Five Criteria for Web-Services Security Architecture
暂无分享,去创建一个
[1] Phillip Hallam-Baker,et al. Web Services Security: SAML Token Profile 1.1 , 2005 .
[2] D. C. Cooper,et al. Theory of Recursive Functions and Effective Computability , 1969, The Mathematical Gazette.
[3] Mark Ryan,et al. Synthesising verified access control systems in XACML , 2004, FMSE '04.
[4] Anna van Raaphorst. OASIS (Organization for the Advancement of Structured Information Standards) , 2006 .
[5] Mike P. Papazoglou,et al. Web Services - Principles and Technology , 2007 .
[6] S. C. Kleene,et al. Introduction to Metamathematics , 1952 .
[7] Mark Ryan,et al. Synthesising verified access control systems through model checking , 2008, J. Comput. Secur..
[8] B. Lampson,et al. Authentication in distributed systems: theory and practice , 1991, TOCS.
[9] Paolo Traverso,et al. Service-Oriented Computing: State of the Art and Research Challenges , 2007, Computer.
[10] Mark Ryan,et al. Evaluating Access Control Policies Through Model Checking , 2005, ISC.
[11] Jr. Hartley Rogers. Theory of Recursive Functions and Effective Computability , 1969 .
[12] Peter Aczel etc. HANDBOOK OF MATHEMATICAL LOGIC , 1999 .
[13] Hans Hermes,et al. Introduction to mathematical logic , 1973, Universitext.