[1] A Business Guide to Enterprise Mashups [EB/OL].
[2] 王怀民,唐扬斌,尹刚,等.互联网软件的可信机理 [J].中国科学E 辑:信息科学,2006,36(10):1 156-1 169.
[3] GOMADAM K,SHETH A P.SA- REST and (S) Mashups:Adding Semantics to RESTful Services [C]//Proceedings of the International Conference on Semantic Computing.Washington,DC:IEEE Computer Society,2007:469-476.
[4] TATEMURA J,SAWIRES A,PO O,et al.Mashup Feeds:Continuous Queries over Web Services [C]//Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data,New York:ACM,2007:1 128-1 130.
[5] ABITEBOUL S,GREENSHPAN O,MILO T.Modeling the Mashup Space [C]//Proceeding of the 10th ACM Workshop on Web Information and Data Management.New York:ACM,2008:87-94.
[6] RIABOV A V,BOILLET E,FEBLOWITZ M D,et al.Wishful Search:Interactive Composition of Data Mashups [C]// Proceeding of the 17th International Conference on World Wide Web.New York:ACM,2008:775-784.
[7] LU J G,YU Y,ROY D,et al.Web Service Composition:A Reality Check [C]// Proceeding of Web Information Systems Engineering(WISE2007),2007:523-532.
[8] BULTAN T,FU X,HULLET R,et al.Conversation Specification:A New Approach to Design and Analysis of E-Service Composition [C]//Proc. of the 12th International World Wide Web Conference.Budapest,Hungary,2003.
[9] 曹健,张申生,李明禄.基于目标驱动和过程重用的Web服务客户化定制模型 [J].计算机学报,2005,28(4):721-730.
[10] 李曼,王大治,杜小勇,等.基于领域本体的Web 服务动态组合 [J].计算机学报,2005,28(4):644-650.
[11] 马建威,舒振,郭得科,等.QoS可信的服务组合技术研究 [J].计算机应用研究,2010,27(5):1 840-1 844.
[12] THATTE S.XLANG:Web Services for Business Process Design [EB/OL].http://www.xml.com/pub/r/1153,2001-06-09.
[13] LEYMANN F.WSFL:Web Service Flow Language 1.0 [EB/OL].http://www3.ibm.com/software/solutions/Webservices/pdf /WSFL.pdf.2002-03-01.
[14] ANDREWS T,CURBERA F.Business Process Execution Language for Web Services Version1.1 [EB/OL].http://www-106.ibm.com/developerworks/webservices/library/ws-bpel/,2003-05-01.
[15] CHARFI A,MEZINI M.AO4BPEL:An Aspect-Oriented Exten-Sion to BPEL [J].World Wide Web,2007,10(3):309-344.
[16] BERARDI D,CALVANESE D,GIACOMO G,et al.Automatic Composition of Transition-Based Semantic Web Services with Messaging [C]//Proceedings of the 31st International Conference on Very Large Data Bases.VLDB Endowment,2005:613-624.
[17] CARDOSO J.Benchmarking a Semantic Web Service Archi-Tecture for Fault-Tolerant B2B Integration [C]//International Workshop on Dynamic Distributed Systems (IWDDS).Lisboa,Portugal:IEEE Computer Society,2006.
[18] 刘济波,朱培栋,胡春华,等.基于两层声誉演化模型的服务组合选取策略 [J].中南大学学报:自然科学版,2009,40(3):756-762.
[19] 郭慧鹏,怀进鹏,邓婷,等.一种可信的自适应服务组合机制 [J].计算机学报,2008,31(8):1 434-1 444.
[20] 蒋哲远,韩江洪,王钊.动态的QoS感知Web服务选择和组合优化模型 [J].计算机学报,2009,32(5):1 014-1 025.
[21] MARSH S P.Formalizing Trust as a Computational Concept [D].University of Stirling,1994.
[22] Trusted Computing Group.Enterprise Security:Putting the TPM to Work [M].Trusted Computing Group White Paper,2008.
[23] 刘克,单志广,王戟,等.“可信软件基础研究” 重大研究计划综述 [J].中国科学基金,2008(3):145-151.
[24] JACKSON D.A Direct Path to Dependable Software [J].Communications of ACM,2009,52:78-88.
[25] YU T,ZHANG Y,LIN K J.Efficient Algorithms for Web Services Selection with End-to-End QoS Constraints [J].ACM Trans. Web,2007,1(1):26.
[26] MOSER L E,MELLIAR-SMITH P M,ZHAO W.Building Dependable and Secure Web Services [J].Journal of Software,2007,2(1):14-26.
[27] SINGH M P.Trustworthy Service Composition:Challenges and Research Questions [C]//Proc. of AAMAS,2002,2002:39-52.
[28] DIMITRAKOS T.A Service-Oriented Trust Management Framework [C]//Proc. of AAMAS,2002,2002:53-72.
[29] LEE Y,OH J,HAN S.Enriching Quality and Fault-Tolerance of Web Services System [J].International Journal of Web Services Practices,2005,1(2):153-157.
[30] FROUNCHI K,CHANDRASEKARAN P.A QoS-Aware Web Service Replica Selection Framework for an Extranet [C]//Proc. of IEEE CCECE/CCGEI.Ottawa,2006.
[31] JUSZCZYK L,LZOWSKI J,DUSTDAR S.Web Service Discovery,Replication,and Synchronization in Ad-Hoc Networks [C]//IEEE Workshop on Dependability in Large-Scale service-Oriented Systems.Vienna,2006.
[32] DUSTDAR S,JUSZCZYK L.Dynamic Replication and Synchronization of Web Services for High Availability in Mobile Ad-Hoc Networks [C]//Service Oriented Computing and Architectures.Springer,2007.
[33] TANG J,ZHOU B,HE Z.Policy Driven and Multi-Agent Based Fault Tolerance for Web Services [J].Journal of Zhejiang University Science,2005,6A(7):676-682.
[34] GARCIA Z,TOLEDO D.A Fault Tolerant Web Service Architecture [C]//Proceedings of the 2007 Latin American Web Conference.IEEE Computer Society.Washington,DC,2007:42-49.
[35] BILLHARDT H,HERMOSO R,OSSOWSKI S,et al.Trust-Based Service Provider Selection in Open Environments [C]//Proc. of the 2007 ACM Symposium on Applied Computing.ACM,New York,2007:1 375-1 380.
[36] LIU W.Trustworthy Service Selection and Composition-Reducing the Entropy of Service-oriented Web [C]//Proc. of the 3rd IEEE International Conference on Industrial Informatics(INDIN),2005.
[37] SKOGSRUD H,BENATALLAH B,CASATI F.Trust-Serv:Model-Driven Lifecycle Management of Trust Negotiation Policies for Web Services [C]//Proceedings of the 13th International Conference on World Wide Web.ACM,New York,2004:53-62.
[38] MAXIMILIEN E M,SINGH M P.Toward Autonomic Web Services Trust and Selection [C]//Proc. of 2nd Intl. Conf. Service Oriented Comp..New York,USA,2004:212-221.
[39] MAXIMILIEN E M,SINGH M P.Agent-Based Trust Model Involving Multiple Qualities [C]//Proc. of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems.ACM,New York,2005:519-526.
[40] GALIZIA S,GUGLIOTTA A,DOMINGUE J.A Trust Based Methodology for Web Service Selection [C]//Proc. of the international Conference on Semantic Computing.ICSC.IEEE Computer Society,Washington,DC,2007:193-200.
[41] YANG S,LAN C,CHUNG J.Trustworthy Service-Oriented Business Processes Integration [J].International Journal of Simulation and Process Modeling,2007,3(1-2):6-17.
[42] WS-Trust OASIS Standard.Web Services Trust Language 1.3 (WS-Trust 1.3) [EB/OL].http://docs.oasis-open.org/ws-sx/ws-trust/200512/ws-trust-1.3-os.html.March,2007-03-15.
[43] BAJAJ S,BOX D.(2006) Web Services Policy Framework version 1.2 (WS-Policy),BEA,IBM,Microsoft etc. [EB/OL].http://download.boulder.ibm.com/ibmdl/ pub/software/dw/specs/ws-polfram/ws-policy,2006-03-01.
[44] KARABULUT Y,KERSCHBAUM F,MASSACCI F.Security and Trust in IT Business Outsourcing:A Manifesto [J].Electronic Notes in Theoretical Computer Science,2007,79:47-58.
[45] OASIS.Core and Hierarchical Role Based Access Control (RBAC) Profile of XACML v2.0 [EB/OL].http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-rbac-profile1-spec-os.pdf,2005-02-10.
[46] OASIS.XACML Profile for Web-Services [EB/OL].http://www.oasis-open.org/committees/download.php/ 3661/draft-xacml-wspl-04,2003-09-29.
[47] W3C.Platform for Privacy Preference (P3P) Project [EB/OL].http://www.w3.org/p3p,2010-01-08.
[48] ANTN A,BERTINO E,LI N,et al.A Roadmap for Comprehensive Online Privacy Policy Management [J].Communication of ACM,2007,50(7):109-116.
[49] RAJBHANDARI S,CONTES A,et al.Establishing Workflow Trust Using Provenace Information [C]//Proc.of the 1st IEEE International Workshop on Modelling Autonomic Communications Environments,2006.
[50] RAJBHANDARI S,WOOTTEN I,ALI A S,et al.Evaluating Provenance-Based Trust for Scientific Workflows [C]//Proc.of the 6th IEEE International Symposium on Cluster Computation and the Grid(CCGrid06),2006:365-372.
[51] RAJBHANDARI S,RANA O F,WOOTTEN I.A Fuzzy Model for Calculating Workflow Trust Using Provence Data [C]//Proc. of MG’08.Baton Rouge,LA,USA,2008.
[52] ALTUNAY M,BROWN D,BYRD G,et al.Trusted-Based Secure Workflow Path Construction [C]//Proc. of ICSOC,2005,2005:382-395. |