參考文獻 |
• Aoyama, M.; Weerawarana, S., Maruyama, H., Szyperski, C., Sullivan, K., and Lea, D. (2002) “Web services engineering: promises and challenges,” Proceedings 24th International Conference on Software Engineering ICSE , 2002
• Gisolfi, D. (2001) “An Introduction to dynamic e-business,” IBM Developer, from http://www-128.ibm.com/developerworks/webservices/library/ws-arc1/index.html
• Yang, S., Lan, B., and Chung, J.Y. (2005) “Trustworthy Service-Oriented Business Process Integration,” International Journal of Service Process Modeling (IJSPM).
• Grandison, T. and Sloman, M. (2000) “A Survey of Trust in Internet Applications,” IEEE Communications Surveys, pp.2-16.
• Microsoft, IBM, and VeriSign (2002) “Specification: Web Services Security (WS-Security),” from http://www-128.ibm.com/developerworks/library/ws-secure/
• Microsoft, IBM, and VeriSign (2004) “Web Services Policy Framework (WS-Policy) ,” from http://ifr.sap.com/ws-policy/ws-policy.pdf
• IBM, BEA Systems, Microsoft, Layer 7 Technologies, Oblix, VeriSign, Actional, Computer Associates, OpenNetwork Technologies, Ping Identity, Reactivity, and RSA Security, (2004) “Web Services Trust Language,” from http://www-128.ibm.com/developerworks/webservices/library/specification/ws-trust/
• Anthony, N., Chris, K., Phillip H., and Ronald, M. (2004) “Web Services Security: SOAP Message Security 1.0 (WS-Security 2004),” from http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0
• Box et al, D. (2003) “Web Services Policy Framework (WS-Policy) Specification Version 1.01,” from http://www-106.ibm.com/developerworks/library/ws-polfram/
• IBM Corporation (2003) “Web Services Level Agreements,” from http://www.research.ibm.com/wsla/WSLASpecV1-20030128.pdf
• Mani, A. and Nagarajan, A. (2002) “Understanding Quality of Service for Web Services,” from http://www-106.ibm.com/developerworks/webservices/library/ws-quality.html
• Jøsang, A. (1999) “An Algebra for Assessing Trust in Certification Chains”. In J. Kochmar, editor, Proceedings of the Network and Distributed Systems Security Symposium (NDSS’99). The Internet Society.
• Jøsang, A. (1999) “Trust-based Decision Making for Electronic Transactions,” The 4th Nordic Wksp. Secure IT Systems (NORDSEC’ 99), Stockholm, Sweden: Stockholm University Report 99-005.
• Huhns, M.N. and Buell, D.A. (2002) “Trusted autonomy,” IEEE Internet Computing, pp.92-95.
• Patrick, A.S. (2002) “Building Trustworthy Software Agents,” IEEE Computing, pp.46-53.
• Singh, M.P. (2002) “Trustworthy Service Composition: Challenges and Research Questions,” Proceedings of the Autonomous Agents and Multi-Agent Systems Workshop on Deception, Fraud and Trust in Agent Societies, pp. 39-52.
• Yolum, P. and Singh, M.P. (2002) “An Agent-Based Approach for Trustworthy Service Location,” Proceedings of 1st International Workshop on Agents and Peer-to-Peer Computing (AP2PC), pp. 45-56.
• Maximilien, E. M. and Singh ,M. P. (2002) “Conceptual Model of Web Service Reputation,” SIGMOD Record, 31(4):36–41
• Maximilien, E. M. and Singh, M. P. (2004). “A Framework and Ontology for Dynamic Web Services Selection,” IEEE Internet Computing, 8(5):84–93
• Staab, S., Bhargava, B., Lilien, L., Rosenthal, A. et al (2004) “The Pudding of Trust,” IEEE Intelligent Systems, pp. 74-88.
• Shadbolt, N. (2002) “A Matter of Trust,” IEEE Intelligent Systems, pp. 2-3.
• Bertino, E. and Squicciarini, A. C. (2004) “Trust-X: A Peer-to-Peer Framework for Trust Establishment,” IEEE Transactions on Knowledge and Data Engineering, Vol. 16, No. 7, pp. 827-842.
• McKnight, D.H. and Chervany, N.L. (1996) “The Meanings of Trust,” MISRC 96-04, University of Minnesota, Management Information Systems Research Center, University of Minnesota.
• Nuutila, E. and Soisalon-Soininen, E.(1994) “On finding the strongly connected components in a directed graph,” Information Processing Letters
• Marsh, S.P. (1994) “Formalising Trust as a Computational Concept,” from http://www.cs.stir.ac.uk/research/publications/techreps/pdf/TR133.pdf
• Yolum, P. and Singh, M. P. (2005) “Engineering Self-Organizing Referral Networks for Trustworthy Service Selection,” IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, Vol. 35, No. 3, pp. 396-407.
• Golbeck, J., Parsia, J. and Hendler, B. (2003) “Trust Networks on the Semantic Web,” Proceedings of Cooperative Intelligent Agents.
• Golbeck, J. and Hendler, B. (2004) “Inferring Reputation on the Semantic Web,” Proceedings of 13th International Web Conference (WWW2004).
• Mitchell, T. (1997) “Machine Learning,” WCB McGraw-Hill, pp.128-141.
• Mendenhall, W. and Beaver, R.J. (1999) “Introduction to Probability and Statistics,” Duxbury Press, pp.442-446.
• Thomas, J. P., Thomas, M., and Ghinea, G.,(2003) “Modeling of Web Services Flow,” IEEE International Conference on E-Commerce, Newport Beach, California, USA, June 24 - 27, 2003, pages 391-398.
• Aalst, W.M.P. van der, Hofstede, A.H.M. ter, Kiepuszewski, B., and Barros, A.P. (2000) “Advanced Workflow Patterns,” In O. Etzion en P. Scheuermann, editors, 7th International Conference on Cooperative Information Systems (CoopIS 2000), volume 1901 of Lecture Notes in Computer Science, pages 1829.
• Narayanan S and McIlraith S A, (2002) “Simulation, Verification and Automated Composition of Web Services,” Proceedings ACM WWW 2002, pp. 77-88 23
• Karp, R.M. and Miller, R.E. (1969) “Parallel Program Schemata,” Journal of Computer and System Sciences 3, pp.
• Finkel, A. (1993), “The Minimal Coverability Graph for Petri Nets,” Advances in Petri Nets 1993, Lecture Notes in Computer Science, Vol. 674, pp. 210-243, Springer Verlag.
• Murata, T. (1989) “Petri Nets: Properties, Analysis and Applications,” Proceedings of the IEEE Vol.77, No. 4, pp.541-580.
• Cormen, T.H., Leiserson, C.E. and Rivest, R.L. (1999) “Introduction to Algorithms,” The MIT Press and McGraw-Hill, pp.489-490.
• Noy, N. F. and McGuinness, D. L. (2001) “Ontology development 101: a guide to creating your first ontology,” Stanford Knowledge Systems Laboratory Technical Report KSL-01-05 and Stanford Medical Informatics Technical Report SMI-2001-0880. 2001.
• Castellanos, M., Casati, F., Shan, M. C., and Dayal, U. (2004) “Visibility and Measurability for Trust Management in Cooperative Business Operations,” IEEE CEC-East, pp. 92 – 99, 2004.
• Zhang, J., Zhang, L. J., and Chung, J. Y. (2004) “An Approach to Help Select Trustworthy Web Services,” IEEE CEC-East, pp. 84 – 91, 2004.
• Liu, P., and Chen, Z. (2004) “An Extended RBAC Model for Web Services in Business Process,” IEEE CEC-East, 24 pp.100 – 107, 2004. |