參考文獻 |
Agrawal, A., Amend, M., Das, M., Ford, M., Keller, C., Kloppmann, M., et al. (2007). WS-BPEL extension for people (BPEL4People). Alonso, G., Casati, F., Kuno, H., & Machiraju, V. (2004). Web services concepts, architectures and applications Springer New York. Alves, A., Arkin, A., Askary, S., Barreto, C., Bloch, B., Curbera, F., et al. (2007). Web services business process execution language version 2.0. OASIS Standard, Andrews, T., Curbera, F., Dholakia, H., Goland, Y., Klein, J., Leymann, F., et al. (2003). Business process execution language for web services, version 1.1. Standards Proposal by BEA Systems, International Business Machines Corporation, SAP AG, Siebel Systems, and Microsoft Corporation, Bertino, E., Crampton, J., & Paci, F. (2006). Access control and authorization constraints for WS-BPEL. 275-284. Bertino, E., Ferrari, E., & Atluri, V. (1999). The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security, 2(1), 65-104. Bertino, E., Squicciarini, A., Paloscia, I., & Martino, L. (2006). Ws-AC: A fine grained access control system for web services. World Wide Web, 9(2), 143-171. Biron, P. V., & Malhotra, A. (2001). XML schema part 2: Datatypes second edition. W3C Recommendation, 2, 2-20010502. Christensen, E., Curbera, F., Meredith, G., & Weerawarana, S. (2001). Web services description language (WSDL) 1.1. Unpublished manuscript. Clark, D. D., & Wilson, D. R. (1987). A comparison of commercial and military computer security policies. IEEE Symposium on Security and Privacy, 0, 184. Clement, L., Hately, A., Riegen, C. V., & Rogers, T. (2004). UDDI version 3.0.2. Unpublished manuscript. Dang, Z., Ibarra, O. H., & Su, J. (2005). On composition and lookahead delegation of e-services modeled by automata. Theor.Comput.Sci., 341(1), 344-363. Hwang, S., Lim, E., Lee, C., & Chen, C. (2007). On composing a reliable composite web service: A study of dynamic web service selection. IEEE International Conference on Web Services, 184-191. Hwang, S., Lim, E., Lee, C., & Chen, C. (2008). Dynamic web service selection for reliable web service composition. IEEE Transactions on Services Computing, 1(2), 104-116. Joshi, J. B. D., Aref, W. G., Ghafoor, A., & Spafford, E. H. (2001). Security models for web-based applications. Communications of the ACM, 44(2), 38-44. Li, N., Bizri, Z., & Tripunitara, M. V. (2004). On mutually-exclusive roles and separation of duty. ACM Conference on Computer and Communications Security, 42-51. Martin, D., Burstein, M., Hobbs, J., Lassila, O., McDermott, D., McIlraith, S., et al. (2004). OWL-S: Semantic markup for web services. Milner, R. (1999). Communicating and mobile systems: The [symbol for pi]-calculus Cambridge University Press. Mitra, N., & Lafon, Y. (2007). SOAP version 1.2 part 0: Primer (second edition). Unpublished manuscript. Moses, T. (2005). Extensible access control markup language (XACML) version 2.0. Oasis Standard, 200502 Pfleeger, C. P. (1997). Security in computing. Upper Saddle River, NJ, USA: Prentice-Hall, Inc. Sandhu, R. S., Coyne, E. J., Feinstein, H. L., & Youman, C. E. (1996). Role-based access control models. IEEE Computer, 29(2), 38-47. Sandhu, R. S. (1988). Transaction control expressions for separation of duties. Computer Security Applications Conference, 282-286. Wolter, C., Schaad, A., & Meinel, C. (2008). Task-based entailment constraints for basic workflow patterns. Symposium on Access Control Models and Technologies, 51-60. |