[1]
|
Ngo, L. and Apon, A. (2007) Using Shibboleth for Authorization and Authentication to the Subversion Version Control Repository System. IEEE Computer Society.
|
[2]
|
Ghauri, P., Gronhaug, K. and Kristianslund, I. (1995) Research Methods in Business Studies: A Practical Guide. Hemel Hempstead, Prentice Hall.
|
[3]
|
Scavo, T. and Cantor, S. (2005) Shibboleth Architecture Technical Overview: Working Draft 02.
|
[4]
|
UK Federation Information Centre, Documents, How It Works Browse. http://www.ukfederation.org.uk/content/Documents/HowItWorks
|
[5]
|
Rixon, G. (2005) Reviews of Shibboleth.
|
[6]
|
Cary, A. A Discussion of Current Methods and a Vision for Digital Libraries. http://www.webjunction.org/documents/webjunction/ Authentication_and_Authorization.html
|
[7]
|
O’Neil, M. (2003) Web Service Security. McGraw-Hill, Osborne.
|
[8]
|
Pollock, N. and Cornford, J. (2000) Theory and Practice of the Virtual University: Report on UK Universities Use of New Technologies. ARIADNE, No. 24. http://www.ariadne.ac.uk/issue24/virtual-universities/
|
[9]
|
CVE-2011-1411. http://www.cvedetails.com/cve/CVE-2011-1411/
|
[10]
|
Bidgoli, M. (2009) Handbook of Information Security. John Wiley & Sons Inc.
|
[11]
|
TechRepublic (2003) Administor’s Guide to Active Directory. 2nd Edition, TechRepublic, KY.
|
[12]
|
Aldini, A., Barteh, G. and Gorrieri, R. (2009) Foundation of Security Analysis and Design V. Springer, Germany.
|
[13]
|
Shibboleth Installation. https://wiki.shibboleth.net/confluence/display/SHIB2/Installation
|
[14]
|
UK Access Management Federation. http://www.ukfederation.org.uk/content/Documents/Setup2SP
|
[15]
|
LDAP Authentication/Smartcard. http://www.mediawiki.org/wiki/Extension:LDAP_Authentication/Smartcard_ Configuration_Examples
|