Author:
Elgedawy Islam,Khurshid Sara,Masood Rahat,Shibli Muhammad Awais
Publisher
Springer Science and Business Media LLC
Reference31 articles.
1. SecurITree - attack tree-based modeling software. Amenaza Technologies Limited [Online]. http://www.amenaza.com/ . Accessed 5 Sep 2014
2. The STRIDE Threat Model, Microsoft [Online]. http://msdn.microsoft.com/en-us/library/ee823878(v=cs.20).aspx . Accessed: 20 Sep 2014
3. Amir, Y., Coan, B., Kirsch, J., Lane, J.: Customizable fault tolerance for wide-area replication. In: Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (2007)
4. Bertino, E., Martino, L., Paci, F., Squicciarini, A.: Web services threats, vulnerabilities, and countermeasures. In: Security for Web Services and Service-Oriented Architectures, pp. 25–44. Springer, Berlin (2010)
5. Bhatti, R., Bertino, E., Ghafoor, A.: A trust-based context-aware access control model for web-services. Distrib. Parallel Databases. 18(1), 83–105 (2005)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Analysis of Trust aware Web Services using Federated Learning;2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS);2023-02-09
2. Distributed PEP–PDP Architecture for Cloud Databases;Wireless Personal Communications;2022-09-11