Trust and Security in Service‐Oriented Environments

[1]  J. L. Hurel,et al.  Mobile network evolution: From 3G onwards , 2003 .

[2]  Zhu Hua,et al.  A realizable intelligent agent model applied in dynamic e-business , 2003, Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications.

[3]  Yokoi Shigeki,et al.  Application of P2P (peer-to-peer) technology to marketing , 2003, Proceedings. 2003 International Conference on Cyberworlds.

[4]  Gustavo Alonso,et al.  Web Services: Concepts, Architectures and Applications , 2009 .

[5]  Andrew B. Whinston,et al.  P2P Networking: An Information-Sharing Alternative , 2001, Computer.

[6]  Jan Camenisch,et al.  Cryptographic security for mobile code , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[7]  Vesna Hassler,et al.  Security Fundamentals for E-Commerce , 2000 .

[8]  Dennis Gannon,et al.  Grid Web Services and Application Factories , 2003 .

[9]  Takahiro Kawamura,et al.  Web service gateway - a step forward to e-business , 2004 .

[10]  Ian T. Foster,et al.  On Death, Taxes, and the Convergence of Peer-to-Peer and Grid Computing , 2003, IPTPS.

[11]  Chai-Keong Toh,et al.  Ad Hoc Mobile Wireless Networks , 2002 .

[12]  Regina Dunlea,et al.  Simple Object Access Protocol (SOAP) , 2005 .

[13]  Paulo F. Pires,et al.  Monitoring e-business Web services usage through a log based architecture , 2004 .

[14]  Robert Richards,et al.  Universal Description, Discovery, and Integration (UDDI) , 2006 .

[15]  Francine Berman,et al.  Grid Computing: Making the Global Infrastructure a Reality , 2003 .

[16]  J. Roy,et al.  Understanding Web services , 2001 .

[17]  Krishnamurthy Srinivasan,et al.  E-Business Process Modeling: The Next Big Step , 2002, Computer.