1 |
Sti-Security Technologies Inc, 'J/LOCK - Java Cryptography Package', March , 2000
|
2 |
E. Bertino, M, Braun , S. Castano, E. Ferrari, M. Mesiti, 'Aurhor - X: a Java - Bas ed System f or XML Data Protection ', Proceeding of th e 14th IFIP WG 11.3 Working Conference on Database Security , Schoorl. Netherlands , August . 2000
|
3 |
Michiharu Kudo, Satoshi Hada, 'XML Document Security based on Provisional Authorization', Conference on Computer and Communication Society , Athens . Greece, Nov ember . 2000
|
4 |
Jonathan Knudsen , 'Java Cryptography ', O'REILLY, 1998
|
5 |
H. Maruyama, K.Tamura, N. Uramoto, 'XML and Java, Developing Web Applications ', Addison Wesley , May , 1999
|
6 |
E. Damiani, S Vimercati, S. Paraboschi, P. Samarati, 'Design and Implementation of an Access Control Process or for XML Documents ', Proceedings of 9th International World Wide Web Conference, Amsterdam, May , 2000
|
7 |
William J .Pardi, 'XML in Action, Web Technology ', Microsoft Press , 1999
|
8 |
Takeshi Imamura, Hiroshi Maruyama, 'Specification of Element - wis e XML Encryption', W3C XML-Encryption Workshop, November , 2000
|