| 期刊論文1. | Kouchaksaraei, H. R.、Chefranov, A. G.(2013)。Countering wrapping attack on XML signature in SOAP message for cloud computing。International Journal of Computer Science and Information Security,11(9)。 | 2. | Mell, P.、Grance, T.(2011)。The NIST definition of cloud computing。National Institute of Standards and Technology,53(6)。 | 會議論文1. | Gajek, S.、Jensen, M.、Liao, L.、Schwenk, J.(2009)。Analysis of signature wrapping attacks and countermeasures575-582。 | 2. | Gupta, A. N.、Santhi, T. P.(2016)。Detection of XML signature wrapping attack using node counting。Springer。 | 3. | Jensen, M.、Meyer, C.、Somorovsky, J.、Schwenk, J.(2011)。On the effectiveness of XML schema validation for countering xml signature wrapping attacks。2011 1st International Workshop on Securing Services on the Cloud (IWSSC),(會議日期: July 9)。IEEE。 | 4. | Kumar, J.、Rajendran, B.、Bindhumadhava, B. S.、Babu, N. S. C.(2017)。XML wrapping attack mitigation using positional token。2017 International Conference on Public Key Infrastructure and its Applications,(會議日期: November 14-15)。IEEE。36-42。 | 5. | McIntosh, M.、Austel, P.(2005)。XML signature element wrapping attacks and countermeasures。2005 Workshop on Secure Web Services,(會議日期: November, 20-27)。 | 6. | Saudi, M. M.、Zaizi, N. J. M.、Sweese, K. J. A.、Bakar, A. A.(2019)。Spatial Signature method (SSM) against XML signature wrapping attacks。MATEC Web of Conferences 2019,(會議日期: January 16)。 | 7. | Somorovsky, J.、Heiderich, M.、Jensen, M.、Schwenk, J.、Gruschka, N.、Lo Iacono, L.(2011)。All your clouds are belong to us: Security analysis of cloud management interfaces。3rd ACM Workshop on Cloud Computing Security Workshop,(會議日期: October 21),3-14。 | 學位論文1. | 李根來、趙逢禹(2011)。基於策略斷言的SOAP消息簽名包裝攻擊檢測(碩士論文)。上海理工大學。 延伸查詢 | |