A Multi-party Implementation of WS-SecureConversation
暂无分享,去创建一个
[1] Rosario Gennaro,et al. How to Sign Digital Streams , 1997, Inf. Comput..
[2] Alan T. Sherman,et al. Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..
[3] Shrideep Pallickara,et al. Performance of Web Services Security , 2004 .
[4] Geoffrey C. Fox,et al. Implementing a Prototype of the Security Framework for Distributed Brokering Systems , 2003, Security and Management.
[5] Jean Jacques Moreau,et al. SOAP Version 1. 2 Part 1: Messaging Framework , 2003 .
[6] Renato J. O. Figueiredo,et al. Fine-grain access control for securing shared resources in computational grids , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.
[7] Matthew J. Moyer,et al. A survey of security issues in multicast communications , 1999, IEEE Network.
[8] Ian T. Foster,et al. The anatomy of the grid: enabling scalable virtual organizations , 2001, Proceedings First IEEE/ACM International Symposium on Cluster Computing and the Grid.
[9] Ian T. Foster,et al. A security architecture for computational grids , 1998, CCS '98.
[10] Francine Berman,et al. Overview of the Book: Grid Computing – Making the Global Infrastructure a Reality , 2003 .
[11] Andrew S. Tanenbaum,et al. Distributed systems: Principles and Paradigms , 2001 .
[12] Ben Y. Zhao,et al. OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.
[13] Steve Anderson,et al. Web Services Secure Conversation Language (WS-SecureConversation) , 2005 .
[14] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[15] Giovanni Della-Libera,et al. Web Services Trust Language (WS-Trust) , 2002 .
[16] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[17] D. Box,et al. Simple Object Access Protocol (SOAP) 1.1, W3C Note , 2000 .
[18] Simon S. Lam,et al. Digital signatures for flows and multicasts , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).
[19] Philippe Golle,et al. Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.
[20] Marty Humphrey,et al. Security Implications of Typical Grid Computing Usage Scenarios , 2004, Cluster Computing.
[21] Phillip Hallam-Baker,et al. Web services security: soap message security , 2003 .
[22] Wei-Chi Ku,et al. An Improved Key Management Scheme for Large Dynamic Groups Using One-Way Function Trees , 2003, ICPP Workshops.
[23] R. V. van Nieuwpoort,et al. The Grid 2: Blueprint for a New Computing Infrastructure , 2003 .
[24] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[25] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..