최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Journal of information processing systems, v.3 no.2, 2007년, pp.82 - 88
Kim, Kyu-Il (Department of Computer Engineering, SungKyunKwan University) , Lee, Joo-Chang (Department of Computer Engineering, SungKyunKwan University) , Choi, Won-Gil (Department of Computer Engineering, SungKyunKwan University) , Lee, Eun-Ju (Department of Computer Engineering, SungKyunKwan University) , Kim, Ung-Mo (Department of Computer Engineering, SungKyunKwan University)
Web services are the new building block of today's Internet, and provides interoperability among heterogeneous distributed systems. Recently in web services environment, security has become one of the most critical issues. The hackers attack one of fragile point and can misuse legitimate user privil...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
OASIS "eXtensible Access Control Markup Language (XACML)V2.0", OASIS Standard, 1 February 2005
B.Clifford Neuman and Theodore Ts'o, Kerberos, An Authentication Service for Computer Networks, IEEE Communications, September 1994 pp33-38
OASIS "Profile for the OASIS Security Assertion Language (SAML)V2.0" OASIS Standard, 15 March 2005
G.Navarro, B.S.Firozabadi, E.Rissanen and J.Borrell, Constrained delegation in XML-based Access Control and Digital Rights Management Standards, Communication, Network, and Information Security 2003
C.A Ardagan, E.Damiani, S.De Capitani di Vimercati, P.Samarati, XML-based Access Control Language, 2004
R. Yavatkar, D. Pendarakis, and R. Guerin, A Framework for Policy-based Admission Control, IETF Informational Standard, RFC 2753, January 2000
B.Pfitzmann, B.Waidner, Token-based web Single Sign-On with Enabled Clients, IBM Research Report RZ 3458(93844), Nobember 2002
V. Welch, I. Foster, C. Kesselman, O. Mulmo, L. Pearlman, S. Tuecke, J. Gawor, S. Meder and F. Siebenlist, X.509 Proxy Certificates for Dynamic Delegation, 2004
R.Sandhu, E. Coyne, H. Feinstein, and C.Youman, Role-Based Access Control Models, IEEE Computer, February 1996
XML Encryption Syntax and Proceeding http://www.w3.org/TR/2002/REC-xmlenc-core-20021210
XML Signature, http://www.w3.org/TR/xmldsig-core
G. Navarro, J. A. Ortega-Ruiz, J. Ametller, S. Robles, Distributed Authorization Framework form Mobile Agents, LNCS Mobility Aware Technologies and Applications, 2005
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.