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption. Pearson Higher Education, 2004.
-
(2004)
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
-
-
Rosenberg, J.1
Remy, D.2
-
27
-
-
84861307113
-
The nist definition of cloud computing
-
Special Publication 800-145
-
P. Mell and T. Grance, "The NIST Definition of Cloud Computing," NIST, Special Publication 800-145, 2011. [Online]. Available: http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
-
(2011)
NIST
-
-
Mell, P.1
Grance, T.2
-
28
-
-
35148894664
-
Service oriented architecture for e-health support services based on grid computing overlay
-
ser. SCC'06. Chicago, IL, USA: IEEE
-
W. M. Omar and A. Taleb-Bendiab, "Service Oriented Architecture for E-health Support Services Based on Grid Computing Overlay," in IEEE International Conference on Services Computing, ser. SCC'06. Chicago, IL, USA: IEEE, 2006, pp. 135-142. [Online]. Available: http://dx.doi.org/10.1109/SCC.2006.90
-
(2006)
IEEE International Conference on Services Computing
, pp. 135-142
-
-
Omar, W.M.1
Taleb-Bendiab, A.2
-
29
-
-
84881074771
-
ETIS-efficient trust and identity management system for federated service providers
-
ser. AINA'13, L. Barolli, F. Xhafa, M. Takizawa, T. Enokido, and H.-H. Hsu, Eds. Barcelona, Catalonia, Spain: IEEE
-
M. V. Bhonsle, N. Poolsappasit, and S. K. Madria, "ETIS-Efficient Trust and Identity Management System for Federated Service Providers," in IEEE 27th International Conference on Advanced Information Networking and Applications, ser. AINA'13, L. Barolli, F. Xhafa, M. Takizawa, T. Enokido, and H.-H. Hsu, Eds. Barcelona, Catalonia, Spain: IEEE, 2013, pp. 219-226. [Online]. Available: http://dx.doi.org/10.1109/AINA.2013.13
-
(2013)
IEEE 27th International Conference on Advanced Information Networking and Applications
, pp. 219-226
-
-
Bhonsle, M.V.1
Poolsappasit, N.2
Madria, S.K.3
-
30
-
-
0003339367
-
Web services description language (wsdl) 1.1
-
E. Christensen, F. Curbera, G. Meredith, and S. Weerawarana, "Web Services Description Language (WSDL) 1.1," W3C, Note, 2001. Available: http://www.w3.org/TR/wsdl
-
(2001)
W3C, Note
-
-
Christensen, E.1
Curbera, F.2
Meredith, G.3
Weerawarana, S.4
-
31
-
-
84919614364
-
-
OWASP XML External Entity (XXE) Processing 2013
-
OWASP, "XML External Entity (XXE) Processing," 2013. Available: https://www.owasp.org/index.php/XML External Entity (XXE) Processing
-
-
-
-
32
-
-
0003213919
-
XML path language (xpath) version 1.0
-
J. Clark and S. DeRose, "XML Path Language (XPath) Version 1.0," W3C, Recommendation, 1999. [Online]. Available: http: //www.w3.org/TR/xpath
-
(1999)
W3C, Recommendation
-
-
Clark, J.1
Derose, S.2
-
33
-
-
84919614363
-
-
OWASP XPATH Injection 2013
-
OWASP, "XPATH Injection," 2013. [Online]. Available: https: //www.owasp.org/index.php/XPATH Injection
-
-
-
-
34
-
-
77954328275
-
XML signature element wrapping attacks and countermeasures
-
ser. SWS '05. New York, NY, USA: ACM
-
M. McIntosh and P. Austel, "XML Signature Element Wrapping Attacks and Countermeasures," in Proceedings of the 2005 Workshop on Secure Web Services, ser. SWS '05. New York, NY, USA: ACM, 2005, pp. 20-27. [Online]. Available: http://doi.acm.org/10.1145/1103022.1103026
-
(2005)
Proceedings of the 2005 Workshop on Secure Web Services
, pp. 20-27
-
-
McIntosh, M.1
Austel, P.2
-
35
-
-
70449472667
-
Vulnerable cloud: Soap message security validation revisited
-
ser. ICWS'09, E. Damiani, R. Chang, and J. Zhang, Eds. Los Angeles, CA, USA: IEEE
-
N. Gruschka and L. Lo Iacono, "Vulnerable Cloud: SOAP Message Security Validation Revisited," in IEEE International Conference on Web Services, ser. ICWS'09, E. Damiani, R. Chang, and J. Zhang, Eds. Los Angeles, CA, USA: IEEE, 2009, pp. 625-631. [Online]. Available: http://dx.doi.org/10.1109/ICWS.2009.70
-
(2009)
IEEE International Conference on Web Services
, pp. 625-631
-
-
Gruschka, N.1
Lo Iacono, L.2
-
36
-
-
80955143542
-
All your clouds are belong to us: Security analysis of cloud management interfaces
-
ser. CCSW '11. New York, NY, USA: ACM
-
J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, "All Your Clouds Are Belong to Us: Security Analysis of Cloud Management Interfaces," in Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, ser. CCSW '11. New York, NY, USA: ACM, 2011, pp. 3-14. [Online]. Available: http://doi.acm.org/10.1145/2046660.2046664
-
(2011)
Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop
, pp. 3-14
-
-
Somorovsky, J.1
Heiderich, M.2
Jensen, M.3
Schwenk, J.4
Gruschka, N.5
Iacono, L.L.6
-
37
-
-
84904705463
-
Making xml signatures immune to xml signature wrapping attacks
-
ser. Communications in Computer and Information Science, I. Ivanov, M. Sinderen, F. Leymann, and T. Shan, Eds. Springer International Publishing
-
C. Mainka, M. Jensen, L. Lo Iacono, and J. Schwenk, "Making XML Signatures Immune to XML Signature Wrapping Attacks," in Cloud Computing and Services Science, ser. Communications in Computer and Information Science, I. Ivanov, M. Sinderen, F. Leymann, and T. Shan, Eds. Springer International Publishing, 2013, vol. 367, pp. 151-167. Available: http://dx.doi.org/10.1007/978-3-319-04519-1 10
-
(2013)
Cloud Computing and Services Science
, vol.367
, pp. 151-167
-
-
Mainka, C.1
Jensen, M.2
Iacono, L.L.3
Schwenk, J.4
-
38
-
-
21244454934
-
Uniform resource identifier (uri): Generic syntax
-
T. Berners-Lee, R. Fielding, and L. Masinter, "Uniform Resource Identifier (URI): Generic Syntax," IETF, RFC 3986, 2005. [Online]. Available: http://www.ietf.org/rfc/rfc3986.txt
-
(2005)
IETF, RFC
, vol.3986
-
-
Berners-Lee, T.1
Fielding, R.2
Masinter, L.3
-
39
-
-
84919614362
-
-
Mozilla Developer Network Persona 2013
-
Mozilla Developer Network, "Persona," 2013. [Online]. Available: https://developer.mozilla.org/en-US/Persona
-
-
-
-
40
-
-
70450170255
-
The application/json media type for javascript object notation (json)
-
D. Crockford, "The application/json Media Type for JavaScript Object Notation (JSON)," IETF, RFC 4627, 2006. [Online]. Available: http://www.ietf.org/rfc/rfc4627.txt
-
(2006)
IETF, RFC
, vol.4627
-
-
Crockford, D.1
-
41
-
-
84864069043
-
On using json-ld to create evolvable restful services
-
ser. WS-REST '12. New York, NY, USA: ACM
-
M. Lanthaler and C. Gutl, "On Using JSON-LD to Create Evolvable RESTful Services," in Proceedings of the Third International Workshop on RESTful Design, ser. WS-REST '12. New York, NY, USA: ACM, 2012, pp. 25-32. [Online]. Available: http: //doi.acm.org/10.1145/2307819.2307827
-
(2012)
Proceedings of the Third International Workshop on RESTful Design
, pp. 25-32
-
-
Lanthaler, M.1
Gutl, C.2
-
42
-
-
84919614361
-
JSON web encryption (jwe)
-
M. Jones, E. Rescorla, and J. Hildebrand, "JSON Web Encryption (JWE)," IETF, Internet-Draft, 2014. [Online]. Available: http://tools. ietf.org/html/draft-ietf-jose-json-web-encryption-25
-
(2014)
IETF, Internet-Draft
-
-
Jones, M.1
Rescorla, E.2
Hildebrand, J.3
-
43
-
-
85022329867
-
JSON web signature (jws)
-
M. Jones, J. Bradley, and N. Sakimura, "JSON Web Signature (JWS)," IETF, Internet-Draft, 2014. [Online]. Available: http://tools.ietf.org/ html/draft-ietf-jose-json-web-signature-25
-
(2014)
IETF, Internet-Draft
-
-
Jones, M.1
Bradley, J.2
Sakimura, N.3
-
44
-
-
84919614359
-
JSON web algorithms (jwa)
-
M. Jones, "JSON Web Algorithms (JWA)," IETF, Internet-Draft, 2014. [Online]. Available: http://tools.ietf.org/html/ draft-ietf-jose-json-web-algorithms-25
-
(2014)
IETF, Internet-Draft
-
-
Jones, M.1
-
45
-
-
84919614358
-
JSON web key (jwk)
-
M. Jones, "JSON Web Key (JWK)," IETF, Internet-Draft, 2014. [Online]. Available: http://tools.ietf.org/html/ draft-ietf-jose-json-web-key-25
-
(2014)
IETF, Internet-Draft
-
-
Jones, M.1
-
47
-
-
84979766254
-
JSON- ld 1.0
-
M. Sporny, D. Longley, G. Kellogg, M. Lanthaler, and N. Lindstrom, "JSON-LD 1.0," W3C, Recommendation, 2014. [Online]. Available: http://json-ld.org/spec/latest/json-ld/
-
(2014)
W3C, Recommendation
-
-
Sporny, M.1
Longley, D.2
Kellogg, G.3
Lanthaler, M.4
Lindstrom, N.5
-
48
-
-
84869593649
-
In search of an internet of things service architecture: Rest or ws-A developers' perspective
-
ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, A. Puiatti and T. Gu, Eds. Springer Berlin Heidelberg
-
D. Guinard, I. Ion, and S. Mayer, "In Search of an Internet of Things Service Architecture: REST or WS-? A Developers' Perspective," in Mobile and Ubiquitous Systems: Computing, Networking, and Services, ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, A. Puiatti and T. Gu, Eds., vol. 104. Springer Berlin Heidelberg, 2012, pp. 326-337. Available: http://dx.doi.org/10.1007/978-3-642-30973-1 32
-
(2012)
Mobile and Ubiquitous Systems: Computing, Networking, and Services
, vol.104
, pp. 326-337
-
-
Guinard, D.1
Ion, I.2
Mayer, S.3
-
49
-
-
84919614356
-
Web cryptography api
-
R. Sleevi and D. Dahl, "Web Cryptography API," W3C, Working Draft, 2013. [Online]. Available: http://www.w3.org/TR/WebCryptoAPI
-
(2013)
W3C, Working Draft
-
-
Sleevi, R.1
Dahl, D.2
-
50
-
-
84866375929
-
Enabling message security for restful services
-
ser. ICWS'12. Honolulu, USA: IEEE, June 24-29, 2012
-
G. Serme, A. S. De Oliveira, and R. Y. Massiera, Julien, "Enabling message security for RESTful services," in 19th IEEE International Conference on Web Services, ser. ICWS'12. Honolulu, USA: IEEE, June 24-29, 2012, 2012. [Online]. Available: http: //www.eurecom.fr/publication/3739
-
(2012)
19th IEEE International Conference on Web Services
-
-
Serme, G.1
De Oliveira, A.S.2
Massiera, J.R.Y.3
-
51
-
-
84919614355
-
-
Amazon Signing and Authenticating REST Requests 2006
-
Amazon, "Signing and Authenticating REST Requests," 2006. Available: http://docs.aws.amazon.com/AmazonS3/latest/dev/ RESTAuthentication.html
-
-
-
-
52
-
-
84919614354
-
HTTP signatures
-
M. Cavage and M. Sporny, "HTTP Signatures," IETF, Internet-Draft, 2013. [Online]. Available: http://tools.ietf.org/html/ draft-cavage-http-signatures-01
-
(2013)
IETF, Internet-Draft
-
-
Cavage, M.1
Sporny, M.2
|