A Multi-party Implementation of WS-SecureConversation

[1]  Rosario Gennaro,et al.  How to Sign Digital Streams , 1997, Inf. Comput..

[2]  Alan T. Sherman,et al.  Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..

[3]  Shrideep Pallickara,et al.  Performance of Web Services Security , 2004 .

[4]  Geoffrey C. Fox,et al.  Implementing a Prototype of the Security Framework for Distributed Brokering Systems , 2003, Security and Management.

[5]  Jean Jacques Moreau,et al.  SOAP Version 1. 2 Part 1: Messaging Framework , 2003 .

[6]  Renato J. O. Figueiredo,et al.  Fine-grain access control for securing shared resources in computational grids , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.

[7]  Matthew J. Moyer,et al.  A survey of security issues in multicast communications , 1999, IEEE Network.

[8]  Ian T. Foster,et al.  The anatomy of the grid: enabling scalable virtual organizations , 2001, Proceedings First IEEE/ACM International Symposium on Cluster Computing and the Grid.

[9]  Ian T. Foster,et al.  A security architecture for computational grids , 1998, CCS '98.

[10]  Francine Berman,et al.  Overview of the Book: Grid Computing – Making the Global Infrastructure a Reality , 2003 .

[11]  Andrew S. Tanenbaum,et al.  Distributed systems: Principles and Paradigms , 2001 .

[12]  Ben Y. Zhao,et al.  OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.

[13]  Steve Anderson,et al.  Web Services Secure Conversation Language (WS-SecureConversation) , 2005 .

[14]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[15]  Giovanni Della-Libera,et al.  Web Services Trust Language (WS-Trust) , 2002 .

[16]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[17]  D. Box,et al.  Simple Object Access Protocol (SOAP) 1.1, W3C Note , 2000 .

[18]  Simon S. Lam,et al.  Digital signatures for flows and multicasts , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).

[19]  Philippe Golle,et al.  Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.

[20]  Marty Humphrey,et al.  Security Implications of Typical Grid Computing Usage Scenarios , 2004, Cluster Computing.

[21]  Phillip Hallam-Baker,et al.  Web services security: soap message security , 2003 .

[22]  Wei-Chi Ku,et al.  An Improved Key Management Scheme for Large Dynamic Groups Using One-Way Function Trees , 2003, ICPP Workshops.

[23]  R. V. van Nieuwpoort,et al.  The Grid 2: Blueprint for a New Computing Infrastructure , 2003 .

[24]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[25]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..