Lesson 174: Web services security specifications

被引:0
|
作者
Conry-Murray, Andrew
机构
来源
Network Magazine | 2003年 / 18卷 / 01期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Advanced web services security specifications
    Gailey, Jeannine Hall
    Computer Security Journal, 2004, 20 (04): : 1 - 7
  • [2] Survey on the Web Services Security Specifications
    Zhang, Xiaofen
    Hou, Yi
    Ma, Jialin
    ENGINEERING SOLUTIONS FOR MANUFACTURING PROCESSES, PTS 1-3, 2013, 655-657 : 1809 - +
  • [3] Constructing Security Protocol Specifications for Web Services
    Bela, Genge
    Piroska, Haller
    Ratoi, Ovidiu
    INTELLIGENT DISTRIBUTED COMPUTING, SYSTEMS AND APPLICATIONS, 2008, 162 : 245 - 250
  • [4] A Combined Grid Security Approach Based on Web Services Security Specifications
    Zhang, Zhongping
    Wang, Kunbo
    Luan, Jianfeng
    2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 414 - 418
  • [5] Web services interoperability specifications
    Nezhad, HRM
    Benatallah, B
    Casati, F
    Toumani, F
    COMPUTER, 2006, 39 (05) : 24 - +
  • [6] Deriving Specifications for Composite Web Services
    Baryannis, George
    Carro, Manuel
    Plexousakis, Dimitris
    2012 IEEE 36TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2012, : 432 - 437
  • [7] Overview of Secured Web Services Specifications
    Mukherjee, Sudeep
    Beg, Rizwan
    Srivastava, Amit
    Khan, Riyazuddin
    2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICT 2013), 2013, : 4 - 9
  • [8] Security of Web services
    Krawczyk, H.
    Wielgus, M.
    DEPCOS-RELCOMEX 2006, 2006, : 183 - +
  • [9] Specifications for Web Services testing: A Systematic Review
    Nabil, El Ioini
    2015 IEEE World Congress on Services, 2015, : 152 - 159
  • [10] An analysis of reliable delivery specifications for web services
    Pallickara, S
    Fox, G
    Pallickara, SL
    ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 1, 2005, : 360 - 365