[1]
Yin Jianzhang. Research on XML-Based Application Layer Data Exchange Technology [J]. Computer and Modernization, 2009, (8): 97-100, 104.
Google Scholar
[2]
Xu W. Research on the Business Component Design of Enterprise Information System [D]. Beihang University, (2008).
Google Scholar
[3]
R. Kraft. Designing a Distributed Access Control Processor for Network Services on the Web [J]. Proceedings of the 2002 ACM workshop on XML security, 2002: 36-52.
DOI: 10.1145/764792.764799
Google Scholar
[4]
Kang Ping. COM Package Technology and Application in Three Layers of Structure Model [J]. Microelectronics & Computer, 2005, 22 (6): 181-183.
Google Scholar
[5]
R. Kraft. Research and Design Issues of Access Control for network services on the web [J]. The 3rd International Conference on Internet Computing (IC 2002), 2002, (3): 542-548.
Google Scholar
[6]
Liu Meixiang. Multi-Database System Based on COM / DCOM [D]. Kunming University of Science and Technology, (2002).
Google Scholar
[7]
Chen Zheng. Data Mining Research Based On XML Database [D]. Huazhong University of Science and Technology, Master's degree thesis, Computer Application Technology Specialty, (2006).
Google Scholar
[8]
T. Modi. WSIL: Do We Nneed Another Web Services Specification? http: /www. webservicesarchitect. com/content/articles/modi01. asp, (2002).
Google Scholar
[9]
Ding Feng, Shen Junyi, Zhao Tianhai. Research and Implementation of Mapping Relational Database to Extensible Markup Language Document [J]. Journal of Xi'an Jiaotong University, 2002, 6(10): 1066~1069.
Google Scholar
[10]
Tu Yanhui, Dai Shijian. Data Security and Programming Techniques [M]. Beijing: Tsinghua University Press, (2005).
Google Scholar
[11]
Liu Chunxia, Chen Dianbo. Realization of Heterogeneous Data Sources Sharing Using ODBC technology [J]. Computer & Digital Engineering, 2007, (2): 154-156.
Google Scholar
[12]
Qu Bin, Wang Fenglin. Guidelines throughout Visual Basic Program Design [M]. Beijing: Publishing House of Electronics Industry, (2009).
Google Scholar