4CURRIE W L. A knowledge-based risk assessment frame work for evaluating web-enabled application outsourcing projects[J]. International Journal of Project Management Volume: 21, Issue: 3, April, 2003: 207-217.
5SMITH M A, KUMAR R L. A theory of application service provider (ASP) use from a client perspective[J]. Information & Management Volume: 41, Issue: 8, November, 2004: 977- 1002.
2Sondhu R S, Coyne Ei, FeiMtein H L, Youman C E. Role-Based Access control Models. IEEE Computer, 1996,29 ( 2 ) : 38-47.
3Hfisto Koshutanski, Fabio Massacci. An Access Control Framework for Business Processes for Web Services. ACM Workshop on XML Securfly, October 31, 2003:1S -24.
4Park J S, Sandhu R S. Binding identities and attributes using digitally signed certificates[A]. In Proceedings of 16th Annual Conference on Computer Security Application [ C ]. [ s. l. ]:IEEE Press,2000. 120- 127.
5Sandhu R S, Coyne E J, Feinstein H L, et al. Role- based access control models [ J ]. IEEE Computer, 1996,29 (2): 38 -47.
6HOWES T, SMITH M, GOOD G. Understanding and Deploying LDAP Directory Services[ M]. Indianapolis. IN: Macmillan Publishing Co., Inc., 1999.
7WAGNER D, SCHNEIER B. Analysis of the SSL 3.0 protocol[ A]. In Procecings of the USENIX Conferenec on Electronic Commerce[C]. Berkeley, CA: USENIX Assoc., 1996.29 - 40.