[1]
|
T. Erl, “Service-Oriented Architecture (SOA): Concepts, Technology, and Design,” Prentice Hall PTR, Upper Saddle River, New Jersey, 2005.
|
[2]
|
B. Portier and F. Budinsky, “Introduction to SDO,” IBM developerWorks, 2004.
|
[3]
|
M. John, “Security Models: Encyclopedia of Software Engineering,” Wiley Press, 1994.
|
[4]
|
M. Benedikt, C. Cheeyonyong, W. F. Fan, et al, “Capturing Both Types and Constraints in Data Integration,” Proceedings of the ACM SIGMOD International Conference on Management of Data, San Diego, California, USA, 2003, pp. 277-288.
|
[5]
|
D. Chaum and H. Van Antwerpen, “Undeniable Signatures,” Advances in Cryptology-CRYPTO’89, LNCS 435. Berlin: Springer-Verlag, 1989.
|
[6]
|
S. W. Galbraith, “Invisibility and Anonymity of Undeniable and Confirmer Signatures,” Topics in Cryptology- CT-RSA’03, LNCS 2612, Springer-Verlag, Berlin, 2003.
|