[1] ZHANG Shensheng,CAO Jian,WANG Yinglin,et al. Theory,technology and practice of agile manufacturing[M]. Shanghai:Shanghai Jiaotong University Press,2000.46-133(in Chinese).[张申生,曹 健,王英林,等. 敏捷制造的理论、技术与实践[M].上海:上海交通大学出版社,2000.46-133. ] [2] ZHANG Shensheng,HUANG Yue,CAO Jian,et al. Application for mass custom collaboration commerce and integrated design system[R].Shanghai:CIT Lab, Computer Science Department, Shanghai Jiaotong University, 2001(in Chinese).[张申生,黄 越,曹 健,等. 面向大批量定制的协同商务与集成设计系统项目申请书[R].上海:上海交通大学计算机系CIT实验室,2001.]
[3] FOSTER I, KESSELMAN C, TSUDIK G, et al. A security architecture for computational grids[A].Proc.5th ACM Conference on Computer and Communications Security Conference[C]. New York:ACM Press,1998.83-92.
[4] NAOMARU I,PETER H, Practical security systems with smartcards[EB/OL].http://citeseer.nj.nec.com/itoi99practical.htm,1999.
[5] WOOLDRIDGE M, JENNINGS N R. Intelligent agents-theory and practice[J]. The Knowledge Engineering Review, 1995,10(2):115-152.
[6] PARKER T A. Single sign-on systems-the technologies and the products[J]. European Convention on Security and Dectection,1995,(5):151-155.
[7] Al Helali Adnal Hadi Mahdi, ZHANG S S. Design of the XML security systemfor electronic commerce application[J]. High Technology Letters,2003,(6):81-86.
[8] LINN J. Generic security service application program interface[EB/OL]. Version 2,rfc2078,http://www.rfc-editor.org/rfc/rfc2078.txt,1997-01.
|