可信服务组合若干关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
以Web服务为代表的软件服务及软件服务协同已成为一种典型的Internet应用形态。集成单一服务所提供的功能以形成新的、满足复杂需求的服务组合技术已成为提高软件重用性,构造Internet新应用的重要方式。然而,多样的服务资源缺乏可信的、专业的第三方认证实体对其相关属性提供担保,且服务实体通常分属于不同的自治域,服务的执行过程相对于使用者而言不可见且可以被提供者更改,导致服务资源具有很大的不确定性和不可控性,服务质量常常未知。因此,在服务协同场景下应用整体的可信问题,即可信服务组合问题显得尤为突出、复杂,已经成为制约服务组合技术发展的关键问题之一。
     针对以上问题,本文在分析服务组合技术在可信性方面的主要挑战基础上,主要从服务选择策略、服务组合方案选择、降低失效维护开销、服务组合演化机理以及服务访问控制等方面开展了相关研究。提出了以身份可信、能力可信、行为可信为一体的服务组合可信概念框架,并从重用性、共享性、可靠性、可用性、协同性等角度出发,提出了多种提高服务组合整体可信性的相关机制。综合这些研究成果,总体上形成了较为系统的可信服务组合技术支撑框架,能够为基于软件服务协同的网络应用提供有效的可信保障机制。本文的主要创新工作包括:
     (1)在可信服务选择方面:可信对用户而言是一种主观感受,因此可信服务选择既要满足服务质量信息的客观准确性又要考虑用户的偏好需求,但现有服务选择机制缺乏对用户偏好的支持。针对该问题,借鉴互联网推荐系统的思想,提出了基于偏好推荐的可信服务选择算法。通过用户的历史服务评价信息在一组推荐用户中筛选出与自己评价指标最相似的一组用户,并根据该组用户对服务的评价值加权计算服务的可信度,以此作为服务选择的依据。模拟实验结果表明,该方法能够为用户选取满足自身偏好需求的服务,并较好解决了推荐算法中冷启动、推荐信息不准确和不诚实评价等问题。与同类研究相比,本文提出的方法更注重用户间体验的类似,并考虑了用户的推荐等级和领域相关度,因此在满足用户偏好需求方面更适合,极大增强了用户对服务的信任程度。
     (2)服务组合方案选择方面:在面对众多的服务组合设计方案时,对组合方案的选择缺乏理论指导是导致容错开销过大的主要原因之一,从而很大程度上限制了容错手段的实施效果,造成容错机制的“弊大于利”。针对该问题,在分析服务冗余、流程重构等容错手段带来的高额容错代价后,提出了9条用于减少容错代价、提高容错效果的服务组合功能拆分原则。遵循这些原则有助于服务组合设计者选择合适的服务粒度并降低服务间的耦合度,增强了服务间的协同能力并降低失效容错代价。与同类研究相比,本文工作加强了在设计阶段对容错机制的支持,这是当前大多数研究中较少考虑而又不可忽略的一部分。
     (3)降低失效开销方面:组合服务的失效不可避免,因此可能带来高额的补偿代价,直接导致用户支出的增加或用户信誉度的降低,影响用户对服务组合系统的信任。针对该问题,本文以具有事务特征的服务组合为背景,在分析并定义事务补偿代价的基础上,提出一种子事务延迟提交算法,该算法允许某个全局事务的子事务在提交前根据自身的补偿代价和全局事务的运行状态动态确定提交时间,尽可能使补偿操作变更为回滚操作。算法的正确性被证明,模拟实验表明,在事务失败时该算法可有效减少补偿活动的数目,降低补偿代价。与同类研究相比较,本文的工作不仅对补偿操作进行准确的分类,更对补偿代价进行精确的定义,这与当前大部分把补偿操作代价刻画为二值的研究相比,更有利于描述补偿操作的个体差异,从而优化了以补偿代价为基准的调度算法。
     (4)服务组合演化机理方面:服务组合的可用性、可靠性等问题不可能在设计阶段就一劳永逸地解决,因此一条可行的技术途径为“监控与演化”。针对该需求,提出了一种QoS驱动的服务组合演化机制,在可演化组合服务模型的基础上,主要对组合服务演化机制的特殊性需求展开深入研究。针对通用的监控注入能力、多维的演化决策、提高演化过程的稳定性和预防抖动现象等需求,通过监控软件生产线、多维服务质量属性的决策模型、基于耦合模型的组合服务设计原则以及离散的演化操作触发机制等技术逐一加以解决。力求建立微观层次规约自主制导与宏观层次人机协同的组合服务演化模型,可以灵活的根据应用的性质提供所需质量的服务。模拟实验结果以及实验系统说明了演化机制的有效性,此外,通过合理的参数调整可以增强演化过程中系统的稳定性并减少抖动。
     (5)服务访问控制方面:从可信的角度出发,人们首先考虑服务提供者的可信度。在某些情况下,服务提供方同样不相信用户可以正确的使用服务,这些误用可能来自于恶意行为、无知或者一时操作的疏忽,最终用户将改变服务的状态,导致服务的共享性降低甚至破坏和扰乱服务的正常运行。针对该问题,结合经典案例本文引入语义拒绝服务攻击SDoS(Semantic Denial of Service)的概念用于描述用户非正常使用服务所导致的服务失效问题,并针对该类攻击提出基于用户可信度的访问控制策略:通过调整用户的资源持有时效和补偿强度两个参数对用户的行为进行隐性的控制。模拟实验表明该策略可有效地抑制语义拒绝服务攻击。
Software service and software service coordination represented by Web service have become a typical Internet application style. Service composition which integrates the functionalities of individual services to fulfill new and complex requirement has become an important manner for improving reusability of software and developing new Internet applications. However, the current service resources lack of the trustworthy and professional third party entities to authenticate guarantee for relevant properties. Moreover, service resources always belong to different autonomic domains, the execution process of services cannot be transparent to the customers and can be modified by service providers. Therefore, service resources have the nature of nondeterminacy and uncontrollability, the quality of service is unknown at moments. It is very obvious that the trustworthiness problem of whole application, namely, the problem of trustworthy service composition, has become a challenging and critical problem of service composition.
     On the basis of analyzing the challenges of service composition at the aspect of trustworthiness, the dissertation have mainly studied on several key problems including service selection strategy, composition plan selection, reducing fault-tolerant cost, mechanism of evolution and service access control. We present trust concept framework of service composition which includes identity trustworthiness, capability trustworthiness and behavior trustworthiness, and then start from the point view of reusability, shareability, reliability, availability and collaboration, we present several relational mechanisms to increase service composition entire trustworthiness. Our contributions have become systematical trustworhty service composition supporting framework which is helpful for providing effective trust-guarantee mechanisms for network application based on software service coordination. The contributions of the dissertation are listed as follows:
     (1) On trustworthy services selection: Trustworthiness is user’s subjective feeling, and for this reason, it not only needs to meet the objective accuracy of QoS, but also needs to consider the users’individualized requirements, but existing service selection strategy lacks of preference support. Aiming at the problem, by borrowing some ideas of Internet recommendation system, we propose preference recommendation based trustworthy service selection algorithm. First, we find a group of recommenders which have similar rating levels according to the historical evaluating information; then, compute the trustworthiness of service by adding recommenders’evaluation of estimate weighting to provide grounds for choosing service. Our experimental results show that our method can find out proper services to meet user's preference requirements effectively, and solve the weakness of recommender systems, such as cold start, inaccurate recommendations and dishonest evaluation. Compared with the similar works, our method focuses on the similarity of users’personal experience, and considers the recommending level and relative domain degrees as well. Therefore, it is more suitable for meeting the users’individual requirements, thus greatly increasing users’faith on service.
     (2) On composition plan selection: It is the main reason for increasing fault-tolerant cost that without theory guiding the choice while select an optimal one among large number of composition plans. So, to some extent, it restricts the effect of fault tolerance and makes fault tolerance unworthy. To this problem, we present nine pieces of functional split principles based on the analysis of high-cost bring from service redundancy and replanning, in order to reduce the cost of fault tolerance. Following these principles is helpful for the designer to select the proper service granularity and reduce the coupling degree of services, moreover, it will be beneficial to coordinate services as well as reduce the cost of fault tolerance. Compared with the similar works, our work emphasizes on the support to fault-tolerant mechanism in design time which is the most important but always ignored part by most researches.
     (3) On reducing failure cost: The failure of composite service is inevitable, which would bring high quota compensation cost, and result in increase of expenses and reduction of users’reputation. For that, based on analyzing and defining the cost of compensating transactions, we present a sub-transactions committing delay algorithm in the backgroup of service composition with transactional characteristic. Sub-transactions can determine the time of committing according to both the cost of compensation and the state of execution dynamically which can turn potential compensation into rollback. The correctness of proposed algorithm is proved, and simulations show that the algorithm can confine the compensation sphere and reduce the cost of compensation when the transaction fails. Compared with the similar works, our work not only classifies compensating operation accurately, but also defines the cost of compensation exactly, while current work largely considers the compensation as two-value which makes against the description the difference of compensation and reduces the effect of optimization on scheduling algorithm based on the cost of compensation.
     (4) On evolution of service composition: It is impossible to find out the method to get availability and reliability done once and for ever in design time, so a feasible technical way is monitor and evolution. To meet the requirement, we present QoS-driven service composition evolution. Based on the evolutionary model of service compositon, we analyze and summarize the specific challenges of service composition evolutionary mechanisms which include general capability of monitor implantation, multidimensional decision making model, increasing stability during the evolution and preventing from shaking of system. After that, we present several solutions based on monitoring software production line, multidimensional service’s QoS decision model, principle of design based on coupled model and discrete trigger mechanism of evolution effectively. We attempt to build the evolution model of service composition both in microscopic view and macroscopic view, and then provide necessary services flexibly according to the character of application. Simulation experiments and system indicate the validity of evolutionary mechanisms, moreover, by adjusting parameters appropriately, we can enhance stability and reduce shaking of the system during the process of evolution.
     (5) On servcie access control: From the trust point of view, people first consider the trustworthiness of service provider. However, under some circumstances, service providers may not trust that users can use their services correctly, whether this misuse happens through malice, stupidity, or oversight is unimportant. It may affect the state of the services which result in reducing the shareability and disturb proper operation even more. To solve this problem, we introduce the term SDOS (Semantic Denial of Service) combine with classical case to describe such problems and then we present a user trustworthiness based lightweight access control which recessively defines users’activities by adjusting two parameters: resources hold duration and compensation intensity. Through the experiments, we find that our proposed mechanism can restrain the SDoS attack effectively.
引文
[1]徐锋.开放协同软件环境中信任管理研究[D].南京:南京大学,2003:1-118.
    [2] Biplav Srivastava, Jana Koehler. Web Service Composition - Current Solutions and Open Problems[C].//ICAPS 2003 Workshop on Planning for Web Services.2003: 28-35.
    [3] Jianguo Lu, Yijun Yu, Debashis Roy, Deepa Saha. Web Service Composition: a Reality Check[C].//Web Information Systems Engineering (WISE2007).2007: 523-532.
    [4] Nikola Milanovic, Malek Miroslaw. Current Solutions for Web Service Composition[J]. IEEE Internet Computing, 2004, 8(6): 51-59.
    [5] Paulo F. Pires, Mário R. F. Benevides, Marta Mattoso. Building Reliable Web Services Compositions[C].//International Workshop Web Services Research, Standardization, and Deployment.2002: 59-72.
    [6] S. Dustdar, W. Schreiner. A survey on web services composition[J]. Int'l Journal of Web and Grid Services, 2005, 1(1): 1-30.
    [7] Eyhab Al-Masri, Qusay H. Mahmoud. Investigating Web Services on the World Wide Web[C].//WWW2008.2008: 795-804.
    [8] Su Myeon Kim, Marcel-Catalin Rosu. A Survey of Public Web Services[C].//WWW 2004.2004: 312-321.
    [9] Stephen J. H. Yang, James S.F. Hsieh, Blue C. W. Lan, Jen-Yao Chung. Composition and Evaluation of Trustworthy Web Services[C].//the IEEE (EEE05) international workshop on Business services networks table of contents.2005: 5-12.
    [10] Singh, Munindar P. Trustworthy Service Composition: Challenges and Research Questions[C].//Autonomous Agents and Multi-Agent Systems Workshop on Deception, Fraud and Trust in Agent Societies(AAMAS).2002: 39-52.
    [11] P?nar Yolum, Munindar P. Singh. Locating Trustworthy Services[C].//the First International Workshop on Agents and peer-to-peer Computing(AP2PC 2002).2002: 1-12.
    [12] Liu, Wei. Trustworthy Service Selection and Composition - Reducing the Entropy of Service-oriented Web[C].//International Conference on Industrial Informatics (INDIN 2005).2005: 104-109.
    [13] Elizabeth Chang, Tharam S Dillon, Farookh Khadeer Hussain. Trust and Reputation Relationships in Service-Oriented Environments[C].//Third International Conference on Information Technology and Applications (ICITA'05).2005: 4-14.
    [14] E. Michael Maximilien, Munindar P. Singh. Toward Autonomic Web Services Trust and Selection[C].//the 2nd international conference on Service oriented computing(ICSOC).2004: 212-221.
    [15] A. Gorbenko, V. Kharchenko, P. Popov, A. Romanovsky, A. Boyarchuk.Development of Dependable Web Services out of Undependable Web Components[R]. Newcastle: School of Computing Science, University of Newcastle upon Tyne, 2004: 1-37.
    [16] Gorbenko A, Kharchenko V, Romanovsky A. On composing Dependable Web Services using undependable web components[J]. International Journal of Simulation and Process Modelling, 2007, 3(1/2): 45-54.
    [17] S.Tsur, S.Abiteboul, R.Agrawal, U.Dayal, J.Klein, and G.Weikum. Are Web Services the Next Revolution in e-Commerce (Panel)[C].//the International Conference on Very Large Databases.2001: 614-617.
    [18] Liangzhao Zeng, Boualem Benatallah, Anne H.H. Ngu, Marlon Dumas, Jayant Kalagnanam, Henry Chang. QoS-Aware Middleware for Web services Composition[J]. Software Engineering, 2004, 30(5): 311-327.
    [19] LEYMANN F, ROLLER D, SCHMIDT M T. Web services and business process management[J]. IBM SYSTEMS JOURNAL, 2002, 41(2): 198-211.
    [20] S.Tsur, S.Abiteboul, R.Agrawal, U.Dayal, J.Klein and G.Welkum. Are Web services the Next Revolution in e-Commerce(Panel)[C].//the 27th International Conference on Very Large Databases(VLDB). Morgan Kaufmann, 2001: 614-617.
    [21] Fox, Shankar R. Ponnekanti and Armando. SWORD: A Developer Toolkit for Web Service Composition[C].//the Eleventh International World Wide Web.2002.
    [22] Alexander Marton, Giacomo Piccinelli, Chris Turfin. Service Provision and Composition in Virtual Business Communities[C].//the 18th IEEE Symposium on Reliable Distributed Systems.1999: 336-346.
    [23] ZHANG R Y, WANG J. ONTOS: ontology-driven Web service composition Platform[EB/OL]. http://webster.es.uga.edu/~ruoyan/ONTOS.htm, 2009-04-13/2009-07-11.
    [24] Marsh, Stephen Paul. Formalizing Trust as a Computational Concept[D]. University of Stirling, 1994: 1-184.
    [25] Wang Huai-Min, Tang Yang-Bin, Yin Gang, Li Lei. Trust mechanisms of Internet software[J]. Science in China Series F: Information Sciences., 2006, 36(10): 1156-1169.
    [26] Wang Huai-Min, Tang Yang-Bin, Yin Gang, Li Lei. Trustworthiness of Internet-based software[J]. Science in China Series F: Information Sciences., 2006, 49(6): 759-773.
    [27]林闯,肖岩平,王元卓,曾荣飞.网络保护质量研究[J].计算机学报,2008,31(10):1667-1678.
    [28] Daniel Bachlechner, Katharina Siorpaes, Dieter Fensel, and Ioan Toma. Web Service Discovery - A Reality Check[R]. DERI-Digital Enterprise Research Institute 2006: 1-19.
    [29] Campanelli, Melissa. Survey: Online Transaction Issues Can Have NegativeEffect[EB/OL]. http://www.dmnews.com/cms/trackback/38375-1, 2007-10-26/2008-02-24.
    [30] Srivatsa, M., Iyengar, A., Mikalsen, T., Rouvellou, I., Yin, J. An access control system for web service compositions[C].// L.J. Zhang, T.J. Watson, K.P. Birman, et al. (eds.). IEEE International Conference on Web Services (ICWS 2007). Ieee Computer Soc, 2007: 1-8.
    [31]胡建强.Web服务发现若干关键技术研究[D].湖南长沙:国防科技大学,2005:1-130.
    [32] Amit Sheth, Jorge Cardoso, John Miller, Krys Kochut. Qos for Service-oriented Middleware[C].//the 6th World Multiconference on Systemics, Cybernetics and Informations (SCI02).2002.
    [33] Hongbing Wang, Yifei Wang, Zongwei Luo, Xun Xu. A solution to Intelligent Services Selection[C].//the International Conference on Next Generation Web Services Practices (NWeSP'06).2006: 155-162.
    [34] Yutu Liu, Anne H.H. Ngu, Liangzhao Zeng. Qos Computation and Policing in Dynamic Web Service Selection[C].//13th International Conference on World Wide Web (WWW04).2004: 66-73.
    [35] Jianqiang Hu, Changguo Guo, Huaimin Wang, Peng Zou. Quality Driven Web Services Selection[C].//IEEE International Conference on e-business Engineering (ICEBE 2005).2005.
    [36]李研,周明辉,李瑞超,曹东刚,梅宏.一种考虑QoS数据可信性的服务选择方法[J].软件学报,2008,19(10):2620-2627.
    [37] P?nar Yolum, Munindar P. Singh. An Agent-Based Approach for Trustworthy Service Location[C].//1st International Workshop on Agents and Peer-to-Peer Computing (AP2PC).2002: 45-56.
    [38] Sensoy, M.,Pembe, F. C.,Zirtiloglu, H., et al. Experience-based service provider selection in agent-mediated E-Commerce[J]. Engineering Applications of Artificial Intelligence, 2007, 20(3): 325-335.
    [39] Xu HL, Wu X, Li XD, Yan BP. Comparison study of Internet recommendation system[J]. Journal of Software, 2009, 20(2): 350-362.
    [40] William Nagy, Francisco Curbera, Sanjiva Weerawarana. The advertisement and discovery of services (ADS) protocol for Web services[EB/OL]. http://www-128.ibm.com/developerworks/library/ws-ads.html?dwzone=ws, 2008-04-23/2008-11-11.
    [41] ShaikhAli A, Rana OF, AI-Ali RJ, Walker DW. UDDIe: An extended registry for Web service[C].//2003 Symposium on Applications and the Internet Workshops (SAINT 2003).2003: 85-89.
    [42] Verma K, Sivashanmugam K, Sheth A, Patil A, Oundhakar S, Miller J.METEOR-S WSDI: A Scalable P2P Infrastructure of Registries for Semantic Publication and Discovery of Web Services[J]. Information technology & management, 2005, 6(1): 17-39.
    [43] Mike P. Papazoglou, Bend J. Kramer, Jian Yang. Leveraging Web-Services and Peer-to-Peer Networks[C].//the 15th Int. Conf. on Advanced Information Systems Engineering (CAiSE 2003).2002: 485-501.
    [44]杜宗霞,怀进鹏.主动分布式Web服务注册机制研究与实现[J].软件学报,2006,17(3):454-462.
    [45]邓水光.Web服务自动组合与形式化验证的研究[D].浙江:浙江大学,2007:1-157.
    [46] Van, A.W. A Class of Petri Nets for Modeling and Analyzing Business Processes[D]. Eindhoven University of Technology, 1995.
    [47] J.Holzmann., Gerard. The Model checker SPIN[J]. IEEE Transactions on Software Engineering, 1997, 23(5): 279-295.
    [48] R.Milner. A Calculus of Communicating Systems[M]. Springer-Verlag New York, Inc., 1982.
    [49] Hoare, C.A. Communicating Sequential Processes[J]. Communications of the ACM, 1978, 21(8): 666-677.
    [50] Milner, Robin. Communicating and Mobile Systems: the Pi-Calculus[M]. Cambridge University Press; 1st edition (June 15, 1999), 1999: 161.
    [51] Cardelli L, Gordon AD. Mobile ambients[C].// e. Nivat M '(eds.).' Foundations of Software Science and Computation Structure.1998: 140-155.
    [52]廖军,谭浩,刘锦德.基于Pi演算的Web服务组合的描述和验证[J].计算机学报,2005,28(4):635-643.
    [53] M. Mazarra, R. Lucchi. A framework for generic error handling in business processes[C].//the 1st International Workshop on Web Services and Formal Method.2004: 133-145.
    [54]高春鸣.服务组合的形式化检验与QOS感知的服务组合方法研究[D].湖南长沙:国防科技大学,2007:1-216.
    [55] Schneider, F.B. Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial[C].//ACM Computing Surveys.1990: 299-319.
    [56] Huipeng Guo, Jinpeng Huai, Huan Li, Ting Deng, Yang Li, Zongxia Du. ANGEL: Optimal Configuration for High Available Service Composition[C].//IEEE International Conference on Web Services (ICWS 2007).2007: 280-287.
    [57] David B. Ingham, Fabio Panzieri, Santosh K. Shrivastava. Constructing Dependable Web Services[C].//Distributed Systems, LNCS 1752.2000: 277-294.
    [58] Canfora, G.,Di Penta, M.,Esposito, R., et al. QoS-aware replanning of compositeweb services[C].//IEEE International Conference on Services Computing.2005: 121-129.
    [59] Canfora, G., Di Penta, M., Esposito, R., Villani, M. L. A framework for QoS-aware binding and re-binding of composite web services[J]. Journal of Systems and Software, 2008, 81(10): 1754-1769.
    [60] Zeng, L. Z.,Benatallah, B.,Ngu, A. H. H., et al. QoS-aware middleware for Web Services Composition[J]. Ieee Transactions on Software Engineering, 2004, 30(5): 311-327.
    [61] Oliver Moser, Florian Rosenberg and Schahram Dustdar. Non-Intrusive Monitoring and Service Adaptation for WS-BPEL[C].//WWW2008.2008: 815-824.
    [62] Babak Esfandiari, Vladimir Tosic. Requirements for Web Service Composition Management[C].//11th HP-OVUA 2004 Workshop.2004:
    [63] Brézillon, Patrick. Focusing on context in human-centered Computing[J]. IEEE Intelligent Systems, 2003, 18(6): 62-66.
    [64] Mostefaoui SK, Hirsbrunner B. Towards a context-based service composition framework[C].//the International conference on Web Services.2003: 42-45.
    [65] Brahim Medjahed, Yacine Atif. Context-based matching for Web service composition[J]. DISTRIBUTED AND PARALLEL DATABASES, 2007, 21(1): 5-37.
    [66] KEITA FUJII, TATSUYA SUDA. Semantics-based Context-aware Dynamic Service Composition[J]. ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS, 2009, 4(2): 1-31.
    [67] Gerardo Canfora, Massimiliano Di Penta, Raffaele Esposito, Maria Luisa Villani. QoS-Aware Replanning of Composite Web Services[C].//IEEE International Conference on Web Services (ICWS'05).2005: 121-129.
    [68] Martello S, Toth P. Algorithms for knapsack problems[J]. Annals of Discrete Mathematics, 1987, 31: 70-79.
    [69] Michael R Garey, David S Johnson. Computers and Intractability: a Guide to the Theory of NP-Completeness[M]. San Francisco : W.H. Freeman, 1979.
    [70] Liangzhao Zeng, Boualem Benatallah, Anne H.H. Ngu, Marlon Dumas, Jayant Kalagnanam, Henry Chang. QoS-Aware Middleware for Web Services Composition[J]. IEEE Transactions on Software Engineering, 2004, 30(5): 311-327.
    [71] Gerardo Canfora , Massimiliano Di Penta. A Lightweight Approach for QoS–Aware Service Composition[C].//2nd International Conference on Service Oriented Computing (ICSOC'04).2004: 1-10.
    [72] Abhijit Patil, Swapna Oundhakar, Amit Sheth, Kunal Verma. METEOR-S Web service Annotation Framework[C].//the 13th international World Wide Web conference.2004: 553-562.
    [73] Boualem Benatallah, Marlon.Dumas, Quan Z.Sheng, and Anne H.H.Ngu. Declarative Composition and Peer-to-Peer Provisioning of Dynamic Web Services[C].//the18th International Conference on Data Engineering (ICDE02).2002: 253-260.
    [74] Boualem Benatallah, Marlon.Dumas, and Quan Z.Sheng. Facilitating the Rapid Development and Scalable Orchestration of CompositeWeb Services[J]. Distributed and Parallel Databases, 2005, 17(1): 5-37.
    [75] Liangzhao Zeng, Boualem Benatallah, and Marlon.Dumas. Quality Driven Web Services Composition[C].//WWW2003.2003: 411-421.
    [76] Haiyan Sun, Xiaodong Wang, Bin Zhou, Peng Zou. Research and Implementation of Dynamic Web Services Composition[C].//APPT'03.2003: 457-466.
    [77] Little, Mark. Web services transactions: past, present and future[R]. Arjuna Technologies Ltd, 2004: 1-10.
    [78] Portilla, Alberto. Providing transactional behavior to services coordination[C].//VLDB2006 Ph.D. Workshop.2006.
    [79] Santosh K.Shrivastava, Stuart M.Wheater. A Transactional Workflow based Distributed Application Composition and Execution Environment[C].//the 8th ACM SIGOPS European workshop on Support for composing distributed applications.1998: 74-81.
    [80] Ting Wang, Paul Grefen. A Historic Survey of Transaction Management From Flat to Grid Transactions[R]. The Netherlands: Eindhoven University of Technology, 2006: 1-22.
    [81] A. Ceponkus, et al. Business Transaction Protocol Version 1.0[R]. OASIS Business Transactions Protocol Technical Committee, 2002.
    [82] Felipe Cabrera, George Copeland, et al. Web Services Transactions specifications[EB/OL]. http://www-128.ibm.com/developerworks/library/specification/ws-tx/, 2009- 05-04/2009-06-04.
    [83] Doug Bunting, Martin Chapman, Oisin Hurley, Mark Little, Jeff Mischkinsky, Eric Newcomer, Jim Webber, Keith Swenson. Web Services Composite Application Framework (WS-CAF)[R]. 2003: 1-23.
    [84] Paulo F. Pires, Mario Benevides, Marta Mattoso. WEBTRANSACT: A FRAMEWORK FOR SPECIFYING AND COORDINATING RELIABLE WEB SERVICES COMPOSITIONS[D]. COPPE FEDERAL UNIVERSITY OF RIO DE JANEIRO, 2002: 1-274.
    [85] Fabio Casati, Ski Ilnicki, LiJie Jin, Krishnamoorthy V., Ming-Chien Shan. Adaptive and Dynamic Service Composition in eFlow[C].//International Conference on Advanced Information Systems Engineering.2000: 13-31.
    [86] Fabio Casati, Mehmet Sayal, Ming-Chien Shan. Developing e-services for composing e-services[C].//the 13th International Conference on Advanced Information Systems Engineering (CAiSE 2001).2001: 171-186.
    [87] T. Jin, S. Goschnick. Utilizing Web Services in an Agent-based Transaction Model[C].//Utilizing Web Services in an Agent-based Transaction Model.2003: 1-9.
    [88] Thomas Mikalsen, Stefan Tai, Isabelle Rouvellou. Transactional Attitudes: Reliable Composition of Autonomous Web Services[C].//Dependable Systems and Networks (DSN) Workshop on Dependable Middleware Systems.2002.
    [89] Sami Bhiri, Olivier Perrin, Claude Godart. Extending workflow patterns with transactional dependencies to define reliable composite Web services[C].//the Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services.2006: 145-150.
    [90] Sami Bhiri, Olivier Perrin, Claude Godart. Ensuring Required Failure Atomicity of Composite Web Services[C].//the 14th international conference on World Wide Web.2005: 138-147.
    [91] Sami Bhiri, Olivier Perrin, Claude Godart. Transactional Patterns for Reliable Web Services Compositions[C].//the 6th international conference on Web engineering(ICWE).2006: 137-144.
    [92] Segaran, Toby. Programming Collective Intelligence[M]. O’Reilly Media, Inc., 2007.
    [93] Garcia-Molina H, Salem K. Sagas[C].//ACM SIGMOD Conference on Management of Data.1987: 249-259.
    [94] Ran, S. A Framework for Discovering Web Services with Desired Quality of Service Attributes[C].//Web Services.2003: 208-213.
    [95] M Tian, A Gramm, T Naumowicz, H Ritter, J Schiller. A Concept for QoS Integration in Web Services[C].//First Web Services Quality Workshop.2003: 149-155.
    [96] Truong, H L,Samborski, RFahringer, T. Towards a Framework for Monitoring and Analyzing QoS Metrics of Grid Services[C].//the Second IEEE International Conference on e-Science and Grid Computing.2006: 1-65.
    [97] Goldberg, D.,Nichols, D.,Oki, B. M., et al. USING COLLABORATIVE FILTERING TO WEAVE AN INFORMATION TAPESTRY[J]. Communications of the Acm, 1992, 35(12): 61-70.
    [98] Karta, Kenneth. An Investigation on Personalized Collaborative Filtering for Web Service Selection[R]. The University of Western Australia, 2005: 1-53.
    [99] Badrul M. Sarwar, George Karypis, Joseph A. Konstan, John T. Riedl. Application of Dimensionality Reduction in Recommender System - A Case Study[C].//ACM WebKDD Workshop.2000.
    [100] Guang-Wei, ZHANG,De-Yi, LI,Peng, LI, et al. A Collaborative Filtering Recommendation Algorithm Based on Cloud Model [J]. Journal of Software 2007, 18(10): 2403-2411.
    [101] Massa, P.,Bhattacharjee, B. Using trust in recommender systems: Anexperimental analysis[C].// C. Jensen, S. PosladT. Dimitrakos (eds.). 2nd International Conference on Trust Management. Springer-Verlag Berlin, 2004: 221-235.
    [102] Wang, Yao,Vassileva, Julita. A Review on Trust and Reputation for Web Service Selection[C].//the 27th International Conference on Distributed Computing Systems Workshops. IEEE Computer Society, 2007: 1-25.
    [103] Rubinoff, Robert. How To Quantify The User Experience[EB/OL]. http://www.sitepoint.com/article/quantify-user-experience/, 2009-08-22/2009-09-11.
    [104] Zhou, Ronggang. How to Quantify User Experience: Fuzzy Comprehensive Evaluation Model Based on Summative Usability Testing[J]. Usability and Internationalization, Part II, HCII, 2007: 564-573.
    [105] Saha, S.,Murthy, C. A.Pal, S. K. Classification of Web services using tensor space model and rough ensemble classifier[C].// A. An, S. Matwin, Z.W. Ras, et al. (eds.). 17th International Symposium on Metodologies for Intelligent Systems. Springer-Verlag Berlin, 2008: 508-513.
    [106] Chirita P. A., Nejdl W., and Zamfir C. Preventing shilling attacks in online recommender systems[C].//ACM International Workshop on web Information and Data Management. ACM Press, 2005: 67-74.
    [107] Tsai, W. T.,Song, W. W.,Chen, Y. N., et al. Dynamic system reconfiguration via service composition for dependable computing[C].// F. Kordon,J. Sztipanovits (eds.). 12th Monterey Workshop. Springer-Verlag Berlin, 2005: 203-224.
    [108] May Chan K.S., Judith Bishop. The design of a self-healing composition cycle for Web services[C].//the ACM/IEEE ICSE 2010 Workshop on Software Engineering for Adaptive and Self-managing Systems SEAMS.2009: 20-27.
    [109] Peer, Joachim. A POP-Based Replanning Agent for Automatic Web Service Composition[C].//ESWC'05.2005: 47-61.
    [110] Massimiliano Colombo, Elisabetta Di Nitto, and Marco Mauri. SCENE: A service composition execution environment supporting dynamic changes disciplined through rules[C].// A. Dan,W. Lamersdorf (eds.). 4th International Conference on Service-Oriented Computing.2006: 191-202.
    [111]朱锐,郭长国,王怀民.一种基于补偿代价的长事务调度算法[J].软件学报,2009,20(3):744-753.
    [112] Berbner R., Spahn M., Repp N., Heckmann O., Steinmetz R. Dynamic replanning of Web Service workflows[C].//IEEE International Conference on Digital Ecosystems and Technologies.2007: 414-419.
    [113] Bocchi L, Laneve C, Zavattaro G. A calculus for long-running transactions[C].//the 6th IFIP Int’l Conf. on Formal Methods for Open-Object Based Distributed Systems.2003: 124-138.
    [114] Gray J, Reuter A. Trans. Proc.: Concepts and Techniques.[M]. 1993.
    [115] G. Weikum, G. Vossen. Transactional Information Systems: Theory, Algorithms,and the Practice of Concurrency Control[M]. San Fransisco: Morgan Kaufmann, 2001.
    [116] Roberto Bruni, Hernan Melgratti, Ugo Montanari. Theoretical Foundations for Compensations in Flow Composition Languages[C].//Symposium on Principles of Programming Lanaguages (POPL'05).2005: 209-220.
    [117] M. Chessell, C. Griffin, D. Vines,M. Butler,C. Ferreira,P. Henderson. Extending the concept of transaction compensation[J]. IBM SYSTEMS JOURNAL, 2002, 41(4): 743-158.
    [118] Lili Lin, Fangfang Liu. Compensation with Dependency in Web Services Composition[C].//the International Conference on Next Generation Web Services Practices (NWeSP'05).2005: 183-188.
    [119] Karlsen, Thomas Stranden?s, Randi. Transaction Compensation in Web Services[R]. Norway: Department of Computer Science, University of Troms?, 2003.
    [120] Jinsong Ouyang, Akhil Sahai, Vijay Machiraju. An Approach to Optimistic Commit and Transparent Compensation for E-Service Transactions[R]. Software Technology Laboratory, 2001: 1-17.
    [121] Memon Abdul Ghafoor, Jianwei Yin, Jinxiang Dong, Maree Mujeeb-u-Rehman. PiRBT-calculus Compensation and Exception Handling Protocol[C].//the 14th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP'06).2006: 39-47.
    [122] Biswas, Debmalya. Compensation in the World of Web Services Composition[C].//SWSWPC.2005: 69-80.
    [123] Moss, J. E. B. Nested transactions: An introduction[C].// e. B. Bhargava (eds.). Concurrency Control and Reliability in Distributed Systems.1987: 395-425.
    [124] C. Pu, G. E. Kaiser, N. C. Hutchinson. Split-Transactions for Open-Ended Activities[C].//the 14th International Conference on Very Large Data Bases (VLDB’88).1988: 26-37.
    [125] A. Zhang, M. Nodine, B. Bhargava, O. Bukhres. Ensuring Relaxed Atomicity for Flexible Transactions in Multidatabase Systems[J]. ACM SIGMOD Record, 1994, 23(2): 67-78.
    [126] P. K. Chrysanthis, K. Ramamritham. ACTA: A Framework for Specifying and Reasoning about Transaction Structure and Behavior[J]. ACM SIGMOD Record, 1990, 19(2): 194-203.
    [127] Grefen P, Vonk J, Apers P. Global transaction support for workflow management systems: from formal specification to practical implementation[J]. The VLDB Journal, 2001, 10(4): 316-333.
    [128] Roberts J, Srinivasan K. Tentative Hold Protocol Part 1: White Paper[EB/OL].http://www.w3.org/TR/tenthold-1, 2007- 09-19/2008-01-26.
    [129] Benchaphon Limthanmaphon, Yanchun Zhang. Web Service Composition Transaction Management[C].//the 15th Australasian database conference (ADC2004).2004: 171-179.
    [130]许炜,程文青,李冰.一种THP的改进事务模型[J].小型微型计算机系统,2007,28(1):97-101.
    [131] Wanxia Xie, Shamkant B. Navathe, Sushil K. Prasad. Supporting QoS-aware transactions in a system on mobile devices (SyD)[C].//the 23rd International Conference on Distributed Computing Systems(ICDCSW'03).2003: 498-502.
    [132]刘云生,廖国琼,李国徽,夏家莉.移动分布式实时嵌套事务提交[J].软件学报,2003,14(1):139-145.
    [133] Oreizy P, Medvidovic N, Taylor R N. Architecture-based runtime software evolution[C].//the 1998 (20th) International Conference on Software Engineering.1998: 177-186.
    [134] Václav Rajlich, Jo?o H. Silva. Evolution and Reuse of Orthogonal Architecture[J]. IEEE Transactions on Software Engineering, 1996, 22(2): 153-157.
    [135]李雄.基于构件运算的软件演化研究[D].湖南长沙:湖南大学,2006:1-68.
    [136] Oreizy, Peyman. Issues in the Runtime Modification of Software Architectures[R]. Department of lnformation and Computer Science, University of Colifornia, 1996.
    [137] Medvidovic, Nenad. Architecture-Based Specification-Time Software Evolution[D]. Irvine: University of California, 1999.
    [138]余萍,马晓星,吕建,陶先平.一种面向动态软件体系结构的在线演化方法[J].软件学报,2006,17(6):1360-1371.
    [139] Cai K Y, Cangussu J W, Decarlo R A, et al. An Overview of Software Cybernetics[C].//Eleventh Annual International Workshop on Software Technology and Engineering Practice.2003: 77-86.
    [140] Robert L. Creating Robust Software through Self-Adaptation.[J]. IEEE Intelligent Systems, 1999, 14(3): 26-29.
    [141]梅宏,申峻嵘.软件体系结构研究进展[J].软件学报,2006,17(6):1257-1275.
    [142] Hirsch D, Inverardi P, Montanari U. Graph grammars and constraint solving for software architecture styles[C].//the third international workshop on Software architecture.1998: 69-72.
    [143] Magee J, Kramer J. Dynamic structure in software architectures[C].//the 4th ACM SIGSOFT symposium on Foundations of software engineering.1996: 3-14.
    [144] Qianxiang, Wang. MASS: Middleware-based Adaptive Software System[C].//Computer Software and Applications Conference, 2007. COMPSAC2007-Vol. 2. 31st Annual International.2007.
    [145] Chu, W., Qian, D. P. A Component-Oriented Development Approach to E-Business Applications[C].// J.Y. Chung,M. Younas (eds.). IEEE International Conference on e-Business Engineering.2008: 45-52.
    [146] Tom Mens, Jim Buckley, Awais Rashid, Matthias Zenger. Towards a taxonomy of software evolution[C].//Workshop on Unanticipated Software Evolution.2002.
    [147] Steffen Higel, David Lewis, Vincent Wade. Realising Personalised Web Service Composition Through Adaptive Replanning[C].//OTM Workshops.2005: 49-58.
    [148] Zirpins, C., Piccinelli, G. Evolution of service processes by rule based transformation[C].// W. Lamersdorf, V. TschammerS. Amarger (eds.). 4th International Conference on E-Commerce, E-Business and E-Government held at the 18th World Computer Congress.2004: 287-305.
    [149] Orriens, B., Yang, J., Papazoglou, M. P. A framework for business rule driven web service composition[C].// M.A. Jeusfeld,O. Pastor (eds.). 22nd International Conference on Conceptual Modeling (ER 2003).2003: 52-64.
    [150] Charfi A, Mezini M. Aspect-oriented web service composition with AO4BPEL[C].//the 2nd IEEE European Conference on Web Services.2004: 168-182.
    [151] Han, J., Kowalczyk, R., Khan, K. M. Security-oriented service composition and evolution[C].// P. Jalote (eds.). 13th Asia-Pacific Software Engineering Conference. Ieee Computer Soc, 2006: 71-78.
    [152] Sun, H. B., Ding, Y. S. E-service emergence: A bio-inspired method of composition[C].// L. Barolli,A.M. Tjoa (eds.). 1st International Conference on Complex, Intelligent and Software Intensive Systems.2007: 53-59.
    [153] Qun Yang, Xianchun Yang, Manwu Xu. A Mobile Agent Approach to Dynamic Architecture-based Software Adaptation[J]. ACM SIGSOFT Software Engineering Notes, 2006, 31(3): 1-7.
    [154] Dorogovtsev S N, Mendes J F. Evolution of networks[J]. Advances In Physics, 2002, 51(4): 1079-1187.
    [155]黄是,梅宏,杨芙清.基于反射式软件中间件的运行时软件体系结构[J].中国科学E辑技术科学,2004,34(2):121-138.
    [156] Paolo Falcarin, Patricia Lago, Maurizio Morisio. Dynamic Architectural Changes for Distributed Services[C].//International ACM Workshop on Component-Oriented Programming.2003: 1-5.
    [157] AEDUS. [EB/OL]. http://www-dse.doc.ic.ac.uk/Projects/aedus/, 2009-08-17/2009-08-20.
    [158]申利民,马川,王涛.基于进程代数的构件动态演化行为一致性研究[J].计算机应用研究,2009,26(4):1345-1349.
    [159]罗毅,李兴宇,关连伟,胡昊,吕建.构件演化中的系统行为一致性的研究[J].计算机科学,2008,35(1):266-271.
    [160] Jun ZHU, Quan YIN, Rui ZHU, Changguo GUO, Huaimin WANG. A Plugin-Based Software Production Line Integrated Framework[C].//2008 International Conference on Computer Science and Software Engineering (CSSE'08).2008: 562-565.
    [161]陈春鹏.大规模分布式仿真消息序管理技术研究[D].湖南长沙:国防科技大学,2007:1-160.
    [162] E.Nuutila, Soisalon-Soininen. On finding the strongly connected components in a directed graph[J]. Information Processing Letters, 1994, 49(1): 9-14.
    [163] Ravi Sandhu, Pierangela Samarati. Authentication, Access Control, and Audit[J]. ACM Computing Surveys, 1996, 28(1): 241-243.
    [164] Kuhn, D. Ferraiolo and R. Role-Based Access Controls[C].//the 15th NIST-NCSC National Computer Security Conference.1992: 554-563.
    [165] M. Blaze, J. Feigenbaum, and J. Ioannidis. The KeyNote Trust Management System Version 2[J]. Internet Society, Network Working Group, 1999.
    [166] Sudip Chakraborty, Indrajit Ray TrustBAC– Integrating Trust Relationships into the RBAC Model for Access Control in Open Systems[C].//the 11th ACM Symposium on Access Control Models and Technologies (SACMAT’06).2006: 49-58.
    [167] Jordan, Carole S. A guide to understanding discretionary access control in trusted systems[M]. National Computer Security Center, 1987: 1-29.
    [168] R. S. Sandhu, P. Samarati. Access control: principles and practice[J]. IEEE Communication magazine, 1994, 32(9): 40-48.
    [169] R. Bhatti, E. Bertino, A. Ghafoor. A Trust-based Context-Aware Access Control Model for Web-Services[C].//the IEEE International Conference on Web Services (ICWS’04).2004: 184-191.
    [170] W. J. Adams, N. J. Davis. Toward a decentralized trust-based access control system for dynamic collaboration[C].//the 2005 IEEE Workshop on Information Assurance and Security.2005: 317-324.
    [171] Huu Tran, Michael Hitchens, Vijay Varadharajan, Paul Watters. A Trust based Access Control Framework for P2P File Sharing Systems[C].//the 38th Hawaii International Conference On System Sciences (HICSS’05).2005.
    [172] Tyrone Grandison, Morris Sloman. A Survey of Trust in Internet Applications[C].//IEEE Communications Surveys and Tutorials, Fourth Quarter.2000: 2-16.
    [173] Sloman, T. Grandison and M. Trust Management Tools for Internet Applications.[C].//the 1st International Conference on Trust Management.2003: 91-107.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700