Trusted Information Processes in B2B Networks
暂无分享,去创建一个
[1] Sara Jones,et al. Trust requirements in e-business , 2000, CACM.
[2] Jeff Hodges,et al. Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V2. 0 , 2001 .
[3] Gail-Joon Ahn,et al. Ensuring information assurance in federated identity management , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[4] Fabio Casati,et al. Process Automation as the Foundation for E-Business , 2000, VLDB.
[5] F. Caeldries. Reengineering the Corporation: A Manifesto for Business Revolution , 1994 .
[6] P. Pavlou,et al. Technology trust in B2B electronic commerce: conceptual foundations , 2003 .
[7] Sanjiva Weerawarana,et al. Unraveling the Web services web: an introduction to SOAP, WSDL, and UDDI , 2002, IEEE Internet Computing.
[8] Robert G. Fichman,et al. Information-rich commerce at a crossroads: business and technology adoption requirements , 2003, CACM.
[9] Munindar P. Singh,et al. Service-Oriented Computing: Key Concepts and Principles , 2005, IEEE Internet Comput..
[10] Liam Peyton,et al. An audit trail service to enhance privacy compliance in federated identity management , 2007, CASCON.
[11] Pauline Ratnasingam. The importance of technology trust in Web services security , 2002, Inf. Manag. Comput. Secur..