面向业务关联的多产业链协作网络和公共服务平台关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着经济全球化和社会化分工的发展,企业为了能更好的生存和发展,企业间业务协作越来越紧密,业务协作呈现大规模、多目标、多角色和多层次特征,企业之间的竞争已发展为产业链之间的竞争,产业链协作模式也逐渐由以龙头企业为核心的单链式模式拓展到业务关联的多条产业链间的相互协作、共同发展。同时,企业为了顺应市场的快速变化和市场竞争的新要求.需要不断更新自身业务流程和模式,而业务流程的更新和业务模式的变化,必须有配套的信息系统做支撑,才能使企业具有快速的市场响应能力和更大的竞争力。建设适应新业务及新流程等应用的信息系统,从技术上要求新的应用信息系统必须能快速搭建并实施,能够做到“随需应变”。支持企业间柔性业务协作的公共服务平台无疑是中小企业信息化的重要手段之一。因此,针对新的产业链协作模式——业务关联的多产业链协作,研究业务关联的多产业链协作网络模型、特征及其支持业务关联的多产业链的多个业务协作的公共服务平台具有重要的意义。
     本文结合国家高技术研究发展计划(863计划)“业务关联的中小企业群信息化服务平台开发与应用”(项目编号:2009AA043501)、国家高技术研究发展计划(863计划)“集团企业业务协同服务支持集成平台开发与应用”(项目编号:2007AA04Z188),针对业务关联的多产业链协作网络模型、网络模型演化算法及务关联的多产业链柔性业务协作的公共服务平台模型、架构、盟员优选、平台认证和平台数据安全等相关技术进行了理论和应用研究。具体包括以下几个方面:
     (1)针对业务关联的多产业链协作模式,抽象出了业务关联的多产业链协作网络,并建立了其数学模型,模型既考虑了节点的近邻数(即节点的度)和节点与近邻之间的边权重,又考虑了节点本身所具备的能力,较好地体现了实际的网络;分析了业务关联的多产业链协作网络特征,基于复杂网络理论,综合考虑了节点的群落特性、节点间双向择优选择机制及节点间协作关系消亡等因素,设计了业务关联的多产业链协作网络模型演化算法;应用业务关联的多产业链协作网络模型和演化算法,对汽车行业业务关联的多产业链协作网络节点强度分布和重要度进行了分析。
     (2)为构建柔性的业务关联的多产业链协作公共服务平台,提出了面向柔性的业务关联的多产业链协作公共服务平台模型:即基于业务分解、业务建模、构件抽象、构件集成及组合的平台的构建模型和基于构件的平台集成模型;基于业务关联的多产业链协作公共服务平台模型,设计了基于软总线和软构件的公共服务平台架构。在此架构下,平台被设计为公共构件、基础业务构件、专用业务构件和软总线的关系集合,公共构件和业务构件通过在平台的软总线上注册、发布和授权,实现了构件与平台之间的即插即用,从而实现了产业链协作业务信息系统与平台之间的即插即用、平台的可扩展性和对企业柔性业务的支持。本文研究成果已应用到汽车及发动机产业链协作服务平台的开发和应用中,应用结果表明,本文设计的平台模型和架构能较好地支持企业业务变化对信息化的要求,是切实可行的。
     (3)对基于物元分析的产业链联盟盟员优选与评价方法进行了理论和应用研究,建立了基于物元分析的业务关联的产业链协作联盟盟员优选与评价模型,该模型将评价指标的不可共度性及矛盾性转换为相容问题,利用关联函数和贴近度函数进行综合评价。基于可拓理论,将产业链协同联盟盟员评价结果分为正域、可拓域及负域,该方法不仅能评价待评方案之间的细微差别,具有更高的精确度,更能从变化的角度评价变化的事物。最后,给出了基于物元分析的二阶段产业链协同联盟盟员企业优选与评价算法。另外,本文的研究纠正了以往研究中关于物元分析方法在综合评价应用中存在的一些错误,并开展了相关的理论研究。
     (4)针对业务关联的多产业链协作公共服务平台特点和基于Web的应用程序应用范围的开放性特点,以及对认证口令在输入及网络传输过程中的保密需求,建立了基于双随机输入单元的软输入模型,基于双随机软输入模型,设计并实现了业务关联的多产业链协作公共服务平台的一次性口令认证方法。该方法的核心思想是,当用户需要输入认证口令时,认证服务器动态生成双随机输入软键盘,即每次生成的软键盘的界面接口布局是随机的,且其接口对应的输入字符也是随机的,随机生成的软键盘是加盖时间戳的,是一次性的。研究结果表明,本文提出的基于双随机软输入模型的一次性口令认证方法,能有效抵御输入截获攻击、内存截获攻击及重放攻击,具有较好的安全性,为基于Web应用程序的身份认证提供了一个新方法。
     (5)针对由第三方开发和运营的业务关联的多产业链协作公共服务平台数据安全需求,基于数据加密技术、HASH技术、数字签名技术和Web Service技术,设计了“数据银行”模式的业务关联的多产业链协作公共服务平台的数据安全解决方案BMCCP DSS,并设计和实现了与公共服务平台数据安全相关的算法,即业务协作单据提交和签名算法、业务协作单据签名验证算法、加密敏感字段单据解密算法(即,单据在平台客户端显示算法)及业务协作单据修改算法。研究结果表明,本文提出的公共服务平台数据安全解决方案,解决了数据在第三方存储的机密性、传输保密性、数据完整性、发送不可抵赖性及防重放攻击等数据安全问题,且方案实现简单、安全性高。
     (6)将研究成果应用到汽车及发动机产业链协作公共服务平台的开发中,验证了研究结果的有效性和实用性。
With development of economic globalization and social division, the business collaboration among enterprises which presents the large-scale, multi-objective, multi-role and multi-level feature, is more increasingly close. Competition among enterprises has developed into competition among industrial chains and industrial chain collaboration mode has gradually expanded to inter-collaboration and common development among business-related multi-industrial chains from single-chain mode among leading enterprises. Meanwhile, the enterprises, which in order to adapt to the rapid market changes and new demands of market competition, need to update their business processes and business mode. The business processes updating and business mode changing are supported by corresponding information systems, which enable enterprises to further enhance rapid response capability and competitiveness. The new information system constructed to adapt to new business and new process must be able to quickly build and implement on demand. Public service platform supporting flexible business collaboration among enterprises is undoubtedly an important means of small and medium enterprises information. Therefore, the study on model and feature of business-related multi-industrial chains collaborative network and public service platform supporting flexible business collaboration among business-related multi-industrial chains have great significance aiming at new industrial collaboration mode:business-related multi-industrial chains collaboration.
     The theory, methods and key techniques are researched, including model and model evolutionary algorithm of business-related multi-industrial chains collaborative network, model and architecture of public service platform supporting flexible business collaboration among business-related multi-industrial chains, evaluation and selective preference model of industrial chain collaboration alliance members, authentication method and data security of public service platform. Research works in this dissertation are partial supported by the National High-Tech Research and Development Plan of China:the development and application of the information platform for business-related small-medium enterprise group (No.2009AA043501) and the development and application of collaboration services integration platform for group enterprise (No.2007AA04Z188), which mainly concentrates on the follwing several aspects, i.e.
     (1) Aiming at collaboration mode for business-related multi-industrial chains, the business-related multi-industrial chains collaborative network is proposed and its mathematical model is established, which not only takes into account the number of neighboring nodes (ie. node degree) and the edge weighted between the nodes and its neighbors, but also capability of the node itself, and better reflects the actual network. Characteristics of business-related multi-industrial chains collaborative network are analyzed. Considering following factors including node community characteristics, two-way preference selection mechanism among modes and the demise of the relationship among nodes, the model evolutionary algorithm for business-related multi-industrial chains collaborative network is put forward based on complex networks theory. The nodes strength distribution and the nodes important degree of business-related multi-industrial chains collaborative network in automotive are analyzed using networks model and model evolutionary algorithm of business-related multi-industrial chains collaborative network.
     (2) To build flexible public service platform for business-related multi-industrial chains collaboration, a flexible public service platform model is proposed, which include platform construction model base on business decomposing, business modeling, component modeling, component integrating and platform integration model base on component. Based on the platform model, the public service platform architecture based on software integration bus and software component for business-related multi-industrial chain collaborating is designed, which is made up of common components, basic business components, special business components and software bus. The plug and play relation between the component and the platform is realized by component registered, component released and component authorized on platform software bus. So the plug and play relation between the information systems of industrial chain collaboration and the platform is achieved, and the platform scalability and business collaboration flexibility are realized. The research results have been applied to automobile & engine industrial chain collaborative public service platform development and implementation. The research results showed that the model and architecture proposed in the dissertation, which support information requirements for business changing, is practicable.
     (3) Theory and application research of the evaluation and selective preference method of industrial chain collaboration alliance members are studied based on matter-element. The evaluation and selective preference model is constructed, which converted the contradictions into the compatibility problems. Comprehensive evaluation is conducted by using correlation function and closeness degree function. Based on extension theory, the evaluation result of industrial chain collaboration alliance members is divided into three categories:positive domain, negative domain and extension domain. The method proposed in the dissertation not only can evaluate the nuances difference among programs and has higher accuracy, but also can evaluate things from perspective of changing. Finally, the two-stage evaluation and selective preference algorithm of industrial chain collaboration alliance members based on matter-analysis is designed. In addition, the study corrects some errors of the previous studies on matter-element analysis application in the comprehensive evaluation field, and the relevant theoretical studies are carried out.
     (4) Aiming at public service platform features of business-related multi-industrial chains collaboration, open feature of web-based application and authentication password confidentiality requirements in process of input and network transmission, soft input model based on double random input unit is put forward. One time password authentication method of public service platform of business-related multi-industrial chains collaboration is designed and implemented based on double random soft input model. The core of this method is:when the user need to input authentication password, the authentication server dynamically generates double random input soft keyboard, the interface layout of soft keyboard generated with time stamp affixed by the authentication server each time is random, and its interface to the corresponding input character is also random. The study results showed that based on this method, the password entered in client and password transmitted over the network are mapped to several groups of different random string each time without any computing in client, effectively solves some password authentication problems including the capture/replay attack, memory and input intercepted assault, and provides a new approach for web-based application authentication
     (5) Aiming at data security requirements of public service platform of business-related multi-industrial chains which is developed and operated by third-party, the data security solutions of public service platform of business-related multi-industrial chains(BMCCP_DSS) are designed based on data encryption technologies, hash technologies, digital signature technologies and web service technologies, which has feature of data bank. The related algorithms of data security of public service platform are designed and implemented, which include submission and signature algorithm for business collaboration documents, signature verification algorithm for business collaboration documents, decryption algorithm for encrypting sensitive fields in business collaboration documents (ie. documents display algorithm in the platform client) and update algorithm for business collaboration documents. The research results showed that the solutions proposed in this dissertation implement data stored confidentiality in third-party, transmission confidentiality, data integrity, non-repudiation of sending, anti-replay attacks and other data security issues, and that the solutions have the following feature, implementing simply, high security and practicable.
     (6) Taking the automobile & engine industrial chain collaborative public service platform for sample, the validity of the researching result in this dissertation is verified.
引文
[1]杨公朴,夏大慰.现代产业经济学[M].上海:上海财经大学出版社,2002:50-80.
    [2]龚勤林.论产业链构建与城乡统筹发展[J].经济学家,2004.3:121-123.
    [3]蒋国俊,蒋明新.产业链理论及稳定机制研究[J].重庆大学学报(社会科学版),2004,(1):36-38.
    [4]周路明.关注高科技“产业链”[J].深圳特区科技,2001.11:10-11.
    [5]芮明杰,刘明宇.论产业链整合[M].上海,复旦大学出版社,2006:5-7.
    [6]刘贵富.产业链基本理论[D].吉林大学博士学位论文,2006.
    [7]陈静,孙林夫.业务关联的多产业链协作网络模型[J].计算机集成制造系统,2010,16(5):1089-1096.
    [8]李想.模块化分工条件下网络状产业链的基本构造与运行机制研究[D].复旦大学博十学位论文,2008.
    [9]徐文营,李歆月.产业链合:福田汽车力创世界商用车品牌[N].经济日报,2006.5.12.
    [10]叶德磊.苹果的可怕在于全球产业链的整合[EB/OL]. http://www.donews.com/it/201104/412572.shtm
    [11]王淑营.支撑产业链协同的SaaS平台动态演化技术研究[D].西南交通大学博士学位论文,2010.
    [12]欧阳璟.Saleforce的秘密[J].程序员,2009.09:26-27.
    [13]Jeffery D. The Supply Chain and Logistics Management of GM. Golden Ideas[R].2004.
    [14]赵慧娟,唐慧佳,孙林夫.基于于应用服务提供商的汽车产业链协同商务平台解决方案[J].计算机集成制造系统,2006,12(5):745-752.
    [15][控产业链协作平台[EB/OL]. http://bol.fdauto.cn/.
    [16]李少波,谢庆生.基于ASP的信息安全管理机制的研究[J].计算机工程与应用,2005,22:215-218.
    [17]孙林夫.制造业产业链协同与中小企业信息化[J].中国制造业信息化,2009,38(1):24-25.
    [18]孙林夫.面向网络化制造的协同设计技术[J].计算机集成制造系统,2005,11(1):01-06.
    [19]王召波,李华.供应链网络结构模型研究[J].物流技术,2007,26(6):84-87
    [20]JUNE DONG, DING Z HANG, HONG YAN, et.al. Multitiered Supply Chain Networks: Multicriteria Decision—Making Under Uncertainty[J]. Annals of Operations Research, 2005,135 (1):155-178.
    [21]Luo Wuming, Han Pingyang, Gao Fei. Study on System Modeling and Analyzing of Supply Chain Network[C].//Proceedings of the IEEE International Conference on Automation and Logistics Shenyang, China August 2009:1598-1602.
    [22]Wang Keqiang, Zeng Zhaofeng, Sun Dongchuan. Structure Analysis of Supply Chain Networks Based on Complex Network Theory[C].//Fourth International Conference on Semantics, Knowledge and Grid (2008), Washington. D. C,. USA:IEEE Computer society,2008: 493-494.
    [23]Katariina Kemppainen, Ari P. J. Vepsalainen. Trends in industrial supply chains and networks[J]. International Journal of Physical Distribution&Logistics Management, 2003,33 (8):701-719.
    [24]Wang Shu-qin, Liu Wei. Closed-loop Supply Chain Network Design Based on Industry Collaboration[C].//2008 International Conference on Information Management, Innovation Management and Industrial Engineering, Washington. D. C,. USA:IEEE Computer society,2008:349-354.
    [25]张纪会,徐军芹.适应性供应链的复杂网络模型研究[J].中国管理科学,2009,17(1)76-79.
    [26]陈晓,张纪会.复杂供需网络的局域生长模型[J].复杂系统与复杂科学,2008,5(1):54-60.
    [27]Nagurney, A., Dong, J., and Zhang, D. A Supply Chain Network Equilibrium Model. Transportation Research E,2002,38 (5):281-303.
    [28]Ding Zhang, June Dong, Anna Nagurney. A Supply Chain Network Economy:Modeling and Qualitative Analysis[C]. Innovations in Financial and Economic Networks[M]. Edward Elgar Publishers,2003:197-213.
    [29]赵慧娟,王淑营,孙林夫.面向中小企业信息化建设的ASP服务平台[J].计算机集成制造系统,2004,10(11):1441-1445.
    [30]王淑营.面向制造业产业链的协同商务平台集成框架[J].西南交通大学学报,2008,43(5):643-64.
    [31]戴建华,蔡铭,林兰芬等.面向网络化制造的ASP服务平台若干关键技术研究[J].计算机集成制造系统,2005,11(1):48-52.
    [32]梁策,肖田元,张林揎等.基于联邦模式的网络化制造系统集成体系结构研究[J].计算机集成制造系统,2007,13(8):1552-1558.
    [33]赵胜钢.国家农业科学数据共享平台体系结构研究[D].中国农业科学院博士学位论文,2009.
    [34]阴艳超.支持产业链协作的产品应用服务建模与系统构建研究[D].西南交通大学博士学位论 文,2009.
    [35]Wu N, Mao N, Qian Y M. An approach of partner selection in agile manufacturing [J]. Journal of Intelligent Manufacturing,1999,10 (6):519-529.
    [36]WANG D W, YUNG K L, IP W H. A heuristic genetic algorithm for subcontractor selection in global manufacturing environment [J]. IEEE Transactions on System, Manufacturing and Cybernetics—Part C:Applications and Reviews,2001,31(2):189-198.
    [37]冯蔚东,陈剑,赵纯均.基于遗传算法的虚拟企业伙伴选择过程及优化模型[J].清华大学学报(自然科学版),2000,40(10):120-124.
    [38]HENRY C. W. LAU, ERIC T.T.WONG. Partner selection and information infrastructure of a virtual enterprise network[J]. INT. J. COMPUTER INTEGRATED MANUFACTURING,2001, 14 (2):186 - 193.
    [39]Crispim J A, Pinho J. Multicritia partner selection in virtual enterprise[M]. Boston: Springer Boston,2007.
    [40]卢纪华,李艳.基于DEA/AHP的虚拟企业合作伙伴选择研究[J].东北大学学报(自然科学版),2008,29(11):1661-1664.
    [41]夏维力,杨海光,张莹.虚拟企业伙伴选择的BP神经网络模型研究[J].计算机工程与应用,2006(26):208-210.
    [42]成桂芳.虚拟企业合作伙伴评价体系与模型研究[J].科技进步与对策,2004,10:40-42.
    [43]张成考,聂茂林,吴价宝.基于改进型灰色评价的虚拟企业合作伙伴选择[J].系统工程理论与实践,2007(11):54-60.
    [44]侯艳君,袁文卓.基于模糊层次综合评价法的虚拟企业合作伙伴选择[J].机械工程与自动化,2009(4):60-62.
    [45]马鹏举.基于模糊层次分析法(F-AHP)的盟员优化选择算法[J].西安交通大学学报,1999,33(7):108-110.
    [46]王丹,杨晓春,王国仁等.基于模糊层次分析法实现虚拟企业中的伙伴选择[J].东北大学学报(自然科学版),2000,21(6):606-609.
    [47]韩敏.基于ASP的汽车产业链协作模式、技术、平台研究[D].西南交通大学博士学位论文,2006.
    [48]周艾飞,陈治亚,刘力存.基于粗糙集的供应链合作伙伴选择[J].物流技术,2007,26(8)178-181.
    [49]居文军,孙林夫,赵慧娟等.ASP平台身份认证技术研究[J].计算机应用研究,2006(5)103-104.
    [50]袁晓舟,范菲雅,马登哲.ASP平台安全认证技术的研究与实现[J].计算机集成制造系统,2005,11(12):1738-1742
    [51]黄华,章义来,翟育明.陶瓷行业ASP平台安全认证技术的研究与实现[J].计算机安全,2008(12):89-91.
    [52]应文兰,李爱平,徐立云.网络化制造动态系统身份认证的研究与实现[J].中国机械r程,2008,19(11):1293-1296.
    [53]刘宏伟,谢维信,喻建平.基于身份的网络化制造安全协同商务平台[J].计算机工程,2008,34(14):160-162.
    [54]徐立云,李爱平.基于应用服务提供商模式网络化制造的安全技术研究[J].计算机集成制造系统,2006,12(11):1881-1886.
    [55]王路炯,李爱平,徐立云.ASP模式的网络化制造安全体系[J].中国机械工程,2007,18(3):300-303.
    [56]王晓峰.制造网格系统信息安全技术研究[D].西安理工大学博士学位论文,2007.
    [57]刘婷婷.网络化制造系统中安全体系结构及访问控制技术研究[D].南京理工大学博士学位论文,2006.
    [58]章义来,高德民.网络化制造ASP平台的安全模型[J].中国制造业信息化,2008,37(17)18-21.
    [59]屈喜龙.区域网络化制造中的资源管理及其优化配置技术研究[D].西南交通大学博士论文,2006.
    [60]Jing Xu, Tang Jinglei, He Dongjian. et al Security Scheme for Sensitive Data in Management-type SaaS[C].//2009 International Conference on Information Management, Innovation Management and Industrial Engineering, USA:IEEE Computer society,2009: 47-50.
    [61]Zhang Qiang, Cui Dong. Enhance the user data privacy for SAAS by separation of data[C]. //2009 International Conference on Information Management, Innovation Management and Industrial Engineering, USA:IEEE Computer society,2009:130-132.
    [62]Linzhen Zhou, Defang Liu, Bin Wang. Research on ASP-Based Information Security System[C].//2008 International Symposium on Computer Science and Computational Technology, USA:IEEE Computer society,2008:746-749.
    [63]Balachandra Reddy Kandukuri, Ramakrishna Paturi V, Dr. Atanu Rakshit. Cloud Security Issues[C].//2009 IEEE International Conference on Services Computing, USA:IEEE Computer society,2009:517-520.
    [64]Fabio kon and Roy H. Campbeu. Dependence Management-Based Distributed Systems. IEEE Concurrency,2000.
    [65]A. P. Barrors et al. Retrofitting workflow for B2B component assembly, Proceedings of the 25th Annual International Computer Software and Applications Conference,2001.
    [66]Sang-Genu Kim. Designing a Domain Framework with Component Management Model[J]. Journal of software,2002, vol.13(3):335-341.
    [67]杨芙清,梅宏,吕建等.浅论软件技术发展[J].电子学报,2002,30(12)A:1901-1906.
    [68]张文娟,赵俊峰,谢冰等.一种支持可变性的构件模型JBCOM/E[J].电子学报,2003,31(6):899-902.
    [69]孟凡超,战德臣,徐晓飞.支持可变性的企业信息系统模型[J].计算机集成制造系统,2006,12(8):1175-1182.
    [70]王忠杰,战德臣,徐晓飞.业务构件识别方法研究综述[J].计算机集成制造系统,2007,13(4):797-805.
    [71]阴艳超,孙林夫.基于广义动态约束满足的产品应用服务构件模型研究[J].计算机集成制造系统,2009,15(6):1098-1106.
    [72]孟繁晶,邓家禔.合作伙伴的可拓综合评价方法[J].计算机集成制造系统,2005,11(6)869-874.
    [73]王晶,杜凡如.结合AHP方法的可拓理论在协同制造合作伙伴评价体系中的应用[J].中国管理科学,2007,15 (Special Issue):427-430.
    [74]贺团英,马天山.基于可拓法的报废汽车逆向物流供应商选择与评价模型研究[J].武汉理工大学学报(社会科学版),2009,22(6):52-57.
    [75]Zhang Qiang, Cui Dong. Enhance the user data privacy for SAAS by separation of data[C]. //2009 International Conference on Information Management, Innovation Management and Industrial Engineering, USA:IEEE Computer society,2009:130-132.
    [76]陈静,孙林夫.复杂网络中节点重要度评估[J].西南交通大学学报(自然科学版),2009,44(3):426-429.
    [77]Barabasi A.-L, Albert R, Jeong H. Mean-field theory for scale-free random networks[J]. Physica A,1999,272:173-137.
    [78]Callaway D S, Newman M E J, Strogatez S H, et al. Network robustness and fragility Percolation on random graphs [J]. PhysRev Lett,2000,85(25):5468-5471.
    [79]汪小帆,李翔,陈关荣.复杂网络理论及其应用[M].北京,清华大学出版社,2006:19-69.
    [80]Solomonoff R, Rapoport A. Connectivity of random nets. Bulletin of Mathematical Biophysics,1951,13:107-117.
    [81]Papoport A. Contribution to the theory of random and biased nets. Bulletin of Mathematical Biophysics,1957,19:257-277.
    [82]刘建国.复杂网络模型构建及其在知识系统中的应用[D].大连理工大学博士论文,20006.
    [83]Erdos, Renyi. On random graphs. Publ. Math.,1959,6:290-297.
    [84]Erdos, Renyi. A. On the evolution of random graphs. Publ. Math. Ins. Hung. Acad. Sci., 1960,5:17-61.
    [85]郭雷,许晓鸥.复杂网络[M].上海科技教育出版社,上海,200006年11月第1版:1-24.
    [86]Watts D J. Networks dynamics and the small world Phenomenon. Am. J. Sociol.,1999, 105:493-592.
    [87]Watts D J. Strogatz S H. Collective dynamics of'small-world'networks. Nature, 1998,393:393-442.
    [88]Newman M E J, Moore C, Watts D J. Mean field solution of the small-world network model. Phys. Rev. Lett.,2000,84:3201-3204.
    [89]Barabasi A L., Albert R. Emergence of scaling in random networks. Science,1999, 286(5439):509-512.
    [90]Albert R, Jeong H, Barabasi A L. Attack and error tolerance in complex networks. Nature, 2000,406:387-482
    [91]Carlson J, Doyle. Highly optimized tolerance:Robustness and power laws in complex systems. Phys. Rev. Lett.,2000,84(11):2529-2532.
    [92]Carlson J, Doyle. Complexity and Robustness. PNAS,2002,99(Suppl.1):2539-2545.
    [93]Li X, Jin Y Y, Chen G. Complexity and synchronization of the World Trade Web. Physica A,2003,328:287-296.
    [94]Li X, Chen G. A local world evolving network model. Physica A,2003,328:274-286.
    [95]S.H. Yook, H. Jeong, Barabasi A.-L, and Y. Tu. Weighted evolving networks[J], Phys. Rev. Lett.,2001,86(18):5835-5838.
    [96]T. Antal and P. L. Krapivsky, Weight-driven growing networks, Phys. Rev. E,71, 026103(2005).
    [97]Kwangho Park, Ying-Cheng Lai, and Nong Ye. Characterization of weighted complex networks, Phys. Rev. E,70,026109(2004).
    [98]Wen-xu Wang, Bo Hu, Tao Zhou, Bing-hong Wang, and Yan-bo Xie. Mutual selection model for weighted networks. Phys. Rev. E,72,046140(2005).
    [99]Zao-feng Pan, Xiang Li, and Xiao-fang Wang. Generalized local-world models for weighted networks. Phys. Rev. E,73,056109(2006).
    [100]宋庭新,黄必清,邵贝恩.集团企业业务集成服务平台的研究与应用[J].计算机集成制造系 统,2008,14(4):696-702.
    [101]杨易.IBM助力上海通用汽车搭建售后服务网络管理系统[EB/OL].http://tech.ianlong. com/28/2004/10/21/223@2332641.htm.,2003-03.
    [102]顾新建,徐向纮,陈子辰.网络化制造范式和我国的网络化制造战略[J].中国工业经济,2001(1):30-34.
    [103]李向东,范玉青,段国林,等.面向网络化制造的中小企业协同管理平台研究[J].计算机集成制造系统,2005,11(11):1564-1572.
    [104]杨海成,敬石开,王海龙. ASP应用服务平台_需求_概念_内容_应用与发展[J].制造业信息化,2003,12:12-15.
    [105]国夕(?)SaaS的发展历程[EB/OL].http://www.dosaas.com/2009/0724/6870.html.,2009-07.
    [106]崔云飞,刘东,李昀.云计算:一种新型服务计算模式[C].2008年中国高校通信类院系学术研讨会论文集(下册),2009:121-127.
    [107]王淑营.面向制造业产业链协同商务系统的数据交换适配器研究[J].计算机应用研究,2009,26(1):189-191.
    [108]王淑营.面向产业链协同商务平台的动态数据交换技术研究[J].计算机集成制造系统,2010,47(4):741-750.
    [109]李向东.网络化制造协同联盟合作伙伴选择与评价策略[J].河北工业大学学报,2005,34(3):1-7.
    [110]蔡文,杨春燕,林伟初.可拓工程方法[M].北京:科学出版社,1997.
    [111]蔡文,杨春燕,陈文微,等.可拓集与可拓数据挖掘[M].北京:科学出版社,2008:39-43.
    [112]陈静,孙林夫.基于物元分析的产业链协同联盟盟员评价与优选模型[J].计算机集成制造系统,2009,15(9):1743-1748.
    [113]傅新平,胡伶俐.基于物元分析法的综合交通系统服务水平评价[J].武汉理工大学学报(交通科学与工程版),2007,31(4):580-583.
    [114]吴华军.基于物元分析生态环境综合评价研究[J].华中科技大学学报(城市科学版),2006,23(1):52-55.
    [115]王锦国,周志芳,袁永生.可拓评价方法在环境质量综合评价中的应用[J].河海大学学报,2002,30(1):15-18.
    [116]关涛,余万军,慎勇扬等.基于可拓评价方法的十地开发整理项目立项决策研究[J].农业程学报,2005,21(1):71-74.
    [117]张甫仁,杨昭,郁文红.室内环境评价物元模型及可拓评价方法[J].天津大学学报,2005,38(4):307-312.
    [118]邵天习.企业战略风险的可拓评价模型研究[J].武汉理工大学学报,2008,30(12):185-188.
    [119]胡宝清,张轩,卢兆明.可拓评价方法的改进及其应用研究[J].武汉理工大学学报(工学版),2003,36(5):79-84.
    [120]王晓宁,盛洪飞,孟祥海.基于物元分析的交通影响评价模型[J].公路交通科技,2007,24(3):102-106.
    [121]周凯,栗秋华,周林等.基于物元分析理论的大电力客户信用评价[J].电网技术,2009,33(16): 75-80.
    [122]黄辉玲,罗文斌,吴次芳等.基于物元分析的土地生态安全评价[J].农业工程学报,2010,26(3):316-322.
    [123]周玉,钱旭,江涛等.井采煤矿安全性态可拓评价模型的研究[J].中国矿业大学学报,2009,38(4):515-522.
    [124]陈薇.可拓学中关联函数的构造及零界的确定[J].数学的实践与认识,2009,39(4):154-159.
    [125]Chun-Li LIN, Hung-Min SUN, Tzonelih HWANG. Attacks and Solutions on Strong-Password Authentication[J]. IEICE Transactions on Communications,2001, E84-B(9):2622-2627.
    [126]李中献,詹榜华,杨义先.认证理论与技术的发展[J].电子学报,1999,21(1):98-102.
    [127]Awasthi A K, Lal S. An enhanced remote user authentication scheme using smart cards [J]. IEEE Trans Consumer Electron,2004,50(2):583-586.
    [128]SHEN Zhong-hua. A new modified remote user authentication scheme using smart cards [J]. Appl. Math. J. Chinese Univ.2008,23(3):371-376.
    [129]王蕴红,朱勇,谭铁牛.基于虹膜识别的身份鉴别[J].自动化学报,2002,28(1):1-10.
    [130]林喜荣,黄析伟,苏晓生等.生物识别技术的标准化进程[J].清华大学学报(自然科学版),2006,46(2):194-198.
    [131]A One-Time Password System. The Internet Society(1998). RFC[2289].
    [132]范玉涛,苏桂平.一种双向一次性口令身份认证方案的设计[J].计算机应用,2008,28(6):71-75.
    [133]张宏,陈志刚.一种新型一次性口令身份认证方案的设计与分析[J].计算机工程,2004,30(17):112-113.
    [134]王敏,戴宗坤,方勇.一种新的一次性口令机制及其应用[J].计算机应用研究,2005(1):108-110.
    [135]N.M. Haller, "The S/key(TM) one-time password system" RFC1760, Feb,1995.
    [136]N. M. Haller. "The S/key(TM) one-time password system" Proc. Internet Society Symposium on Network and Distributed System Security, pp.151-158,1994
    [137]索望.一次性口令身份认证方案的设计与实现[D].四川大学硕十学位论文,2005
    [138]张金颖.动态口令身份认证方案的研究与实现[D].西南交通大学硕十学位论文,2006
    [139]M. Sandirigama, A. Shimizu and M. t. Noda, "Simple and secure password authentication protocol(SAS)", IEICE Trans. Commun., Vol. E83-B(6), pp.1363-1365,2000.
    [140]但静,刘嘉勇,王艳艳.一种新的基于RSA及有限域上离散对数难题的一次性身份认证方案[J].四川大学学报(自然科学版),2008,45(3):549-552.
    [141]Hwang MS, Li LH. A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics,46(4):992-993,2000.
    [142]陈静,孙林夫.业务关联的多产业链协作网络模型[J].计算机集成制造系统,2010,16(5):1089-1096
    [143]陈静,王淑营,孙林夫.面向柔性的业务关联的多产业链协作公共服务平台模型和架构[J].计算机集成制造系统,2011,17(1):177-185.
    [144]王大康,杜海山.信息安全中的加密与解密技术[J].北京工业大学学报,2006,32(6)497-500.
    [145]袁春,文振堃,张基红等.基于密码学的访问控制和加密安全数据库[J].电子学报,2006,34(11):2043-2046.
    [146]朱勤,骆轶妹,乐嘉锦数据库加密与密文数据查询技术综述[J].东华大学学报(自然科学版),2007,33(4):543-548
    [147]尚晋,徐江峰,黄小粟基于B/S结构的数据库加密研究[J].计算机科学,2005,32(8):80-82
    [148]赵卓,刘博,厉京运.基于DBMS外层的数据库加密系统研究与设计[J].计算机工程与设计,2008,29(12):3030-3033.
    [149]汪培芬.数据库加密技术的研究与实现[D].南京理[大学硕十学位论文,2008.
    [150]李石.数据库加密技术及在招投标系统中的应用研究[D].哈尔滨工程大学,2008.
    [151]王尚平,王育民,张亚玲.基于DSA及RSA的证实数字签名方案[J],软件学报,2003,14(3)588-593.
    [152]杜红珍.数字签名的若干问题研究[D].北京邮电大学博士学位论文,2009.
    [153]王少辉.数字签名算法的研究与实现[D].山东大学博士学位论文,2008.
    [154]岳昆,王晓玲,周傲英.Web服务核心支撑技术:研究综述[J].软件学报,2004,15(3)428-442.
    [155]陈静,孙林夫.基于双随机软输入模型的一次性口令认证方法[J].四川大学学报(工程科学版),2010,42(2):154-159.
    [156]IPSec解决方案技术白皮书[EB/OL]. http://www.huawei-3com.com,
    [157]简单易用的8SL VPN网络技术白皮书[EB/OL]. http://www.huawei-3com.com
    [158]张亚玲,张璟,王晓峰.一个高效的基于身份和RSA的紧致多重数字签名方案[J].电子与信息学报,2008,30(9):2246-2249.
    [159]张健红,韦永壮,王育民.基于RSA的多重数字签名[J].通信学报,2003,24(8):150-154.
    [160]王尚平,王育民,张亚玲.基于DSA及RSA的证实数字签名方案[J].软件学报,2003,14(3):588-593.
    [161]RSA Private Key Encryption[EB/OL] http://www.codeproject.com/KB/security/PrivateEncryption.aspx,2009-08.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700