|
[1]Stuart King, “Threats and Solution To Web Services Security,” Web Services, 8-12, 2003. [2]Will Iverson, “Real world Web Services,” O’REILLY, October 2004. [3]Booch, G. Jacobson, I. and Rumbaugh, J., “The Unified Modeling Language User Guide,” Addison Wesley, 1999. [4]Mark O’neill, “Web Services Security,” McGraw-Hill Osborne, USA, 2003. [5]David C. Chou and Kirill Yurov, “Security development in Web Services environment,” Computer Standards & Interfaces, In Press, Uncorrected Proof, Available online 11, September 2004. [6]Peter Seibel, “Service-Oriented Architecture – A Field Guide to Integrating XML and Web Services,” PRENTICE HALL, April, 2004. [7]Karl Gottschallk, Web Services architecture overview, Http://www-128.ibm.com/ [8]Sinan Si Albir, “UML in a Nutsbell,” O’Reilly&Associates Inc., New York, 1999. [9]Booch, G, Rumbaugh, J. and Jacobson, J., “The Unified Modeling Language for Object-Oriented Development: Documentation Set Version 0.9 Addendum, Rational Software Corp, 1996. [10]Mark Colan, “Server-Oriented Architecture expands the vision of Web Services,Part , 1,” IBM, 2004, Http://www-106.ibm.com/developerworks/webservices/library/ws-soaintro.html. [11]Erik Christensen, Francisco Curbera, Greg Meredith, Sanjiva Weerawarana., “Web Service Description Language (WSDL) Version 1.1 W3C Note 15,” March 2001. [12]Raina Khalaf., “Business process: Learning BPEL4WS Part 2,” August 2002. [13]Ju Long, Yuan,M.J., Whinston, “Securing a new era of financial services,” IEEE Computer Society, Volume:5, Issue:4, 2003. [14]Chris Kaler et al, “Web Services Security Specification, Version 1.005,” International Business Machines Corporation, 2002. [15]Jim Amsden, Tracy Gardner, Catherine Griffin, Sridhar Iyenger, “Draft UML 1.4 Profile for Automated Business Process With a mapping to BPEL 1.0 Version 1.11,” IBM, 2003. [16]Martin Gudgin, Marc Hadley, Jean-Jacques Moreau, Henrik Frystyk Nielsen, SOAP Version 1.2 Part 1: Messaging Framework, Http://www.w3.org/TR/2001/WD-soap12-part1-20011002/. [17]Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman, “Role-Based Access Control Models,” IEEE computer Volume 29, Number 2, February 1996. [18]David Ferraiolo and Richard Kuhn, “Role - Based Access Controls,” In Proceedings of 15th NIST - NCSC National Computer Security Conference, Baltimore, MD, pp. 554-563, 1992. [19]沈炳宏,Smart Client 開發實務 - 使用 Web Services & SOA Http://www.microsoft.com/taiwan/msdn/columns/mvp/200412_smartclient.htm [20]張思源,「Web 服務安全標準及實務應用」,財團法人資訊工業策進會,台北,2002. [21]戚玉樑、彭淑芸、賴德優、張琪瑩,「Web Services探索與應用」,全華,台北,2003. [22]周賢昭、邱炫儒,以網路服務安全政策為基礎之認證架構,第十四屆物件導向技術及應用研討會,2003. [23]張益嘉、林金龍、何建明,數位典藏系統之權限控管,第二屆數位典藏技術研討會,2003. [24] 陳文鏘,設計與實作以商業流程為基礎的網際服務組合引擎,國立交通大學資訊工程研究所碩士論文,2003.
|