[1] Camarinha-Matos L M,Afsarmanesh H.The Virtual Enterprise Concept[M].Boston:Kluwer Academic Publishers,1999.3-14.
[2] 路晓明,冯登国.一种基于身份的多信任域网格认证模型[J].电子学报,2006,34(4):577-582. Lu Xiao-ming,Feng Deng-guo.An identity-based authentication model for multi-domain grids[J].Acta Electronica Sinica,2006,34(4):577-582.(in Chinese)
[3] Liu H,Luo P,Wang D.A distributed expansible authentication model based on Kerberos[J].Journal of Network and Computer Applications,2008,31(4):472-486.
[4] 代战锋,温巧燕,李小标.基于分布式PKI 的P2P 网络认证技术[J].电子学报,2009,37(11):2561-2564. Dai Zhan-feng,Wen Qiao-yan,Li Xiao-biao.The authentication technology of P2P network based on distributed PKI[J].Acta Electronica Sinica,2009,37(11):2561-2564.(in Chinese)
[5] Djordjevic I,Dimitrakos T,Romano N,Mac Randal D,Ritrovato P.Dynamic security perimeters for inter-enterprise service integration[J].Future Generation Computer Systems,2007,23(4):633-657.
[6] Rouibah K,Ould-Ali S.Dynamic data sharing and security in a collaborative product definition management system[J].Robotics and Computer-Integrated Manufacturing,2007,23(2):217-233.
[7] Lopez Millan G,Gil Perez M,Martinez Perez G,Gomez Skarmeta A F.PKI-based trust management in inter-domain scenarios[J].Computers & Security,2010,29:278-290.
[8] Xu J,Zhang D,Li X.Dynamic authentication for cross-realm SOA-based business processes[J].IEEE Transactions on Service Computing,2012,5(1):20-32.
[9] 刘端阳,潘雪增.虚拟企业的安全交互模型[J].计算机研究与发展,2003,40(9):1307-1311. Liu Duan-yang,Pan Xue-zeng.A new VCA scheme in virtual enterprises[J].Journal of Computer Research and Development,2003,40(9):1307-1311.(in Chinese)
[10] 张文芳,王小敏,何大可.一个改进的基于门限RSA签名的虚拟企业安全交互模型[J].计算机研究与发展,2012,49(8):1662-1667. Zhang Wen-fang,Wang Xiao-min,He Da-ke.An improved VCA interaction model for virtual enterprises based on threshold RSA signature[J].Journal of Computer Research and Development,2012,49(8):1662-1667.(in Chinese)
[11] 张文芳,何大可,王小敏.基于可变权限集的广义虚拟企业信任交互方案[J].计算机集成制造系统-CIMS,2007,13(5):1001-1007. Zhang Wen-fang,He Da-ke,Wang Xiao-min.Generalized trust-interaction scheme for virtual enterprises based on variable privilege sets[J].Computer Integrated Manufacturing Systems,2007,13(5):1001-1007.(in Chinese)
[12] 张文芳,王小敏,何大可.身份可追查的抗合谋攻击广义虚拟企业信任交互方案[J].计算机集成制造系统-CIMS,2010,16(7):1558-1567. Zhang Wen-fang,Wang Xiao-min,He Da-ke.Novel conspiracy attack immune generalized interactive authentication scheme for virtual enterprises with traceability[J].Computer Integrated Manufacturing Systems,2010,16(7):1558-1567.(in Chinese) |