G. Price, Public Key Infrastructures: A research agenda, Journal of Computer Security, vol.14, issue.5, pp.391-417, 2006.
DOI : 10.3233/JCS-2006-14502

B. Diab, W. Tohme, S. Bassil, and C. , Critical VPN security analysis and new approach for securing VOIP communications over VPN networks WMuNeP '07, Proceedings of the 3rd ACM Workshop on Wireless Multimedia Networking and Performance Modeling, pp.92-96, 2007.

C. Chou, W. C. Cheng, and L. Golubchik, Performance study of online batch-based digital signature schemes, Journal of Network and Computer Applications, vol.33, issue.2, pp.98-114, 2010.
DOI : 10.1016/j.jnca.2009.12.001

C. Zhao and F. Gao, The business process model for IT service management, pp.1494-1503, 2008.

M. Antonovich, Office and SharePoint 2007 User's Guide: Integrating SharePoint with Excel, Outlook, Access and Word (Pro) APress, 2008.

G. R. Haron, N. K. Siong, and T. F. Bee, Translation of RFC 3820 to software codes using OpenSSL primitives International Association Of Science And Technology For Development, Proceedings of the Fourth IASTED international Conference on Advances in Computer Science and Technology, pp.109-114, 2008.

V. P. Nambiar, M. Khalil-hani, and M. M. Zabidi, Accelerating the AES encryption function in OpenSSL for embedded systems, Int. J. Inf. Commun. Techol, vol.2, issue.12, pp.83-93, 2009.

H. Sun and Y. Ding, An Adaptable Method of E-Workflow Composition Based on Distributed Awareness, Proceedings of the 11th Asia-Pacific Symposium on Network Operations and Management, pp.503-506, 2008.
DOI : 10.1007/978-3-540-88623-5_62

A. Pantaleev and A. Rountev, Identifying Data Transfer Objects in EJB Applications, Fifth International Workshop on Dynamic Analysis (WODA '07), 2007.
DOI : 10.1109/WODA.2007.6

J. L. Muñoz, O. Esparza, J. Forné, and E. Pallares, ???-OCSP: A protocol to reduce the processing burden in online certificate status validation, Electronic Commerce Research, vol.29, issue.3, pp.255-273, 2008.
DOI : 10.1007/s10660-008-9024-y

J. Policelli, Active Directory Domain Services, How-To, 2008.

T. C. De-souza, J. E. Martina, C. , and R. F. , Audit and backup procedures for hardware security modules, Proceedings of the 7th symposium on Identity and trust on the Internet , IDtrust '08, pp.89-97, 2008.
DOI : 10.1145/1373290.1373302