[1]
|
D. Boughaci and H. Drias, “A Secure E-Transaction model for E-Commerce,” IEEE GCC Conference (GCC), Manama, 20-22 March 2006.
doi:10.1109/IEEEGCC.2006.5686242
|
[2]
|
C. Potter and A. Beard, “Information Security Breaches Survey 2010,” Technical Report, PricewaterhouseCoopers, 2010.
|
[3]
|
P. ltner and T. Grechenig, “A Joint Infrastructure of ‘Digital Corporate Organisms’ as Facilitator for a Virtual Digital Retail Ecosystem,” 4th IEEE International Conference on Digital Ecosystems and Technologies (DEST), Dubai, 12-15 April 2010.
|
[4]
|
Y.-L. Fang B. Han and Y.-B. Li, “Research and Implementation of Key Technology Based on Internet Encryption and Authentication,” International Conference on Networking and Digital Society (ICNDS’09), Guiyang, 30-31 May 2009.
|
[5]
|
X. Tian and W. Dai, “Study on Information Management and Security of E-commerce System,” International Symposium on Intelligence Information Processing and Trusted Computing (IPTC), Huanggang, 18-20 November 2010.
|
[6]
|
P. Dini, M. Darking, N. Rathbone, M. Vidal, P. Hernandez, P. Ferronato, G. Briscoe and S. Hendryx, “The Digital Ecosystems Research Vision: 2010 and Beyond,” 2011. www.digital-ecosystems.org/events/2005.05/de_position_ paper_vf.pdf
|
[7]
|
EComm, “Technologies for Digital Ecosystems,” 2005.
www.digital-ecosystems.org/doc/flyer-de-sector.doc.
|
[8]
|
F. Nachira, P. Dini and A. Nicolai, “A Network of Digital Business Ecosystems for Europe: Roots, Processes and Perspectives,” 2011.
http://www.digital-ecosystems.org/book/DBE-2007.pdf
|
[9]
|
F. Nachira, E. Chiozza, H. Ihonen, M. Manzoni and F. Cunningham, “Towards a Network of Digital Business Ecosystems Fostering the Local Development,” Discussion Paper, Bruxelles, 2002.
|
[10]
|
H. Boley and E. Chang, “Digital Ecosystem: Principles and Semantics,” Inaugural IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2007), Cairns, 12-23 February 2007.
|
[11]
|
M. Hadzic, E. Chang and T. Dillon, “Methodology Framework for the Design of Digital Ecosystem,” ISIC IEEE International Conference Systems, Man and Cybernetics, Montreal, 7-10 October 2007.
|
[12]
|
DigitalEcosystem.org, “Digital Ecosystems: The New Global Commons for SMEs and Local Growth,” 2011.
http://www.digital-ecosystems.org/de/refs/ref_books.html
|
[13]
|
G. Briscoe and P. Wilde, “Digital Ecosystems: Evolving Service-Oriented Architectures,” 1st International Conference on Bio Inspired Models of Network, Information and Computing Systems, New York, June 2006.
|
[14]
|
M. Wooldridge, “Introduction to MultiAgent Systems,” Wiley, New York, 2002
|
[15]
|
E. Cantu-Paz, “A Survey of Parallel Genetic Algorithms,” Reseaux et Systemes Repartis, Calculateurs Paralleles, Vol. 10, 1998, pp. 141-171.
|
[16]
|
J. Stender, “Parallel Genetic Algorithms: Theory and Applications,” IOS Press, Amsterdam, 1993.
|
[17]
|
A. Berson, “Client/Server Architecture,” 2nd Edition, McGraw-Hill Companies, Upper Saddle River, 1996.
|
[18]
|
W3C, “Web Services Architecture,” 2011.
http://www.w3.org/TR/ws-arch/
|
[19]
|
R. Schollmeier, “A Definition of Peer-to-Peer Networking for the Classification of Peer-to-Peer Architectures and Applications,” Proceedings of 1st IEEE International Conference on Peer to Peer Computing, Linkoping, 27-29 August 2001.
|
[20]
|
H. Koshutanski, et al., “Distributed Identity Management Model for Digital Ecosystems,” International Conference on Emerging Security Information, Systems and Technologies (Securware’07), Valencia, 14-20 October 2007.
|
[21]
|
J. M. Seigneur, “Demonstration of Security through Collaborative in Digital Business Ecosystem,” Proceedings of the IEEE SECOVAL Workshop, Athens, September 2005.
|
[22]
|
J. Novotny, “An Online Credential Repository for the Grid: MyProxy,” Proceedings of the IEEE 10th International Symposium on High Performance Distributed Computing (HPDC-10), San Fransisco, 7-9 September 2001.
|
[23]
|
L. Pearlman, et al., “A Community Authorization Service for Group Collaboration,” Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks, Monterey, 5-7 June 2002.
doi:10.1109/POLICY.2002.1011293
|
[24]
|
M. Thompson, et al., “Certificate-Based Access Control for Widely Distributed Resources,” Proceedings of the 8th conference on USENIX Security Symposium, Washington DC, 23-26 August 1999.
|
[25]
|
J. Weise, “Public Key Infrastructure Overview,” Sun Microsystem, Sun BluePrints Online 2001.
|
[26]
|
I. Pranata, G. Skinner and R. Athauda, “A Survey on the Security Requirements for a Successful Adoption of Digital Ecosystem Environment,” 2nd International Conference on Information Technology Security (ITS 2011), Singapore, 24-25 November 2011.
|
[27]
|
I. Pranata, G. Skinner and R. Athauda, “Community Based Authentication and Authorisation Mechanism for Digital Ecosystem,” 5th IEEE International Conference on Digital Ecosystems and Technologies (DEST’11), Seoul, 31 May-3 June 2011.
|
[28]
|
I. Pranata, G. Skinner and R. Athauda, “Distributed Mechanism for Protecting Resources in a Newly Emerged Digital Ecosystem,” 11th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2011), Melbourne, 24-26 October 2011.
|
[29]
|
W3C, “Extensible Markup Language (XML),” 2011.
http://www.w3.org/XML/
|
[30]
|
P. R. Zimmermann, “The Official PGP User’s Guide,” MIT Press, Cambridge, 1995.
|
[31]
|
FTSC, “FSTC Counter-Phising Initiative,” Financial Services Technology Consortium, New York, 2004.
|
[32]
|
Apache JMeter, 2011. http://jakarta.apache.org/ jmeter/
|