IEEE International Conference on Web Services (ICWS'05) 2005
DOI: 10.1109/icws.2005.138
|View full text |Cite
|
Sign up to set email alerts
|

WSEmail: secure Internet messaging based on Web services

Abstract: Internet messaging (email) faces a variety of challenges not envisioned in its original design. Efforts have been made to compensate for limitations in security, flexibility, and integration within the existing standards and software base, but many aspects of these objectives can be obtained more easily from a fresh design. A fresh design will be easier to deploy if it is based on an emerging suite of high-level standards. In this work we explore the idea of redesigning email as a family of web services, an ap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2006
2006
2018
2018

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(17 citation statements)
references
References 13 publications
0
17
0
Order By: Relevance
“…We adapt the following notation from previous work by the authors in Lug, et al [22]. We assume knowledge of public key certificates.…”
Section: Report and Alarm Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…We adapt the following notation from previous work by the authors in Lug, et al [22]. We assume knowledge of public key certificates.…”
Section: Report and Alarm Protocolsmentioning
confidence: 99%
“…The approach taken to formal methods in this work builds on our work on WSEmail [22], for which we formalized a single protocol and proved a correspondence theorem. Here we have undertaken the formalization and verification of two arguably more complex protocols and proven more complicated theorems.…”
Section: Related Workmentioning
confidence: 99%
“…It is effective for standards XML files such as WSDL files, but the authors did not consider how to handle some headers security functions such as OASIS UsernameToken authentication (Bhargavan et al, 2004;Bhargavan and Gordon, 2017;Bhargavan et al, 2007;Lux et al, 2005).…”
Section: Tulafalementioning
confidence: 99%
“…• Send a service request from a requestor to the registry • Send information from the registry to the requestor; • Allow the requestor to bind to the service provider and run the web service (Mainka et al, 2012;Al-Jaroodi and Al-Dhaheri, 2011;Bhargavan et al, 2007) It is important to mention that SOAP is essential for all web services and communication between banking eservices (Hariharan and Babu, 2014;Lux et al, 2005;Keen et al, 2017).…”
Section: Simple Object Access Protocol (Soap) [D]mentioning
confidence: 99%
“…This approach has been followed in modeling many protocols (e.g., [3,4,9,13,18,19,37,39]). Techniques from the programming-language literature, such as typing, have been employed for proofs, sometimes with substantial extensions or variations; specialpurpose techniques have also been developed and exploited, as in the tool ProVerif on which we rely below (e.g., [2,10,23,24,28,33,36]).…”
Section: The Wmf Protocol In the Pi Calculusmentioning
confidence: 99%