Mashups: The new breed of Web app, IBM developerWorks, 2006. ,
Market Overview of Enterprise Mashup Tools. Service- Oriented Computing -ICSOC, pp.708-721, 2008. ,
SMash, Proceeding of the 17th international conference on World Wide Web , WWW '08, pp.535-544, 2008. ,
DOI : 10.1145/1367497.1367570
Subspace, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.611-620, 2007. ,
DOI : 10.1145/1242572.1242655
OMash, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.99-108, 2008. ,
DOI : 10.1145/1455770.1455784
OMOS: A Framework for Secure Communication in Mashup Applications, 2008 Annual Computer Security Applications Conference (ACSAC), pp.355-364, 2008. ,
DOI : 10.1109/ACSAC.2008.25
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, 2009. ,
E-business, innovation and SMEs: the significance of hosted services and firm aggregations, International Journal of Entrepreneurship and Innovation Management, vol.7, issue.1, pp.92-112, 2007. ,
DOI : 10.1504/IJEIM.2007.012175
Privacy-enhancing identity management, Information Security Technical Report, vol.9, issue.1, pp.35-44, 2004. ,
DOI : 10.1016/S1363-4127(04)00014-7
MashMaker, Proceedings of the 2007 ACM SIGMOD international conference on Management of data , SIGMOD '07, pp.1116-1118, 2007. ,
DOI : 10.1145/1247480.1247626
Web-key: Mashing with permission. W2SP 2008: Web 2.0 Security and Privacy, IEEE Computer Society, 2008. ,
Please Permit Me: Stateless Delegated Authorization in Mashups, 2008 Annual Computer Security Applications Conference (ACSAC), pp.173-182, 2008. ,
DOI : 10.1109/ACSAC.2008.24
The domino effect of password reuse, Communications of the ACM, vol.47, issue.4, pp.75-78, 2004. ,
DOI : 10.1145/975817.975820
Why Johnny can't encrypt: a usability evaluation of PGP 5.0, Proceedings of the 8th conference on USENIX Security Symposium - 14 USENIX Association, 1999. ,
Privacy-aware identity management for client-side mashup applications, Proceedings of the 5th ACM workshop on Digital identity management, DIM '09, pp.21-30, 2009. ,
DOI : 10.1145/1655028.1655036
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
DOI : 10.1145/359340.359342
Identity-Based Cryptosystems and Signature Schemes Advances in Cryptology, pp.47-53, 1985. ,
WebIBC: Identity Based Cryptography for Client Side Security in Web Applications, 2008 The 28th International Conference on Distributed Computing Systems, pp.689-696, 2008. ,
DOI : 10.1109/ICDCS.2008.24
Security issues in distributed software, ACM SIGSOFT Software Engineering Notes, vol.22, issue.6, pp.52-59, 1997. ,
DOI : 10.1145/267896.267902
A convenient method for securely managing passwords, Proceedings of the 14th international conference on World Wide Web , WWW '05, pp.471-479, 2005. ,
DOI : 10.1145/1060745.1060815
PKCS #5: Password-Based Cryptography Specification Version 2, 2000. ,
DOI : 10.17487/rfc2898
System and method for generating unique passwords ,
Implementing Strong Authentication Interoperability with Legacy Systems. Policies and Research in Identity Management, pp.149-160, 2008. ,
DOI : 10.1007/978-0-387-77996-6_12
The Seven Flaws of Identity Management: Usability and Security Challenges, IEEE Security & Privacy Magazine, vol.6, issue.2, pp.24-29, 2008. ,
DOI : 10.1109/MSP.2008.49
Single Sign-On Architectures, Proceedings of Infrastructure Security , International Conference, pp.40-58, 2002. ,
DOI : 10.1007/3-540-45831-X_4
End-to-end Web Application Security, 11th Workshop on Hot Topics in Operating Systems. USENIX Association, 2007. ,