-
1
-
-
85055785380
-
-
Global Information Infrastructure principles and framework architecture, ITU-T Recommendation Y.110, June
-
Global Information Infrastructure principles and framework architecture, ITU-T Recommendation Y.110, June 1998.
-
(1998)
-
-
-
2
-
-
85055842205
-
-
Wikipedia-the Free Encyclopedia
-
Wikipedia-the Free Encyclopedia, http://www.wikipedia.org.
-
-
-
-
3
-
-
85055807127
-
-
SANS (SysAdmin, Audit, Network, Security) Institute
-
SANS (SysAdmin, Audit, Network, Security) Institute, http://www.sans.org.
-
-
-
-
4
-
-
85055783048
-
-
Open Source Software
-
Open Source Software, http://sourceforge.net.
-
-
-
-
5
-
-
85055841617
-
-
Tcpdump
-
Tcpdump: http://www.tcpdump.org/.
-
-
-
-
6
-
-
85055852082
-
-
Ethereal
-
Ethereal: http://www.ethereal.com/.
-
-
-
-
7
-
-
85055806276
-
-
Libpcap
-
Libpcap (http://www.tcpdump.org).
-
-
-
-
9
-
-
84948699217
-
On preventing replay attacks on security protocols
-
June
-
Malladi, S., Alves-Foss, J., Heckendorn, R., On preventing replay attacks on security protocols, Proceedings of the International Conference on Security and Management, June 2002, pp. 77-83.
-
(2002)
Proceedings of the International Conference on Security and Management
, pp. 77-83
-
-
Malladi, S.1
Alves-Foss, J.2
Heckendorn, R.3
-
10
-
-
85055778900
-
-
GSM 03.40: Digital cellular telecommunications system (Phase 2+); Technical realization of the Short Message Service (SMS) Point-to-Point (PP)
-
GSM 03.40: Digital cellular telecommunications system (Phase 2+); Technical realization of the Short Message Service (SMS) Point-to-Point (PP).
-
-
-
-
11
-
-
85055775699
-
-
Secure Computer System: Unified Exposition and Multics Interpretation, ESD-TR-75-306, United States Air Force, March
-
Secure Computer System: Unified Exposition and Multics Interpretation, ESD-TR-75-306, United States Air Force, March 1971, csrc.nist.gov/publications/history/bell76.pdf.
-
(1971)
-
-
-
12
-
-
0003902428
-
-
4th Edition, Prentice Hall, Saddle River, New Jersey, USA
-
William Stallings, Cryptography and Network Security, 4th Edition, Prentice Hall, Saddle River, New Jersey, USA, 2005.
-
(2005)
Cryptography and Network Security
-
-
-
14
-
-
0003400251
-
-
MITRE Technical Report 2547, March 1
-
Elliott, B.D., LaPadula, L.J., Secure Computer Systems: Mathematical Foundations, MITRE Technical Report 2547, Vol I, March 1, 1973.
-
(1973)
Secure Computer Systems: Mathematical Foundations
, vol.1
-
-
Elliott, B.D.1
LaPadula, L.J.2
-
15
-
-
0042304883
-
-
Addison-Wisley, Reading, MA, USA
-
Boykin, J., Kirschen, D., Langerman, A., LoVerso, S., Programming under Mach, Addison-Wisley, Reading, MA, USA, 1993.
-
(1993)
Programming under Mach
-
-
Boykin, J.1
Kirschen, D.2
Langerman, A.3
LoVerso, S.4
-
16
-
-
33750376598
-
The nepenthes platform: An efficient approach to collect malware
-
Baecher, P., Koetter, M., Holz, T., Dornseif, M., Freiling, F., The nepenthes platform: An efficient approach to collect malware, Proceedings of the 9th Symposium on Recent Advances in Intrusion Detection (RAID’06), 2006, pp. 165-184.
-
(2006)
Proceedings of the 9th Symposium on Recent Advances in Intrusion Detection (RAID’06)
, pp. 165-184
-
-
Baecher, P.1
Koetter, M.2
Holz, T.3
Dornseif, M.4
Freiling, F.5
-
17
-
-
85055822401
-
-
Database Security in Oracle8i, An Oracle Technical White Paper November
-
Database Security in Oracle8i, An Oracle Technical White Paper November 1999.
-
(1999)
-
-
-
18
-
-
85055797573
-
Chapter 1-2-3 Relational database access controls using SQL
-
Krause, M., Tipton, H.F. (Editor), Boca Raton, FL, USA
-
Sandhu, R.S., Chapter 1-2-3 Relational database access controls using SQL, Handbook of Information Security Management, Krause, M., Tipton, H.F. (Editor), Boca Raton, FL, USA, http://www.cccure. org/Documents/HISM/ewtoc.html.
-
Handbook of Information Security Management
-
-
Sandhu, R.S.1
-
19
-
-
77955159768
-
Mobile Computing-Technology, Applications
-
McGraw-Hill, New York
-
Talukder, A.K., Yavagal, R., Mobile Computing-Technology, Applications, and Service Creation, McGraw-Hill, New York, 2007.
-
(2007)
And Service Creation
-
-
Talukder, A.K.1
Yavagal, R.2
-
20
-
-
85055773675
-
-
Federal Information Processing Standards Publication 197, November 26
-
Specification for the Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197, November 26, 2001.
-
(2001)
-
-
-
21
-
-
85055802623
-
-
Information Security, Recommended Security Controls for Federal Information Systems, December
-
Ross, R., Katzke, S., Johnson, A., Swanson, M., Stoneburner, G., Rogers, G., NIST Special Publication 800-53 Revision 1, Information Security, Recommended Security Controls for Federal Information Systems, December 2006.
-
(2006)
NIST Special Publication 800-53 Revision 1
-
-
Ross, R.1
Katzke, S.2
Johnson, A.3
Swanson, M.4
Stoneburner, G.5
Rogers, G.6
-
22
-
-
85055819208
-
-
SSE-CMM, Systems Security Engineering Capability Maturity Model, Model Description Document, Version 3.0, June 15
-
SSE-CMM, Systems Security Engineering Capability Maturity Model, Model Description Document, Version 3.0, June 15, 2003.
-
(2003)
-
-
-
23
-
-
33747259074
-
-
Microsoft Press, Redmond, Washington, USA
-
Howard, M., Lipner, S. The Security Development Lifecycle, Microsoft Press, Redmond, Washington, USA, 2006.
-
(2006)
The Security Development Lifecycle
-
-
Howard, M.1
Lipner, S.2
-
24
-
-
0038633284
-
Components and the World of Chaos
-
May/June
-
Parsons, R., Components and the World of Chaos, IEEE Software, 83, May/June 2003, http:// martinfowler.com/ieeeSoftware/componentChaos.pdf.
-
(2003)
IEEE Software
, vol.83
-
-
Parsons, R.1
-
27
-
-
0003902726
-
-
Addison-Wesley
-
Jacobson, I., Booch, G., Rumbaugh, J., The Unified Software Development Process, Addison-Wesley, 1992.
-
(1992)
The Unified Software Development Process
-
-
Jacobson, I.1
Booch, G.2
Rumbaugh, J.3
-
28
-
-
0034497420
-
Eliciting security requirements by misuse cases
-
November 20-23 2000
-
Sindre, G., Opdahl, A.L., Eliciting security requirements by misuse cases, Proceedings of the TOOLS Pacific 2000, November 20-23, 120-131, 2000.
-
(2000)
Proceedings of the TOOLS Pacific
, pp. 120-131
-
-
Sindre, G.1
Opdahl, A.L.2
-
29
-
-
13644265503
-
Templates for misuse case description
-
Sydney, Australia
-
Sindre, G., Opdahl, A.L., Templates for misuse case description, Proceedings of the 7th International Workshop on Requirements Engineering, Foundation for Software Quality (REFSQ’2001), Sydney, Australia, 2001.
-
(2001)
Proceedings of the 7th International Workshop on Requirements Engineering, Foundation for Software Quality (REFSQ’2001)
-
-
Sindre, G.1
Opdahl, A.L.2
-
31
-
-
70349266490
-
-
Hernan, S., Lambert, S., Ostwald, T., Shostack, A., Threat Modeling-Uncover Security Design Flaws Using The STRIDE Approach, 2006, http://msdn2.microsoft.com/hi-in/magazine/cc163519(en-us). aspx.
-
(2006)
Threat Modeling-Uncover Security Design Flaws Using The STRIDE Approach
-
-
Hernan, S.1
Lambert, S.2
Ostwald, T.3
Shostack, A.4
-
32
-
-
0038226150
-
-
Technical Note CMU/SEI-2001-TN-001
-
Moore, A.P., Ellison, R.J., Linger, R.C., Attack Modeling for Information Security and Survivability, Technical Note CMU/SEI-2001-TN-001, 2001.
-
(2001)
Attack Modeling for Information Security and Survivability
-
-
Moore, A.P.1
Ellison, R.J.2
Linger, R.C.3
-
33
-
-
85055778611
-
-
Open Web Application Security Project (OWASP)
-
Threat Risk Modeling, Open Web Application Security Project (OWASP), http://www.owasp.org/index.php/Th reat_Risk_Modeling.
-
-
-
-
34
-
-
77955933695
-
-
Attack Surface, Wikipedia, The Free Encyclopedia, http://en.wikipedia.org/.
-
The Free Encyclopedia
-
-
-
35
-
-
0003752204
-
-
Oxford University Press, Oxford, UK
-
Alexander, C., A Pattern Language: Towns, Buildings, Construction. Oxford University Press, Oxford, UK, 1977.
-
(1977)
A Pattern Language: Towns, Buildings, Construction
-
-
Alexander, C.1
-
36
-
-
0003880013
-
-
Addison-Wesley Professional
-
Gamma, E., Helm, R., Johnson, R., Vlissides, J., Design Patterns: Elements of Reusable Object-Oriented Software, Addison-Wesley Professional, 1994.
-
(1994)
Design Patterns: Elements of Reusable Object-Oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
37
-
-
0003885315
-
-
Wiley
-
Brown, W., Malveau, R., Mowbray, T., AntiPatterns: Refactoring Software, Architectures, and Projects in Crisis, Wiley, 1998.
-
(1998)
AntiPatterns: Refactoring Software, Architectures, and Projects in Crisis
-
-
Brown, W.1
Malveau, R.2
Mowbray, T.3
-
38
-
-
33750050331
-
-
Wiley Software Patterns Series, West Sussex, England
-
Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., Sommerlad, P., Security Patterns: Integrating Security and Systems Engineering, Wiley Software Patterns Series, West Sussex, England, 2006.
-
(2006)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez-Buglioni, E.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
39
-
-
38149113771
-
Architectural Patterns for Enabling Application Security
-
Report (wucs-97-34)
-
Yoder, J., Barcalow, J., Architectural Patterns for Enabling Application Security, The 4th Pattern Languages of Programming Conference, Washington University Tech. Report (wucs-97-34), 1997.
-
(1997)
The 4th Pattern Languages of Programming Conference, Washington University Tech
-
-
Yoder, J.1
Barcalow, J.2
-
41
-
-
33646505513
-
Multifactor TLS Protocol for Holistic Security in Mobile Environment Special issue on “Protocols for Resource, Link and Mobility Management for Wireless and Satellite Communication Networks.”
-
March-June
-
Talukder, A. K., Sharma D., Rao V. B., Pal, R., Multifactor TLS Protocol for Holistic Security in Mobile Environment, Special issue on “Protocols for Resource, Link and Mobility Management for Wireless and Satellite Communication Networks.” IETE Journal of Research, 52 (2 &3), 239-246, March-June 2006.
-
(2006)
IETE Journal of Research
, vol.52
, Issue.2-3
, pp. 239-246
-
-
Talukder, A.K.1
Sharma, D.2
Rao, V.B.3
Pal, R.4
-
46
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R.L., Shamir, A., Adleman, L., A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, 21(2), 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
48
-
-
0018545449
-
How to share a secret
-
November
-
Shamir, A., How to share a secret, Communication of the ACM, 22, 612, November 1979.
-
(1979)
Communication of the ACM
, vol.22
, pp. 612
-
-
Shamir, A.1
-
49
-
-
0024141971
-
How to share a secret with cheaters
-
Martin, T., Woll, H., How to share a secret with cheaters, Journal of Cryptography, 133, 1988.
-
(1988)
Journal of Cryptography
, pp. 133
-
-
Martin, T.1
Woll, H.2
-
51
-
-
84992947912
-
Artificial hygiene: Non-proliferation of virus in cellular network
-
December
-
Talukder, A.K., Das, D., Artificial hygiene: Non-proliferation of virus in cellular network, Journal of Systems and Information Technology, 8, 10-22, December 2004.
-
(2004)
Journal of Systems and Information Technology
, vol.8
, pp. 10-22
-
-
Talukder, A.K.1
Das, D.2
-
52
-
-
23844510131
-
Artificial hygiene: A critical step towards safety from email virus
-
Talukder, A.K., Rao, V.B., Kapoor, V., Sharma, D., Artificial hygiene: A critical step towards safety from email virus, Proceedings of the IEEE INDICON 2004, 484-489, 2004.
-
(2004)
Proceedings of the IEEE INDICON 2004
, pp. 484-489
-
-
Talukder, A.K.1
Rao, V.B.2
Kapoor, V.3
Sharma, D.4
-
53
-
-
84975018562
-
Reflections on cardiovascular diseases
-
Strasser, T., Reflections on cardiovascular diseases, Interdisciplinary Science Review, 3, 225-230, 1978.
-
(1978)
Interdisciplinary Science Review
, vol.3
, pp. 225-230
-
-
Strasser, T.1
-
54
-
-
33747280349
-
A process for performing security code reviews
-
Howard, M., A process for performing security code reviews, IEEE Security & Privacy, 4(4), 74-79, 2006.
-
(2006)
IEEE Security & Privacy
, vol.4
, Issue.4
, pp. 74-79
-
-
Howard, M.1
-
55
-
-
85032546038
-
-
Patterns & Practices Developer Center, Microsoft Corporation
-
Meier, J.D., Mackman, A., Wastell, B., Bansode, P., Taylor, J., Araujo, R., How to: Perform a Security Code Review for Managed Code (Baseline Activity), Patterns & Practices Developer Center, Microsoft Corporation, http://msdn2.microsoft.com/en-us/library/ms998364.aspx.
-
How to: Perform a Security Code Review for Managed Code (Baseline Activity)
-
-
Meier, J.D.1
Mackman, A.2
Wastell, B.3
Bansode, P.4
Taylor, J.5
Araujo, R.6
-
56
-
-
0003533991
-
-
2nd Edition, McGraw-Hill, New York
-
Musa, J.D., Software Reliability Engineering, More Reliable Software, Faster and Cheaper, 2nd Edition, McGraw-Hill, New York, 2004.
-
(2004)
Software Reliability Engineering, More Reliable Software, Faster and Cheaper
-
-
Musa, J.D.1
-
58
-
-
52249088775
-
-
Microsoft Press
-
Gallagher, T., Jeffries, B., Landauer, L., Hunting Security Bugs, Microsoft Press, 2006.
-
(2006)
Hunting Security Bugs
-
-
Gallagher, T.1
Jeffries, B.2
Landauer, L.3
-
59
-
-
33750949706
-
-
NIST Special Publication 800-42, October
-
Wack, J., Tracy, M., Souppaya, M., Guideline on Network Security Testing - Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-42, October 2003.
-
(2003)
Guideline on Network Security Testing - Recommendations of the National Institute of Standards and Technology
-
-
Wack, J.1
Tracy, M.2
Souppaya, M.3
-
60
-
-
4444381692
-
An Empirical Study of the Robustness of Windows NT Applications Using Random Testing
-
Seattle
-
Forrester, J.E., Miller B. P., An Empirical Study of the Robustness of Windows NT Applications Using Random Testing, 4th USENIX Windows System Symposium, Seattle, 2000.
-
(2000)
4th USENIX Windows System Symposium
-
-
Forrester, J.E.1
Miller, B.P.2
-
61
-
-
1942425806
-
-
Technical Report COAST TR 98-02, Purdue University, USA
-
Du, W., Mathur, A. P., Vulnerability Testing of Software System Using Fault Injection, Technical Report COAST TR 98-02, Purdue University, USA, 1998, http://www.cerias.purdue.edu/apps/reports_and_papers/view/32/.
-
(1998)
Vulnerability Testing of Software System Using Fault Injection
-
-
Du, W.1
Mathur, A.P.2
-
62
-
-
85055814583
-
-
available at
-
Functional safety and IEC 61508, IEC Functional Safety Zone, available at http://www.iec.ch/functional safety.
-
IEC Functional Safety Zone
-
-
-
64
-
-
64549142966
-
Formal Methods in Safety-Critical Railway Systems
-
Lecomte, T., Servat, T., Pouzancre, G., Formal Methods in Safety-Critical Railway Systems, Proceedings of $BMF 2007, 2007, http://rodin.cs.ncl.ac.uk/Publications/fm_sc_rs_v2.pdf.
-
(2007)
Proceedings of $BMF 2007
-
-
Lecomte, T.1
Servat, T.2
Pouzancre, G.3
-
65
-
-
0003972115
-
-
Prentice Hall Software Series, Upper Saddle River, New Jersey, USA
-
Bach, M.J., The Design of the UNIX Operating System, Prentice Hall Software Series, Upper Saddle River, New Jersey, USA, 1986.
-
(1986)
The Design of the UNIX Operating System
-
-
Bach, M.J.1
-
66
-
-
0042304883
-
-
Addison-Wesley, Reading, MA
-
Boykin, J., Kirschen, D., Langerman, A., LoVerso, S., Programming under Mach, Addison-Wesley, Reading, MA, 1993.
-
(1993)
Programming under Mach
-
-
Boykin, J.1
Kirschen, D.2
Langerman, A.3
LoVerso, S.4
-
67
-
-
85055856840
-
-
POSIX. IEEE Standard 1003.1-1988
-
POSIX. IEEE Standard 1003.1-1988.
-
-
-
-
68
-
-
85055776994
-
-
Wikipedia, The Free Encyclopedia, http://www.wikipedia.org.
-
-
-
-
69
-
-
85055855173
-
-
EROS: The Extremely Reliable Operating System
-
EROS: The Extremely Reliable Operating System, http://www.eros-os.org/.
-
-
-
-
70
-
-
85055797732
-
-
What is a Capability, Anyway?
-
What is a Capability, Anyway?, http://www.eros-os.org/essays/capintro.html.
-
-
-
-
71
-
-
85055790603
-
-
The Veterans Health Information Systems and Technology Architecture (VistA)
-
The Veterans Health Information Systems and Technology Architecture (VistA), http://worldvista. org/.
-
-
-
-
74
-
-
85055828015
-
-
Version 0.5, May
-
Secure UNIX Programming FAQ, Version 0.5, May 1999, http://www.whitefang.com/sup/.
-
(1999)
-
-
-
75
-
-
85084161067
-
SNP: An interface for secure network programming
-
Boston, Massachusetts, USA
-
Woo, T.Y.C., Bindignavle, R., Su, S., Lam, S.S., SNP: An interface for secure network programming, Proceedings of the USENIX Summer 1994 Technical Conference, Boston, Massachusetts, USA, 1994.
-
(1994)
Proceedings of the USENIX Summer 1994 Technical Conference
-
-
Woo, T.Y.C.1
Bindignavle, R.2
Su, S.3
Lam, S.S.4
-
76
-
-
85055792866
-
-
Part 1: Overview of the API, Create Basic Secure and Unsecure Connections
-
Ballard, K., Secure programming with the OpenSSL API, Part 1: Overview of the API, Create Basic Secure and Unsecure Connections, http://www.ibm.com/developerworks/linux/library/l-openssl. html?ca=dgr-lnxw16OpenSSL.
-
Secure programming with the OpenSSL API
-
-
Ballard, K.1
-
77
-
-
85055807777
-
-
OpenSSL Library
-
OpenSSL Library, http://www.openssl.org/docs/ssl/ssl.html.
-
-
-
-
79
-
-
0003405432
-
-
2nd Edition, Prentice Hall, New York
-
Kernighan, B.W., Ritchie, D.M., The C Programming Language, 2nd Edition, Prentice Hall, New York, 1988.
-
(1988)
The C Programming Language
-
-
Kernighan, B.W.1
Ritchie, D.M.2
-
80
-
-
0003741989
-
-
5th Edition, Prentice-Hall of India Private Limited, New Delhi, India
-
Deitel, H.M., P.J. Deitel, C++ How to Program, 5th Edition, Prentice-Hall of India Private Limited, New Delhi, India, 2005.
-
(2005)
C++ How to Program
-
-
Deitel, H.M.1
Deitel, P.J.2
-
82
-
-
4344593013
-
Beyond Stack Smashing: Recent Advances in exploiting buffer overruns
-
July/August
-
Pincus, J., Baker, B., Beyond Stack Smashing: Recent Advances in exploiting buffer overruns, IEEE Security & Privacy, 2(4), 20-27, July/August 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.4
, pp. 20-27
-
-
Pincus, J.1
Baker, B.2
-
83
-
-
21644485343
-
-
Baratloo, A., Tsai, T., Singh, N., Libsafe: Protecting Critical Elements of Stacks, http://www.belllabs. com/org/11356/libsafe.html.
-
Libsafe: Protecting Critical Elements of Stacks
-
-
Baratloo, A.1
Tsai, T.2
Singh, N.3
-
84
-
-
85055815015
-
-
CERT C Programming Language Secure Coding Standard, Document No. N1255, September
-
CERT C Programming Language Secure Coding Standard, Document No. N1255, September 2007.
-
(2007)
-
-
-
86
-
-
85055798344
-
-
Microsoft Developer Network (MSDN)
-
Microsoft Developer Network (MSDN), http://msdn.microsoft.com, msdn2.microsoft.com.
-
-
-
-
87
-
-
85055826341
-
Design and Implementation of Generics for the .NET Common Language Runtime
-
Kennedy, A., Syme, D., Design and Implementation of Generics for the .NET Common Language Runtime, ACM SIGPLAN, 36(5), 342, 2001.
-
(2001)
ACM SIGPLAN
, vol.36
, Issue.5
, pp. 342
-
-
Kennedy, A.1
Syme, D.2
-
89
-
-
85055797568
-
Improving .NET Application Performance and Scalability
-
Meier, J. D., Vasireddy, S., Babbar, A., Mackman, A., Improving .NET Application Performance and Scalability, Microsoft Patterns & Practices, 2004, http://msdn.microsoft.com/en-us/library/ms998530.aspx.
-
(2004)
Microsoft Patterns & Practices
-
-
Meier, J.D.1
Vasireddy, S.2
Babbar, A.3
Mackman, A.4
-
92
-
-
84887866238
-
Improving Web Application Security-threats and countermeasures
-
Meier, J.D., Mackman, A., Vasireddy, S., Dunner, M., Escamilla, R., Murukan, A., Improving Web Application Security-threats and countermeasures, Microsoft Corporation, 2006.
-
(2006)
Microsoft Corporation
-
-
Meier, J.D.1
Mackman, A.2
Vasireddy, S.3
Dunner, M.4
Escamilla, R.5
Murukan, A.6
-
93
-
-
85055775110
-
Building Secure ASP.NET Applications-Authentication, Authorization, and Secure Communication
-
Meier, J.D., Mackman, A., Vasireddy, S., Dunner, M., Building Secure ASP.NET Applications-Authentication, Authorization, and Secure Communication, Microsoft Patterns & Practices, 2002, http://msdn.microsoft.com/en-us/library/aa302415.aspx.
-
(2002)
Microsoft Patterns & Practices
-
-
Meier, J.D.1
Mackman, A.2
Vasireddy, S.3
Dunner, M.4
-
94
-
-
85055816740
-
-
Web Services Security (WS-Security), Version 1.0, April
-
Web Services Security (WS-Security), Version 1.0, April, 2002.
-
(2002)
-
-
-
95
-
-
85055827386
-
-
OASIS Standard 200401, Web Services Security: SOAP Message Security 1.0 (WS-Security 2004), March
-
OASIS Standard 200401, Web Services Security: SOAP Message Security 1.0 (WS-Security 2004), March 2004.
-
(2004)
-
-
-
96
-
-
85055766425
-
-
OASIS Standard 200401, Web Services Security, X.509 Certificate Token Profile, March
-
OASIS Standard 200401, Web Services Security, X.509 Certificate Token Profile, March 2004.
-
(2004)
-
-
-
97
-
-
85055783290
-
-
OASIS Standard 200401, Web Services Security, UsernameToken Profile 1.0, March
-
OASIS Standard 200401, Web Services Security, UsernameToken Profile 1.0, March 2004.
-
(2004)
-
-
-
98
-
-
85055785779
-
Patterns, and Implementation Guidance for Web Services Enhancements (WSE) 3.0
-
Web Service Security Scenarios, Patterns, and Implementation Guidance for Web Services Enhancements (WSE) 3.0, Patterns & Practices, 2005, http://msdn.microsoft.com/en-us/library/aa480545.aspx.
-
(2005)
Patterns & Practices
-
-
-
99
-
-
85055859485
-
-
Web Services Trust Language (WS-Trust), February
-
Web Services Trust Language (WS-Trust), February 2005.
-
(2005)
-
-
-
100
-
-
85055786840
-
-
Web Services Secure Conversation Language (WS-SecureConversation), February
-
Web Services Secure Conversation Language (WS-SecureConversation), February 2005.
-
(2005)
-
-
-
102
-
-
3242760396
-
The COM+ Security Model Gets You out of the Security Programming Business
-
November
-
Eddon, G., The COM+ Security Model Gets You out of the Security Programming Business, Microsoft System Journal, November 1999, http://www.microsoft.com/msj/1199/comsecurity/comsecurity.aspx.
-
(1999)
Microsoft System Journal
-
-
Eddon, G.1
-
103
-
-
85055780253
-
-
SQL Server 2005 Security Best Practices-Operational and Administrative Tasks, March
-
Beauchemin, B., Microsoft SQL Server 2005, SQL Server 2005 Security Best Practices-Operational and Administrative Tasks, March 2007, http://download.microsoft.com/download/8/5/e/85eea4fab3bb-4426-97d0-7f7151b2011c/SQL2005SecBestPract.doc.
-
(2007)
Microsoft SQL Server 2005
-
-
Beauchemin, B.1
-
104
-
-
85055810919
-
-
Implementing Row- and Cell-Level Security in Classified Databases Using SQL Server 2005, September
-
Rask, A., Rubin, D., Neumann, B., Microsoft SQL Server 2005, Implementing Row- and Cell-Level Security in Classified Databases Using SQL Server 2005, September 2005, http://www.microsoft. com/technet/prodtechnol/sql/2005/multisec.mspx.
-
(2005)
Microsoft SQL Server 2005
-
-
Rask, A.1
Rubin, D.2
Neumann, B.3
-
105
-
-
85019888771
-
-
O’Reilly, March
-
Kline, K., Gould, L., Zanevsky, A., Transact-SQL Programming, O’Reilly, March 1999.
-
(1999)
Transact-SQL Programming
-
-
Kline, K.1
Gould, L.2
Zanevsky, A.3
-
107
-
-
34547878428
-
-
NET Programming security
-
Tutorial: NET Programming security, http://etutorials.org.
-
Tutorial
-
-
-
109
-
-
85055767341
-
-
RFC2743: Generic Security Service Application Program Interface Version 2, Update 1, January
-
RFC2743: Generic Security Service Application Program Interface Version 2, Update 1, January 2000.
-
(2000)
-
-
-
110
-
-
0003700417
-
-
Project Athena Technical Plan, MIT Project Athena, Cambridge, MA
-
Miller, S.P., Neuman, B.C., Schiller, J.I., Saltzer, J.H., Section E.2.1: Kerberos Authentication and Authorization System, Project Athena Technical Plan, MIT Project Athena, Cambridge, MA, 1988.
-
(1988)
Section E.2.1: Kerberos Authentication and Authorization System
-
-
Miller, S.P.1
Neuman, B.C.2
Schiller, J.I.3
Saltzer, J.H.4
-
111
-
-
85055827432
-
-
RFC4120: The Kerberos Network Authentication Service (V5), July
-
RFC4120: The Kerberos Network Authentication Service (V5), July 2005.
-
(2005)
-
-
-
112
-
-
85055804514
-
-
RFC4178: The Simple and Protected Generic Security Service Application Program Interface (GSSAPI) Negotiation Mechanism, October
-
RFC4178: The Simple and Protected Generic Security Service Application Program Interface (GSSAPI) Negotiation Mechanism, October 2005.
-
(2005)
-
-
-
113
-
-
85055822747
-
-
RFC4559: SPNEGO-Based Kerberos and NTLM HTTP Authentication in Microsoft Windows, June
-
RFC4559: SPNEGO-Based Kerberos and NTLM HTTP Authentication in Microsoft Windows, June 2006.
-
(2006)
-
-
-
114
-
-
0003428414
-
-
Professional Computing Series, Addison-Wesley, Reading, MA
-
Richard Stevens, W., TCP/IP Illustrated, Vol 1-3, Professional Computing Series, Addison-Wesley, Reading, MA, 1996.
-
(1996)
TCP/IP Illustrated
, vol.1-3
-
-
Richard Stevens, W.1
-
115
-
-
85055854889
-
-
Wikipedia
-
Wikipedia, http://en.wikipedia.org/wiki/Internet.
-
-
-
-
116
-
-
85055782596
-
-
RFC147, The Definition of a Socket
-
RFC147, The Definition of a Socket.
-
-
-
-
117
-
-
85055833641
-
-
RFC3330, Special-Use IPv4 Addresses
-
RFC3330, Special-Use IPv4 Addresses.
-
-
-
-
118
-
-
20844448545
-
-
Willey, New York
-
Camarillo, G., Garcia-Martin, M.A., The 3G IP Multimedia Subsystem (IMS), Willey, New York, 2004.
-
(2004)
The 3G IP Multimedia Subsystem (IMS)
-
-
Camarillo, G.1
Garcia-Martin, M.A.2
-
119
-
-
38049035715
-
-
Wiley, England
-
Poikselka, M., Niemi, A., Khartabil, H., Mayer, G., The IMS: IP Multimedia Concepts and Services, Wiley, England, 2006.
-
(2006)
The IMS: IP Multimedia Concepts and Services
-
-
Poikselka, M.1
Niemi, A.2
Khartabil, H.3
Mayer, G.4
-
120
-
-
85055829607
-
-
RFC 1287, Towards the Future Internet Architecture
-
RFC 1287, Towards the Future Internet Architecture.
-
-
-
-
121
-
-
85055846758
-
-
RFC1752, The Recommendation for the IP Next Generation Protocol
-
RFC1752, The Recommendation for the IP Next Generation Protocol.
-
-
-
-
122
-
-
85055775115
-
-
RFC1886, DNS Extensions to support IP version 6
-
RFC1886, DNS Extensions to support IP version 6.
-
-
-
-
123
-
-
85055795123
-
-
RFC1971, IPv6 Stateless Address Autoconfiguration
-
RFC1971, IPv6 Stateless Address Autoconfiguration.
-
-
-
-
124
-
-
85055776194
-
-
RFC1993, PPP Gandalf FZA Compression Protocol
-
RFC1993, PPP Gandalf FZA Compression Protocol.
-
-
-
-
125
-
-
85055769434
-
-
RFC2292, Advanced Sockets API for IPv6
-
RFC2292, Advanced Sockets API for IPv6.
-
-
-
-
126
-
-
85055856654
-
-
RFC2373, IP Version 6 Addressing Architecture
-
RFC2373, IP Version 6 Addressing Architecture.
-
-
-
-
127
-
-
85055823408
-
-
RFC2460, Internet Protocol, Version 6 (IPv6) Specification
-
RFC2460, Internet Protocol, Version 6 (IPv6) Specification.
-
-
-
-
128
-
-
85055831075
-
-
RFC2473, Generic Packet Tunneling in IPv6 Specification
-
RFC2473, Generic Packet Tunneling in IPv6 Specification.
-
-
-
-
129
-
-
47749105178
-
-
HP Software Global Business Unit, November 3
-
Srinivasan, L., Treadwell, J., An Overview of Service-oriented Architecture, Web Services and Grid Computing, HP Software Global Business Unit, November 3, 2005.
-
(2005)
An Overview of Service-oriented Architecture, Web Services and Grid Computing
-
-
Srinivasan, L.1
Treadwell, J.2
-
130
-
-
85055822817
-
-
WebServices.org
-
WebServices.org, http://www.webservices.org.
-
-
-
-
131
-
-
85055776389
-
-
Carnegie Mellon Software Engineering Institute
-
Component Object Model (COM), DCOM, and Related Capabilities, Carnegie Mellon Software Engineering Institute, http://www.sei.cmu.edu/str/descriptions/com.html.
-
DCOM, and Related Capabilities
-
-
-
132
-
-
77955159768
-
-
McGraw-Hill
-
Talukder, A.K., Yavagal R., Mobile Computing - Technology, Applications, and Service Creation, McGraw-Hill, 2007.
-
(2007)
Mobile Computing - Technology, Applications, and Service Creation
-
-
Talukder, A.K.1
Yavagal, R.2
-
133
-
-
85055794824
-
-
Policy-Based Networks, Sun BluePrints OnLine - October
-
Jean-Christophe, M., Policy-Based Networks, Sun BluePrints OnLine - October 1999, http://www.sun.com/blueprints/1099/policy.pdf.
-
(1999)
-
-
Jean-Christophe, M.1
-
134
-
-
85055840939
-
-
OASIS Web Services Security, Kerberos Token Profile 1.1, OASIS Standard Specification, February 1
-
OASIS Web Services Security, Kerberos Token Profile 1.1, OASIS Standard Specification, February 1, 2006.
-
(2006)
-
-
-
135
-
-
85055804610
-
-
RC1831, Remote Procedure Call Protocol Specification Version 2
-
RC1831, Remote Procedure Call Protocol Specification Version 2.
-
-
-
-
137
-
-
85055834479
-
-
ONC+ Developer’s Guide
-
ONC+ Developer’s Guide, http://docs.sun.com/app/docs/doc/802-1997/6i6091la7?a=view.
-
-
-
-
138
-
-
85055807666
-
-
SUN RPC: A lesson based on UNIX Network Programming by W. Richard Stevens, Prentice Hall, Inc
-
SUN RPC: A lesson based on UNIX Network Programming by W. Richard Stevens, Prentice Hall, Inc., http://www.eng.auburn.edu/cse/classes/cse605/examples/rpc/stevens/SUNrpc.html.
-
-
-
-
140
-
-
85055777761
-
-
formal/02-03-11 v1.8
-
CORBA Security Service Specification, formal/02-03-11 v1.8, 2002.
-
(2002)
-
-
-
141
-
-
85055855802
-
-
Real-time CORBA with TAO (The ACE ORB)
-
Real-time CORBA with TAO (The ACE ORB), http://www.cs.wustl.edu/~schmidt/TAO.html.
-
-
-
-
142
-
-
85055802381
-
-
Microsoft Developer Network (MSDN)
-
Microsoft Developer Network (MSDN), http://msdn2.microsoft.com.
-
-
-
-
143
-
-
85055780108
-
-
Java Security at Sun Microsystems
-
Java Security at Sun Microsystems, http://Java.sun.com/Javase/technologies/security/index.jsp.
-
-
-
-
144
-
-
0003629755
-
-
Sun Microsystems, May
-
Gosling, J., McGilton, H., The Java Language Environment: A White Paper, Sun Microsystems, May 1995, http://www.cab.u-szeged.hu/WWW/java/whitepaper/java-whitepaper-1.html.
-
(1995)
The Java Language Environment: A White Paper
-
-
Gosling, J.1
McGilton, H.2
-
146
-
-
85055785798
-
-
Java Language Specification
-
Java Language Specification, http://Java.sun.com/docs/books/jls/index.html.
-
-
-
-
148
-
-
85055765524
-
Poland, Java and Java Virtual Machine security vulnerabilities and their exploitation technique
-
Singapore, Oct 3rd-4th
-
The Last Stage of Delirium Research Group, Poland, Java and Java Virtual Machine security vulnerabilities and their exploitation technique, Black Hat Briefings, Singapore, Oct 3rd-4th, 2002.
-
(2002)
Black Hat Briefings
-
-
-
149
-
-
85055788654
-
-
Wikipedia
-
Wikipedia, http://en.wikipedia.org/wiki/Java_Cryptography_Architecture.
-
-
-
-
151
-
-
85055827682
-
-
All About Sockets (Sun Tutorial)
-
All About Sockets (Sun Tutorial), http://java.sun.com/docs/books/tutorial/networking/sockets/.
-
-
-
-
152
-
-
85055783796
-
-
IBM, Java Secure Socket Extension
-
IBM, Java Secure Socket Extension, https://www6.software.ibm.com/developerworks/education/j-jsse/section4.html.
-
-
-
-
153
-
-
77955159768
-
-
McGraw-Hill, New York
-
Talukder, A. K., Yavagal, R., Mobile Computing-Technology, Applications, and Service Creation, McGraw-Hill, New York, 2007.
-
(2007)
Mobile Computing-Technology, Applications, and Service Creation
-
-
Talukder, A.K.1
Yavagal, R.2
-
154
-
-
85055844951
-
-
3GPP TS 22.057: Technical Specification Group Services and System Aspects, Mobile Station Application Execution Environment (MExE), Service Description, Stage 1
-
3GPP TS 22.057: Technical Specification Group Services and System Aspects, Mobile Station Application Execution Environment (MExE), Service Description, Stage 1.
-
-
-
-
155
-
-
85055778005
-
-
3GPP TS 23.140: Digital cellular telecommunications system (Phase 2+), Universal Mobile Telecommunications System (UMTS), Multimedia Messaging Service (MMS), Functional Description
-
3GPP TS 23.140: Digital cellular telecommunications system (Phase 2+), Universal Mobile Telecommunications System (UMTS), Multimedia Messaging Service (MMS), Functional Description.
-
-
-
-
156
-
-
85055814267
-
-
3GPP TS 31.101: Universal Mobile Telecommunications System (UMTS), UICC-Terminal Interface, Physical and Logical Characteristics
-
3GPP TS 31.101: Universal Mobile Telecommunications System (UMTS), UICC-Terminal Interface, Physical and Logical Characteristics.
-
-
-
-
157
-
-
85055814920
-
-
ETSI TR 187 002 V1.1.1 (2006-03) Technical Report, Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN); TISPAN NGN Security (NGN_SEC), Th reat and Risk Analysis
-
ETSI TR 187 002 V1.1.1 (2006-03) Technical Report, Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN); TISPAN NGN Security (NGN_SEC), Th reat and Risk Analysis.
-
-
-
-
158
-
-
85055797627
-
-
ETSI ETR 332, Security Techniques Advisory Group (STAG), Security Requirements Capture
-
ETSI ETR 332, Security Techniques Advisory Group (STAG), Security Requirements Capture.
-
-
-
-
159
-
-
85055811216
-
-
ETSI EG 202 387, Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Security Design Guide; Method for application of Common Criteria to ETSI deliverables
-
ETSI EG 202 387, Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Security Design Guide; Method for application of Common Criteria to ETSI deliverables.
-
-
-
-
161
-
-
85055788510
-
-
GSM 03.40: Digital Cellular Telecommunications System (Phase 2), Technical Realization of the Short Message Service (SMS) Point-to-Point (PP)
-
GSM 03.40: Digital Cellular Telecommunications System (Phase 2), Technical Realization of the Short Message Service (SMS) Point-to-Point (PP).
-
-
-
-
162
-
-
85055844804
-
-
GSM 03.48: Digital Cellular Telecommunications System (Phase 2+), Security Mechanisms for SIM Application Toolkit
-
GSM 03.48: Digital Cellular Telecommunications System (Phase 2+), Security Mechanisms for SIM Application Toolkit.
-
-
-
-
163
-
-
85055818755
-
-
3GPP TS 31.102: Universal Mobile Telecommunications System (UMTS), Characteristics of the Universal Subscriber Identity Module (USIM) application
-
3GPP TS 31.102: Universal Mobile Telecommunications System (UMTS), Characteristics of the Universal Subscriber Identity Module (USIM) application.
-
-
-
-
165
-
-
85055834786
-
-
GSM 03.19: Digital cellular telecommunications system (Phase 2+), Subscriber Identity Module Application Programming Interface (SIM API), SIM API for Java Card (TM), Stage 2 (ETSI TS 101 476)
-
GSM 03.19: Digital cellular telecommunications system (Phase 2+), Subscriber Identity Module Application Programming Interface (SIM API), SIM API for Java Card (TM), Stage 2 (ETSI TS 101 476).
-
-
-
-
166
-
-
85055821744
-
-
Technical Report SM-99-03, Gemplus Research Lab, June
-
Girard, P., Lanet, J-L., New Security Issues Raised by Open Cards, Technical Report SM-99-03, Gemplus Research Lab, June 1999.
-
(1999)
New Security Issues Raised by Open Cards
-
-
Girard, P.1
Lanet, J.-L.2
-
167
-
-
85055841717
-
-
Wireless Application Protocol Architecture Specification, WAPForum
-
Wireless Application Protocol Architecture Specification, WAPForum, 1998.
-
(1998)
-
-
-
168
-
-
85055791505
-
-
Wireless Application Protocol Wireless Application Environment Specification Version 1.2, WAPForum
-
Wireless Application Protocol Wireless Application Environment Specification Version 1.2, WAPForum, 1999.
-
(1999)
-
-
-
169
-
-
85055826455
-
-
NIST Special Publication 800-19 - Mobile Agent Security
-
Jansen, W., Karygiannis, T., NIST Special Publication 800-19 - Mobile Agent Security, src.nist. gov/publications/nistpubs/800-19/sp800-19.pdf.
-
-
-
Jansen, W.1
Karygiannis, T.2
-
170
-
-
85055785180
-
-
RFC2001: Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations
-
RFC2001: Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations.
-
-
-
-
172
-
-
85055834067
-
-
Executive Summary: Digital Rights Management Survey, April
-
Executive Summary: Digital Rights Management Survey, April 2007. Available at http://instat.com/panels/pdf/2007/apr07digitalrightsmgmt.pdf.
-
(2007)
-
-
-
173
-
-
85055790045
-
-
Open Mobile Alliance Digital Rights Management, OMA-Download-DRM-V1_0-20040615-A, Version 1.0, June 15
-
Open Mobile Alliance Digital Rights Management, OMA-Download-DRM-V1_0-20040615-A, Version 1.0, June 15, 2004.
-
(2004)
-
-
-
174
-
-
0005097206
-
Digital Rights Management (DRM) Architectures
-
Available at
-
Iannella, R., Digital Rights Management (DRM) Architectures, D-Lib Magazine, 7(6), 2001. Available at http://www.dlib.org/dlib/june01/iannella/06iannella.html.
-
(2001)
D-Lib Magazine
, vol.7
, Issue.6
-
-
Iannella, R.1
-
176
-
-
4544296687
-
The present and future of Digital Rights Management
-
Springer, Berlin
-
Stefan Bechtold, The present and future of Digital Rights Management, Digital Rights Management-Technological, Economic, Legal and Political Aspects, Springer, Berlin, 2003, pp. 597-654. Available at http://www.jura.uni-tuebingen.de/bechtold/pub/2003/Future_DRM.pdf.
-
(2003)
Digital Rights Management-Technological, Economic, Legal and Political Aspects
, pp. 597-654
-
-
-
177
-
-
85055842544
-
-
CERT Advisory Malicious HTML HTML Tags Embedded in Client Web Requests
-
CERT Advisory Malicious HTML HTML Tags Embedded in Client Web Requests http://www.cert. org/advisories/CA-2000-02.html.
-
-
-
-
178
-
-
85055818185
-
-
Brute-Force Exploitation of Web Application Session Ids
-
Endler, D., Brute-Force Exploitation of Web Application Session Ids, http://www.idefense. com/application/poi/researchreports/display.
-
-
-
Endler, D.1
-
179
-
-
85055775043
-
-
The National Electronic Commerce Coordinating Council Identity Management, A White Paper, Presented at the NECCC Annual Conference, December 4-6, New York
-
The National Electronic Commerce Coordinating Council Identity Management, A White Paper, Presented at the NECCC Annual Conference, December 4-6, 2002, New York.
-
(2002)
-
-
-
180
-
-
67549113863
-
-
Version 1.0, May 28
-
Goodner, M., Hondo, M., Nadalin, A., McIntosh, M., Schmidt, D., Understanding WS-Federation, Version 1.0, May 28, 2007.
-
(2007)
Understanding WS-Federation
-
-
Goodner, M.1
Hondo, M.2
Nadalin, A.3
McIntosh, M.4
Schmidt, D.5
-
181
-
-
85055787468
-
-
Microsoft Passport Network Privacy Supplement
-
Microsoft Passport Network Privacy Supplement, http://privacy.microsoft.com/en-us/passport.aspx.
-
-
-
-
182
-
-
85055787370
-
-
Oracle Enterprise Single Sign On
-
Oracle Enterprise Single Sign On, http://www.oracle.com/technology/products/id_mgmt/esso/index. html.
-
-
-
-
183
-
-
85055816222
-
-
SAML OASIS Standards
-
SAML OASIS Standards, http://www.oasis-open.org/committees/security/.
-
-
-
-
184
-
-
85055780613
-
-
Authorization (AZN) API Technical Standard, Open Group Technical Standard Document Number:C908
-
Authorization (AZN) API Technical Standard, Open Group Technical Standard Document Number:C908, 2000.
-
(2000)
-
-
-
185
-
-
85055847135
-
-
RSA Federated Identity Manager
-
RSA Federated Identity Manager, http://www.rsa.com/node.aspx?id=1191.
-
-
-
-
186
-
-
85055826319
-
-
Information Technology-Open Systems Interconnection-The Directory: Overview of Concepts, Models and Services, August
-
ITU-T Recommendation X.500: Series X: Data Networks, Open System Communications and Security, Information Technology-Open Systems Interconnection-The Directory: Overview of Concepts, Models and Services, August 2005.
-
(2005)
Open System Communications and Security
-
-
-
187
-
-
85055826319
-
-
Information Technology-Open Systems Interconnection-The Directory: Overview of Concepts, Models and Services, August
-
ITU-T Recommendation X.500: Series X: Data Networks, Open System Communications and Security, Information Technology-Open Systems Interconnection-The Directory: Overview of Concepts, Models and Services, August 2005.
-
(2005)
Open System Communications and Security
-
-
-
188
-
-
85055826319
-
-
Information Technology-Open Systems Interconnection-The Directory: Protocol Specifications, August
-
ITU-T Recommendation X.519: Series X: Data Networks, Open System Communications and Security, Information Technology-Open Systems Interconnection-The Directory: Protocol Specifications, August 2005.
-
(2005)
Open System Communications and Security
-
-
-
189
-
-
85055826319
-
-
Information Technology-Open Systems Interconnection-The Directory: Public-Key and Attribute Certificate Frameworks, August
-
ITU-T Recommendation X.509, Series X: Data Networks, Open System Communications and Security, Information Technology-Open Systems Interconnection-The Directory: Public-Key and Attribute Certificate Frameworks, August 2005.
-
(2005)
Open System Communications and Security
-
-
-
190
-
-
85055845580
-
-
ITU-T Corrigendum X.509, Series X: Data Networks, Open System Communications and Security, Information Technology-Open Systems Interconnection-The Directory: Public-Key and Attribute Certificate Frameworks, January
-
ITU-T Corrigendum X.509, Series X: Data Networks, Open System Communications and Security, Information Technology-Open Systems Interconnection-The Directory: Public-Key and Attribute Certificate Frameworks, January 2007.
-
(2007)
-
-
-
191
-
-
35048848973
-
Trust and Security Realization for Mobile Users in GSM Cellular Networks
-
Kathmandu October 29-31, LNCS 3285
-
Venkatraman, J., Raghavan, V., Das, D., Talukder, A.K., Trust and Security Realization for Mobile Users in GSM Cellular Networks, Proceedings of Asian Applied Computer Conference, Kathmandu October 29-31, 2004; LNCS 3285 pp-302-309.
-
(2004)
Proceedings of Asian Applied Computer Conference
, pp. 302-309
-
-
Venkatraman, J.1
Raghavan, V.2
Das, D.3
Talukder, A.K.4
-
192
-
-
85020598353
-
Identity Based Cryptosystems and Signature Schemes
-
84, Lecture Notes in Computer Science, Springer-Verlag
-
Shamir, A., Identity Based Cryptosystems and Signature Schemes, Advances in Cryptology-Proceedings of Crypto '84, Lecture Notes in Computer Science, Vol. 196, Springer-Verlag, pp. 47-53, 1984.
-
(1984)
Advances in Cryptology-Proceedings of Crypto
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
193
-
-
0037623983
-
Identity-Based Encryption from the Weil Pairing
-
Boneh, D., Franklin, M., Identity-Based Encryption from the Weil Pairing, SIAM Journal of Computing, Vol. 32, No. 3, pp. 586-615, 2003.
-
(2003)
SIAM Journal of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
196
-
-
85055770156
-
-
SQL Injection Walkthrough
-
SQL Injection Walkthrough, http://www.securiteam.com/securityreviews/5DP0N1P76E.html.
-
-
-
-
197
-
-
85055843092
-
-
Finnigan, Pete, SQL injection and Oracle
-
Finnigan, Pete, SQL injection and Oracle, http://www.securityfocus.com/infocus/1644.
-
-
-
-
198
-
-
85055823986
-
-
Advanced SQL injection
-
Anley, C., Advanced SQL injection, http://www.nextgenss.com/papers/advanced_sql_injection.pdf.
-
-
-
Anley, C.1
-
199
-
-
85055768880
-
-
Secure Programming for Linux and Unix HOWTO
-
Wheeler, D., Secure Programming for Linux and Unix HOWTO, http://www.dwheeler.com/secure-programs/.
-
-
-
Wheeler, D.1
-
200
-
-
85055830466
-
-
Cross Site Scripting (XSS) FAQ
-
Cross Site Scripting (XSS) FAQ, http://www.cgisecurity.com/articles/xss-faq.shtml.
-
-
-
-
201
-
-
85055766716
-
-
What Is Web 2.0, Design Patterns and Business Models for the Next Generation of Software
-
O’Reilly, T., What Is Web 2.0, Design Patterns and Business Models for the Next Generation of Software, http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html.
-
-
-
O’Reilly, T.1
-
202
-
-
85055843400
-
-
Top 100 Network Security Tools
-
Top 100 Network Security Tools, http://sectools.org/.
-
-
-
-
203
-
-
85055849387
-
-
Brutus - A Brut Force Online Password Cracker
-
Brutus - A Brut Force Online Password Cracker, http://www.hoobie.net/brutus/.
-
-
-
-
204
-
-
85055847734
-
-
dig - Internet Search Engine Software
-
dig - Internet Search Engine Software, Available at www.htdig.org.
-
-
-
-
205
-
-
85055791459
-
-
dnsa - DNS Auditing Tool
-
dnsa - DNS Auditing Tool, Available at http://www.packetfactory.net/projects/dnsa/.
-
-
-
-
206
-
-
85055850153
-
-
dsniff- Tool for Network Auditing and Penetration testing
-
dsniff- Tool for Network Auditing and Penetration testing, Available at http://www.monkey. org/~dugsong/dsniff/.
-
-
-
-
207
-
-
85055771645
-
-
dnsspoof - DNS Spoofing Tool
-
dnsspoof - DNS Spoofing Tool, http://downloads.openwrt.org/people/nico/man/man8/dnsspoof.8.html.
-
-
-
-
208
-
-
85055801948
-
-
hunt, TCP hijacking tool
-
hunt, TCP hijacking tool, http://www.securiteam.com/tools/3X5QFQUNFG.html.
-
-
-
-
209
-
-
85055804551
-
-
hunt-TCP hijacking tool
-
hunt-TCP hijacking tool (http://lin.fsid.cvut.cz/~kra/index.html).
-
-
-
-
210
-
-
85055833758
-
-
nmap Free Secure Scanner, -scan the NW
-
nmap Free Secure Scanner, -scan the NW, http://nmap.org/.
-
-
-
-
211
-
-
85055854639
-
-
ntop - Network Traffic Probe
-
ntop - Network Traffic Probe, http://www.ntop.org/ntop.html.
-
-
-
-
212
-
-
85055822173
-
-
nikto Web Server Scanner
-
nikto Web Server Scanner, http://www.cirt.net/code/nikto.shtml.
-
-
-
-
213
-
-
85055781133
-
-
nemesis Packet Injection Utility
-
nemesis Packet Injection Utility, http://www.packetfactory.net/projects/nemesis/.
-
-
-
-
214
-
-
85055788308
-
-
nessus the Network Vulnerability Scanner
-
nessus the Network Vulnerability Scanner, http://www.nessus.org/.
-
-
-
-
215
-
-
85055850606
-
-
Packet Storm
-
Packet Storm, www.packetstormsecurity.org.
-
-
-
-
216
-
-
85055837358
-
-
Tcpdump
-
Tcpdump, http://www.tcpdump.org/.
-
-
-
-
217
-
-
85055822264
-
-
Achilles - Web Application Security Assessment Tool
-
Achilles - Web Application Security Assessment Tool, http://achilles.mavensecurity.com/.
-
-
-
-
218
-
-
85055849559
-
-
OWASP Guide
-
OWASP Guide, http://www.owasp.org/.
-
-
-
-
219
-
-
85055796847
-
-
OWASP Top 10 2007, The Ten Most Critical Web Application security Vulnerabilities, OWASP Foundation
-
OWASP Top 10 2007, The Ten Most Critical Web Application security Vulnerabilities, OWASP Foundation, 2007.
-
(2007)
-
-
-
220
-
-
85055800330
-
-
OASIS Application Vulnerability Description Language v1.0, OASIS Standard, May
-
OASIS Application Vulnerability Description Language v1.0, OASIS Standard, May 2004.
-
(2004)
-
-
-
221
-
-
85055849195
-
-
J2EE Tutorial
-
J2EE Tutorial, java.sun.com.
-
-
-
-
222
-
-
85055784483
-
-
Sun Java Blueprints
-
Sun Java Blueprints, http://java.sun.com/reference/blueprints/index.html.
-
-
-
-
224
-
-
85055775055
-
-
Java Servlet Specification
-
Java Servlet Specification, http://java.sun.com/products/servlet/.
-
-
-
-
225
-
-
85055766967
-
-
RFC2617: HTTP Authentication: BASIC and DIGEST Access Authentication
-
RFC2617: HTTP Authentication: BASIC and DIGEST Access Authentication, http://www.ietf. org/rfc/rfc2617.
-
-
-
-
226
-
-
85055824984
-
-
HTTP Status Code Definitions
-
HTTP Status Code Definitions, http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html.
-
-
-
-
227
-
-
85055807503
-
-
When Escaping Is Not Enough, Version 1.0, last modified on September 1
-
Andonov, A., The Unexpected SQL Injection, When Escaping Is Not Enough, Version 1.0, last modified on September 1, 2007, http://www.webappsec.org/projects/articles/091007.shtml.
-
(2007)
The Unexpected SQL Injection
-
-
Andonov, A.1
-
228
-
-
85055776256
-
-
DOM Based Cross Site Scripting or XSS of the Th ird Kind A Look at an Overlooked Flavor of XSS (aksecurity@hotpop.com) Version 0.2.8, last modified on July 4
-
Klein, A., DOM Based Cross Site Scripting or XSS of the Th ird Kind A Look at an Overlooked Flavor of XSS (aksecurity@hotpop.com) Version 0.2.8, last modified on July 4, 2005, http://www.webappsec. org/projects/articles/071105.shtml.
-
(2005)
-
-
Klein, A.1
-
229
-
-
85055821689
-
-
Bugtraq
-
Bugtraq, http://www.securityfocus.com/archive.
-
-
-
-
230
-
-
85055795810
-
-
Apache Struts
-
Apache Struts, http://struts.apache.org.
-
-
-
-
232
-
-
85055818641
-
-
OWASP: Java Server Faces
-
OWASP: Java Server Faces, http://www.owasp.org/index.php/Java_Server_Faces.
-
-
-
-
233
-
-
85055832817
-
JSF Security Quickie: Problems and Solutions
-
Mills, D., JSF Security Quickie: Problems and Solutions, The Java Web Users Group 2006.
-
(2006)
The Java Web Users Group
-
-
Mills, D.1
-
234
-
-
85055790859
-
-
The Web Application Security Consortium (WASC)
-
The Web Application Security Consortium (WASC), http://www.webappsec.org/.
-
-
-
-
235
-
-
85055853285
-
-
The Web Security Th reat Classification
-
The Web Security Th reat Classification, http://www.webappsec.org/projects/threat/.
-
-
-
-
236
-
-
85055773399
-
-
Java Web Application Security-Best Practice Guide V. 2.0
-
Java Web Application Security-Best Practice Guide V. 2.0, www.secologic.de.
-
-
-
-
237
-
-
85055843644
-
-
http://www.developer.com.
-
-
-
-
239
-
-
85055828322
-
-
Sun EJB Specifications
-
Sun EJB Specifications, http://java.sun.com/products/ejb/docs.html.
-
-
-
-
240
-
-
0012525222
-
-
2nd ed., Wiley, Hoboken, NJ, USA
-
Ed Roman, Mastering Enterprise JavaBeans, 2nd ed., Wiley, Hoboken, NJ, USA.
-
Mastering Enterprise JavaBeans
-
-
Roman, E.1
-
241
-
-
85055835731
-
-
Web Services Security
-
Web Services Security, www.trl.ibm.com/projects/xml/soap/.
-
-
-
-
242
-
-
85055840919
-
-
Wikipedia
-
Wikipedia, http://en.wikipedia.org/wiki/Internet.
-
-
-
-
243
-
-
85055838118
-
-
World Wide Web Consortium
-
World Wide Web Consortium, http://www.w3.org/TR/SOAP/.
-
-
-
-
244
-
-
85055857766
-
-
Security in a Web Services World: A Proposed Architecture and Roadmap, IBM DeveloperWorks
-
Security in a Web Services World: A Proposed Architecture and Roadmap, IBM DeveloperWorks, http://www-106.ibm.com/developerworks/webservices/library/ws-secmap/?loc=dwmain.
-
-
-
-
245
-
-
85055806203
-
-
OWASP-Open Web Application Security Project
-
OWASP-Open Web Application Security Project, http://www.owasp.org.
-
-
-
-
246
-
-
85055777691
-
-
XML Signature, World Wide Web Consortium
-
XML Signature, World Wide Web Consortium, www.w3.org/TR/SOAP-dsig/.
-
-
-
-
247
-
-
85055848223
-
-
Microsoft Developer Network
-
Microsoft Developer Network, http://msdn.microsoft.com/security.
-
-
-
-
248
-
-
85055787222
-
-
Wuhan University Journal of Natural Sciences:A Message-Level Security Model consisting of Multiple Security Tokens: Article ID: 1007-1202 (2007)01-0001-04
-
Liu, Z., Song, X., Tang, W., Chang, X., Zhou, D., Wuhan University Journal of Natural Sciences:A Message-Level Security Model consisting of Multiple Security Tokens: Article ID: 1007-1202 (2007)01-0001-04.
-
-
-
Liu, Z.1
Song, X.2
Tang, W.3
Chang, X.4
Zhou, D.5
-
249
-
-
85055768024
-
-
Web Service & SOA Security Standards, Java Technology Evangelist, Sun Microsystems Inc
-
Shin, S., Web Service & SOA Security Standards, Java Technology Evangelist, Sun Microsystems Inc. http://www.javapassion.com/webservices/webservicessecurity2.pdf.
-
-
-
Shin, S.1
-
250
-
-
85055804517
-
-
OASIS-Organization for the Advancement of Structured Information Standards
-
OASIS-Organization for the Advancement of Structured Information Standards, http://www.oasis-open.org.
-
-
-
-
251
-
-
85055776925
-
-
The Liberty Alliance
-
The Liberty Alliance, http://www.projectliberty.org/.
-
-
-
-
252
-
-
85055781750
-
-
Web Service Standards
-
Web Service Standards, www.ws-standards.com.
-
-
-
-
253
-
-
85055817169
-
-
W3C XML Schema Reference
-
W3C XML Schema Reference, http://www.w3.org/XML/Schema.
-
-
-
-
254
-
-
85055784035
-
-
Java Security for the Enterprise
-
Java Security for the Enterprise, http://www.j2ee-security.net.
-
-
-
-
255
-
-
85055769730
-
-
Apache Axis
-
Apache Axis, http://ws.apache.org.
-
-
-
-
256
-
-
85055796028
-
-
W3C XPath Reference
-
W3C XPath Reference, www.w3.org/TR/xpath.
-
-
-
-
258
-
-
85055857969
-
-
Sun Federated Identity Management
-
Sun Federated Identity Management, http://www.sun.com/software/media/flash/demo_federation/index.html.
-
-
-
-
259
-
-
85055851156
-
-
Open Financial Exchange, Specification 2.1.1, May 1
-
Open Financial Exchange, Specification 2.1.1, May 1, 2006.
-
(2006)
-
-
-
260
-
-
85055788844
-
-
IFX Forum, Interactive Financial Exchange, XML Implementation Specification, Version 1.0.1 April 26
-
IFX Forum, Interactive Financial Exchange, XML Implementation Specification, Version 1.0.1 April 26, 2000.
-
(2000)
-
-
|