P1: JDW
Sahai WL040/Bidgolio-Vol I WL040-Sample.cls July 16, 2003 18:35 Char Count= 0
REFERENCES 767BEA Systems, Intalio, SAP AG, and Sun Microsystems
(2002). Web Service Choreography Interface (WSCI)
1.0 Specification. Retrieved November 2002 from
http://wwws.sun.com/software/xml/developers/wsci
Berners-Lee, T. (1996, August).The World Wide Web: Past,
present and future. Retrieved November 2002 from
http://www.w3.org/People/Berners-Lee/1996/ppf.html
Chaum, D. (1985). Security without identification: Trans-
action systems to make Big Brother obsolete.Commu-
nications of the ACM, 28.
CryptoLogic Ecash FAQ(2002). Retrieved November 2002
from http://www.cryptologic.com/faq/faq-ecash.html
DAML: The DARPA Agent Markup Language Home-
page (2001). Retrieved November 2002 from http://
http://www.daml.org
Digital Certificates, CCITT (1988). Recommendation
X.509: The Directory—Authentication Framework.
ebXML: Enabling a global electronic market (2001). Re-
trieved November 2002 from http://www.ebxml.org
Ford, W., Hallam-Baker, P., Fox, B., Dillaway, B., LaMac-
chia, B., Epstein, J., & Lapp, J. (2001, March 30).
XML key management specification (XKMS). Retrieved
November 2002 from http://www.w3.org/TR/xkms
Glassman S., Manasse, M., Abadi, M., Gauthier P., Sobal-
varo, P. (2000). The Millicent Protocol for Inexpensive
Electronic Commerce. Retrieved November 2002 from
http://www.w3.org/Conferences/WWW4/Papers/246/
Graupner, S., Kotov, V., & Trinks, H. (2002). Resource-
sharing and service deployment in virtual data centers.
InIEEE Workshop on Resource Sharing in Massively
Distributed Systems (RESH’02). New York: IEEE.
Hallam-Baker, P., & Maler, E. (Eds.). (2002, March 29).
Assertions and protocol for the OASIS Security As-
sertion Markup Language. Retrieved November 2002
from http://www.oasis-open.org/committees/security/
docs/draft-sstc-core-29.pdf
Karp, A., Gupta, R., Rozas, G., Banerji, A. (2001). The
Client Utility Architecture: The Precursor to E-speak,
HP Technical Report. Retrieved November 2002
from http://lib.hpl.hp.com/techpubs/2001/HPL-2001-
136.html
HP Utility Data Center: Enabling the adaptive infrastruc-
ture. (2002, November). Retrieved November 2002
from http://www.hp.com/go/hpudc
Kim, W., Graupner, S., & Sahai, A. (2002, January 7–
10). A secure platform for peer-to-peer computing in
the Internet. Paper presented at 35th Hawaii Inter-
national Conference on System Science (HICSS-35),
Hawaii.
Kuno, H., & Sahai, A. (2002).My agent wants to talk to your
service: Personalizing Web services through agents. Re-
trieved November 2002 from http://www.hpl.hp.com/
techreports/2002/HPL-2002-114
IBM Autonomic Computing(n.d.). Retrieved from http://
http://www.research.ibm.com/autonomic/
Leymann, F. (Ed.) (2001). WSFL Web services flowlanguage (WSFL 1.0). Retrieved July 2003 from
http://www.ibm.com/software/solutions/webservices/
pdf/WSFL.pdf
Liberty Alliance Project (2002). Retrieved November 2002
from http://www.projectliberty.org/
Machiraju, V., Sahai, A., & van Moorsel, A. (2002). Web
service management network: An overlay network for
federated service management. Retrieved November
2002 from http://www.hpl.hp.com/techreports/2002/
HPL-2002-234.html
Micropayments overview (2002). Retrieved Novem-
ber 2002 from http://www.w3.org/ECommerce/
Micropayments/
Microsoft .NET Passport (2002). Retrieved November
2002 from http://www.passport.com/
OASIS PKI Member Section (2002). Retrieved November
2002 from http://www.pkiforum.org/
Organization for the Advancement of Structured Informa-
tion Standards (OASIS) (2002). Retrieved November
2002 from http://www.oasis-open.org
Reagle, J. (Ed.) (2000, October 6).XML encryption require-
ments. Retrieved November 2002 from http://lists.w3.
org/Archives/Public/xml-encryption/2000Oct/att-0003/
01-06-xml-encryption-req.html
RosettaNet (2002). Retrieved November 2002 from
http://www.rosettanet.org
Sahai, A., Machiraju, V., Sayal, M., Jin, L. J., & Casati,
F. (2002). Automated SLA monitoring for Web ser-
vices. Retrieved November 2002 from http://www.
hpl.hp.com/techreports/2002/HPL-2002-191.html
Sahai, A., Machiraju, V., & Wurster, K. (2001, July).
Monitoring and controlling Internet based services.
InSecond IEEE Workshop on Internet Applications
(WIAPP’01). New York: IEEE. [Also as HP Tech. Rep.
HPL-2000—120.]
Semantic Web(2001). Retrieved November 2002 from
http://www.w3.org/2001/sw/
SET Secure Electronic Transactions LLC (2002). Re-
trieved November 2002 from http://www.setco.org/
Simple Public Key Infrastructure (SPKI). (1999).SPKI
Certificate Theory(RFC 2693).
Thatte, S. (2001). XLANG Web Services for Business
Process Design. Retrieved November 2002 from
http://www.gotdotnet.com/team/xmlwsspecs/xlang-c/
default.htm
TSpaces: Intelligent Connectionware (1999). Retrieved
November 2002 from http://www.almaden.ibm.com/
cs/TSpaces/
Van Moorsel, A. (2001).Metrics for the Internet Age—
Quality of experience and quality of business. Re-
trieved November 2002 from http://www.hpl.hp.com/
techreports/2001/HPL-2001-179.html
Weber, R. (1998).Chablis—Market analysis of digital pay-
ment systems. Retrieved November 2002 from Univer-
sity of Munich Web site: http://chablis.informatik.tu-
muenchen.de/MStudy/x-a-marketpay.html