[1] Jack Be Corporation.A Business Guide to Enterprise Mashups [EB/OL].http://www.JackBe.com,2007-06-19.[2] 王怀民,唐扬斌,尹刚,等.互联网软件的可信机理 [J].中国科学E 辑:信息科学,2006,36(10):1 156-1 169.[3] GOMADAM K,SHETH A P.SA- REST and (S) Mashups:Adding Semantics to RESTful Services [C]//Proceedings of the International Conference on Semantic Computing.Washington,DC:IEEE Computer Society,2007:469-476.[4] TATEMURA J,SAWIRES A,PO O,et al.Mashup Feeds:Continuous Queries over Web Services [C]//Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data,New York:ACM,2007:1 128-1 130.[5] ABITEBOUL S,GREENSHPAN O,MILO T.Modeling the Mashup Space [C]//Proceeding of the 10th ACM Workshop on Web Information and Data Management.New York:ACM,2008:87-94.[6] RIABOV A V,BOILLET E,FEBLOWITZ M D,et al.Wishful Search:Interactive Composition of Data Mashups [C]// Proceeding of the 17th International Conference on World Wide Web.New York:ACM,2008:775-784.[7] LU J G,YU Y,ROY D,et al.Web Service Composition:A Reality Check [C]// Proceeding of Web Information Systems Engineering(WISE2007),2007:523-532.[8] BULTAN T,FU X,HULLET R,et al.Conversation Specification:A New Approach to Design and Analysis of E-Service Composition [C]//Proc. of the 12th International World Wide Web Conference.Budapest,Hungary,2003.[9] 曹健,张申生,李明禄.基于目标驱动和过程重用的Web服务客户化定制模型 [J].计算机学报,2005,28(4):721-730.[10] 李曼,王大治,杜小勇,等.基于领域本体的Web 服务动态组合 [J].计算机学报,2005,28(4):644-650.[11] 马建威,舒振,郭得科,等.QoS可信的服务组合技术研究 [J].计算机应用研究,2010,27(5):1 840-1 844.[12] THATTE S.XLANG:Web Services for Business Process Design [EB/OL].http://www.xml.com/pub/r/1153,2001-06-09.[13] LEYMANN F.WSFL:Web Service Flow Language 1.0 [EB/OL].http://www3.ibm.com/software/solutions/Webservices/pdf /WSFL.pdf.2002-03-01.[14] ANDREWS T,CURBERA F.Business Process Execution Language for Web Services Version1.1 [EB/OL].http://www-106.ibm.com/developerworks/webservices/library/ws-bpel/,2003-05-01.[15] CHARFI A,MEZINI M.AO4BPEL:An Aspect-Oriented Exten-Sion to BPEL [J].World Wide Web,2007,10(3):309-344.[16] BERARDI D,CALVANESE D,GIACOMO G,et al.Automatic Composition of Transition-Based Semantic Web Services with Messaging [C]//Proceedings of the 31st International Conference on Very Large Data Bases.VLDB Endowment,2005:613-624.[17] CARDOSO J.Benchmarking a Semantic Web Service Archi-Tecture for Fault-Tolerant B2B Integration [C]//International Workshop on Dynamic Distributed Systems (IWDDS).Lisboa,Portugal:IEEE Computer Society,2006.[18] 刘济波,朱培栋,胡春华,等.基于两层声誉演化模型的服务组合选取策略 [J].中南大学学报:自然科学版,2009,40(3):756-762.[19] 郭慧鹏,怀进鹏,邓婷,等.一种可信的自适应服务组合机制 [J].计算机学报,2008,31(8):1 434-1 444.[20] 蒋哲远,韩江洪,王钊.动态的QoS感知Web服务选择和组合优化模型 [J].计算机学报,2009,32(5):1 014-1 025.[21] MARSH S P.Formalizing Trust as a Computational Concept [D].University of Stirling,1994.[22] Trusted Computing Group.Enterprise Security:Putting the TPM to Work [M].Trusted Computing Group White Paper,2008.[23] 刘克,单志广,王戟,等.“可信软件基础研究” 重大研究计划综述 [J].中国科学基金,2008(3):145-151.[24] JACKSON D.A Direct Path to Dependable Software [J].Communications of ACM,2009,52:78-88.[25] YU T,ZHANG Y,LIN K J.Efficient Algorithms for Web Services Selection with End-to-End QoS Constraints [J].ACM Trans. Web,2007,1(1):26.[26] MOSER L E,MELLIAR-SMITH P M,ZHAO W.Building Dependable and Secure Web Services [J].Journal of Software,2007,2(1):14-26.[27] SINGH M P.Trustworthy Service Composition:Challenges and Research Questions [C]//Proc. of AAMAS,2002,2002:39-52.[28] DIMITRAKOS T.A Service-Oriented Trust Management Framework [C]//Proc. of AAMAS,2002,2002:53-72.[29] LEE Y,OH J,HAN S.Enriching Quality and Fault-Tolerance of Web Services System [J].International Journal of Web Services Practices,2005,1(2):153-157.[30] FROUNCHI K,CHANDRASEKARAN P.A QoS-Aware Web Service Replica Selection Framework for an Extranet [C]//Proc. of IEEE CCECE/CCGEI.Ottawa,2006.[31] JUSZCZYK L,LZOWSKI J,DUSTDAR S.Web Service Discovery,Replication,and Synchronization in Ad-Hoc Networks [C]//IEEE Workshop on Dependability in Large-Scale service-Oriented Systems.Vienna,2006.[32] DUSTDAR S,JUSZCZYK L.Dynamic Replication and Synchronization of Web Services for High Availability in Mobile Ad-Hoc Networks [C]//Service Oriented Computing and Architectures.Springer,2007.[33] TANG J,ZHOU B,HE Z.Policy Driven and Multi-Agent Based Fault Tolerance for Web Services [J].Journal of Zhejiang University Science,2005,6A(7):676-682.[34] GARCIA Z,TOLEDO D.A Fault Tolerant Web Service Architecture [C]//Proceedings of the 2007 Latin American Web Conference.IEEE Computer Society.Washington,DC,2007:42-49.[35] BILLHARDT H,HERMOSO R,OSSOWSKI S,et al.Trust-Based Service Provider Selection in Open Environments [C]//Proc. of the 2007 ACM Symposium on Applied Computing.ACM,New York,2007:1 375-1 380.[36] LIU W.Trustworthy Service Selection and Composition-Reducing the Entropy of Service-oriented Web [C]//Proc. of the 3rd IEEE International Conference on Industrial Informatics(INDIN),2005.[37] SKOGSRUD H,BENATALLAH B,CASATI F.Trust-Serv:Model-Driven Lifecycle Management of Trust Negotiation Policies for Web Services [C]//Proceedings of the 13th International Conference on World Wide Web.ACM,New York,2004:53-62.[38] MAXIMILIEN E M,SINGH M P.Toward Autonomic Web Services Trust and Selection [C]//Proc. of 2nd Intl. Conf. Service Oriented Comp..New York,USA,2004:212-221.[39] MAXIMILIEN E M,SINGH M P.Agent-Based Trust Model Involving Multiple Qualities [C]//Proc. of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems.ACM,New York,2005:519-526.[40] GALIZIA S,GUGLIOTTA A,DOMINGUE J.A Trust Based Methodology for Web Service Selection [C]//Proc. of the international Conference on Semantic Computing.ICSC.IEEE Computer Society,Washington,DC,2007:193-200.[41] YANG S,LAN C,CHUNG J.Trustworthy Service-Oriented Business Processes Integration [J].International Journal of Simulation and Process Modeling,2007,3(1-2):6-17.[42] WS-Trust OASIS Standard.Web Services Trust Language 1.3 (WS-Trust 1.3) [EB/OL].http://docs.oasis-open.org/ws-sx/ws-trust/200512/ws-trust-1.3-os.html.March,2007-03-15.[43] BAJAJ S,BOX D.(2006) Web Services Policy Framework version 1.2 (WS-Policy),BEA,IBM,Microsoft etc. [EB/OL].http://download.boulder.ibm.com/ibmdl/ pub/software/dw/specs/ws-polfram/ws-policy,2006-03-01.[44] KARABULUT Y,KERSCHBAUM F,MASSACCI F.Security and Trust in IT Business Outsourcing:A Manifesto [J].Electronic Notes in Theoretical Computer Science,2007,79:47-58.[45] OASIS.Core and Hierarchical Role Based Access Control (RBAC) Profile of XACML v2.0 [EB/OL].http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-rbac-profile1-spec-os.pdf,2005-02-10.[46] OASIS.XACML Profile for Web-Services [EB/OL].http://www.oasis-open.org/committees/download.php/ 3661/draft-xacml-wspl-04,2003-09-29.[47] W3C.Platform for Privacy Preference (P3P) Project [EB/OL].http://www.w3.org/p3p,2010-01-08.[48] ANTN A,BERTINO E,LI N,et al.A Roadmap for Comprehensive Online Privacy Policy Management [J].Communication of ACM,2007,50(7):109-116.[49] RAJBHANDARI S,CONTES A,et al.Establishing Workflow Trust Using Provenace Information [C]//Proc.of the 1st IEEE International Workshop on Modelling Autonomic Communications Environments,2006.[50] RAJBHANDARI S,WOOTTEN I,ALI A S,et al.Evaluating Provenance-Based Trust for Scientific Workflows [C]//Proc.of the 6th IEEE International Symposium on Cluster Computation and the Grid(CCGrid06),2006:365-372.[51] RAJBHANDARI S,RANA O F,WOOTTEN I.A Fuzzy Model for Calculating Workflow Trust Using Provence Data [C]//Proc. of MG’08.Baton Rouge,LA,USA,2008.[52] ALTUNAY M,BROWN D,BYRD G,et al.Trusted-Based Secure Workflow Path Construction [C]//Proc. of ICSOC,2005,2005:382-395. |