[1] 韩燕波. 《面向服务的计算》专辑介绍[J]. 计算机学报, 2006, 29(7): 1009-1010. Han Yanbo. Service-oriented computing album introduced[J]. Chinese Journal of Computers, 2006, 29(7): 1009-1010. [2] 岳昆, 王晓玲, 周傲英. Web服务核心支撑技术:研究综述[J]. 软件学报, 2004, 15(3): 428-442. Yue Kun, Wang Xiaoling, Zhou Aoying. Underlying techniques for web services: a survey[J]. Journal of Software, 2004, 15(3): 428-442. [3] 廖渊, 唐磊, 李明树. 一种基于QoS的服务构件组合方法[J]. 计算机学报, 2005, 28(4): 627-634. Liao Yuan, Tang Lei, Li Mingshu. A method of QoS-aware service component composition[J]. Chinese Journal of Computers, 2005, 28(4): 627-634. [4] Tosic V. Service offerings for XML web services and their management applications. Ottawa: Carleton University, 2004. [5] Benatallah B, Dumas M, Sheng Q Z, et al. Declarative composition and peer-to-peer provisioning of dynamic web services//ICDE 2002. San Jose CA :IEEE Press, 2002: 297-308. [6] 陈彦萍, 李增智, 郭志胜, 等. Web服务组合中基于服务质量的服务选择算法[J]. 西安交通大学学报, 2006, 40(8): 897-900. Chen Yanping, Li Zengzhi, Guo Zhisheng, et al. Service selection algorithm based on quality of service and its implementation for web services composition[J]. Journal of Xi’an Jiaotong University, 2006, 40(8): 897-900. [7] Liu Y T, Ngu AHHL, Zeng L. QoS computation and policing in dynamic web service selection//WWW 2004. New York: ACM Press, 2004: 66-73. [8] Zeng L Z, Benatallah B, Dumas M. Quality driven web service composition//WWW2003. Budapest: ACM Press, 2003: 411-421. [9] 赵俊峰, 谢冰, 张路, 等. 一种支持领域特性的web服务组装方法[J]. 计算机学报, 2005, 28(4): 731-738. Zhao Junfeng, Xie Bing, Zhang Lu, et al. A web services composition method supporting domain feature[J]. Chinese Journal of Computers, 2005, 28(4): 731-738. [10] 崔逊学, 林闯. 一种带约束的多目标服务质量路由算法[J]. 计算机研究与发展, 2004(8): 1368-1375. Cui Xunxue, Lin Chuang. A constrained quality of service routing algorithm with multiple objectives[J]. Journal of Computer Research and Development, 2004(8): 1368-1375. [11] Salman A, Ahmad I. Particle swarm optimization for task assignment problem[J]. Microprocessor and Microsystems, 2002, 26(8): 363-371. [12] Kennedy J, Eberhart R. Particle swarm optimization//IEEE Int'1 Conf Neural Networks. Piscataway, NJ: IEEE Service Center, 1995: 1942-1948. [13] Eberhart R, Kennedy J. A new optimizer using particle swarm theory//Proceedings Sixth International Symposium on Micro Machine and Human Science. Nagoya: , 1995: 39-43. [14] Yu T, Lin K J. Service selection algorithms for web services with end-to-end QoS constraints//CEC 2004. Calfornia: IEEE Press, 2004: 129-136. (上接第62页) [2] Lee S M, Hwang Y J, Lee D H. Efficient authentication for low-cost RFID systems//International Conference on Computational Science and Its Applications(ICCSA2005). Berlin: Springer-Verlag, 2005: 619-627. [3] Tsudik G. YA-TRAP: yet another trivial RFID authentication protocol//4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops. Washington: IEEE Press, 2006: 640-651. [4] Le T, Burmester M, Medeiros de B. Universally composable and forward secure RFID authentication and authenticated key exchange//ACM Symposium on Information, Computer, and Communications Security. Singapore: ACM Press, 2007: 242-252. [5] Chien H Y. SASI: a new ultralightweight rfid authentication protocol providing strong authentication and strong integrity[J]. IEEE Transactions on Dependable and Secure Computing, 2007, 4(4): 337-340. [6] Tan C C, Sheng B, Li Q. Severless search and authentication protocols for RFID//5th Annual IEEE International Conference on Pervasive Computing and Communications. New York: IEEE Press, 2007: 24-29. [7] Canetti R. Universally composable security: a new paradigm for cryptographic protocols//42th IEEE Annual Symposium on Foundations of Computer Science. Oakland: IEEE Press, 2001: 136-145. [8] 张帆, 孙璇, 马建峰, 等. 供应链环境下通用可组合安全的RFID 通信协议[J]. 计算机学报, 2008, 31(10): 1754-1767. Zhang Fan, Sun Xuan, Ma Jianfeng, et al. A universally composable secure RFID communication protocol in supply chains[J]. Chinese Journal of Computers, 2008, 31(10): 1754-1767. |