Security management mechanism for composite applications based on hash chains
暂无分享,去创建一个
[1] Claude Godart,et al. Reliable Web services composition using a transactional approach , 2005, 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service.
[2] Yibo Zhang,et al. Charging Validation for Third Party Value-Added Applications in Service Delivery Platform , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.
[3] Corrado Moiso,et al. Security Analysis of Parlay/OSA Framework , 2004 .
[4] Yang Fang-chun,et al. A Study on the Security Features of the Parlay API Based Application Behavior , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.
[5] L. Klostermann,et al. Opening the networks with Parlay/OSA: standards and aspects behind the APIs , 2003, IEEE Netw..