Trust and Security in Service‐Oriented Environments
暂无分享,去创建一个
[1] J. L. Hurel,et al. Mobile network evolution: From 3G onwards , 2003 .
[2] Zhu Hua,et al. A realizable intelligent agent model applied in dynamic e-business , 2003, Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications.
[3] Yokoi Shigeki,et al. Application of P2P (peer-to-peer) technology to marketing , 2003, Proceedings. 2003 International Conference on Cyberworlds.
[4] Gustavo Alonso,et al. Web Services: Concepts, Architectures and Applications , 2009 .
[5] Andrew B. Whinston,et al. P2P Networking: An Information-Sharing Alternative , 2001, Computer.
[6] Jan Camenisch,et al. Cryptographic security for mobile code , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[7] Vesna Hassler,et al. Security Fundamentals for E-Commerce , 2000 .
[8] Dennis Gannon,et al. Grid Web Services and Application Factories , 2003 .
[9] Takahiro Kawamura,et al. Web service gateway - a step forward to e-business , 2004 .
[10] Ian T. Foster,et al. On Death, Taxes, and the Convergence of Peer-to-Peer and Grid Computing , 2003, IPTPS.
[11] Chai-Keong Toh,et al. Ad Hoc Mobile Wireless Networks , 2002 .
[12] Regina Dunlea,et al. Simple Object Access Protocol (SOAP) , 2005 .
[13] Paulo F. Pires,et al. Monitoring e-business Web services usage through a log based architecture , 2004 .
[14] Robert Richards,et al. Universal Description, Discovery, and Integration (UDDI) , 2006 .
[15] Francine Berman,et al. Grid Computing: Making the Global Infrastructure a Reality , 2003 .
[16] J. Roy,et al. Understanding Web services , 2001 .
[17] Krishnamurthy Srinivasan,et al. E-Business Process Modeling: The Next Big Step , 2002, Computer.