共 4 条
[2]
A component mining approach to incubate Grid services in object-oriented legacy systems[J] . Jian-Zhi Li,Zhuo-Peng Zhang,Bing Qiao,Hong-Ji Yang.International Journal of Automation and Computing . 2006 (1)
[3]
Enforcing security and safety models with an information flow analysis tool[J] . Roderick Chapman,Adrian Hilton.ACM SIGAda Ada Letters . 2004 (4)
[4]
Whitepaper on Liberty Pro-tocol and Identity Theft 2004 .2 Liberty Alliance Project. http://www.projectliberty.org . 2008