1 |
OSGi, 'OSGi Service Platform - Release 3,' http://www.osgi.org, 2003.3
|
2 |
OSGi, 'RFC 36 - Secure Provisioning Data Transport using HTTP',http://www.osgi.org/, 2002
|
3 |
C. Neuman and T. Ts'o, 'Kerberos: An Authentication Service for Computer Network,' IEEE, Computer Magazine, 32(9), pp.33-38, 1994.9
DOI
ScienceOn
|
4 |
Sun Microsystems, 'The Java Tutorial - Signing JAR Files,' http://java.sun.com/docs/books/tutorial/jar/sign/signing.html, 2002
|
5 |
R. Merkle, 'Secrecy, Authentication, and Public Key Systems. Ph.D. Thesis,' Stanford University, 1979.6
|
6 |
J. Clark and J. Jacob, 'A Survey of Authentication Protocol Literature: Version 1.0,' University of York, Department of Computer Science, 1997.11
|
7 |
H. Krawczyk et al., 'IETF RFC 2104 - HMAC Keyed-Hashing for Message Authentication,' http://www.apps.ietf.org/rfc/rfc2104.html, 1997.2
|
8 |
W. Diffie and M. Hellman, 'New Directions in Cryptography,' Proc. of the AFIPS National Computer Conference, 1976.6
DOI
|
9 |
L. Kassab et al., 'Towards Formalizing the Java Security Architecture of JDK 1.2,' Proc. of the ERORICS'98, Leuven-la-Neuve, Belgium, 1998.9
|
10 |
R. Needham and M. Schroeder, 'Using Encryption for Authentication in Large Networks of Computers', Communications of the ACM, 1978.12
DOI
ScienceOn
|
11 |
S. Jajodia et al., 'A Logical Language for Expressing Authorization,' Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, 1997.5
DOI
|
12 |
M. Hauswirth et al., 'A Secure Execution Framework for Java', Proc. of the 7th ACM conference on computer and communications security (CCS 2000), pp. 43-52, Athens, Greece, 2000.11
DOI
|
13 |
P. Nikander et al., 'Distributed Policy Management for JDK 1.2,' Proc. of the 1999 Network and Distributed Systems Security Symposium, pp. 91-102, San Diego, CA, 1999.2
|
14 |
Security Technologies Inc., 'Java Cryptography Library - J/LOCK', http://www.stitec.com/product/ejlock.html
|
15 |
G. Karjoth et al., 'A Security Model for Aglets,' IEEE Internet Computing, 1(4), 1997.7
DOI
ScienceOn
|
16 |
C. Lai and L. Gong, 'User Authentication and Authorization in the Java Platform,' Proc. of the Computer Security Applications Conference, 1999.12
|
17 |
D. Harkins and D. Carrel, 'RFC 2409-The Internet Key Exchange (IKE),' 1998.11.http://www.faqs.org/rfcs/rfc2409.html
|
18 |
Sun Microsystems, 'Java Embedded Server 2.0,' http://wwws.sun.com/software/embeddedserver/index.html
|
19 |
Ericsson, 'Ericsson's E-box System - An Electronic Services Enabler', http://www.ericsson.com/about/publications/review/1999_01/files/1999015.pdf
|
20 |
M. Pistoia, et al., 'Java 2 Network Security,' Second edition, Prentice Hall, 1999
|
21 |
B. Galbraith, et al., 'Professional Web Services Security,' Wrox Press, 2002
|
22 |
R. Sandhu, et al., 'Role-Based Access Control Model,' IEEE Computer, 29(2), pp.38-47, 1996.2
DOI
ScienceOn
|