References
References
- Balacheff B Chen L Plaquin D Proudler G 2001 A trusted process to digitally sign a document Proceedings of the 2001 Workshop on New Security Paradigms pp. 79–86
- Benchiao J 1998 RADIUS: rapid application delivery, installation and upgrade system Proceedings, Technology of Object-Oriented Languages 180 186
- Chen D Sun C 2001 Optimal instant locking in distributed collaborative graphics editing systems Proceedings of the 8th International Conference on Parallel and Distributed Systems pp. 109–166
- Dasigi V 1998 Information fusion experiments for text classification IEEE Information Technology Conference pp. 23–26
- Dengel , A . 1997 . Bridging the media gap from the Guthenberg's world to electronic document management systems . IEEE International Conference on Systems, Man, and Cybernetics, Computational Cybernetics and Simulation , 4 : 3540 – 3545 .
- Devanbu P Gertz M Kwong A Martel C Nuckolls G Stubblebine SG 2001 Flexible authentication of XML document Proceedings of the 8th ACM conference on Computer and Communications Security pp. 136–145
- Farkas , J . 1993 . Neural networks and document classification . Canadian Conference on Electrical and Computer Engineering , 1 : 1 – 4 .
- Hahn , J . 1999 . The committee support system . Computer Standards and Interfaces , 20 ( 4–5 ) : 231 – 241 .
- Ho KS Leong HV Lam W 2001 A collaborative word processing system using a COBRA-based workflow framework Proceedings of the 3rd International Symposium on Distributed Objects and Applications pp. 176–185
- Hou , J-L , Trappey , CV and Trappey , AJC . 2001 . A web-based document server for knowledge management in a supply chain . International Journal of Agile Manufacturing , 5 ( 1 ) : 77 – 87 .
- Israel , JE and Linden , TA . 1983 . Authentication in office system Internetworks . ACM Transactions on Information Systems , 1 ( 3 ) : 193 – 210 .
- Jurecic M Bunz H 1994 Exchange of patient records – prototype implementation of a security attributes service in X.500 Proceedings of the 1st ACM conference on Computer and Communications Security pp. 30–38
- Krulwich B 1995 Learning document category descriptions through the extraction of semantically significant phrases The IJCAI Workshop on Data Engineering for Inductive Learning pp. 1–10
- Kwong A Gertz M 2001 Authentic publication of XML document data Proceedings of the Second International Conference on Web Information Systems Engineering pp. 331–340
- Lam , W and Low , K-F . 1997 . Automatic document classification based on probabilistic reasoning: model and performance analysis . IEEE International Conference on Systems, Man, and Cybernetics, Computational Cybernetics and Simulation , 3 : 2719 – 2723 .
- Lee , JY . 2001 . Threshold signature scheme with multiple signing policies . IEE Proceedings-Computers and Digital Techniques , 148 ( 2 ) : 95 – 99 .
- Russell S 1993 Transparent cosignatures for electronic documents Proceedings of the Ninth Annual Conference on Computer Security Applications pp. 82–91
- Sun , M-T and Hou , J-L . 2002 . The architecture and models for security reasoning in an EDMS . Journal of the Chinese Society of Industrial Engineers , 20 ( 4 ) : 305 – 316 .
- Sun QB Feng PR Deng R 2001 An optical watermarking solution for authenticating printed documents Proceedings of the International Conference on Information Technology: Coding and Computing pp. 65–70
- Takase T Uramoto N Baba K 2002 XML digital signature system independent of existing applications Proceedings of Symposium on Applications and the Internet Workshops pp. 150–157