Author:
Modak Subrata,Majumder Koushik,De Debashis
Reference12 articles.
1. Gruschka, N., Lo Iacono, L.: Vulnerable cloud: SOAP message security validation revisited. In: 2009 IEEE International Conference on Web Services, Los Angeles (2009)
2. Gruschka, N., Jensen, M., Lo Iacono, L., Luttenberger, N.: Server-side streaming processing of ws-security. IEEE T. Serv. Comput. 4, 272–285 (2011)
3. Gajek, S., Jensen, M., Liao, L., Schwenk, J.: Analysis of signature wrapping attacks and countermeasures. In: ICWS 2009. IEEE International Conference on Web Services, Bochum (2009)
4. McIntosh, M., Austel, P.: XML Signature Element Wrapping Attacks and Countermeasures. IBM Research Report, NewYork (2005)
5. Rahaman, M.A., Schaad, A., Rits, M.: Towards secure SOAP message exchange in a SOA. In: 3rd ACM workshop on Secure web services, New York (2006)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献