18.11.2014 Views

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Referências<br />

Apache Foundation (2011), Apache Axis2, Acessível em:<br />

http://axis.apache.org/axis2/java/core/, referenciado em 22 <strong>de</strong> Setembro <strong>de</strong><br />

2011.<br />

Badger, L., Grance, T., Patt-Corner, R. e Voas, J. (2011), Cloud Computing Synopsis<br />

and Recommendations, disponível em: http://csrc.nist.gov/publications/drafts/800-<br />

146/Draft-NIST-SP800-146.pdf, Referenciado em 22 <strong>de</strong> Setembro <strong>de</strong> 2011.<br />

Citrix Systems (2011), Inc. Xen Hypervisor. Disponível em:<br />

http://xen.org/products/xenhyp.html, referenciado em 22 <strong>de</strong> Setembro <strong>de</strong> 2011.<br />

Debian Project (2011), Debian GNU/Linux. Disponível em: http://www.<strong>de</strong>bian.org,<br />

referenciado em 22 <strong>de</strong> Setembro <strong>de</strong> 2011.<br />

Eucalyptus Systems, Inc. (2011), Eucalyptus Cloud Platform. Disponível em:<br />

http://www.eucalyptus.com/, referenciado em 22 <strong>de</strong> Setembro <strong>de</strong> 2011.<br />

Massachusetts Institute of Technology (2011), Kerberos: The Network Authentication<br />

Protocol, Disponível em: http://web.mit.edu/Kerberos/, referenciado em 22 <strong>de</strong><br />

Setembro <strong>de</strong> 2011.<br />

Morgan, R. L., Cantor, S., Carmody, S., Hoehn, W. e Klingenstein (2004), K. Fe<strong>de</strong>rated<br />

Security: The Shibboleth Approach, EDUCAUSE Quarterly, vol. 27, no. 4 pp 12-17.<br />

Needham, R. M. e Schroe<strong>de</strong>r, M. D. (1978), Using encryption for authentication in<br />

large networks of computers, Commun. of the ACM. vol. 21, no. 12, pp 993-999.<br />

[Needham]<br />

Neuman, B.C. e Ts'o, T. (1994), Kerberos: An Authentication Service for Computer<br />

Networks, IEEE Communications, vol. 32 no. 9, pp 33-38.<br />

OpenID Foundation (2007), OpenID Authentication 2.0 Disponível em:<br />

http://openid.net/specs/openid-authentication-2_0.html, referenciado em 22 <strong>de</strong><br />

Setembro <strong>de</strong> 2011.<br />

Oracle Corporation (2010), OpenSSO Architecture Overview, documentação.<br />

http://wikis.sun.com/display/OpenSSO/OpenSSO+Architecture+Overview.<br />

Referenciado em 22 <strong>de</strong> Setembro 2011.<br />

Organization for the Advancement of Structured Information Standards (OASIS)<br />

(2011), Security Assertion Markup Language, v. 2.0. http://docs.oasisopen.org/security/saml/v2.0/saml-core-2.0-os.pdf,<br />

2005. Referenciado em 22 <strong>de</strong><br />

Setembro <strong>de</strong> 2011.<br />

Park, J. e Sandhu, R. (2004), The UCON ABC Usage Control Mo<strong>de</strong>l. ACM Trans. Inf.<br />

Syst. Secur., vol. 7 no. 1, pp 128-174.<br />

Steiner, J.G., Neuman, B.C., e Schiller, J.I. (1988), Kerberos: An Authentication<br />

Service for Open Network Systems. In Proceedings of the Winter 1988 Usenix<br />

Conference.<br />

The World Wi<strong>de</strong> Web Consortium (W3C) (2011), SOAP Version 1.2 Part 1 Messaging<br />

Framework (Second Edition). Disponível em http://www.w3.org/TR/soap12-part1,<br />

referenciado em 22 <strong>de</strong> Setembro <strong>de</strong> 2011.<br />

396

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!