Architectural styles and the design of network-based software architectures " Doctoral dissertation, 2000. ,
SOAP: Simple Object Access Protocol " , in Internet Draft draft-box-http-soap-01, 1999. ,
Promoting Access to Public Research Data for Scientific, Economic, and Social Development, Data Science Journal, vol.3, issue.29, pp.135-152, 2004. ,
DOI : 10.1126/science.1095958
URL : http://doi.org/10.2481/dsj.3.135
Open data, democracy and public sector reform. A look at open government data use from data.gov, 2010. ,
The Open Knowledge Foundation: Open Data Means Better Science, PLoS Biology, vol.3, issue.12, p.1001195, 2011. ,
DOI : 10.1371/journal.pbio.1001195.g001
URL : http://doi.org/10.1371/journal.pbio.1001195
Linked open drug data for pharmaceutical research and development, Journal of Cheminformatics, vol.3, issue.1, pp.19-29, 2011. ,
DOI : 10.1186/1758-2946-2-7
URL : http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3121711
The potential of metadata for linked open data and its value for users and publishers. JeDEM-e-Journal of e-Democracy and Open Government, 2012. ,
Benefits, Adoption Barriers and Myths of Open Data and Open Government, Information Systems Management, vol.28, issue.3, pp.258-268, 2012. ,
DOI : 10.1080/10580530.2012.716740
A promising phenomenon of open data: A case study of the Chicago open data project, Government Information Quarterly, vol.30, issue.4, pp.508-513, 2013. ,
DOI : 10.1016/j.giq.2013.05.012
Open data policies, their implementation and impact: A framework for comparison, Government Information Quarterly, vol.31, issue.1, pp.17-29, 2014. ,
DOI : 10.1016/j.giq.2013.04.003
Open data, Proceedings of the 15th International Conference on Computer Systems and Technologies, CompSysTech '14, pp.3038-3084, 1997. ,
DOI : 10.1145/2659532.2659594
Open business intelligence, Proceedings of the 2012 Joint EDBT/ICDT Workshops on, EDBT-ICDT '12, 2012. ,
DOI : 10.1145/2320765.2320812
Enabling the development of safer mashups for open data, Proceedings of the 1st International Workshop on Inclusive Web Programming, Programming on the Web with Open Data for Societal Applications, IWP 2014, 2014. ,
DOI : 10.1145/2593761.2593764
RESTful open workflows for data provenance and reuse, Proceedings of the 23rd International Conference on World Wide Web, WWW '14 Companion, 2014. ,
DOI : 10.1145/2567948.2577347
http://www.socrata.com/industries/open-data-state-local- government ,
Why REST security doesn't exist? " . http://www.computerworld.com/s/article Web Services Security: SOAP Message Security 1, 2006. ,
RESTful Security In Web 2.0 Security & Privacy, conjunction with 2009 IEEE Symposium on Security and Privacy, 2009. ,
An extended UsernameToken-based approach for REST-style Web Service Security Authentication, 2nd IEEE International Conference on, pp.582-590, 2009. ,
Enabling Message Security for RESTful Services, 2012 IEEE 19th International Conference on Web Services, pp.24-29, 2012. ,
DOI : 10.1109/ICWS.2012.94
Defense against REST-based web service attacks for enterprise systems, Communications of the IIMA, pp.57-68, 2013. ,
Design of a security mechanism for RESTful Web Service communication through mobile clients, 2014 IEEE Network Operations and Management Symposium (NOMS), pp.5-9, 2014. ,
DOI : 10.1109/NOMS.2014.6838308
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976. ,
DOI : 10.1109/TIT.1976.1055638
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.37.9720
Towards a practical public-key cryptosystem, PhD diss., Massachusetts Institute of Technology, 1978. ,
Conventional public key infrastructure: An artefact ill-fitted to the needs of the information society, Proceedings of the 9th European Conference on Information Systems, 2001. ,
Can we eliminate certificate revocation lists?, Financial Cryptography, pp.178-183, 1998. ,
DOI : 10.1007/BFb0055482
A Response to ???Can We Eliminate Certificate Revocation Lists????, In Financial Cryptography, pp.245-258, 2001. ,
DOI : 10.1007/3-540-45472-1_17
Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing, Proceedings of the USENIX 2008 Annual Technical Conference, 2008. ,
SSL and the Future of Authenticity, 2011. ,