References


[Anne2] Anne Anderson. "IEEE Policy 2004 Workshop 8 June 2004Comparing WSPL and WS-Policy." IEEE Policy 2004. http://www.policy-workshop.org/2004/slides/Anderson-WSPL_vs_WS-Policy_v2.pdf

[Anne3] Anne Anderson. "An Introduction to the Web Services Policy Language (WSPL)." Sun Microsystems Laboratories, 2004. http://research.sun.com/projects/xacml/Policy2004.pdf

[BSP] Web Services Interoperability Organization. Basic Security Profile Version 1.0. Working Group Draft. May 15, 2005. www.ws-i.org/Profiles/BasicSecurityProfile-1.0.html

[CoR1] Mark Grand. "Pattern Summaries: Chain of Responsibility." www.developer.com and www.developer.com/java/other/article.php/631261

[CoR2] data & object factory. "Chain of Responsibility." www.dofactory.com/Patterns/PatternChain.aspx

[CSI] Computer Security Institute. CSI/FBI Computer Crime and Security Survey. Computer Security Institute 2005.

[CSP] Chris Steel , Ramesh Nagappan , Ray Lai. Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management. Boston: Prentice Hall, 2006.

[J2EE14] Bill Shannon. "Java™ 2 Platform Enterprise Edition Specification, v1.4." Proposed Final Draft 3. Sun Microsystems, April 2003. http://java.sun.com/j2ee/j2ee-1_4-pfd3-spec.pdf

[J2EE14Tutor] Eric Armstrong, et al. "The J2EE 1.4 Tutorial." Sun Microsystems, 2003. http://java.sun.com/j2ee/1.4/docs/tutorial/doc/

[JavaVMFlaw] Security Focus. "Security Vulnerability in Sun's Java Virtual Machine Implementation." Security Focus. October 23, 2003. www.securityfocus.com/archive/1/342147

[LibertyWSFed] Liberty Alliance. "Liberty Alliance & WS-Federation: A Comparative Overview." Liberty Alliance Project White Paper. October 14, 2003. www.projectliberty.org/resources/whitepapers/wsfed-liberty-overview-10-13-03.pdf

[LiGong] Li Gong. "Java Security Architecture." in "Java 2 SDK, Standard Edition Documentation Version 1.4.2." Sun Microsystems, 2003. http://java.sun.com/j2se/1.4.2/docs/guide/security/spec/securityspec.doc1.html and http://java.sun.com/j2se/1.4.2/docs/guide/security/spec/securityspec.doc2.html.

[SGuest] Simon Guest. "WS-Security Interoperability Using WSE 2.0 and Sun JWSDP 1.5." Microsoft, May 2005. http://msdn.microsoft.com/library/default.asp?url=/library/enus/dnbda/html/wssinteropjwsdp15.asp

[Watkins] Dr. Demien Watkins. "An Overview of Security in the .NET Framework." MSDN Library, January 2002. http://msdn.microsoft.com/library/default.asp?url=/library/enus/dnnetsec/html/netframesecover.asp

[WindowsAuthFlaw] Microsoft. "MS02-011: An Authentication Flaw Could Allow Unauthorized Users to be Authenticated on the SMTP Service." Article 310669. Revision 7. Microsoft Support, April 13, 2004. http://support.microsoft.com/default.aspx?scid=kb;EN-US;Q310669

[WSI-countermeasure] Jerry Schwarz, et al., ed. "Security Challenges, Threats and Countermeasures Version 1.0" Final Material. Web Services Interoperability Organization, May 7, 2005. http://www.ws-i.org/Profiles/BasicSecurity/SecurityChallenges-1.0.pdf

[XACML2] OASIS. eXtensible Access Control Markup Language (XACML) Version 2.0. February 1, 2005. http://docs.oasis-open.org/xacml/2.0/XACML-2.0-OS-ALL.zip




Java EE and. Net Interoperability(c) Integration Strategies, Patterns, and Best Practices
Java EE and .NET Interoperability: Integration Strategies, Patterns, and Best Practices
ISBN: 0131472232
EAN: 2147483647
Year: N/A
Pages: 170

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net