[1] Dustdar S, Schreiner W. A survey on Web services composition[J]. International Journal of Web and Grid Services, 2005,1(1):1-30.
[2] Bansal G, Zahedi F M, Gefen D. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online[J]. Decision Support Systems, 2010,49(2):138-150.
[3] Singh M P. Privacy for telecom services[J]. IEEE Internet Computing, 2002,6(1):4-5.
[4] Goldberg I, Wagner D, Brewer E. Privacy-enhancing technologies for the Internet[C]// Proceedings of the 42nd IEEE International Computer Conference. 1997:103.
[5] Xu Wei, Venkatakrishnan V N, Sekar R, et al. A framework for building privacy-conscious composite Web services[C]// Proceedings of the IEEE International Conference on Web Services. 2006:655-662.
[6] 徐万江. 一种保护用户隐私的Web服务组合框架[J]. 计算机与现代化, 2012(3):89-92.
[7] Li Yinhua, Paik H Y, Benatallah B. Formal consistency verification between BPEL process and privacy policy[C]// Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services. 2006:212-223.
[8] 刘林源,李清,祝义,等. Web服务组合中的隐私需求规约与验证[J]. 解放军理工大学学报(自然科学版), 2012,13(1):27-33.
[9] Liu Linyuan, Zhu Haibin, Huang Zhiqiu. Analysis of the minimal privacy disclosure for Web services collaborations with role mechanisms[J]. Expert Systems with Applications, 2011,38(4):4540-4549.
[10]Liu Linyuan, Zhu Haibin, Huang Zhiqiu, et al. Minimal privacy authorization in Web services collaboration[J]. Computer Standards & Interfaces, 2011,33(3):332-343.
[11]Barth A, Mitchell J, Datta A, et al. Privacy and Utility in Business Processes[C]// Proceedings of the 20th IEEE Computer Security Foundations Symposium. 2007:279-294.
[12]赵亮,黄志球,刘林源. Web服务组装中的隐私暴露分析方法[J]. 计算机科学与探索, 2012,6(4):319-326.
[13]Papazoglou M P. The challenges of service evolution[C]// Proceedings of the 20th International Conference on Advanced Information Systems Engineering. 2008:1-15.
[14]Liu Xumin, Bouguettaya A, Wu J, et al. Ev-lcs: A system for the evolution of long-term composed services[J]. IEEE Transactions on Services Computing, 2013,6(1):102-115.
[15]Madhavji N H. The prism model of changes[C]// Proceedings of the 13th International Conference on Software Engineering. 1991:166-177.
[16]van der Aalst W M P, Basten T. Inheritance of workflows: An approach to tackling problems related to change[J]. Theoretical Computer Science, 2002,270(1-2):125-203.
|