基于应用服务提供商(ASP)模式的网络化制造系统若干关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
网络化制造是在信息技术发展的驱动下,为应对经济全球化的挑战而发起的一种新型制造模式。它借助于先进的网络技术和生产、管理技术,通过企业间的协同和资源共享与集成,开展覆盖整个产品生命周期各个环节的企业活动(如产品设计、制造、销售、采购和管理等),从而提高企业的核心竞争力。为了能让网络化制造的概念更快的让企业认识和接收,必须寻找一种对企业来说使用方便、费用低廉的方式。通过分析和比较,我们采用了基于应用服务提供商(ASP)的实施模式。
     在国家863计划CIMS主题资助的“浙江省块状经济区域网络化制造系统开发与应用”(项目编号:2002AA414070)项目的支撑下,本文对基于ASP的网络化制造系统的若干关键技术问题进行了比较深入的研究。
     第一章对网络化制造的诞生、网络化制造的定义、国内外网络化制造的研究现状以及实施网络化制造的意义进行了总结和阐述,分析了网络化制造系统的体系结构和系统实施过程中存在的关键问题,并在课题组承担的863项目的基础上,提出了本论文的研究目标和主要研究内容。
     第二章主要研究基于网格的网络化制造系统体系结构。首先分析了目前的网络化制造体系结构模型的优缺点,明确了体系结构设计的目标。接着介绍网格体系结构的研究情况,以及课题组所承担项目的总体目标和定位,给出了网络化制造系统的总体方案,并把网格体系结构与网络化制造系统体系结构进行结合,提出一个基于网格的网络化制造系统——制造网格体系结构。制造网格体系结构充分吸收了网格的五层结构以及网格服务为中心的思想,集成了许多Globus的支持工具包和协议,为网络化制造系统的进一步发展做出了有益的探索。
     第三章主要研究基于ASP的网络化制造系统实施模式。首先介绍了网络化制造系统的实施方针,并对网络化制造系统的实施模式进行比较和选择。接着分析了外包模式和ASP模式的发展状况以及各自的优缺点,并对这两种模式进行了比较。在这个基础上,我们提出了基于ASP的网络化制造系统实施模式,给出了网络化制造系统的ASP关系图以及一个根据用户类别、用户规模、服务类型、使用服务次数、占用资源数量等因素来确定的ASP费用模型。这个基于ASP的网络化制造系统实施模式可以很好的指导系统的实施,并能很好的拓展以应用于浙江省的其它典型区域。
     第四章研究了网络化制造系统的用户综合访问控制模型。本章描述了ASP和网络化制造系统的安全性问题,尤其是用户访问控制的问题;接着介绍了几种
    
    浙江大学博士学位论文
    典型的访问控制方法,包括强制访问控制、任意访问控制、基于角色的访问控制、
    基于任务的访问控制,以及基于公司关系的访问控制、基于企业联盟的访问控制
    等;在前面描述的典型访问控制模型基础上,给出了一个网络化制造系统的综合
    访问控制模型,包括网络化制造系统的用户和资源层次关系图、访问控制参考模
    型和访问控制过程模型,并定义了各个模型中的相关元素和关系,给出了各级约
    束验证和授权的表达;最后我们给出了以 XACML为基础的网络化制造系统的
    访问控制描述语言。
     第五章提出了基于多类队列网络客户行为模拟法的ASP站点服务器的性能分
    析与容量规划。我们首先利用客户状态转换模型直观的描述了ASP站点运行初期
    用户在ASP站点中执行的几个主要操作,以及各个功能之间的相互联系。通过客
    户状态转换模型,可以得到对ASP站点性能影响最大的几个主要操作。然后建立
    一个开放的多类队列网络模型来模拟整个ASP站点系统,找出对该站点性能影响
    最大的瓶颈服务器是数据库服务器。接着,我们进一步建立该瓶颈服务器的封闭
    多类队列网络模型,通过性能度量找到影响性能的瓶颈组件是磁盘。最后,我们
    通过使用混合队列网络模型进行分析,发现添加了一个磁盘分别存储动态和静态
    信息后CPU的利用率得到了很大提高,而磁盘的利用率也没受影响。通过这种方
    法,我们可以实现对ASP站点进行深入的性能分析,从而指导我们进行ASP站点
    的容量和体系结构规划。
     第六章中,我们结合项目开发的绍兴轻纺区域网络化制造系统,介绍了系统
    的ASP实施物理结构、运行环境和系统运行情况。
     第七章总结了本文的主要研究内容和创新之处,并对未来的研究工作进行了
    展望。
Networked Manufacturing is a new manufacturing mode, which was driven by the development of information technologies (IT), and was originated for deal with the challenge of globalization of economics. It carries on the enterprises' activities (e.g. production design, manufacturing, sailing, stock and management) that cover the whole product lifecycle by means of the advanced technologies of network, production and management, and via the cooperation and resource sharing between enterprises, thereby improve the enterprises' core competencies. In order to help the enterprises to meet and accept the networked manufacturing mode, we must find an easier and cheaper mode to implement the networked manufacturing, and we choose the application service provider mode.
    Supported by the National High-Tech. R&D Programs for CIMS, "Development and Applications of Networked Manufacturing System for Special Economic Regions in Zhejiang Province" (Grant No. 2002AA414070), we carried out deeper research on the key technologies for ASP-based networked manufacturing system.
    In the 1st chapter, the naissance, the definition, the research status and the significance of networked manufacturing were summarized and expatiated, and the key problems in the architecture and fulfillment of networked manufacturing system were analyzed. Finally, we proposed the research target and main content of this dissertation based on the project.
    In the 2~(nd) chapter, the grid-based architecture of networked manufacturing system was studied. We analyzed the relative merits of current architecture, and nailed down the target of the design of architecture. Then we proposed a grid-based architecture for networked manufacturing system by integrate the grid architecture and networked manufacturing system's architecture, we called it as manufacturing grid architecture. The manufacturing grid architecture absorbed the five-level framework of grid and the grid services idea, and integrated many supporting toolboxes and protocols of Globus, which is a helpful exploration to the development of networked manufacturing system.
    In the 3rd chapter, the Application Service Provider (ASP) based implementing mode was studied. Firstly, the implementing guideline of networked manufacturing was introduced, and then the outsourcing mode and ASP mode were compared. Based on that, we provided the ASP-based implementing mode for networked manufacturing system. This mode includes an ASP relationship graph for networked manufacturing and an ASP charging model, which was constituted according with some factors such as user classes, user scale, service style, frequency of service use, and resource occupancy and so on. The ASP-based model will give good instruction to system
    
    
    
    implementation, and can be expanded to other special economic regions in Zhejiang Province.
    In the 4th chapter, the integrated user access control model was studied. We characterized the security issues in ASP-based networked manufacturing system, especially the issue of the user access control. Then the typical methods of access control were introduced, which include Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), Task-based access control (TBAC), Coalition-Based Access Control (CBAC) and relationship-driven access control (RDAC) and so on. Based on that, we provided an integrated user access control model, which was composed of RBAC, TBAC, RDAC and CBAC. This model mainly includes the reference model and process model. Furthermore, we defined the elements and their relationships of this model, and gave the expressions of constraints authorization. Finally, we proposed a XACML-based access control markup language for networked manufacturing system.
    In the 5th chapter, the performance analysis and capacity planning for ASP site servers based on modeling the user behaviors using the multi-class queuing network. Firstly, we use the customer state transform model to characterize the functions and their relationships in ASP site, and found the
引文
[蔡铭,2002] 蔡铭,网络化制造环境中基于语义的资源智能检索、服务匹配的原理与技术研究,博士学位论文,浙江大学,2002年12月。
    [蔡铭,2003] 蔡铭,林兰芬,陈刚,董金祥,网络化制造环境中制造资源的智能发现技术研究,计算机集成制造系统-CIMS,2003,Vol.9,No.7,p.589-594。
    [程涛,1999] 程涛,胡春华,吴波,杨叔子,分布式网络化制造系统构想,中国机械工程,1999,10(11):1234-1238
    [邓锦波,2003] 邓锦波,洪帆,基于任务的访问控制模型,软件学报,2003,14(1):76-82。
    [都志辉,2002] 都志辉,陈渝,刘鹏等编著,《网格计算》,北京:清华大学出版社,2002 年10月。
    [范玉顺,2002] 范玉顺,网络化制造与制造网络[R],2002,杭州:浙江大学
    [范玉顺,2003a] 范玉顺,刘飞,祁国宁,网络化制造系统及其应用实践,北京:机械工业出版社,2003年10月。
    [范玉顺,2003b] 范玉顺,网络化制造的内涵与关键技术问题,计算机集成制造系统-CIMS,2003,Vol.9,No.7,p.576-582。
    [高丽华,2001] 高丽华,陈宏林,IT在韩国—中国IT记者团赴韩考察纪行,计算机世界,2001。
    [顾新建,2001] 顾新建,祁国宁,陈子辰,网络化制造的战略和方法——制造业在网络经济中的生存和发展,北京:高等教育出版社,2001年8月。
    [李国杰,,2001] 李国杰.信息服务网格—第三代Internet,计算机世界,2001年9月
    [刘飞,2003] 刘飞,雷琦,宋豫川,网络化制造的内涵及研究发展趋势,机械工程学报,2003,39(8):1-6。
    [刘连成,2001] 刘连成,张霖等,CIMSNET—基于Internet的现代集成制造支撑平台,计算机集成制造系统-CIMS,2001,7(5):6—9,11
    [苗剑,2003] 苗剑,刘飞,宋豫川,网络化制造平台的系统构成及功能应用,中国制造业信息化,2003,32(1):62-65。
    [王仲奇,2003] 王仲奇,李西宁,姜澄宇,面向关中高新技术产业带的网络化制造,计算机集成制造系统-CIMS,2003,Vol.9,No.8,p.711-715。
    [严隽琪,2000] 严隽琪,数字化与网络化制造,工业工程与管理,2000,Vol.5,No.01,p.8-11
    [杨涛,2003] 杨涛,王云莉,肖田元,张林骀,网络化制造环境下的资源发现研究,计算机集成制造系统-CIMS,2003,Vol.9,No.1。
    [俞诗鹏,2003] 俞诗鹏,基于角色访问控制的理论与应用研究,硕士学位论文,北京大学数学学院信息科学系,2003年5月。
    
    
    [赵刚,2003] 赵刚,江平宇,网络化制造中资源优化配置的方法研究,航空制造技术,2003,No.08,p.60-64。
    [赵爱明,2003] 赵爱明,刘东,孙林夫,成德绵区域网络化制造工程方案设计,中国制造业信息化,2003,Vol.32,No.4,p.80-83。
    [赵慧娟,2003] 赵慧娟,居文军,王淑营,殷成凤,软件资源共享及其在网络化制造系统中的应用,计算机集成制造系统-CIMS,2003,Vol.9,No.7,p.608-612。
    [赵隽琪,2002] 赵隽琪,陈德人,姚宇明等,分布式电子商务环境下电子商务平台性能模型研究[J],浙江大学学报(工学版),Vol.36,No.6,Nov.2002:624-629.
    [张彩芳,2003] 张彩芳,但斌,张旭梅,基于供应链的网络化制造体系结构,重庆大学学报(自然科学版),2003,Vol.26,No.5,p.80-85。
    [张曙,1998] 张曙,分数网络化制造[J].机械与电子,1998(5):3-6
    [郑小林,2003] 郑小林,陈德人,面向网络化制造的敏捷供应链系统研究,计算机集成制造系统-CIMS,2003,Vol.9,No.8,p.698-703。
    [郑小林,2004] 郑小林,蔡铭,王正肖,陈德人,董金祥,绍兴轻纺区域网络化制造系统研究,计算机集成制造系统-CIMS,已录用。
    [中国网,2000] 中国网,经济全球化,2000年6月,http://www.china.org.cn/ch-jingji/。
    [Abdinnour-helm, 1999] S. Abdinnour-helm, Network design in supply chain management, International Journal of Agile Management Systems, 1999, 1 (2): 99-106.
    [Abrams, 1990] Abrams MD, Eggers KW, La Padula L J, Olson IW. A generalized framework for access control: an information description. In: Proceedings of the 13th National Computer Security Conference. 1990. 135~143.
    [Abrams, 1991] Abrams MD, Heaney J, King O, LaPadula LJ, Lazear M, Olson Ⅰ. Generalized framework for access control: toward prototyping the Orgcon policy. In: Proceedings of the 14th NIST-NCSC National Computer Security Framework.
    [Ahn, 2000] Ahn Gail-Joon, Sandhu Ravi, Role-based authorization constraints specification, ACM Transactions on Information and System Security (TISSEC), 2000, 3(4): 207-226.
    [Allen, 2001] Allen Yuoko, Beyond Six Sigma: E-Manufacturing in the dot.com era (R), GEO European Conference, May 2001.
    [Amours, 1999] Amours D., Sophie; Montreuil, Benoit; Lefrancois, Pierre; Soumis, Francois, Networked manufacturing: The impact of information sharing, International Journal of Production Economics Volume: 58, Issue: 1, January 5, 1999, pp. 63-79.
    [Anas, 2003] Anas Abou El Kalam, Rania El Baida, Philippe Balbiani, et al., Organization based
    
    access control, http://www.rennes.enst-bretagne.fr/~fcuppens/articles/Or-BAC.pdf, Aug. 2003.
    [Anderson, 1999] Anderson, J.D., Internet outsourced application provides IT cost reduction, Health Management Technology, 1999, 20(6), pp.32-33.
    [Arlitt, 1996] Arlitt M.F. and Williamson C.L., Web server workload characterization: The search for invariants [A]. In Proceedings of the ACM Sigmetrics Conference[C]. Philadelphia, Pennsylvania, USA, 1996, 126-137.
    [Atluri, 1996] Atluri V, Huang WK, An authorization model for workflows, In Proceedings of the 5th European Symposium on Research in Computer Security. Lecture Notes in Computer Science Vol 1146, Springer-Verlag, 1996, pp. 44~64.
    [Bajgoric, 2000] N. Bajgoric, Web-based information access for agile management, International Journal of Agile Management Systems, 2000, 2(2): 121-129.
    [Baker, 2000] M. Baker, R. Buyya, and D. Laforenza. The Grid: International Efforts in Global Computing, In Proceedings of the International Conference on Advances in Infrastructure for Electronic Business, Science, and Education on the Internet, July 31-August 6, 2000.
    [Balasubramanian, 2001] S. Balasubramanian, R.W. Brennan, D.H. Norrie, An architecture for metamorphic control of holonic manufacturing systems, Computers in Industry, 2001, vol.46, p.13-31.
    [Bell and Lapadula, 1973] Bell, D. E. and Lapadula, L. J., "Secure computer systems: Mathematical foundations," MITRE, Technical Report MTR-2547, 1973.
    [Biba, 1977] Biba, K. J., "Integrity considerations for secure computer systems," MITRE, Technical Report TR-3153, 1977.
    [Borchers, 1996] Borchers, A.S., Information Technology Outsourcing: A Test of Organizational Economic, Strategic and Political Models, Unpublished doctoral dissertation, Nova Southwestern University, 1996.
    [Bourassa, 1998] Bourassa, N., Outsourcing IT: Achieving maximum technology and business benefits, CMA Management, 1998, 72(4), pp.21-23.
    [Briere, 1999] Briere, D., Heckart, C., Hosted applications: Look before you leap, Network World, 1999, 16(19), pp.48.
    [Browne, 1995] Browne J., P.J. Sackett, J.C. Wortmann, 1995, Furture manufacturing systems-Toward the extended enterprise, Computers in Industry 25, 235-54.
    [Buchok, 1999] Editorial: The pros and cons of ASPs, Computing Canada, 1999, 25(46), P.8.
    [CAM-I, 1995] Consortium for Advanced Manufacturing - International, Next Generation
    
    Manufacturing Systems (NGMS) IMS Program, http://www.cam-i.org/ngms.html
    [Camarinha-Matos, 1998] Camarinha-Matos L.M. and C.P. Lima, A framework for cooperation in virtual enterprises, Proceeding of DIISSM'98, 1998.
    [Camarinha-matos, 2001] L.M. Camarinha-matos, H. Afsarmanesh, A.L. Osorio, Flexibility and safety in a web-based infrastructure for virtual enterprises, International Journal of Computer Integrated Manufacturing, 2001, 14 (1): 66-82.
    [Cantamessa, 1997] M. Cantamessa, Agent-based modeling and management of manufacturing systems, Computers in Industry, 1997, vol.34, p. 173-186.
    [Chan, 2003] F.T.S. Chan, Zhang J., P. Li, Agent- and CORBA-Based Application Integration Platform for an Agile Manufacturing Environment, The International Journal of Advanced Manufacturing Technology, Springer-Verlag London Ltd, 2003, 21(6): 460 - 468.
    [Chen, 2003] Chen Li, Deng Hong, Deng Qianni, Wu Zhenyu, A Research on the Framework of Grid Manufacturing, Proceedings of the 2th International Workshop on grid and Cooperative Computing, Dec.2003, p. 11-17.
    [Cheng, 2004] Cheng Kai, Yaroslav Popov, Internet-enabled modelling of extended manufacturing enterprises using process-based techniques, The International Journal of Advanced Manufacturing Technology, Springer-Verlag London Ltd, 23(1-2), p.148-153
    [Cheon, 1992] Cheon, M.j., OutSourcing of Information Systems Functions: A contingency Model, Unpublished doctoral dissertation, University of South Carolina.
    [Cherkasova, 1998] Cherkasova L. and Phaal P., Session Based Admission Control: A Mechanism for Improving the Performance of an Overloaded Web Server[R], HPL-98-119, HP Labs Technical reports, 1998.1-40. Available at: http://www.hpl.hp.com/techreports/98/HPL-98-119.pdf
    [Cherry Tree & Company, 1999] Cherry Tree & Company, Application Service Providers (ASP): Spotlight Report, Edina, MN: author.
    [CIMS,2001] CIMS—计算机集成制造系统网络,下一代的制造模式——网络化敏捷制造,http://www.cims.edu.cn/985index.html
    [Cisco, 2004] Cisco Business Industries, Cisco Intelligent Networked Manufacturing Overview, 2004, http://business.cisco.com/servletw13/FileDownloader/iqprd/106626/106626_kbns.pdf.
    
    
    [Cloutier, 2000] Cloutier L., J.-M. Frayret, S. D'Amours, B. Montreuil: The NetMan agent-based architecture for E-business in network organizations. E-Business and Virtual Enterprises, 2000, 157-166.
    [Cohen, 2002] Cohen E., Thomas R.K., Winsborough W., & Shands D., Models for Coalition-based Access Control (CBAC). Seventh ACM Symposium on Access Control Models and Technologies, Monterey, California. eMarket Services. (2002). Introduction to eMarkets, http://www.emarketservices.com.
    [Coulouris, 1998] Coulouris G, Dollimore J, Roberts M. Role and task-based access control in the PerDiS groupware platform. In Proceedings of the ACM Workshop on Role-Based Access Control, George Mason University, 1998, pp.115~121. http://www.dcs.qmw.ac.uk/research/distrib/perdis/.
    [Crovella, 1996] Crovella M.E. and Bestavros A., Self-similarity in World Wide Web traffic: Evidence and possible causes [A]. In Proceedings of the ACM Sigmetrics Conference[C], Philadelphia, Pennsylvania, USA, 1996, 160-169.
    [Crovella,1998] Crovella M., Generating representative web workloads for network and server performance evaluation [J]. Performance Evaluation Review, 1998, 26(1):151-160.
    [Denning, 1976] Denning, D. E., A Lattice Model of Secure Information Flow, Communications of the ACM, Vol. 19, No. 5, 1976, pp. 236-243.
    [De Toni, 1998] De Toni A. and S. Tonchia, 1998, Manufacturing flexibility: a literature review, International Journal of Production Research, 36 (6), 1587-1617.
    [DeVor, 1997] DeVor R., R. Graves, J.J. Mills, 1997, Agile manufacturing research: Accomplishments and opportunities, IIE Transactions 29(10), 813-23.
    [Diegelman, 2000] Diegelman S., The Changing Role of the Outsourcer, USinternetworking, 2000, http://www.usi.net/technology/insite/archive.html? 1
    [Dix, 1999] Dix, J., At the knee of the ASP curve, Network World, 1999, 16(40), p.62.
    [Dix, 2000] Dix, J., Software firm validates the ASP model, Network World, 2000, 17(21), pp.49-57.
    [Drolet, 1989] Drolet, J.R., B. Montreuil & C.L. Moodie, 1989, Scheduling factories of the future, Joumal of Mechanical Working Technology, 183-194.
    [Enterasys, 2001] Enterasys network, Wireless Networks for Manufacturing(R), 2001, http://www.enterasys.com/solutions/manufacturing/wireless-manufacturing.pdf
    [Ferraiolo, 1992] Ferraiolo, D. and Kuhn, R., Role Based Access Controls, In 15th NIST-NCSC National Computer Security Conference, 1992, pp. 554-563.
    
    
    [Ferraiolo, 1995] Ferraiolo, D., Cugini, J., and Kuhn, R., Role Based Access Control: Features and Motivations, In Computer Security Applications Conference, 1995.
    [Ferraiolo and Sandhu, 2001] Ferraiolo, D., Sandhu, R. S., Gavrila, S., Kuhn, R., and Chandramouli, R., Proposed NIST Standard for Role-Based Access Control, ACM Transactions on Information and System Security, Vol. 4, No. 3, 2001, pp. 224-274.
    [Ferranti, 1999] Ferranti, M., Users not sold on Application Server provider model, Computerworld, 1999, 33(41), p.8.
    [Foster, 1998] Ⅰ. Foster, C. Kesselman, "The Grid: Blueprint for a new computing infrastructure," Morgan Kaufmann, 1998, chapter 3.
    [Foster, 2001] Ⅰ. Foster, C. Kesselman, and S. Tueke. "The Anatomy of the Grid: Enabling Scalable Virtual Organizations," International Journal of Supercomputing Applications, 2001.
    [Foster, 2002-A] Ⅰ. Foster, What is the Grid? A Three Point Checklist, 2002
    [Foster, 2002-B] Ⅰ. Foster, Kesselman, C., Nick, J. and Tuecke, S., The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration, to be presented at GGF4, Feb. 2002. http://www.globus.org/research/papers.html
    [Foster, 2003] Ⅰ. Foster, D.Gannon, H. Kishimono, The Open Grid Service Architecture, http://forge.gridforum.org/projects/ogsa-wg, Sept.23, 2003
    [Fox, 2000] M.S. Fox, M. Barbuceanu, R. Teigen, Agent-oriented supplychain management, International Journal of Flexible Manufacturing Systems, 2000, vol.12, p.165-188.
    [Frayret, 2002] Jean-Marc Frayret, A conceptual framework to operate collaborative manufacturing networks, Dissertation Abstracts International, 2002,Vol.63-09, Section: B, page 4313.
    [Fried, 1993] Fried, L., Outsourcing Confessions: Revealing talk about why partnerships sour, computerworld, 1993, 27(6), pp.67-69.
    [Fujit, 2000] S. Fujit, T. Kaihara, H. Morita, A distributed virtual factory in agile manufacturing environment, International Journal of Production Research, 2000, 38 (17): 4113-4128.
    [Gary, 2001] Gary Palmatier, ASP (Application Service Provider) Configuration Handbook, Syngress Publishing Inc.
    [Gehling, 2002] Gehling Robert George, Development of a general application service provider (ASP) model, Ph.D thesis, Aubum University, Albama, May.11, 2002.
    
    
    [Globus, 2001] Globus Project, Globus quick start guide, http://www.globus.org, June. 2001
    [Gjerdrum, 2001] Gjerdrum J., N. Shan, L.G. Papageorgiou, A combined optimization and agent-based approach to supply chain modelling and performance assessment, Production Planning & Control, 2001, 12 (1): 81-88.
    [Groves, 2001] Groves, Jackie, Security for Application Service Providers, Network Security, Volume: 2001, Issue: 1, January 1, 2001., pp. 6-9.
    [Gunasekaran, 1998] Gunasekaran A., 1998, Agile manufacturing: enablers and an implementation framework, International Journal of Production Research 36(5), 1223-47.
    [Gunasekaran, 2001] A. Gunasekaran, Next generation computer integrated manufacturing strategies and techniques, International Journal of Computer Integrated Manufacturing, 2001, 14(2): 137-139.
    [Hagel, 1999] Hagel, J. Ⅲ, and Singer M., Unbundling the corporation, Harvard Business Review, 1999, 77(2), pp. 133-141.
    [Halal, 1994] Halal W.E., 1994, From hierarchy to enterprise: Internal markets are the new foundation of management, The Academy of Management Executive 8(4), 69-82.
    [Harrington, 1973] Hardngton J., Computer Integrated Manufacturing, Industrial Press, New York, 1973.
    [Hauser, 1996] Hauser J.R., D.I. Simester, B. Wernerfelt, Internal customers and internal suppliers, Journal of Marketing Research, 1996, 33(3), 268-80.
    [Hlavacs, 1999] Hlavacs H., Kotsis G. and Steinkellner C., Traffic source modeling[R]. Technical Report TR-99101, Institute for Applied Computer Science and Information Systems, University of Vienna. 1999.1-12.
    [Huang, 2001] G.Q. Huang, K.L. Mak, Web-integrated manufacturing: recent developments and emerging issues, International Journal of Computer Integrated Manufacturing, 2001, 14 (1): 3-13.
    [IDC, 1999] International Data Corporation, The ASPs' Impact on the IT Industry, Sept. 1999, Framingham.
    [IMS, 1995] Intelligent Manufacturing System, http://www.ims.org/
    [Ip, 2002] W.H. Ip, B. Chen, Organization structure and enterprise modelling in ERP realization, International Journal of Networking and Virtual Organizations, 2002, 1(2): 170-183.
    [ISO/IEC7498-2, 1989] ISO/IEC7498-2, Information Processing Systems-Open Systems Interconnection Reference, Model-Part 2: Security Architecture. 1989.
    
    
    [Iung, 2001] B. lung, E. Neunreuther, G. Morel, Engineering process of integrated-distributed shop floor architecture based on interoperable field components, International Journal of Computer Integrated Manufacturing, 2001, 14 (3): 246-262.
    [Jagdev, 1998] Jagdev H.S. and J. Browne, The extended enterprise-a context for manufacturing, Production Planning and Control, 1998, 9(3), 216-29.
    [Jones, 1994] Jones, C., Evaluating Software Outsourcing Option: Do your Software Operations Add Value? Information Systems Management, 1994, 11(4), 28-33.
    [Kang, 2001] Kang, H.M., Park, J.S. & Froscher, J.N., Access Control Mechanisms for Inter-organizational Workflow. 6th ACM Symp. on Access Control Models and Technologies, 2001, pp.66-74.
    [Lacity, 1992] Lacity M.C., An Interpretive Investigation of the Information Systems Outsourcing Phenomenon, Unpublished doctoral dissertation, University of Houston.
    [Lacity, 1993] Lacity M.C., Hirschheim R., The Information Systems Outsourcing Bandwagon, Sloan Management Review, 1993, 35(1), pp.73-86.
    [Lacity, 1994] Lacity M.C., Hirschheim R., Willcocks L., Realizing Outsourcing Expectations: Incredible Expectation, Credible Outcomes, Information Systems Management, 1994, 11(4), pp.7-18.
    [Lampson, 1971] Lampson, B. W., Protection, In 5th Princeton Conference on Information Sciences and Systems, Princeton, 1971.
    [Lazowska, 1984] Lazowska, E. D., Zahorjan, J., Graham, G.. S., Sevcik, K. C., 1984. Quantitative System Performance: Computer System Analysis Using Queuing Network Models. Prentice-Hall, Englewood Cliffs, New Jersey 07632, pp. 127-151.
    [Leem, 2004] Leem, Choon Seong; Lee, Hong Joo, Development of certification and audit processes of application service provider for IT outsourcing, Technovation, Volume: 24, Issue: 1, January, 2004, pp. 63-71.
    [Li, 2002] Dongdong Li, Songli Hu, and Shuo Bai, A Uniform Model for Authorization and Access Control in Enterprise Information Platform, Lecture Notes in Computer Science, Springer-Verlag Heidelberg, Volume 2480 / 2002, Page: 180-192, January 2002. (Title: Engineering and Deployment of Cooperative Information Systems: First International Conference, EDCIS 2002, Beijing, China, September 17-20, 2002. Proceedings)
    [Liu, 2004] Liu lilan, Shi Zhanbei, Yu Tao, MG-QoS: an Application Level QoS for Manufacturing Grid, GlobusWORLD 2004 conference, January, 2004.
    
    
    [Little, 1961] Little, J., 1961. A proof of the Queuing Formula L=λ W. Operations Research, vol. 9, pp. 383-387.
    [Loh, 1992] Lob, L., Venkatraman N., Diffusion of Information Technology Outsourcing: Influence Sources and the Kodak Effect, Information Systems Research, 1992, 3(4), pp.334-358.
    [Mateyaschunk, 1999] Mateyaschunk J., Businesses Turn to Shared Servers to Save Money, Informationweek, 1999, vol.765, pp. 148-150.
    [Mcfalane, 2000] D.C. Mcfarlane, S. Bussmann, Developments in holonic production planning and control, Production Planning & Control 11, 2000, vol.6, 522-536.
    [Menasce, 2000] Menasce, D. A., Almeida, V. A. F., 2000. Scaling for E-Business Technologies, Models, Performance, and Capacity Planning. Prentice Hall, Upper Saddle River, N J, pp. 273-305.
    [Miles, 1986] Miles R.E. and C.C. Snow, 1986, Organizations: New Concepts for New Forms, California Management Review 28(3), 62-73.
    [Montreuil, 1992] Montreuil, B., J. Drolet and P. Lefrancois 1992, The Design and Management of Virtual Cellular manufacturing Systems, Proceedings of APICS 35th International Conference, Montréal, Québec, 410-414.
    [Montreuil, 2000] Montreuil, Benoit; Frayret, Jean-Marc; D'Amours, Sophie, A strategic framework for networked manufacturing, Computers in Industry, Volume: 42, Issue: 2-3, June, 2000, pp. 299-317.
    [Mummer, 2003] Mummer Ko, Jun Ni, Jay Lee, et al, INTRODUCTION OF e-MANUFACTURING(A), NAMRC 2003 E-Manufacturing Panel, McMaster Univ. May 2003.
    [Nyanchama, 1994] Nyanchama, M. and Osborn, S., Access Rights Administration in Role-Based Security Systems, In IFIP WG 11.3 Database Security, 1994, pp. 37-56.
    [OASIS, 2003] OASIS Standard, Extensible Access Control Markup Language (XACML), Version 1.0, 18 February 2003, http://www.oasis-open.org/committees/xacml.
    [OASIS, 2004] OASIS Committee Draft 01, XACML Profile for Role Based Access Control (RBAC), Feb.2004, http://docs.oasis-open.org/xacml.
    [O'Kelly, 1999] O'Kelly C., Electronic commerce: A case study in competitive advantage, Accountancy Ireland, 1999, 31(4), pp.49-50.
    [Pappalardo, 1999] Pappalardo D., ASP Attack, Network World, 1999, 26(39), pp.70-75.
    [Park, 2001] Park, J. S. and Sandhu, R. S., Role-Based Access Control on the Web, ACM Transactions on Information and System Security, Vol. 4, No. 1, 2001, pp.
    
    37-71.
    [Poulin, 1994] Poulin D., B. Montreuil, S. Gauvin. L'entreprise réseau. Montreal: Publi-Relais, 1994.
    [Powell, 1990] Powell, W.W. 1990, Neither Market Nor Hierarchy: Network Forms of Organization, Research in Organizational Behavior 12, 295-336.
    [Preiss, 1994] Preiss K., 1994, Agile manufacturing, Computer-Aided Design, 26(2), 83-4.
    [RAM, 1996] Ram Sriram, Arun Candadai, Agile Infrastructure for Manufacturing Systems (AIMS) - A Pilot Program, 5th National Agility Conference, Boston, MA, March, 1996.
    [Rannanjarvi, 1998] L. Rannanjarvi, T. Heikkila, Software development for holonic manufacturing systems, Computers in Industry, 1998, vol.37, p. 233-253.
    [Reiser, 1980] Reiser, M., Lavenberg, S., 1980. Mean-value Analysis of Closed Multi-Chain Queuing Networks. J. ACM, vol. 27, no. 2, pp. 313-323.
    [Ricardo, 2000] Ricardo M. Bastos, José Palazzo M. de Oliveira, A Conceptual Modeling Framework for Multi-agent Information Systems, Conceptual Modeling - ER 2000: 19th International Conference on Conceptual Modeling: Salt Lake City, Utah, USA, October 2000, Springer-Verlag Heidelberg, 2000, Volume 1920/2000, p. 295 -308.
    [Rockwell, 2001] ROCKWELL Automation, Making Sense of e-Manufacturing: A Roadmap for UK Industry [EB/OL], http://www.rockwellautomation.co.uk, 2001-08-01.
    [Rolstadas, 1998] Rolstadas A., 1998, Virtual and Extended Enterprise-definition, Production Planning and Control 9(3), 215.
    [Sahlin, 1999] Sahlin, J. P., Outsourcing Electronic Commerce, USinternetworking Business Case White Paper, 1999.
    [Sandhu, 1992] Sandhu, R. S., The Typed Access Matrix Model, Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, May 4-6, 1992, pages 122-136.
    [Sandhu, 1993] Sandhu, R. S., Lattice-Based Access Control Models, IEEE Computer, Vol. 26, No. 11, 1993, pp. 9-19.
    [Sandhu, 1994] Sandhu, R. S. and Samarati, P., Access Control: Principles and Pratice, IEEE Communications, Vol. 32, No. 9, 1994, pp. 40-48.
    [Sandhu, 1996] Sandhu Ravi S., Edward J. Coynek, Hal L. Feinsteink, et al., Role-Based Access Control Models, IEEE Computer, Volume 29, Number 2, February 1996, pages 38-47.
    
    
    [Sandhu, 1999] Sandhu, R. S., Bhamidipati, V., and Munawer, Q., The ARBAC97 Model for Role-Based Administration of Roles, ACM Transactions on Information and System Security, Vol. 2, No. 1, 1999, pp. 105-135.
    [Shi, 1999] Shi ML, Yang GX, Xiang Y, Wu SG. WsMS: the manage system of workflow. Chinese Journal of Computers, 1999, 22(3):325~334.
    [Shin, 2001] J. Shin, H. Cho, Planning and sequencing heuristics for feature-based control of holonic machining equipment, International Journal of Flexible Manufacturing Systems, 2001, vol. 13, p.49—70.
    [Smith, 1998] Smith M.A., An Empirical Investigation of the Determinants of Information Systems Outsourcing (Firm Strategy). Unpublished doctoral dissertation, Georgia Institute of Technology.
    [Snow, 1992] Snow C.C., R.E. Miles, H.J.Jr. Coleman, 1992, Managing 21st Century Network Organizations, Organizational Dynamics 20(3), 5-20.
    [Strader, 1998] Strader T.J., F.R. Lin, M.J. Shaw, Information infrastructure for electronique virtual organization management, Decision Support Systems, 1998(23): 75-94.
    [Taylor, 2000] Taylor B., Taylor D., Time for a new wave of ASPs, Communications News, 2000, 37(6), P.58.
    [Thoben, 2001] K.D. Thoben, H.S. Jagdev, Typological issues in enterprise networks, Production Planning & Control, 2001, 12 (5): 421-436.
    [Thomas, 1993] Thomas R.K., Sandhu R.S., Towards a task-based paradigm for flexible and adaptable access control in distributed applications. In: Proceedings of the 1992-1993 ACM SIGSAC New Security Paradigms Workshops. 1993. 138~142.
    [Thomas, 1996] Thomas R.K., Sandhu R.S., Task-Based authorization: a research project in next-generation active security models for workflows. In: NSF Workshop on Workflow and Process Automation in Information Systems: State-of-the-Art and Future Directions. 1996.
    [Thomas, 1997] Thomas, R.K. & Sandhu, R.S., Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management. Proceedings of the IFIP WG11.3 Workshop on Database Security, Lake Tahoe, California, August 11-13, 1997.
    [Thomas, 2003] Thomas Raschke, Daniel O'Boyle Kelly, Security: Enabling the Manufacturing Sector, An IDC Whiter Paper Sponsored by Nokia, October, 2002, http://www.idc.com
    
    
    [Thompson, 1999] Thompson A., Strickland A. J., Strategic Management: Concepts and Cases, Homewood, IL: Irwin.
    [Thorelli, 1986] Thorelli, H.B. 1986, Networks: Between Markets and Hierarchies, Strategic Management Journal 7(1), 37-51.
    [Tuecke, 2003] S.Tuecke, K.Czajkowski, Ⅰ. Foster, J.Frey, et al., Open grid Service Infrastructure (OGSI)-Version 1.0, http://www.ggf.org/ogsi-wg, June.27, 2003.
    [Unqer, 2003] Jay Unqer, Matt Haynos,开放网格服务架构之旅——剖析OGSA的组件结构, http://www-900.ibm.com/developerWorks/cn/grid/gr-visual/index.shtml, 2003年12月。
    [Upton, 1996] Upton D.M., and A. McAfee, The Real Virtual Factury, Harvard Business Review, July-August, 1996, 123-33.
    [Urban , 2001] Urban Bilstrup, Per-Ame Wiberg, Wireless Networks for Manufacturing (R), http://www.artes.uu.se/events/gsconf00/papers/bilstrup2.pdf
    [Van, 1997] Van Der Vlist P., J.J.E.M. Hoppenbrouwers, H.M.H. Hegge, 1997, Extending the entreprise through multi-level supply control, International Journal of Production Economics 53, 35-42.
    [Vorst, 2000] J.G.A.J.V.D. Vorst, A.J.M. Beulens, P.V. Beck, Modelling and simulating multi-echelon food systems, European Journal of Operational Research, 2000, Vol.122, p. 354-366.
    [Wang, 2004] Wang, Qing; Yung, Kai Leng; Ip, Wai Hung, A hierarchical multi-view modeling for Networked Joint Manufacturing System, Computers in Industry Volume: 53, Issue: 1, January, 2004, pp. 59-73.
    [Wang & Cheng, 2004] Wang Harry J., Hsing K. Cheng, J. Leon Zhao, Web Services Enabled E-Market Access Control Model, International Journal of Web Services Research, 1(1), 21-40, Jan-Mar 2004.
    [Wilding, 1998] Wilding R., The supply chain complexity triangle: Uncertainty generation in the supply chain, International Journal of Physical Distribution & Logistics Management, 1998, 28(8), 599-616.
    [William, 2003] William R. Cook, Policy-Based Authorization, 2003, pp.1-10, Available at: www.cs.utexas.edu/users/wcook/Drafts/wcook-auth.pdf
    [Wrenden, 1999] Navigating uncharted waters, Informationweek, 1999, 761, pp. 138-140.
    [Wright, 1998] Wright D.T. and N.D. Bums, 1998, New organisation structures for global business: an empirical study, International Journal of Operations & Production Management 18(9/10), 896-923.
    
    
    [Wang, 2004] Wang, Qing; Yung, Kai Leng; Ip, Wai Hung, A hierarchical multi-view modeling for Networked Joint Manufacturing System, Computers in Industry Volume: 53, Issue: 1, January, 2004, pp. 59-73.
    [Zaiane, 1998] Zaiane O.R., Xin M. and Han, J. Discovering Web Access Pattems and Trends by Applying OLAP and Data Mining Technology on Web Logs, Proc. Advances in Digital Libraries Conference[C]. Santa Barbara, CA, 1998, 19-29.
    [Zhao, 2002] Zhao, J. L., Wang, H. J., Huang, S. S. &Chen, G., Relationship driven access control in a supply web, Proceedings of the 12th Workshop on Information Technology and System (WITS'O2), Barcelona, Spain, 2002.
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via email.