{"title":"Deploying Multi-tier Applications Across Multiple Security Domains","authors":"Igor Balabine, Arne Koschel","doi":"10.1007/978-0-387-35696-9_11","DOIUrl":"https://doi.org/10.1007/978-0-387-35696-9_11","url":null,"abstract":"","PeriodicalId":276612,"journal":{"name":"Certification and Security in E-Services","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132332455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security and Certification Issues in Grid Computing","authors":"Ian T Foster, F. Siebenlist, S. Tuecke, Von Welch","doi":"10.1007/978-0-387-35696-9_3","DOIUrl":"https://doi.org/10.1007/978-0-387-35696-9_3","url":null,"abstract":"","PeriodicalId":276612,"journal":{"name":"Certification and Security in E-Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125399440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Schantz, F. Webber, P. Pal, J. Loyall, D. Schmidt
{"title":"Protecting Applications Against Malice Using AdaptiveMiddleware","authors":"R. Schantz, F. Webber, P. Pal, J. Loyall, D. Schmidt","doi":"10.1007/978-0-387-35696-9_5","DOIUrl":"https://doi.org/10.1007/978-0-387-35696-9_5","url":null,"abstract":"","PeriodicalId":276612,"journal":{"name":"Certification and Security in E-Services","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121231740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Through Integration: Towards a Comprehensive Framework for Development and Certification","authors":"B. Marquet, Adriano Rossi, F. Cosquer","doi":"10.1007/978-0-387-35696-9_12","DOIUrl":"https://doi.org/10.1007/978-0-387-35696-9_12","url":null,"abstract":"","PeriodicalId":276612,"journal":{"name":"Certification and Security in E-Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116048981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-Government Services: Certification and Security Overlay","authors":"F. Arcieri, R. Giaccio","doi":"10.1007/978-0-387-35696-9_8","DOIUrl":"https://doi.org/10.1007/978-0-387-35696-9_8","url":null,"abstract":"","PeriodicalId":276612,"journal":{"name":"Certification and Security in E-Services","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116555209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Network Management Viewpoint on Security in e-Services","authors":"R. Boutaba, Brent Ishibashi, B. Shihada","doi":"10.1007/978-0-387-35696-9_2","DOIUrl":"https://doi.org/10.1007/978-0-387-35696-9_2","url":null,"abstract":"","PeriodicalId":276612,"journal":{"name":"Certification and Security in E-Services","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123233024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mastering E-Commerce and Globalization","authors":"Étínne Dubreuil","doi":"10.1007/978-0-387-35696-9_18","DOIUrl":"https://doi.org/10.1007/978-0-387-35696-9_18","url":null,"abstract":"","PeriodicalId":276612,"journal":{"name":"Certification and Security in E-Services","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121703628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}