| 研究生: |
謝碩峰 James S. F. Hsieh |
|---|---|
| 論文名稱: |
可信賴網際服務之合成與評估 Composition and Evaluation of Trustworthy Web Services |
| 指導教授: |
楊鎮華
Stephen J.H. Yang |
| 口試委員: | |
| 學位類別: |
碩士 Master |
| 系所名稱: |
資訊電機學院 - 網路學習科技研究所 Graduate Institute of Network Learning Technology |
| 畢業學年度: | 94 |
| 語文別: | 英文 |
| 論文頁數: | 55 |
| 中文關鍵詞: | 派翠網路 、本體論 、可信賴之網際服務 、組合之網際服務 、自動化運算 、信賴 |
| 外文關鍵詞: | Trustworthy Web services, Composite Web services, Ontology, Petri nets, Quality of Service (QoS), Service selection, Autonomic Computing, Trust |
| 相關次數: | 點閱:5 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
“網際服務”是種可以讓不同平台的軟體根據商業的需求做到無縫高度整合的一項技術. 目前網際服務這項技術相關的研究都著重在於描述服務的軟體介面, 還有功能性的描述, 與自動化整合的相關技術. 一個基本的服務流程可以用以下幾個簡單的步驟來說明: 服務需求者可以針對他們的需求提出服務需求的要素, 網際服務代理人會根據功能性的需求找到適合的服務提供者, 服務提供者會提供服務來滿足服務需求者的要求, 然後整個網際服務的整個流程完整結束. 因為服務所需要的資訊是藉由網路的方式傳送於不同單位的服務提供者來整合分散式鬆耦合架構的多個服務,所以存在一個重要的課題需要解決, 那就是網際服務的鬆耦合與分散架構下會造成安全性與信賴上的問題產生. 學生的論文中我嘗試提出解決方法來解決這類的問題.基本的概念就是我們可以根據過去服務執行時收集非功能性的特性與資訊來評估一個服務提供者的信賴度, 我使用彈性的Ontology架構來描述與記錄服務執行後產生的非功能性特性(服務執行過所留下的經驗), 藉由統計方法根據服務需求者所提出的信賴需求策略與過去經驗來評估一個不可分割網際服務之信賴度, 然後, 我使用了派翠網路 (Petri nets) 來描述一個合成的網際服務 (Composite web service) 之執行流程, 再根據派翠網路模擬執行過程所產生的 Coverability Graph 結合之前所計算每個不可分割服務的信賴度之結果來評估一個合成之網際服務的整體信賴程度. 這樣的方式將比傳統的方法更可以完整的評估一個合成之網際服務是否在服務需求者的要求之下是值得信賴的.
Web service technology enables seamlessly integration of different software to fulfill dynamic business demands in a platform-neutral fashion. By means of standard interfaces, service requesters can obtain desired functionalities through certain service discovery mechanism and service providers can offer the functionality to service requesters without exposing details of provided services. However, the adoption of loosely coupled and distributed services will cause trustworthiness problems. In this these, I used ontology to describe experience and utilize statistical techniques along with Petri nets to conduct a trustworthy evaluation method for composite Web services. The degree of trustworthiness of all involved services in an aggregated composite service will be evaluated by analyzing past experiences so that the trustworthiness of the composite service could be estimated from the evaluation.
• Aoyama, M.; Weerawarana, S., Maruyama, H., Szyperski, C., Sullivan, K., and Lea, D. (2002) “Web services engineering: promises and challenges,” Proceedings 24th International Conference on Software Engineering ICSE , 2002
• Gisolfi, D. (2001) “An Introduction to dynamic e-business,” IBM Developer, from http://www-128.ibm.com/developerworks/webservices/library/ws-arc1/index.html
• Yang, S., Lan, B., and Chung, J.Y. (2005) “Trustworthy Service-Oriented Business Process Integration,” International Journal of Service Process Modeling (IJSPM).
• Grandison, T. and Sloman, M. (2000) “A Survey of Trust in Internet Applications,” IEEE Communications Surveys, pp.2-16.
• Microsoft, IBM, and VeriSign (2002) “Specification: Web Services Security (WS-Security),” from http://www-128.ibm.com/developerworks/library/ws-secure/
• Microsoft, IBM, and VeriSign (2004) “Web Services Policy Framework (WS-Policy) ,” from http://ifr.sap.com/ws-policy/ws-policy.pdf
• IBM, BEA Systems, Microsoft, Layer 7 Technologies, Oblix, VeriSign, Actional, Computer Associates, OpenNetwork Technologies, Ping Identity, Reactivity, and RSA Security, (2004) “Web Services Trust Language,” from http://www-128.ibm.com/developerworks/webservices/library/specification/ws-trust/
• Anthony, N., Chris, K., Phillip H., and Ronald, M. (2004) “Web Services Security: SOAP Message Security 1.0 (WS-Security 2004),” from http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0
• Box et al, D. (2003) “Web Services Policy Framework (WS-Policy) Specification Version 1.01,” from http://www-106.ibm.com/developerworks/library/ws-polfram/
• IBM Corporation (2003) “Web Services Level Agreements,” from http://www.research.ibm.com/wsla/WSLASpecV1-20030128.pdf
• Mani, A. and Nagarajan, A. (2002) “Understanding Quality of Service for Web Services,” from http://www-106.ibm.com/developerworks/webservices/library/ws-quality.html
• Jøsang, A. (1999) “An Algebra for Assessing Trust in Certification Chains”. In J. Kochmar, editor, Proceedings of the Network and Distributed Systems Security Symposium (NDSS’99). The Internet Society.
• Jøsang, A. (1999) “Trust-based Decision Making for Electronic Transactions,” The 4th Nordic Wksp. Secure IT Systems (NORDSEC’ 99), Stockholm, Sweden: Stockholm University Report 99-005.
• Huhns, M.N. and Buell, D.A. (2002) “Trusted autonomy,” IEEE Internet Computing, pp.92-95.
• Patrick, A.S. (2002) “Building Trustworthy Software Agents,” IEEE Computing, pp.46-53.
• Singh, M.P. (2002) “Trustworthy Service Composition: Challenges and Research Questions,” Proceedings of the Autonomous Agents and Multi-Agent Systems Workshop on Deception, Fraud and Trust in Agent Societies, pp. 39-52.
• Yolum, P. and Singh, M.P. (2002) “An Agent-Based Approach for Trustworthy Service Location,” Proceedings of 1st International Workshop on Agents and Peer-to-Peer Computing (AP2PC), pp. 45-56.
• Maximilien, E. M. and Singh ,M. P. (2002) “Conceptual Model of Web Service Reputation,” SIGMOD Record, 31(4):36–41
• Maximilien, E. M. and Singh, M. P. (2004). “A Framework and Ontology for Dynamic Web Services Selection,” IEEE Internet Computing, 8(5):84–93
• Staab, S., Bhargava, B., Lilien, L., Rosenthal, A. et al (2004) “The Pudding of Trust,” IEEE Intelligent Systems, pp. 74-88.
• Shadbolt, N. (2002) “A Matter of Trust,” IEEE Intelligent Systems, pp. 2-3.
• Bertino, E. and Squicciarini, A. C. (2004) “Trust-X: A Peer-to-Peer Framework for Trust Establishment,” IEEE Transactions on Knowledge and Data Engineering, Vol. 16, No. 7, pp. 827-842.
• McKnight, D.H. and Chervany, N.L. (1996) “The Meanings of Trust,” MISRC 96-04, University of Minnesota, Management Information Systems Research Center, University of Minnesota.
• Nuutila, E. and Soisalon-Soininen, E.(1994) “On finding the strongly connected components in a directed graph,” Information Processing Letters
• Marsh, S.P. (1994) “Formalising Trust as a Computational Concept,” from http://www.cs.stir.ac.uk/research/publications/techreps/pdf/TR133.pdf
• Yolum, P. and Singh, M. P. (2005) “Engineering Self-Organizing Referral Networks for Trustworthy Service Selection,” IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, Vol. 35, No. 3, pp. 396-407.
• Golbeck, J., Parsia, J. and Hendler, B. (2003) “Trust Networks on the Semantic Web,” Proceedings of Cooperative Intelligent Agents.
• Golbeck, J. and Hendler, B. (2004) “Inferring Reputation on the Semantic Web,” Proceedings of 13th International Web Conference (WWW2004).
• Mitchell, T. (1997) “Machine Learning,” WCB McGraw-Hill, pp.128-141.
• Mendenhall, W. and Beaver, R.J. (1999) “Introduction to Probability and Statistics,” Duxbury Press, pp.442-446.
• Thomas, J. P., Thomas, M., and Ghinea, G.,(2003) “Modeling of Web Services Flow,” IEEE International Conference on E-Commerce, Newport Beach, California, USA, June 24 - 27, 2003, pages 391-398.
• Aalst, W.M.P. van der, Hofstede, A.H.M. ter, Kiepuszewski, B., and Barros, A.P. (2000) “Advanced Workflow Patterns,” In O. Etzion en P. Scheuermann, editors, 7th International Conference on Cooperative Information Systems (CoopIS 2000), volume 1901 of Lecture Notes in Computer Science, pages 1829.
• Narayanan S and McIlraith S A, (2002) “Simulation, Verification and Automated Composition of Web Services,” Proceedings ACM WWW 2002, pp. 77-88 23
• Karp, R.M. and Miller, R.E. (1969) “Parallel Program Schemata,” Journal of Computer and System Sciences 3, pp.
• Finkel, A. (1993), “The Minimal Coverability Graph for Petri Nets,” Advances in Petri Nets 1993, Lecture Notes in Computer Science, Vol. 674, pp. 210-243, Springer Verlag.
• Murata, T. (1989) “Petri Nets: Properties, Analysis and Applications,” Proceedings of the IEEE Vol.77, No. 4, pp.541-580.
• Cormen, T.H., Leiserson, C.E. and Rivest, R.L. (1999) “Introduction to Algorithms,” The MIT Press and McGraw-Hill, pp.489-490.
• Noy, N. F. and McGuinness, D. L. (2001) “Ontology development 101: a guide to creating your first ontology,” Stanford Knowledge Systems Laboratory Technical Report KSL-01-05 and Stanford Medical Informatics Technical Report SMI-2001-0880. 2001.
• Castellanos, M., Casati, F., Shan, M. C., and Dayal, U. (2004) “Visibility and Measurability for Trust Management in Cooperative Business Operations,” IEEE CEC-East, pp. 92 – 99, 2004.
• Zhang, J., Zhang, L. J., and Chung, J. Y. (2004) “An Approach to Help Select Trustworthy Web Services,” IEEE CEC-East, pp. 84 – 91, 2004.
• Liu, P., and Chen, Z. (2004) “An Extended RBAC Model for Web Services in Business Process,” IEEE CEC-East, 24 pp.100 – 107, 2004.