1 |
Kyu Il Kim; Hae Kyung Lee; Ung Mo Kim, "Secure Delegation Model based on SAML in Ubiquitous Environments", Information Security and Assurance, 2008.
ISA 2008. International Conference on, Vol.24126, pp.117-121, 2008.
DOI
|
2 |
Gross, T., "Security analysis of the SAML single sign-on browser/artifact profile", Computer Security Applications Conference, Vol.2003, pp.298-307, 2003.
|
3 |
남상온,Rolyn C Daguil,'Ajax를 기반으로 한 인증 및 세션 관리', 인터넷정보학회논문지 제7권 제6호, pp.157-174, 2006. 12.
과학기술학회마을
|
4 |
Lawton, G., "New Ways to Build Rich Internet Applications", Computer, Vol.41, Issue 8, pp10-12, 2008.
DOI
ScienceOn
|
5 |
Scott Cantor, "Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0", OASIS, 2005.
|
6 |
박차라, 임태수, "RIA 기반 개인화 검색을 위한 Widget 응용의 구현", 한국정보과학회 컴퓨팅의 실제 및 레터 제13권 제6호, 2007.
과학기술학회마을
|
7 |
J. Musser, T, O'Relly, O'Relly Radar Team, Web 2.0 Report, O'Relly Media, 2006.
|
8 |
Direct Web Remoting, http://directwebremoting.org
|
9 |
Opensaml, http://www.opensaml.org
|
10 |
Perez, S.; Diaz, O.; Melia, S.; Gomez, J., "Facing Interaction-Rich RIAs: The Orchestration Model", Web Engineering, 2008. ICWE "08. Eighth, Vol.14-18, pp.24-37, 2008.
DOI
|
11 |
Heidenbluth, Norbert; Schweiggert, Franz, "Status Sensitive Components: Adapting Rich Internet Applications to Their Runtime Context", Digital Society, Vol.1-7, pp133-138, 2009.
DOI
|
12 |
IBM, "How Rich Internet Applications (RIAs) can help business", http://www-01.ibm.com/software/info/web20/mashups-rias/ria.html
|
13 |
adobe, "Programming with LiveCycle ES", http://livedocs. adobe.com/livecycle/8.2/programLC/programmer/help/wwhelp/wwhimpl/common/html/wwhelp.htm
|
14 |
Paul Madsen, NTT, SAML V2.0 Executive Overview Committee Draft 01,OASIS, 2005.
|
15 |
Rod Widdowson, "Identity Provider Discovery Service Protocol and Profile", OASIS, 2008.
|
16 |
Nate Klingenstein, "SAML V2.0 Holder-of-Key Web Browser SSO Profile", OASIS, 2008.
|
17 |
Adobe LiveCycle ES, " ES Services", 2008
|