參考文獻 |
中文文獻
1. 尤焙麟,謝侑純,王子敬, “網路安全入門手冊,” 翻譯自”Network Security: a beginner’s guide,” Eric Maiwald, 格羅‧希爾國際出版公司,2002年2月初版
2. 莊友欣, ”電子商務與網路安全,”翻譯自”Web Security, Privacy & Commerce, 2e,” Simson Garfinkel with Gene Spafford, O’REILLY, 2004年4月中文書第二版
3. 黃景彰, “資訊安全-電子商務之基礎,” 華泰文化事業公司, 2001年6月
4. 劉心陽, “網路駭客,” 亞太圖書, 1998初版
5. 劉尊全, 劉興鋼, “破譯RSA-Cracking RSA,” 全華出版社, 2003初版
英文文獻
6. Ahmad, S. N., “Business models of P2P companies, an outlook of P2P architecture usage in business today,” Humboldt University Berlin, Faculty of Economics and Management Sciences, 2003.
7. Bellifemine, F., Caire, G., Trucco, T.(TILAB, formerly CSELT) and Rimassa , G. (University of Parma), “JADE Programmer’s guide,” JADE TUTORIAL, JADE3.2, 2004.
8. Bierman, E., Pretoria, T. and Cloete, E. “Classification of malicious host threats in mobile agent computing,” Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology, 2002.
9. Caire, G. (TILAB, formerly GSELT), “JADE Programming for beginners,” JADE TUTORIAL, JADE3.1, 2003.
10. Chaum, D., “Blind signatures for untraceable payments,” Proceedings of Crypto’82. Springer-Verlag, 1982.
11. Chaum, D., Fiat, A. and Naor, M., “Untraceable electronic cash,” Proceedings Crypto’ 88, Lecture Notes in Computer Science, Springer-Verlag, 1990, p. 319–327.
12. Chi, E. “Evaluation of Micropayment Schemes,” HP Laboratories Technical Report, 1997, no. 97-14, p. 1-29.
13. Claessens, J., Preneel, B. and Vandewalle, J., “(How) can mobile agents do secure electronic transactions on untrusted host? A survey of the security issues and the current solutions,” ACM Transactions on Internet Technology (TOIT), 2003, vol. 3 , issue 1.
14. Dai, X., Grundy, J. and Lo, B., “Comparing and contrasting micro-payment models for E-commerce systems,” International Conferences of Info-tech and Info-net (ICII), China, 2001.
15. Daras, P., Palaka, D., Giagourta, V., Bechtsis, D., Petridis, K. and Strintzis, M.G. “A nocel peer-to-peer payment protocol,” IEEE EUROCON 2003, International Conference on Computer as a Tool (Invited paper), Ljubljana, Slovenia, 2003.
16. Das, A. and Gongxuan, Y., “A secure payment protocol using mobile agents in an untrusted host environment,” Proceedings of the Second International Symposium on Topics in Electronic Commerce, Springer-Verlag, 2001, p. 33-41.
17. Dasgupta, P. “Improving peer-to-peer resource discovery using mobile agent based referrals,” Second international workshop on agents and peer-to-peer computing(AP2PC 2003), 2003, p. 186-197.
18. Disz, T. L., Papka, M. E., Pellegrino, M. and Stevens, R., ”Sharing visualization experiences among remote virtual environments,” International Workshop on High Performance Computing for Computer Graphics and Visualization, Springer-Verlag, 1995, p. 217-237.
19. Farmer, W., Guttman, J. and Swarup, V., “Security for mobile agents: Authentication and state appraisal,” Proceedings of the 4th European Symposium on Research in Computer Security, 1996, p. 118-130.
20. Foster, I., “What is the Grid? A Three Point Checklist,” The globus alliance, 2002, http://www-fp.mcs.anl.gov/~foster/Articles/WhatIsTheGrid.pdf.
21. Foster, I., Kesselman, C., Tsudik, G. and Tuecke, S., “A security architecture for computational grids,” The 5th ACM Conference on Computer and Communication Security, 1998.
22. Foster, I., Kesselman, C. and Tuecke, S., “The anatomy of grid,” International Journal, Supercomputer Applications 15(3), 2001, http://www.globus.org/research/papers/anatomy.pdf
23. Glassman, S., Manasse, M., Abadi, M., Gauthier, P. and Sobalvarro, P. G. “The Millicent Protocol for Inexpensive Electronic Commerce,” Fourth International World Wide Web Conference, 1995.
24. Grimley, M.J. and Monroe, B.D. “Protecting the integrity of agents,” ACM Magazine. 1999.
25. Guan, S. and Hua, F., “A multi-agent architecture for electronic payment,” International Journal of Information Technology and Decision Making, 2003.
26. Guan, S., Tan, S. and Hua, F., “A modularized electronic payment system for agent-based e-commerce,” Journal of Research and Practice in Information Technology, 2004, vol. 36, no. 2.
27. Hohl, F., “Time limited blackbox security: Protecting mobile agents from malicious hosts,” Mobile Agents and Security, Lecture Notes in Computer Science, Springer-Verlag, 1998, no. 1419, p. 92-113.
28. Holf, F. “A framework to protect mobile agents by using reference states,” Proceedings of the 20th International Conference on Distributed Computing Systems, 2000.
29. Jansen, W., “Countermeasures for mobile agent security,” Computer Communications, Special Issue on Advances in Research and Application of Network Security, 2000.
30. Lee, T.O., Yip, Y.L., Tsang, C.M. and Ng, K.W., “An agent-based micropayment system for e-commerce,” E-commerce agent, Lecture Notes in Artificial Intelligence 2033, Springer-Verlag, 2001.
31. Maes, P., Guttman, R. and Moukas, A., “Agents that buy and sell,” Comminications of the ACM, 1999, vol. 42, no. 3.
32. Marques, P., Silva, L. M. and Silva, J. G., “Security mechanisms for using mobile agents in electronic commerce”, Proc. of the 18th IEEE Symposium on Reliable Distributed Systems, 1999, p. 378-383.
33. Meadows, C. “Detecting attacks on mobile agents,” Foundations for secure mobile code workshop, Centre for high assurance computing systems. 1997.
34. Milojicic, D. S., Kalogeraki, V., Lukose, R., Nagaraja, K., Pruyne, J., Richard, B., Rollins, S. and Xu, Z., “Peer-to-peer computing,” HP Laboratories Palo Alto, 2002.
35. Ordille, J. J., “When agents roam, who can you trust?” First Annual Conference on Emerging Technologies and Applications in Communications, 1996, p. 188 – 191.
36. Papazoglou, M. P., “Agent-oriented technology in support of e-business,” Communications of the ACM, 2001, vol. 44, issue 4.
37. Riordan, J. and Schneier, B., “Environmental key generation towards clueless agents,” Mobile Agents and Security, Lecture Notes in Computer Science, Springer-Verlag, 1998, vol. 1419, p. 15-24.
38. Rosenschein, J., Sandholm, T., Sierra, C., Mae, P. and Gutmann R., “Agent-mediated electronic commerce: issues, challenges and some viewpoints,” Proceedings of the Workshop on Agent Mediated Electronic Trading (AMET'98) Minneapolis, Minnesota, 1998.
39. Roth, V. “Secure recording of itineraryies through cooperating agents,” Proceedings of the COOP Workshop on Distributeed Object Security and 4th Workshop on Mobile Object Systems: Secure Internet Mobile Computations, 1998, p. 147-154.
40. Sander, T. and Tschudin, C. “Protecting mobile agents against malicious hosts,” Mobile Agents and Security, Lecture Notes in Computer Science. Springer-Verlag, 1998, no. 1419, p.44-60.
41. Schneider, F. B. “Towards fault-tolerant and secure agentry,” Keynote Lecture, 11th International Workshop WDAG '97., 1997.
42. Schoenmakers, B., “Basic security of the ecash payment system,” Lecture Notes in Computer Science, 1994, vol. 1528, p. 217-230.
43. Smith, S.W. and Austel, V., “Trusting trusted hardware: Towards a formal model for programmable secure processors,” 3rd USENIX Workshop on Electronic Commerce, 1998.
44. Vigna, G. “Protecting mobile agents through tracing,” Proceedings of the 3rd ECOOP Workshop on Mobile Object Systems, 1997.
45. Wang, D., “A Resource Discovery Model based on Multi-Agent Technology in P2P System,” Intelligent Agent Technology, IEEE/WIC/ACM International Conference on (IAT'04), 2004.
46. Westhoff, D., Schneider, M., Unger, C. and Kaderali, F., “Methods for protecting a mobile agent’s route,” Proceedings of the Information Security Workshop, Lecture Notes in Computer Science 1729, Spring Verlag, 1999.
47. Wooldrige, M. and Jennings, N.R.: Intelligent agent: theory and practice, Knowledge engineering review, 1995.
48. Yee, B. S., “A Sanctuary for Mobile Agents,” DARPA Workshop on Foundations for Secure Mobile Code, 1997.
49. Young, A. and Yung, M., “Sliding encryption: A cryptographic tool for mobile agents,” Proceedings of the 4th International Workshop on Fast Software Encryption, 1997.
網頁資料
50. CNET News.com, Digital content spurs micropayments resurgence, http://news.com.com/Digital+content+spurs+micropayments+resurgence/2100-1030_3-5347513.html
51. Delegation and single sign-on (proxy certificates) Chapter 11, GSI: Grid Security Infrastructure,
http://www.casa-sotomayor.net/gt3-tutorial/
52. eBay, “什麼是PayPal?”http://pages.tw.ebay.com/paypal/index.html
53. FIPA, http://www.fipa.org/
54. Foster, I. “Internet Computing and the Emerging Grid,” Nature Web Matters, 2000, http://www.nature.com/nature/webmatters/grid/grid.html
55. Information Techonology Association of America, http://www.itaa.org/isec/pubs/e20047-08.pdf
56. Internetnews, “Japan Opens First Millicent E-Commerce Site,” http://www.internetnews.com/bus-news/article.php/135881
57. JADE, http://jade.tilab.com
58. PayPal, http://www.paypal.com
59. PC Cluster平行系統研發與應用, http://pccluster.nchc.gov.tw
60. RSA Laboratories, what is a blind signature scheme? http://www.rsasecurity.com/rsalabs/node.asp?id=2339
61. SUN, http://java.sun.com
62. Taiwan.CNET.com科技資訊網, “Grid Computing, 網格運算,”
http://www.taiwan.cnet.com/enterprise/glossary/term/0,2000062921,2000057796,00.htm
63. The globus alliance, http://www.gpds.org/
64. TW Grid, http://www.twgrid.org
65. 財團法人中華民國國家資訊基本建設產業發展協進會, “談數位內容於電子商務之應用座談會分析報告”, 2003,
http://www.nii.org.tw/cnt/info/Report/200309_3.htm
66. 資策會電子商務應用推廣中心, 黃瑩芳, “美國小額付款機制,” 2001, http://taiwan.cnet.com/enterprise/technology/0,2000062852,20030461,00.htm
67. 經濟部技術處產業電子化指標與標準研究計畫/資策會ACI-FIND, http://www.find.org.tw |