[1] |
SOA. 引领软件发展新方向官方主页[EB/OL]. .
|
|
SOA.The official homepage of guiding development of the software[EB/OL]. .
|
[2] |
朱志良, 苑海涛, 宋杰 ,等. SOA与云计算:竞争还是融合[J]. 计算机科学, 2011,38(12): 6-11.
|
|
ZHU Z L , YUAN H T , SONG J ,et al. SOA and cloud computing:competition or integration[J]. Computer Science, 2011,38(12): 6-11.
|
[3] |
韩崇砚 . 面向SOA多域协作环境的认证技术研究[D]. 郑州:信息工程大学, 2011.
|
|
HAN C Y . Research on authentication technologies in service orientied multi-domain collaboration environment[D]. Zhengzhou:Information Engineering University, 2011.
|
[4] |
OASIS. Web services security:SOAP message security 1.1 (WS-Security 2004)[EB/OL]. .
|
[5] |
张斌, 王曦 . 面向Web服务的SAML路径验协议及其性能分析[J]. 计算机科学, 2013,40(3): 192-196.
|
|
ZHANG B , WANG X . SAML path verification protocol for Web service and its performance analysis[J]. Computer Science, 2013,40(3): 192-196.
|
[6] |
王冠众 . 面向大数据的 SOA 认证关键技术研究[D]. 郑州:信息工程大学, 2015.
|
|
WANG G Z . Research on key technologies of authentication in service orientied big data environment[D]. Zhengzhou:Information Engineering University, 2015.
|
[7] |
刘雅辉, 张铁赢, 靳小龙 ,等. 大数据时代的个人隐私保护[J]. 计算机研究与发展, 2015,52(1): 229-247.
|
|
LIU Y H , ZHANG T Y , JIN X L ,et al. Personal privacy protection in the era of big data[J]. Journal of Computer Research and Development, 2015,52(1): 229-247.
|
[8] |
方跃坚, 朱锦钟, 周文 ,等. 数据挖掘隐私保护算法综述[J]. 信息网络安全, 2017(2): 6-11.
|
|
FANG Y J , ZHU J Z , ZHOU W ,et al. A survey on data mining privacy protection algorithms[J]. Netinfo Security, 2017(2): 6-11.
|
[9] |
严文博, 姚远志, 张卫明 ,等. 基于二维码和信息隐藏的物流系统隐私保护方案[J]. 网络与信息安全学报, 2017,3(11): 22-28.
|
|
YAN W Y , YAO Y Z , ZHANG W M ,et al. Privacy-preserving scheme for logistics systems based on 2D code and information hiding[J]. Chinese Journal of Network and Information Security, 2017,3(11): 22-28.
|
[10] |
张磊, 马春光, 杨松涛 ,等. 面向关联攻击的轨迹匿名方法[J]. 网络与信息安全学报, 2017,3(6): 8-20.
|
|
ZHANG L , MA C G , YANG S T ,et al. Trajectories anonymous algorithm for association attack[J]. Chinese Journal of Network and Information Security, 2017,3(6): 8-20.
|
[11] |
巩林明, 李顺东, 窦家维 ,等. 同态加密方案及安全两点直线计算协议[J]. 软件学报, 2017,28(12): 6-11.
|
|
GONG F L , LI S D , DOU J W ,et al. Homomorphic encryption scheme and a protocol on secure computing a private points[J]. Journal of Software, 2017,28(12): 6-11.
|
[12] |
马铭鑫, 史国振, 王亚琼 ,等. 适用于分布式系统的多级安全访问控制策略[J]. 网络与信息安全学报, 2017,3(8): 28-34.
|
|
MA M X , SHI Z G , WANG Y Q ,et al. Multilevel secure access control policy for distributed systems[J]. Chinese Journal of Network and Information Security, 2017,3(8): 28-34.
|
[13] |
刘博 . 满足用户隐私需求的 Web 服务组合方法研究[D]. 南京:南京航空航天大学, 2015.
|
|
LIU B . Research on the method of Web services composition for user’s privacy requirement[D]. Nanjing:Nanjing University of Aeronautics and Astronautics, 2015.
|
[14] |
KAGAL L , PATO J . Preserving privacy based on semantic policy tools[J]. Security & Privacy, 2010,8(4): 25-30.
|
[15] |
LIU L T Y , ZHU H B , HUANG Z Q . Analysis of the minimal privacy disclosure for Web services collaborations with role mechanisms[J]. Expert System & Application, 2011,38(4): 4540-4549.
|
[16] |
张玉磊, 王欢, 李臣意 ,等. 可证安全的紧致无证书聚合签密方案[J]. 电子与信息学报, 2015,37(12): 2838-2844.
|
|
ZHANG Y L , WANG H , LI C Y ,et al. Provable secure and compact certificateless aggregate signcryption scheme[J]. Journal of Electronics & Information Technology, 2015,37(12): 2838-2844.
|
[17] |
DAN B , MATT F . Identity-based encryption from the weil pairing[J]. Lecture Notes in Computer Science, 2001(1): 213-229.
|
[18] |
JAMES J , RAFAE B , ELISA B ,et al. X-RBAC:an access control language for multi-domain environments[R]. West Lafayette of USA:Center for Education and Research in Infromation Assurance and Security,Purdue Uinvisity, 2004.
|