用户名: 密码: 验证码:
网络信息资源的亲权关系模型研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
在以网络社区为代表的信息系统中,大量的信息资源(用户、软件、数据等)相互交往、渗透,形成了复杂、演变的关系,这种关系是信息活动的基础,也是构成信息系统复杂性的重要原因。研究网络信息资源间的关系,对于解决信息资源的可信判定,安全访问、审计追踪具有重要的价值和意义。比如:我们可以利用网络资源在传播过程中由于复制、修改形成的衍生关系,了解信息的演变过程,计算信息来源的可信度;可以利用信息资源间的链接、通讯等各种交互关系,对资源的安全性进行分析等等。
     如何在开放式环境下,对网络信息资源间的这种衍生和交往关系进行建模成为一个亟待解决的问题。近年来,人们提出了各种理论来描述网络信息资源间的复杂关系,比如:社会网络分析和复杂网络研究可以用来对信息资源间的交互关系进行建模,数据起源研究了数据的演变历史等,然而由于网络信息资源数目庞大、关系复杂且动态变化,难以用一个网状、图结构来描述所有对象的衍生和交往关系:①现有的社会网络和复杂网络分析方法主要关注的是网络抽象出来的结构特性,缺乏对具体关系性质及其动态特征的描述。②目前,数据起源研究主要在封闭式环境下,采用“观察者”模式获取所有的起源信息,对于开放式环境下的信息资源衍生关系建模还没有得到很好的解决。
     在信息活动中,信息资源自主交往、渗透,形成了衍生、调用、组合、协同等关系使得信息系统越来越接近社会系统、生态系统等复杂系统。从社会和历史学家的角度看,人类社会中,人们在生产、生活活动中,产生的各种关系(血缘、同乡、学术、同事等等),形成了人们交往、社会活动的基础。同样,在信息系统中信息资源间的衍生和交互关系类似于人类社会的这种血缘关系和社会关系。这种高度的相似性为描述信息资源之间复杂关系提供了一种新的思路。
     本文引入社会学中的“亲权”这一概念对网络信息资源间的衍生关系和交往关系进行统一描述。借鉴社会学中关系的描述机制,建立信息资源的亲权关系模型,描述信息资源的复杂、演变关系。从信息资源个体的角度出发,在资源个体层面对其衍生关系和交往关系进行统一建模,然后通过关系鉴定模式实现多个资源间相互关系的判定,解决开放式环境下信息资源间复杂、演变关系的建模问题。
     在信息资源关系的表述机制上,本文借鉴人类社会血缘关系的描述机制,采用家族树描述网络信息资源的衍生关系,并且给出相关的运算结构;借鉴人类社会交往关系描述机制,采用关系网络描述信息资源间的交互关系,研究了相关的运算、演变机制和关系的生命周期。
     以网络社区为代表的信息系统已经成为社会系统的延伸,随着社会关系的嵌入,网络信息资源间的关系也具备了相应的社会性。比如:在网络游戏社区中,用户资源会形成种族、帮派、同盟、师徒、朋友等各种关系,关系之间又存在着相容、互斥、传递等各种属性约束,这些关系是游戏活动的基础。从这个角度看,信息资源间的关系是多元的,具有相应的语义。本文针对信息资源间多元关系的描述问题,建立关系属性本体,实现关系属性在概念模型上的统一,描述了关系属性的层次结构及其约束机制,研究基于描述逻辑的本体的推理机制,为关系鉴定中的推理服务提供了基础。
     由于采用基于资源个体的关系建模机制,为了判定多个信息资源间的关系,这就需要相应的关系鉴定机制。本文借鉴人类社会关系鉴定的机制,利用关系本体计算关系的语义距离,从信息资源间相近的关系出发进行关系鉴定,从而降低鉴定的复杂度。然后,分别研究了基于家族树和关系网络的三种鉴定方式:Easy模式、Common模式、Hard模式,并给出了相应的鉴定算法和解决问题的思路。
     最后,本文把亲权关系模型应用到网络社区安全,采用挑战/应答的模式,利用用户在社区中形成的各种关系作为挑战问题,实现动态身份认证;利用本体进行推理对用户设置的各种关系规则进行验证,实现权限的控制。在此基础上,建立原型系统,验证了亲权模型的有效性。
In the information system such as network community, a large number of information resources (users, software, data, etc.) interact each other, they form complex relationship which is not only the base of various information activities, but also a important reasons of complex information system.It is important for researching these relationship,we can make use of them to solve some question: information trust,access control,audit and track etc.For example,when information rescource copy,revise etc,there will form derivative relationship,we can make use of it to compute the information trust;when information rescource communicate each other, there will form interactions relationship, we can make use of it to implement security analysis.
     How to describe the relationships between information resource is a important question.In recent years, various theories have been proposed to describe the complex relationships between information resources, for example:social network analysis and complex network can be used to describe the interactions relationship between the information resources,the data origin can describe the evolution history of data, but because the large number of network information resources, relations are complex and dynamic change, difficult to use a network, graph structure to describe the interaction and derivatives relationship of all objects:①the social networks and complex network analysis are concerned with the structural characteristics of the network, lacking the the description the nature of the relationship and the dynamic characteristics.②Now, the data origin research, mainly in a closed environment, getting all the origin of information by "observer" mode. The problem about data origin under open environment have not been solved better.
     Therefore, the complex and evolving relationship of network information resources is no longer a map, network structure can describe the static relationship, but a typical complex ecosystems.From the social point of view, in human society, people form a variety of relationships (family, schoolmates, hometown, academic, colleagues, etc.) in the production and living activities, this relationship is the basis of social activities. Information activities, interaction, calling,derive, which is similar to the relationship of human society. It is similar to describe the complex relationship between information resources and human society,so we can learn form human society to describe the relationship of information resource.
     In this dissertation,we adopt the "paternity" concept to describe the interaction and derivative relationship.We learn from description mechanism of sociology, establish a parental relationship model which can describe the complexity relationship of information resources. What's more, "Local Approximation+the global" approach is adopted.From the perspective of individual information resources, describes the relationship with other resources, and then make use of the relationship identification mechanism to judge the relationship, to resolve describe question about relationship of information resources.
     In this dissertation, learn from the description of pedigree in human society, we make use of the family tree to descbibe the derivative relationship, and give an associated computing structures; learn from the description of the human social interaction mechanism,adopt relational network describle the inteactionl relationship.
     The information system has become an extension of the social system, with the social relations embedded in the information system. For example:in the online game community, users will form a race, alliances, mentor, friend and other relationships,they are the basis of game activity. From this perspective, the relationship between information resources are diverse, and they have the different semantics.As the relationship between information resources can have different types of family trees and networks, so it is nessary to describle multiple relationships of information resources.In this paper, a relationship ontology is established, which describes the hierarchy of relationship, and implement the reasoning mechanism based on descrip tion logic.
     In this dissertation,we adopt local relationship description mechanism, so it is nessary to establish a relationship identification mechanism to judg the relationship of information resource.According to complexity, we studied the three ways:Easy mode, Common Mode, Hard Mode. In order to effectively reduce the complexity, firstly,we calculate the properties of similarity relations, starting search from the close relationship.
     Finally, this parental relationship model is applied to security of the network community, adopt challenge/response mode, make use of the relationships as challenges questions, achieve dynamic authentication; make use of ontology reasoning to validate the security rules which was setted by files owner, achieve authority control. Lastly, a prototype system has been established to verify the validity of the model.
引文
[1].张树人从社会性软件、Web2.0到复杂适应信息系统研究中国人民大学博士论文2006,28-55
    [2].刘军《社会网络分析导论》2004社会科学文献出版社,14-30
    [3].欧阳莹之(英).复杂系统理论基础田保国.周亚.樊瑛等译.2002上海科技出版社..
    [4].李淮春主编.马克思主义哲学全书.北京:中国人民大学出版社.1996,第511页.
    [5].中国互联网信息中心第23次中国互联网络发展状况统计报告2009.1,第3页
    [6].腾讯网http://www.tencent.com/zh-cn/at/abouttencent.shtml
    [7].汤汇道社会网络分析法述评 学术界2009.3,205-208
    [8].约翰斯科特著,刘军译社会网络分析法2007重庆大学出版社第二版,22-40
    [9].刘军整体网分析讲义2009格致出版社上海人名出版社,1-20
    [10].肖鸿《试析当代社会网研究的若干进展》,《社会学研究》1999年第3期,1-11,
    [11].李林艳《社会空间的另一种想象一社会网络分析的结构视野》,《社会学研究》2004年第三期,64-75
    [12].马汀·奇达夫、蔡文彬《社会网络与组织》,王凤彬等译校,中国人民大学出版社,2007年,128
    [13].刘作仪复杂网络理论及相关管理复杂性研究的资助进展中国科学基金2008,13-16
    [14]. Watts D J, Strogatz S H.Collective dynamics of'small-word'networks.Nature,1998,393 (6684):440-442
    [15]. Barabasi A L,Albert R.Emergence of scaling in random networks Science,1999,286 (5439)
    [16].周涛,柏文洁,汪秉宏,刘之景,严钢复杂网络研究概述物理2005.1,31-35
    [17].陈关荣,复杂网络及其新近研究进展简介,力学进展,2008,38,653-662,
    [18].汪小帆,李翔,陈关荣复杂网络及其应用 2006.4第一版,10-11
    [19].刘喜平,万常选数据起源研究综述科技广场2005.1,47-52
    [20].李亚子数据起源标注模式与描述模型数字图书馆2007.7,10-13
    [21]. Peter Buneman, Sanjeev Khanna and Wang-Chiew Tan. Data Provenance:Some Basic Issue [EB/OL]. [2006-11-12].http://db.cis.upenn.edu/DL/fsttcs.pdf
    [22]. Y Cui, J Widom.Lineage Tracing for General Data Warehouse Transformations[C] Proceedings of 27th International Conference on Very Large Data Bases (VLDB'01), Rome, Italy,2001.
    [23]. Margo Seltzer, KiranKumar MuniswamyReddy David A. Holland, Uri Braun, Jonathan Ledlie,Provenance-Aware Storage Systems,Harvard University Computer Science Technical Report TR-18-05
    [24].董红斌,周剑,卢学裕,钱立进.基于角色模型的Linux文件血统及其安全机制,计算机工程与应用,2004年8月23期,76-77,126
    [25]. Facebook统计数据来源网站http://www.lukew.com/ff/entry.asp?882
    [26].信息系统百度百科http://baike.baidu.com/view/8231.htm?fr=ala0_1
    [27]. Tim O'reilly.What's Web2.0[EB/OL]. http://www.oreillynet.com/pub/a/oreilly/tim/ news/2005/09/30/what-is-web-20.html 2006-3-19.
    [28]. RSS 2.0 Specification http://blogs.law.harvard.edu/tech/rss
    [29].金炳华主编.马克思主义哲学大辞典.上海:上海辞书出版社.2003.第377页.
    [30].李德毅刘坤孙岩韩明畅涌现计算:从无序掌声到有序掌声的虚拟现实,中国科学2007.10,1248-1257
    [31].代根兴,周晓燕信息资源概念研究情报理论与实践1999.6397-400
    [32].冯承柏,王崇德“信息资源”的研究情报理论与实践,1996,(6)397-400
    [33].马费成,李纲,等.信息资源管理[M].武汉:武汉大学出版社,2001:2
    [34].孙玲玲对信息及信息资源本质的再认识情报探索2010.1第一期53-55
    [35].杨文祥.信息资源价值论—信息文明的价值思考[M].北京:科学出版社,2007:172-191
    [36].胡忠红,王以群,张中会谈我国网络信息资源的共建与共享南华大学学报(社会科学版) 2001年01期81-84
    [37].杨杰,陈利华试析利用网络信息资源的障碍四川图书馆学报,2000年03期,52-56
    [38].孙文峰信息资源唯一标识标准化研究世界标准化与质量管理2008年3月第3期,33-35
    [39].李金华网络研究三部曲:图论、社会网络分析与复杂网络理论华南师范大学学报(社会科学版) 2009.4,136-138
    [40].刘军.社会网络模型研究论析.社会学研究,2004(1).1-12
    [41]. Wasserman, S.& Faust, K., Social Networks Analysis:Methods and Application,Cambridge University Press.1994
    [42]. Matjaz Zaversnik.Vladimir Batagelj,Andrej Mrvar.Analysis and visualization of 2-mode networks [EB/OL].http://www-stat.uni-klu.ac.at/Tagungen/Ossiach/Zaversnik.pdf.
    [43]. Bonanich,P.,Holdren,A.C.,and Johnston,M. Hyer-edges and MultidimensionalCentrality Social Networks 2004,Volume 26, Issue 3,189-203
    [44]. Everett,M.G. and Borgatti,S.P. The Centrality of Groups and Classes Journal of Mathematical SocioSociocentricMeasures of Network Centrality social Networks 24,407-422.
    [45]. Davis, J. A.,"Clustering and Hierarchy in Interpersonal Relations:Testing Two Theoretical Models on 742 Sociograms. "American Sociological Review 35.1970 843-850
    [46]. White,H.C.,Boorman,S.A.,and Breiger,R.I. Social Structrue from Mutiple Networks.I.Blockmodels of Roles and Positions American Journal of Sociology 1976,81,730-779
    [47]. Forsyth, E.& Katz, L., A Matrix Approach to the Analysis of Sociometric Data Preliminary Report. Sociometry 1946 vol 9 No 4.340-347
    [48]. Burt,R.S. Social Contagion and Innovation:Cohesion Versus Structural Equivalence American Journal of sociology,1987 vol92No61287-1335
    [49]. Frank, O.&Strauss, D.,Markov Graphs. Journal of the American Statistical Association 1986 vol81No395 832-842
    [50].刘建香复杂网络及其在国内研究进展的综述系统科学学报2009.10 31-37
    [51]. Peter Buneman, Sanjeev Khanna, Wang-Chiew Tan. Why and Where:A Characterization of Data Provenance [J]. In:ICDT (2001), LNCS 1973:316-3301
    [52]. Carmen Pancerella, J im Myers, Larry Rahn. Data Provence in the CMCS[EB/OL]. http:/ /peop le. cs. uchicago. edu/-yongzh/papers/ProvenanceWorkshopCMCS. pdfl
    [53]. Yingwei Cui, Jennifer Widom. Practical Lineage Tracing in DataWarehouses[EB/OL]. [2007-02-11]. http://www. cs.brown. edu/courses/cs227/Papers/Lineage/trace.pdfl
    [54]. Michael Day. Provenance and Data-Intensive Science [EB/OL]. [2007-01-12]. http:/ /www. ukoln. ac. uk/p rojects/ebank-uk/p rovenance/report/draft-v01. pdfl
    [55]. A Woodruff, M Stonebraker. Supporting Fine-grained Data Lineage in a Database Visualization Environment. In:Proc of the Int'lConf on Data Engineering (IEEE ICDE), 1997.91-102
    [56]. Sudha Ram, Jun Liu A New Perspective on Semantics of Data Provenance SWPM-2009,2009.10
    [57].刘喜平 万常选 数据起源研究综述科技广场2005.147-52
    [58]. Yogesh L. Simmhan, Beth Plale, Dennis Gannon A Survey of Data Provenance Techniques ACM SIGMOD 2005.9 Volume 34, Issue 3
    [59]. I. T. Foster, J.-S. Vockler, M. Wilde, and Y. Zhao, "Chimera:A Virtual Data System for Representing, Querying, and Automating Data Derivation," in SSDBM,2002,.37-46.
    [60]. R. D. Stevens, A. J. Robinson, and C. A. Goble, "myGrid:personalised bioinformatics on the information grid," in Bioinformatics, vol.19,2003,302-304.
    [61]. C. Pancerella, J. Hewson, W. Koegler, D. Leahy, M. Lee, L. Rahn, C. Yang, J. D. Myers, B. Didier, R.McCoy, K. Schuchardt, E. Stephan, T. Windus, K. Amin, S. Bittner, C. Lansing, M. Minkoff, S. Nijsure, Gv. Laszewski, R. Pinzon, B. Ruscic, Al-Wagner, B. Wang, W. Pitz, Y.-L. Ho, D. Montoya, L. Xu, T. C.Allison, W. H. Green, Jr, and M. Frenklach, "Metadata in the collaboratory for multi-scale chemical science," in Dublin Core Conference,2003.
    [62]. A. Aiken, J. Chen, M. Stonebraker, and A. Woodruff, "Tioga-2:A Direct Manipulation Database Visualization Environment," ICDE,1996.
    [63]. J. Frew and R. Bose, "Earth System Science Workbench:A Data Management Infrastructure for Earth Science Products," in SSDBM,2001,180-189.
    [64]. P. Groth, M. Luck, and L. Moreau, "A protocol for recording provenance in service-oriented Grids," in OPODIS. Grenoble, France,2004.
    [65]. Yingwei Cui, Jennifer Widom, and Janet L. Wiener. Tracing the lineage of view data in a warehousing environment. ACM Trans. Database Syst.,25(2):179-227,2000.
    [66]. Yingwei Cui and Jennifer Widom. Lineage Tracing for General Data Warehouse Transformations. In Proceedings of the 27th International Conference on Very Large Data Bases(VLDB'01), pages 471-480, Orlando, September 2001. Morgan Kaufmann.
    [67]. Peter Buneman, Sanjeev Khanna, and Wang Chiew Tan. Why and Where:A Characterization of Data Provenance. In ICDT'01:Proceedings of the 8th International Conference on Database Theory, pages 316-330, London, UK,2001. Springer-Verlag.
    [68]. Jonathan Ledlie, Chaki Ng, David A. Holland, Kiran-Kumar Muniswamy-Reddy, UriBraun, and Margo Seltzer. Provenance-Aware Sensor Data Storage. In ICDE Workshops,page 1189, 2005.
    [69]. Seltzer, appears in 8th USENIX Conference on File and Storage Technologies (FAST'10), Feb2010.pdf
    [70]. Layering in Provenance Systems, Kiran-Kumar Muniswamy-Reddy, Uri Braun, David A. Holland, Peter Macko Diana Maclean, Daniel Margo, Margo Seltzer, and Robin Smogor, appears in 2009 USENIX Annual Technical Conference (USENIX'09), June 2009.pdf
    [71]. Causality-Based Versioning, Kiran-Kumar Muniswamy-Reddy and David A. Holland, appears in 7th USENIX Conference on File and Storage Technologies (FAST'09), Feb 2009. pdf
    [72]. Uri Braun, Avraham Shinnar, and Margo Seltzer, Securing Provenance, In Proceedings of the 3rd USENIX Workshop on Hot Topics in Security (HotSec'08), San Jose, CA, July 2008.
    [73]. Paul Groth, Simon Miles, and Luc Moreau. PReServ:Provenance Recording for Services. In Proceedings of the UK OST e-Science second All Hands Meeting 2005 (AHM'05), Nottingham,UK, September 2005.
    [74]. Peter Buneman, Adriane Chapman, and James Cheney. Provenance Management in Curated Databases. Technical Report EDIINFRR0769, The University of Edinburgh, June 2006.
    [75]. Peter Buneman, Adriane Chapman, James Cheney, and Stijn Vansummeren. A Provenance Model for Manually Curated Data. In International Provenance and Annotation Workshop. University of Edinburgh,2006.
    [76]. Laura Chiticariu, Wang-Chiew Tan, and Gaurav Vijayvargiya. DBNotes:a post-it system for
    relational databases based on provenance. In SIGMOD'05:Proceedings of the 2005 ACM SIGMOD international conference on Management of data, pages 942-944, New York, NY, USA,2005. ACM Press.
    [77]. Li, Tao; Bin, Dong Hong; Liang, Yi Wen; Liu, WeiWei Electronic document security sharing system based on lineage mechanism,3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008, IEEE Computer Society,vol2:602-606
    [78]. Li, Tao; Liang, Yiwen He Yang digital information security sharing system based on lineage model Second International Symposium on Information Processing (isip2009) Academy Publisher of Finland,121-124 2009.8
    [79]. P Buneman, S Khanna, W C Tan. Data Provenance:Some Basic Issues. In:Proc of the Foundations of Software Technology and Theoretical Computer Science Conf (FSTTCS), 2000.87-93
    [80]. D Bhagwat, L Chiticariu, W C Tan, GVijayvargiya. An Annotation Management System for Relational Databases. In:Proc of the Int'l Conf on Very Large Data Base (VLDB), 2004.900-911
    [81]. W3C. Extensible Markup Language (XML) 1.0 Specification. W3C Recommendation,1998-02-10.http://www.w3.org/TR/REC-xml
    [82]. Dan Brickley, R V Guha. Resource Description Framework(RDF) Schema Specification. Technical report, W3C,1999.W3C Proposed Recommendation [EB/OL]. http://www. w3.org/TR/PR2rdf2schema/
    [83]. S. Abiteboul, D. Quass, J. McHugh, J. Widom, and J. L. Wiener. The Lorel query language for semistructured data. International Journal on Digital Libraries,1(1):199768-88,.
    [84]. David A. Holland, Uri Braun, Diana Maclean, Kiran-Kumar Muniswamy-Reddy, and Margo Seltzer, Choosing a Data Model and Query Language for Provenance, In Second International Provenance and Annotation Workshop (IPAW'08),2008 June,.
    [85]. P. Buneman, M. F. Fernandez, and D. Suciu. UnQL:a query language and algebra for semistructured data based on structural recursion. VLDB Journal,9(1):2000 March 76-110,.
    [86]. M. F. Fernandez, D. Florescu, A. Y Levy, and D. Suciu. A query language for a web-site management system. SIGMOD Record,1997,26(3):4-11.
    [87]. M. Gyssens, J. Paredaens, J. V. den Bussche, and D. van Gucht. A graph-oriented object database model. IEEE Transactions on Knowledge and Data Engineering,6(4):,1994. 572-586
    [88].莫衡等主编.当代汉语词典.上海:上海辞书出版社.2001.
    [89].范英”人际关系和商业管理”,2003, http://hdl.handle.net/2438/2438
    [90].费孝通.乡土中国生育制度[M].北京:北京大学出版社,1998.
    [91].廖盖隆,孙连成,陈有进等主编.马克思主义百科要览·下卷.北京:人民日报出版社.1993.第1604页.
    [92].宋春明家谱档案探源兰台世界2009年23期第67页
    [93].从家谱看炎黄子孙的寻根情结新上海档案2006.9
    [94].向洪,张文贤,李开兴主编.人口科学大辞典.成都:成都科技大学出版社.1994.第262页
    [95].邓志鸿、唐世渭等ontology研究综述,北京大学学报(自然科学版),2002年9月第38卷,第5期,730-738
    [96]. Borst W N. Construction of Engineering Ontologies for Knowledge Sharing and Reuse. PhD thesis,University of Twente,Enschede,1997
    [97]. Studer R,Benjamins V R,Fensel D. Knowledge Engineering,Principles and Methods. Data and Knowledge Engineering,1998,25 (122):161~197
    [98]. Perez A G,Benjamins V R. Overview of Knowledge Sharing and Reuse Components:Ontologies and Problem Solving Methods. In:Stockholm V R,Benjamins B,Chandrasekaran A,eds. Proceedings of the IJCAI299 workshop on Ontologies and Problem2Solving Methods (KRR5) 1999,1~15
    [99].顾金睿,王芳关于本体论的研究综述情报科学2007.6 949-956
    [100]. T Berners Lee, J Hendler, O Lassila The semantic Web Scientific American,2001,284 (5):34-43
    [101]. Semantic Web Architecture [EBPOL]. http://www. w3. org/2000/Talks/1206-xml2k-tbl/slide10-0. html,2006-1-28.
    [102]. KSL,OKBC:Open Knowledge Base Connectivity. Implementations and documents [EBPOL]. http://www-ksl-svc. stanford. edu:5915/doc/release/okbc/index. html,2005-12-28.
    [103].ISI.Loom Project Hompage [EBPOL]. http://www. isi. edu/isd/LOOM-HOME. html,1999-07-12.
    [104]. The SHOE TeamPCSPUMD. SHOE Simple HTML Ontology Extensions [EBPOL]. http://www. cs. umd. Edu/projects/plusPSHOEP,2006-3-15.
    [105]. Kmi. OCML:Operational Conceptual Modeling Language [EBPOL]. Summary. http://kmi. open. ac. Uk/projects/ocml,2006-3-2.
    [106].Cycorp, Inc. The CycL of Syntax [EBPOL]. http://www. cyc.com/cycdoc/refPcycl-syntax. html,2006-03-28.
    [107]. AIPSEI. XOL:XML-based ontology-exchange language [EBPOL]. http://www. ai. sri. Com/pkarp/xol/,2006-3-2.
    [108]. Graham Klyne Jeremy J. Carroll Resource Description Framework Concepts and Abstract Syntax[EBPOL]. http://www. w3.org/TR/2003/PR-rdf-concepts-20031215P,2005-12 -28.
    [109]. Dan Brichley,R. V. Guha. RDF Vocabulary Description Language 1.0:RDF Schema[EBPOL].W3C Working Draft 23 January 2003. http://www.w3. org/TR/rdf-schema/,2005-12-28.
    [110]. OIL Steering Committee. Description of OIL-Ontology Inference layer[EBPOL] http://www. ontoknowledge. Org/oil/,2006-3-15.
    [111].DARPA's Information Exploitation Office[EBPOL]. DAML. http://www. daml. Org/,2006-3-15.
    [112]. Web Ontology Language, (OWL) Reference Version 1.0. W3CWorking Draft 12 November 2002 [EBPOL]. http://www. w3.orgPTRP2002PWD-owl-ref 20021112P,2006-3-28.
    [113].岳静,张自力本体表示语言研究综述计算机科学2006.2 158-162
    [114]. Gruber T R. Towards Principles for the Design of Ontologies Used for Knowledge Sharing. International Journal of Human2Computer Studies,1995,43:907~928
    [115].杜文华本体的构建及其在数字图书馆中的应用研究武汉大学博士论文37-41
    [116].韩婕向阳本体构建研究综述计算机应用与软件2007.9 21-23
    [117]. Sean Bechhofer, IanHorrocks,CaroleGoble,RobertStevens.OilEd:Areason-able ontology editor for the semantic Web. In:Proceedings of KI2001, JointGerman/Austrian conference on Artificial Intelligence,Vienna,Austria, Lecture Notes in Computer Science, Sep 2001, 2174:396-408.
    [118].NoyN F, SintekM,DeckerS,CrubezyM, FergersonRW,MusenM A.Creating Semantic Web Contents with Protege-2000. In IEEE Intelligent Systems,March/April2001,16(2):60-71.
    [119]. SureY, erdmannM,Angele J, Staab S, StuderR,Wenke D.OntoEdit:Collaborative Ontology Engineering for the SemanticWeb. In Interna-tionalSemanticWeb Conference2002 (ISWC2002), Sardinia, Italy,LNCS, June 2002,2342:221-235.
    [120].SwartoutB, PatilR,KnightK,RussT.Ontosaurus:a tool for browsing and editing ontologies.USC/Information Sciences Institute,Marina delRey,California,1996.
    [121].杜文华董慧本体建设工具比较研究情报杂志2005.25-7
    [122].张钋.基于语义的网络服务匹配机制的研究与实现[硕士学位论文].北京:清华大学,2005.p193-223
    [123].林汝坤,刘芳,戴长华,姚莉OWL本体建模中约束公理的应用计算机过程2006.8
    [124]. V Haarslev, Ralf Moller.RACER system description.In Proceedings of the International Joint Conference on Automated Reasoning(IJCAR 2001),volume 2083 of Lecture Notes in Artificial Intelligence,Springer,2001.701-705.
    [125]. FRANZ BAADER,DIEGO CALVANESE,DEBORAH MCGUINNESS,DANIELE NARDI,and PETER PATEL-SCHNEIDER.The Description Logic Handbook Theory,Implementation and Applications[M].Cambridge University Press,2003.
    [126].刘亚彬陈岗基于描述逻辑的空间推理研究计算机科学2004,31(8)p110-112
    [127].石莲孙吉贵描述逻辑综述计算机科学,2006,33(1):194-197
    [128].文坤梅基于本体知识库推理的语义搜索研究华中科技大学博士论文2007,33-35
    [129].张德海,朱耀 不同本体中概念语义距离的一种度量方法计算机科学2008 9期Vol 35 144-148
    [130].吴健,吴朝晖,李莹,邓水光基于本体论和词汇语义相似度的Web服务发现计算机学报2005.4 595-602
    [131]. P Ganesan,H Garcia-Molina,and J Widom.Exploiting hierarchical domain structure to compute similarity.ACM Transactions on Information Systems,2003,21(1):64--93,.
    [132].中国互联网信息中心《2009年中国网民网络信息安全状况系列报告》
    [133]. ITU-T Recommendation X.509/ISO/IEC 9594-8-2001 Information Technology—Open System Interconnection—The Directory:Public-key and Attribute Certificate Frameworks[S]. 2001.
    [134].王斌李建华基于智能卡的动态身份认证机制通讯学报2003.8 117-121
    [135]. System and method for user authentication having clock synchronization[P],美国:VS-5886065,1999.
    [136].李超,辛阳,钮心忻,杨义先一种基于生物证书的身份认证方案计算机工程2007.10 159-161
    [137].林闯,封富君,李俊山 新型网络环境下的访问控制技术软件学报Vol.18,No.4,2007.4,955-966
    [138]. R Sandhu, E Coyne, H Feinstein. Role based Access ControlModels. IEEE Computer,1996, 38-47.
    [139]. J Park, R Sandhu. TowardsUsage ControlModels:Beyond Traditional Access Control Proceedings of the 7 th ACM Symposium on Access ControlModels and Technologies, 2002.57-64
    [140].Guillou L, Ugon M, Quisquater J J. Cryptographic Authentication Protocols for Smart Cards. Computer Networks,2001,36 (4):437-451
    [141].谭成予网络社区中信任机制的血缘模型武汉大学博士论文2007

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700