[1] MIN Jie, YAN Chunlong,YE Ming, et al. A new mode of network economics-direct customization facing the customer[J].China Soft Science,2001,(6):53-56(in Chinese).[闵 捷,颜春龙,叶 明,等.网络经济新模式— 面向顾客的直接定制[J].中国软科学,2001,(6):53-56.] [2] ZHANG Zhiyong, LIU Shirong, CHENG Tao, et al. Study on strategy of resource reconfiguration for networked manufacturing system[J]. China Mechanical Engineering, 2002, 13(1):76-80(in Chinese).[张智勇,刘世荣,程 涛,等.网络化制造系统中资源快速重组的策略研究[J].中国机械工程,2002,13(1):76-80.]
[3] GU Xinjian, XU Xianghong,CHEN Zichen. Research on network-based manufacturing paradigm[J].China Industrial Economy, 2001,(1):30-33(in Chinese).[顾新建,徐向宏,陈子辰.网络化制造范式和我国的网络化制造战略[J].中国工业经济,2001,(1):30-33.]
[4] DAN Bin, LIU Fei. Research on networked integrated manufacturing and the system[J]. Systems Engineering and Electronics, 2001, 23(8): 12-15(in Chinese).[但 斌,刘 飞.网络化集成制造及其系统研究[J].系统工程与电子技术,2001,23(8):12-15.]
[5] FOSTER I,KESSELMAN C, NICK J,et al. The physiology of the grid: an open grid services architecture for distributed systems integration[EB/OL].http://www.globus.org/research/papers/ogsa.pdf,2002.
[6] FOSTER I,KESSELMAN C, NICK J, et al.Grid services for distributed system integration[J]. IEEE Computer, 2002, 35(6):37-46.
[7] GLOBUS. Overview of the grid security infrastructure[DB/OL].http://www.globus.org/security/overview.html, 2002-10-17.
[8] THOMPSON M R, OLSON D, COWLES R, et al. CA based trust issues for grid authentication and identity delegation[EB/OL]. http://www.gridforum.org/documents/GFD/GFD2I.17.pdf.2005-10.
[9] FOSTER I, KESSELMAN C, TSUDIK G, et al. A security architecture for computational grids[A].ACM Conference on Computer and Communications Security Conference[C]. San Francisco,CA,USA:ACM Press,1998.82-89.
[10] CURBERA F,DUFTLER M,KHALAF R, et al. Unraveling the Web services web:an introduction to SOAP, WSDL, and UDDI[J].IEEE Internet Computing,2002,6(2):86-93.
[11] XU Jiazhen, CHEN Shenmeng. Comparison and analysis of IPSec-based and SSL-based VPN[J]. Computer Engineering and Design, 2004, 25(4): 586-588(in Chinese).[徐家臻,陈莘萌.基于IPSec与基于SSL的VPN的比较与分析[J].计算机工程与设计,2004,25(4):586-588.]
|