|
[1] David F. Ferraiolo , Ravi Sandhu , Serban Gavrila , D. Richard Kuhn , Ramaswamy Chandramouli, “Proposed NIST standard for role-based access control”, ACM Transactions on Information and System Security, Vol.4, No.3, August 2001, pp. 224-274. [2] Web Services Activity, http://www.w3.org/2002/ws/. [3] R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, T. Berners-Lee, “Hypertext Transfer Protocol -- HTTP/1.1.”, June 1999. http://www.w3.org/Protocols/rfc2616/rfc2616.txt. [4] Extensible Markup Language, http://www.w3.org/XML/. [5] Simple Object Access Protocol, http://www.w3.org/TR/soap/. [6] Web Services Description Language, http://www.w3.org/TR/wsdl. [7] Universal Description, Discovery and Integration, http://www.uddi.org/. [8] A. Walvekar, M. Kelkar, M. Smith, R. Gamble, “Determining Conflicts in Interdomain Mappings for Access Control”, Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis, Seattle, August 15 - 16, 2006. [9] Siqing Du, James B. D. Joshi, “Supporting Authorization Query and Inter-domain Role Mapping in Presence of Hybrid Role Hierarchy”, SACMAT`06, June 7-9, 2006, Lake Tahoe, California, USA, pp. 228-236. [10] Basit Shafiq, James B. D. Joshi, Elisa Bertino, Arif Ghafoor, “Secure Interoperation in a Multidomain Environment Employing RBAC Policies”, IEEE Transactions on Knowledge and Data Engineering Vol.17, No.11, November 2005, pp. 1557-1577. [11] Java SE, http://java.sun.com/javase/. [12] Java Server Page, http://java.sun.com/products/jsp/. [13] Apache Axis2/Java, http://ws.apache.org/axis2/. [14] MySQL AB, http://www.mysql.com/. [15] Object Management Group, “Agent Technology Green Paper”, Agent Working Group OMG Document, Aug 2001. [16] Danny B. Lange and Mitsuru Oshima, “Seven Good Reasons for Mobile Agents”, Communications of the ACM, Vol.42, No.3, March 1999, pp. 88-89.
|