[1]陳秀芳 (2008),在階層式點對點網路架構下以負載平衡為導向之排程機制,朝陽科技大學資訊管理系碩士論文,臺中。[2]陳慶維 (2011),在階層式雲端運算網路架構下以負載平衡為導向之排程機制,朝陽科技大學資訊管理系碩士論文,臺中。[3]S. Abraham, G. Greg and B. G. Peter(2005), Operating System Concepts, John Wiley & Sons, Inc., seventh edition.
[4]G. Casella and R. L. Berger(2002). Statistical inference (Vol. 2). Pacific Grove, CA: Duxbury.
[5]K. Aberer, M. Hauswirth and A. Salehi(2007), “Infrastructure for Data Processing in Large-scale Interconnected Sensor Networks,” Proceedings of International Conference on Mobile Data Management, pp. 198-205.
[6]A. Allam(2006), “Service-oriented Modeling and Architecture for Realization of an SOA,” Proceedings of the IEEE 2006 International Conference on Services Computing, pp. 521.
[7]E. Al-Masri and Q.H. Mahmoud(2008), “Investigating Web Services on the World Wide Web,” Proceeding of the 17th International Conference on World Wide Web, pp. 795-804.
[8]A. Andrieux, C. Karl, A. Dan, K. Keahey, H. Ludwig, T. Nakata, J. Pruyne, J. Rofrano, S. Tuecke and M. Xu(2007), “Web Services Agreement Specification (WS-Agreement),” Open Grid Forum, Vol. 128.
[9]R. Armstrong, D. Hensgen and T. Kidd(1998), “The Relative Performance of Various Mapping Algorithms is Independent of Sizable Variances in Run-Time Predictions,” Proceeding of the 7th IEEE Heterogeneous Computing Workshop, pp. 79-87.
[10]F.M. Aymerich, G. Fenu, and S.Surcis(2008), “An Approach to A cloud Computing Network,” Proceeding of the 1st International Conference on the Applications of Digital Information and Web Technologies, pp. 113-118, August 4-6.
[11]K. Birman, G. Chockler, and R. Renesse(2009), “Toward A Cloud Computing Research Agenda,” ACM SIGACT News, Vol. 40, No. 2, pp. 68-80, June.
[12]D. Boyle, S. Kim and T. Newe(2008), “Securing Wireless Sensor Networks: Security Architectures,” Journal of Networks, Vol. 3, No. 1 pp. 7.
[13]T.D. Brauna, H.J. Siegelb, N. Beckc, L.L. Bölönid, Muthucumaru Maheswarane, I.R. Albert, J.P. Robertsong, M.D. Theysh, B. Yaoi, D. Hensgenj and R.F. Freundk(2001), “A Comparison of Eleven Static Heuristics for Mapping A Class of Independent Tasks onto Heterogeneous Distributed Computing Systems,” Journal of Parallel and Distributed Computing , Vol. 61, Issue 6 , pp. 810-837.
[14]L. Breslau, D. Estrin, K. Fall, S. Floyd, J. Heidemann, A. Helmy, P. Huang, S. McCanne, K. Varadhan, Ya Xu, Haobo Yu (2000),“Advances in Network Simulation,” IEEE Computer, Vol. 33, No.5, pp. 59 - 67.
[15]S.A. Camtepte and B. Yener(2005), “Key Distribution Mechanisms for Wireless Sensor Networks: A Survey,” Technical Report, TR-05-07.
[16]H. Chan and A. Perrig(2005), “PIKE: Peer Intermediaries for Key Establishment in Sensor Networks,” Proceeding of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Vol. 1, pp. 524-535.
[17]L. Coetzee and J. Eksteen(2011), “The Internet of Things-Promise for the Future an Introduction,” Proceedings of IST- Africa Conference, pp. 1-9.
[18]M. Eid, R. Liscano and A.E. Saddik(2007), “A Universal Ontology for Sensor Networks Data,” Proceedings of the IEEE International Conference on Computational Intelligence for Measurement Systems and Applications, pp. 59-62.
[19]M. Eisenhauer, P. Rosengren and P. Antolin(2010), “Hydra: A Development Platform for Integrating Wireless Devices and Sensors into Ambient Intelligence Systems.” The Internet of Things, pp. 367-373.
[20]R.F. Freund, M. Gherrity, S. Ambrosius, M. Campbell, M. Halderman, D. Hensgen, E. Keith, T. Kidd, M. Kussow, J. D. Lima, F. Mirabile, L. Moore, B. Rust and H. J. Siegel(1998), “Scheduling Resources in Multi-User, Heterogeneous, Computing Environments with SmartNet,” Proceeding of the 7th IEEE Heterogeneous Computing Workshop, pp. 184-199.
[21]A. Gavras, A. Karila, S. Fdida, M. May and M. Potts(2007), “Future Internet Research and Experimentation: the FIRE initiative,” ACM SIGCOMM Computer Communication Review, Vol. 37, No. 3, pp.89-92.
[22]N. Gershenfeld, R. Krikorian and D. Cohen(2004), “The Internet of Things,” Scientific American, pp. 76-81, October.
[23]D. Giusto, A. Iera, G. Morabito and L. Atzori(2010), “The Internet of Things,” Proceeding of the 20th Tyrrhenian Workshop on Digital Communications, pp. 5-18.
[24]D. Guinard, V. Trifa, S. Karnouskos, P. Spiess and D. Savio(2010), “Interacting with the SOA-Based Internet of Things: Discovery, Query, Selection, and On-demand Provisioning of Web Services,” IEEE Transactions on Services Computing, Vol. 3, No. 3, pp. 223-235.
[25]R. R. Henning(1999), “Security Service Level Agreements: Quantifiable Security for the Enterprise?,” Proceeding of the ACM Workshop on New Security Paradigms, pp. 54-60.
[26]J. Honkola, H. Laine, R. Brown and O. Tyrkko(2010), “Smart-M3 Information Sharing Platform,” Proceedings of IEEE Symposium on Computers and Communications (ISCC), pp. 1041-1046.
[27]M. Junginger and Y. Lee(2002), “The Multi-Ring Topology - High-Performance Group Communication in Peer-to-Peer Networks,” Proceedings of Peer-to-Peer Computing, pp. 49-56.
[28]H. Kopetz(2011), Real-Time Systems: Design Principles for Distributed Embedded Applications, 2nd edn, 406, Springer US.
[29]B. Lai, S. Kim and I. Verbauwhede(2002), “Scalable Session Key Construction Protocol for Wireless Sensor Networks,” Proceeding of the IEEE Workshop on Large Scale Real Time and Embedded Systems, pp. 7.
[30]H. Lee, Y.H. Kim, DH. Lee and J. Lim(2007), “Classification of key management schemes for wireless sensor networks,” Proceeding of the International Workshop on Application and Security Service in Web and PervAsive eNvironments, Vol. 4537, pp. 664-673.
[31]G. Li, V. Muthusamy, and H.A. Jacobsen(2010), “A Distributed Service-oriented Architecture for Business Process Execution,” ACM Transactions on the Web (TWEB), Vol. 4, Issue 1, pp.2-33.
[32]J. Liu and F. Zhao(2005), “Towards Semantic Services for Sensor-rich Information Systems,” Proceedings of the 2th International Conference on Broadband Networks, pp. 967-974.
[33]A. Luigi, I. Antonio and M. Giacomo(2010), “The Internet of Things: a survey,” Computer Networks, Vol. 54, pp. 2787-805.
[34]J. Luna, H. Ghani, T. Vateva and N. Suri(2012), “Quantitative Assessment of Cloud Security Level Agreements: A Case Study,” Security and Cryptography, pp. 64-73.
[35]W. Mao(2004), Modern Cryptography: Theory and Practice. Prentice Hall Professional Technical Reference, New Jersey.
[36]D. Massaguer, B. Hore, M. Diallo, S. Mehrotra and N. Venkatasubramanian(2009), “Middleware for Pervasive Spaces: Balancing Privacy and Utility,” Lecture Notes in Computer Science (LNCS), Vol. 5896, pp. 247-267.
[37]E. Meshkova, J. Riihijarvi, M. Petrova and P. Mahonen(2008), “A Survey on Resource Discovery Mechanisms, Peer-to-peer and Service Discovery Frameworks,” Computer Networks, Vol. 52, No. 11, pp. 2097-2128.
[38]R.C. Merkle(1988), “A Digital Signature based on a Conventional Encryption Function,” Lecture Notes in Computer Science, Vol. 293, pp. 369-378.
[39]M.P. Papazoglou(2003), “Service-oriented Computing: Concepts, Characteristics and Directions,” Proceedings of the Fourth International Conference on Web Information Systems Engineering, pp. 3-12.
[40]J. Pasley(2005), “How BPEL and SOA are Changing Web Services Development, ” IEEE Internet Computing, Vol. 9, No. 3, pp. 60-67.
[41]A. Perrig, R. Szewczyk, V. Wen, D. Cullar and J.D. Tygar(2002), “SPINS: Security Protocols for Sensor Networks,” Wireless Networks, Vol. 8, No. 5, pp. 521-534.
[42]D. Pointcheval and J. Stern(2000), “Security Arguments for Digital Signatures and Blind Signatures,” Journal of Cryptology, Vol. 13, No. 3, pp. 361-396.
[43]M. Presser, P. Barnaghi, M. Eurich and C. Villalonga(2009), “The SENSEI Project: Integrating the Physical World with the Digital World of the Network of the Future,” IEEE Communications Magazine, Vol. 47, No. 4, pp. 1-4.
[44]X. Ren and H. Yu(2006), “Security Mechanisms for Wireless Sensor Networks,” International Journal of Computer Science and Network Security, Vol. 6, No. 3, pp. 155-156.
[45]RL. Rivest, A. Shamir and L. Adleman(1978), “A Method for Obtaining Digital Signatures and Public-key Cryptosystems,” Communications of the ACM, Vol. 21, No. 2, pp. 120-126.
[46]A.C. Sarma and J. João(2009), “Identities in the Future Internet of Things,” Wireless Personal Communications, Vol. 49, No.3, pp. 3535-363.
[47]S. E. Sarma, S. A. Weis and D. W. Engels(2002), “RFID Systems and Security and Privacy Implications,” Proceeding of the 4th International Workshop on Cryptographic Hardware and Embedded Systems, pp.454-469.
[48]R. Schoenen and B.H. Walke(2007), “On PHY and MAC Performance of 3G-LTE in a Multi-hop Cellular Environment,” Proceeding of the International Conference on Wireless Communications, Networking and Mobile Computing, pp. 926-929.
[49]D. Sun and B. He(2006), “Review of Key Management Mechanisms in Wireless Sensor Networks,” Acta Automatica Sinica, Vol. 32, No. 6, pp. 900-906.
[50]T. Teixeira, S. Hachem, V. Issarny and N. Georgantas(2011), “Service Oriented Middleware for the Internet of Things: A Perspective,” Towards a Service-Based Internet Lecture Notes in Computer Science, Vol. 6994, pp 220-229.
[51]B. Wang(2009), “Review on Internet of Things,” Journal of Electronic Measurement and Instrument, Vol. 23, No. 12.
[52]E. Welbourne, L. Battle, G. Cole, K. Gould, K. Rector, S. Raymer, M. Balazinska and G. Borriello(2009), “Building the Internet of Things using RFID: The RFID Ecosystem Experience,” IEEE Internet Computing, Vol. 13, No.3, pp. 48-55.
[53]Y. Xiao(2007), Security in Distributed, Grid, Mobile and Pervasive Computing, CRC Press, Auerbach Publications.
[54]Y. Xue, L. Zhihua, G. Zhenmin and Z. Haitao(2012), “A Multi-layer Security Model for Internet of Things,” Internet of Things Communications in Computer and Information Science, Vol. 312, pp 388-393.
[55]K.Q. Yan, S.C. Wang, C.P. Chang, and J.S. Lin(2006), “A Hybrid Load Balancing Policy Underlying Grid Computing Environment,” Computer Standards & Interfaces, Vol. 29, No. 2, pp. 161-173.
[56]S.P. Yen, S. Talwar, S.C. Lee and H. Kim(2008), “WiMax Femtocells: a Perspective on Network Architecture, Capacity, and Coverage,” IEEE Communications Magazine, Vol. 46, No. 10, pp. 58-65.
[57]W. Zhang and K. Hansen(2008), “Semantic Web Based Self-management for a Pervasive Service Middleware,” Proceedings of the 2th IEEE International Conference on Self-Adaptive and Self-Organizing Systems, pp. 245-254.
[58]W. Zhang and K. Hansen(2009), “An Evaluation of the NSGA-II and MOCell Genetic Algorithms for Self-management Planning in a Pervasive Service Middleware.” Proceedings of the 14th IEEE International Conference on Engineering of Complex Computer Systems, pp. 192-201.
[59]J. Zhang and V. Varadharajan(2010), “Wireless Sensor Network Key Management Survey and Taxonomy,” Journal of Network and Computer Applications, Vol. 33, No. 2, pp.63-75.
[60]Q. Zhou and J. Zhang(2011), “Research Prospect of Internet of Things Geography,” Proceeding of the 19th International Conf. on Geoinformatics, pp.1-5.
[61]F. Zhu, M. Mutka and L. Ni(2005), “Service Discovery in Pervasive Computing Environments,” IEEE Pervasive Computing, Vol. 4, No. 4, pp. 81-90.
[62]S. Zhu, S. Setia and S. Jajodia(2006), “LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks,” ACM Transactions on Sensor Networks (TOSN), Vol. 2, No. 4, pp. 62-72.
[63]CoBIs project, Cobis final project report deliverable 104 v 2.0, Tech. Rep., 2007, http://www.cobis-online.de/files/Deliverable_D104V2.pdf, October 10, 2015 Retrieved.
[64]European Commission, “ICT in FP7” http://www.libnet.sh.cn:82/gate/big5/cordis.europa.eu/fp7/ict/, October 10, 2015 Retrieved.
[65]M. Dekker and G. Hogben(2011), “Survey and Analysis of Security Parameters in Cloud SLAs Across the European Public Sector,” European Union Agency for Network and Information Security, ht3PS://www.enisa.europa.eu/activities/Resilience-and-CIIP/cloud-computing/survey-and-analysis-of-security-parameters-in-cloud-slas-across-the-european-public-sector, October 10, 2015 Retrieved.
[66]International Telecommunications Union, 2005, ITU Internet Reports 2005: The Internet of Things. Executive Summary, Geneva: ITU, October 10, 2015 Retrieved.
[67]Microsoft, “SOA Overview,” Nov. 2012, http://www.microsoft.com/taiwan/msdn/columns/soa/SOA_overview_2004112901.htm, October 10, 2015 Retrieved.
[68]MIT, “MIT Auto-ID Laboratory,” 2010, http://autoid.mit.edu/cs/, October 10, 2015 Retrieved.
[69]RFC2460-“IPv6” 1998, http://tools.ietf. org/html/rfc2460, October 10, 2015 Retrieved.
[70]The Network Simulator - ns-2l, August 2010, http://www.isi.edu/nsnam/ns/, October 10, 2015 Retrieved.