메뉴 건너뛰기




Volumn , Issue , 2015, Pages 56-66

Secure sessions for web services

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY; SEMANTICS; SPECIFICATIONS; TELECOMMUNICATION SERVICES; WEBSITES;

EID: 84954139111     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1111348.1111355     Document Type: Conference Paper
Times cited : (15)

References (31)
  • 4
    • 1442336684 scopus 로고    scopus 로고
    • A semantics for web services authentication
    • An extended version appears as Microsoft Research Technical Report MSR-TR-2003-83
    • K. Bhargavan, C. Fournet, and A. D. Gordon. A semantics for web services authentication. In 31st ACM Symposium on Principles of Programming Languages (POPL'04), pages 198-209, 2004. An extended version appears as Microsoft Research Technical Report MSR-TR-2003-83.
    • (2004) 31st ACM Symposium on Principles of Programming Languages (POPL'04) , pp. 198-209
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3
  • 7
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on Prolog rules
    • IEEE Computer Society
    • B. Blanchet. An efficient cryptographic protocol verifier based on Prolog rules. In 14th IEEE Computer Security Foundations Workshop (CSFW-14), pages 82-96. IEEE Computer Society, 2001.
    • (2001) 14th IEEE Computer Security Foundations Workshop (CSFW-14) , pp. 82-96
    • Blanchet, B.1
  • 8
    • 84958749546 scopus 로고    scopus 로고
    • From secrecy to authenticity in security protocols
    • volume 2477 of LNCS, Springer
    • B. Blanchet. From secrecy to authenticity in security protocols. In 9th International Static Analysis Symposium (SAS'02), volume 2477 of LNCS, pages 342-359. Springer, 2002.
    • (2002) 9th International Static Analysis Symposium (SAS'02) , pp. 342-359
    • Blanchet, B.1
  • 12
  • 15
    • 0141998527 scopus 로고    scopus 로고
    • Validating a web service security abstraction by typing
    • An extended version appears as Microsoft Research Technical Report MSR-TR-2002-108
    • A. D. Gordon and R. Pucella. Validating a web service security abstraction by typing. In ACM Workshop on XML Security 2002, pages 18-29, 2003. An extended version appears as Microsoft Research Technical Report MSR-TR-2002-108.
    • (2003) ACM Workshop on XML Security 2002 , pp. 18-29
    • Gordon, A.D.1    Pucella, R.2
  • 16
    • 84954108452 scopus 로고    scopus 로고
    • MSDN, May
    • M. Gudgin. Using WS-Trust and WS-SecureConversation. MSDN, May 2004. At http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnwebsrv/html/ws-trustandsecureconv.asp.
    • (2004) Using WS-Trust and WS-SecureConversation
    • Gudgin, M.1
  • 23
  • 27
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Commun. ACM, 21(12):993-999, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 28
    • 85024252307 scopus 로고    scopus 로고
    • Inductive analysis of the internet protocol TLS
    • L. C. Paulson. Inductive analysis of the internet protocol TLS. ACM Trans. Inf. Syst. Secur., 2(3):332-351, 1999.
    • (1999) ACM Trans. Inf. Syst. Secur , vol.2 , Issue.3 , pp. 332-351
    • Paulson, L.C.1
  • 29
    • 33645964737 scopus 로고    scopus 로고
    • W3C. SOAP Version 1.2, at
    • W3C. SOAP Version 1.2, 2003. W3C Recommendation, at http://www.w3.org/TR/soap12.
    • (2003) W3C Recommendation


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.