References
[Anne2] Anne Anderson. "IEEE Policy 2004 Workshop 8 June 2004—Comparing WSPL and WS-Policy." IEEE Policy 2004.
http://www.policy-workshop.org/2004/slides/Anderson-WSPL_vs_WS-Policy_v2.pdf
[Anne3] Anne Anderson. "An Introduction to the Web Services Policy Language (WSPL)." Sun Microsystems Laboratories, 2004.
http://research.sun.com/projects/xacml/Policy2004.pdf
[BSP] Web Services Interoperability Organization. Basic Security Profile Version 1.0. Working Group Draft. May 15, 2005.
http://www.ws-i.org/Profiles/BasicSecurityProfile-1.0.html
[CoR1] Mark Grand. "Pattern Summaries: Chain of Responsibility."
and
http://www.developer.com/java/other/article.php/631261
[CoR2] data & object factory. "Chain of Responsibility."
http://www.dofactory.com/Patterns/PatternChain.aspx
[CSI] Computer Security Institute. CSI/FBI Computer Crime and Security Survey. Computer Security Institute 2005.
[CSP] Chris Steel, Ramesh Nagappan, Ray Lai. Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management. Boston: Prentice Hall, 2006.
[J2EE14] Bill Shannon. "JavaTM 2 Platform Enterprise Edition Specification, v1.4." Proposed Final Draft 3. Sun Microsystems, April 2003.
http://java.sun.com/j2ee/j2ee-1_4-pfd3-spec.pdf
[J2EE14Tutor] Eric Armstrong, et al. "The J2EE 1.4 Tutorial." Sun Microsystems, 2003.
http://java.sun.com/j2ee/1.4/docs/tutorial/doc/
[JavaVMFlaw] Security Focus. "Security Vulnerability in Sun’s Java Virtual Machine Implementation." Security Focus. October 23, 2003.
http://www.securityfocus.com/archive/1/342147
[LibertyWSFed] Liberty Alliance. "Liberty Alliance & WS-Federation: A Comparative Overview." Liberty Alliance Project White Paper. October 14, 2003.
http://www.projectliberty.org/resources/whitepapers/wsfed-liberty-overview-10-13-03.pdf
[LiGong] Li Gong. "Java Security Architecture." in "Java 2 SDK, Standard Edition Documentation Version 1.4.2." Sun Microsystems, 2003.
http://java.sun.com/j2se/1.4.2/docs/guide/security/spec/securityspec.doc1.html
and
http://java.sun.com/j2se/1.4.2/docs/guide/security/spec/securityspec.doc2.html.
[SGuest] Simon Guest. "WS-Security Interoperability Using WSE 2.0 and Sun JWSDP 1.5." Microsoft, May 2005.
http://msdn.microsoft.com/library/default.asp?url=/library/enus/dnbda/html/wssinteropjwsdp15.asp
[Watkins] Dr. Demien Watkins. "An Overview of Security in the .NET Framework." MSDN Library, January 2002.
http://msdn.microsoft.com/library/default.asp?url=/library/enus/dnnetsec/html/netframesecover.asp
[WindowsAuthFlaw] Microsoft. "MS02-011: An Authentication Flaw Could Allow Unauthorized Users to be Authenticated on the SMTP Service." Article 310669. Revision 7. Microsoft Support, April 13, 2004.
http://support.microsoft.com/default.aspx?scid=kb;EN-US;Q310669
[WSI-countermeasure] Jerry Schwarz, et al., ed. "Security Challenges, Threats and Countermeasures Version 1.0" Final Material. Web Services Interoperability Organization, May 7, 2005.
http://www.ws-i.org/Profiles/BasicSecurity/SecurityChallenges-1.0.pdf
[XACML2] OASIS. eXtensible Access Control Markup Language (XACML) Version 2.0. February 1, 2005.