3Foster I, Kesselman C, Tsudik G, et al. A security architecture for computational grids[A]. In: Reiter M, ed. Proceedings of the 5^th ACM conference on computer and communications security[J]. New York: ACM Press, 1998.83 ~ 91.
5Tuecke S, Engert D, Foster I. Internet X .509 public key infrastructure proxy certificate profile [ EB/OL]. http://caops. es. net/documents/certprofile, doc, 200.1.
6Wong C, Gouda M, Lain S. Secure group communications using key graphs[ EB/OL]. hup://www.acm. org/sigcomm/sigcomm98/ rp/paper06, pdf, 1998.
7Aissi S, Malu P, Srinnivasan K. E-business Process Modeling: The Next Big Step. Computer, 2002, 35(5): 55-62.
8Yang Jian, Papazoglou M P, van den Heuvel W J. Tackling the Challenges of Service Composition in E-marketplace. IEEE 12^th International Workshop on Research Issues in Data Engineering:Engineering E-commerce/E-business Systems (RIDE02), 2002:125.
9Kwak M, Han D, Shim J. A Framework for Dynamic Workflow Interoperation Using Multi-subprocess Task. IEEE RIDE02, 2002:93-100.
10Hofreiter B, Huemer C, Klas W. ebXML: Status, Research Issues and Obstacles. IEEE RIDE02, 2002:7-16.