软件可信性评估模型及其优化方法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着信息技术的快速发展,软件已经成为现代制造业和服务业不可分割的一部分,其运行行为对产品性能或服务质量具有直接影响。然而软件系统并不总是可信的,固有的缺陷和未处理的异常都将导致软件系统的行为可能会偏离用户的期望。因此,为了减少由于软件失信所引起的社会安全问题及其可能带来的巨大经济损失,迫切需要研究客观高效的软件可信性评估方法及模型,进而为保障软件实体的全面可信提供理论支持。
     传统的可信性评估模型或方法通常使用软件度量或逻辑验证方法对软件进行定量估计。这些模型或方法虽然解决了一些实际问题,但在应用于规模庞大、功能复杂且演化规律不确定的软件系统时,依然存在:缺乏对用户真实可信需求的全面把握、未能充分考虑影响评估结果正确性的关键因素、不具备动态自适应特征等问题。本文主要以复杂软件系统为研究对象,重点研究软件可信性评估过程中指标系统动态构建、客观赋权、评估模型构建与优化、可信性动态评估建模以及可信推荐等基础科学问题,大量数值实验表明这些模型及算法的合理性和有效性。
     本文的主要工作及取得的创新性成果如下:
     (1)研究了普适性的软件可信性评估过程。剖析了软件可信性评估过程中急需攻克的关键科学问题和研究难点,开发了可信性评估指标系统的动态构造模型及相关算法,构建了软件可信性评估应用系统的时间状态机模型。
     (2)对于软件可信性评估的不确定性问题,研究了基于ER方法和效用理论的软件可信性评估模型。提出了多源异构可信证据的采集及其一致转换方法,给出了基于全局不确定度的可信指标客观赋权方法,并建立了基于分布式框架的软件可信性评估推理模型,实验结果表明该模型较好地解决了具有多可信属性、不确定性、可信证据多量纲等特征的复杂系统软件的可信性评估问题,评估结果精确、完备且可解释性强。
     (3)对于可信证据的非可靠问题,研究了面向主客观可信证据的折扣估计方法。当使用群体专家主观评价或软件模型预测方式采集可信证据时,可以利用集成折扣估计与相对权重的联合系数对可信证据进行预处理,在此基础上还给出了一种ER改进方法,实验结果表明该方法适用于解决软件可信性评估过程中的证据非可靠问题,且有利于提升可信性评估模型的普适性。
     (4)对于可信证据的相关性问题,研究了应用于相关信念背景下的证据融合规则ECCR,开发了用于多源可信证据融合的水平合成算法,并提出了一种考虑证据相关性的软件可信性评估推理算法,实验结果表明该方法适用于解决软件可信性评估过程中的证据相关性问题,且由于将合并过程中由相对权重或折扣引起的未知从合成结果中剔除,提高了可信性评估模型的求解精度。
     (5)对于软件演化背景下的可信性动态评估及可信推荐问题,研究了基于关联矩阵变换的可信性评估指标系统动态自适应重构方法,提出了一种需求驱动的软件可信性动态评估模型,并将可信属性融入到软件服务的选择过程,建立了基于多属性匹配的可信云服务推荐系统及算法,实验结果表明该方法可以有效解决云计算环境下软件可信性动态评估及可信推荐问题。
With the fast advance in information technology (IT), software has become indispensable tomodern manufacturing and services in which the operational behavior of the software has a directimpact on the product performance and the service quality. Unfortunately, software systems arenot always trustworthy---bugs and unhandled exceptions may cause software behavior to deviatedramatically from the user’s expectation. Therefore, there is an increasing demand for evaluatingsoftware trustworthiness to reduce the social security problems and the tremendous economiclosses caused by untrustworthy software.
     The current STE models focus on the quantitative evaluation of trustworthiness through theuse of software metrics or logic verification method. While these models successfully solved a lotof actual problems, they are facing three major challenges for complex software systems:(1) Theusers’ subjective trustworthiness requirements are neglected in practice;(2) The key fatorsimpacting trustworthiness evaluation are ignored in the models construction;(3) The traditionalmodels fail to have the dynamic adaptability. The dissertation systematically studies theconstruction of trustworthiness evaluation indicator system, the objective weighting, theevaluation model establishment and its optimization, and software recommendation consideringseveral trustworthy attributes. A great number of numerical experiments demonstrate theeffectiveness and applicability of the proposed models and algorithms.
     The main contributions of the dissertation are summarized as follows.
     (1) The universal software trustworthiness evaluation process is studied. Based on theanalysis of the key scientific issues in the software trustworthiness evaluation, a dynamicconstruction model of trustworthiness evaluation indicator system and a finite state model oftrustworthiness evaluation application are developed.
     (2) For the trustworthiness evaluation problem with a variety type of uncertainties, a softwaretrustworthiness evaluation model is developed by using the evidential reasoning approach and theutility theory. For the sake of multi-dimension evaluation information pre-processing, amultisource-heterogeneous trustworthiness evidences conversion and consistent constructionmethod is proposed. To enhance the accuracy and objectivity of the evaluation, a new objectiveweighting approach based on the total uncertainty measure is discussed. On this basis, atrustworthiness evaluation reasoning model, which can analyze and solve uncertainly softwaretrustworthiness evaluation problem, is given based on the distributed evaluation framework.Numerical experiments show that the proposed model is suitable to large-scaled industrial detection software characterized by multiple trustworthy attributes and uncertainty trustworthinessevidences.
     (3) For the trustworthiness evaluation problem characterized by unreliable evidences, twodiscounting-factor estimation methods are discussed for objective and subjective evidences,respectively. As for the evidences collection cases of expert scoring or software probability modelforecasting, a joint coefficient integrating discounting factor with relevance weight is defined forthe unreliable evidences pretreatment. In addition, an extended ER approach applying the jointcoefficient is proposed. The experimental analysis shows that the proposed discounting methodsare not only suitable for the unreliable evidences pretreatment but also for trustworthinessevaluation model enhancement.
     (4) For the trustworthiness evaluation problem with non-independent evidences, an improvedDenoeux cautious conjunctive rule and a horizontal evidence combination algorithm areintrouduced. On the analysis of objective problems, such as information uncertainty andcorrelation of information sources in the process of evaluation, a software trustworthinessevaluation reasoning algorithm is developed. The experimental analysis shows that the proposedtwo algorithms are suitable to solve the trustworthiness evaluation problem with non-independentevidences, and the accuracy of the trustworthiness evaluation model has improved.
     (5) For the trustworthiness dynamic evaluation and trustworthy software recommendationunder the software evolution, the incidence matrix is used to make correlation analysis betweentrustworthy attributes and then the variation rule of relative weight is revealed. An adaptive systemof reconstruction device, which can analyze and sovle the software trustworthiness evaluationindicator system of self-reconfiguration, is designed based on the incidence matrix. A completeframework of trustworthiness evaluation and evoluation model is proposed. On this basis, thetrustworthy attributes have been integrated with software service selction in Cloud Computing. Anovel cloud recommendation system (CRS) supporting software with various specified functionaland QoS guarantees such that the CRS can mediate multi-attribute matching between solutionsand consumer’s demands is designed.
引文
[1]刘克,单志广,王戟等.“可信软件基础研究”重大研究计划综述.中国科学基金,2008,22(3):145-151.
    [2]梅宏,曹东刚.软件可信性:互联网带来的挑战.中国计算机学会通讯,2010,2:20-27.
    [3] High Confidence Software and Systems Coordinating Group. High Confidence Software andSystems Research Needs. USA: http://www.ccic.gov/pubs/hcss-research.pdf, January10,2001.
    [4] Lutz R.R., Mikulski I.C. Empirical Analysis of Safety-Related Anomalies During Operations,IEEE Transaction on Software Engineering,2004,30(3):172-180.
    [5] Steffen B., Wilhelm H., Alexandra P., et al. Trustworthy software systems: a discussion ofbasic concepts and terminology. ACM SIGSOFT Software Engineering Notes archive,2006,31(6):1-18.
    [6] Clement T. Social Computing and the Potential Impact on Business Decision Making,Decision Sciences,2009,25(2):7-9.
    [7] Shen Changxiang, Zhang Huanguo, Wang Huaimin. Research on trusted computed and itsdevelopment. Science China: Information Scicens,53(3):405-433
    [8] Dozelli P, Basili V. A practical framework for eliciting and modeling system dependabilityrequirements: Experience from the NASA high dependability computing project[J]. TheJournal of systems and software,2006,79:107-119
    [9] Bernstein L. Trustworthy software systems. ACM SIGSOFT Software Engineering Notes,2005,30(1):4-5.
    [10]Voas J. Trusted Software’s Holy Grail. Software Quality Journal,2003,11(1):9-17.
    [11]Hasselbring W., Reussner R. Toward trustworthy software systems. IEEE Computer,2006,39(4):91-92.
    [12]王怀民,尹刚.网络时代的软件可信演化.中国计算机学会通讯,2010,2:28-36.
    [13]Dozelli P., Basili V. A practical framework for eliciting and modeling system dependabilityrequirements: Experience from the NASA high dependability computing project. TheJournal of Systems and Software,2006,79:107-119.
    [14]Saleh K., Habil M. The Security Requirements Behavior Model for Trustworthy Software.e-Technologies,2008International MCETECH Conference on Digital Object Identifier,2008,235–238.
    [15]Jin Z., Chen X.H., Zowghi D. Performing projection in problem frames using scenarios,Proceedings of ACM Software Applications Conference,2009:1456-1461.
    [16]Liu C., Wang Y., Jin Z. Elicit the requirements on software dependability: A knowledge-basedapproach, Proceedings of the16th Asia Pacific Software Engineering Conference, Penang,Malaysia,2009.
    [17]De Leon D.C. Alves-Foss J. Hidden implementation dependencies in high assurance andcritical computing system. IEEE Transactions on Software Engineering,2006,32(10):790-811.
    [18]Peng X., Lee S.W., Zhao W.Y. Featured-oriented nonfunctional requirements analysis forsoftware product line. Journal of Computer Science and Technology,2009,24(2):319-338.
    [19]徐宝文,聂长海,史亮,陈火旺.一种基于组合测试的软件故障调试方法.计算机学报,2006,29(1):132-138.
    [20]Zhou Y.M., Leung H., Xu B.W. Examining the potentially confounding effect of class size onthe associations between object-oriented metrics and change-proneness. IEEE Transactionson Software Engineering,2009,35(5):607-623.
    [21]Shahriar H., Zulkernine M. Trustworthiness testing of phishing websites: A behaviormodel-based approach. Future Generation Computer Systems,2011, doi:10.1016/j.future.2011.02.001.
    [22]Saglietti F., Oster N., Pinte F. White and grey-box verification and validation approaches forsafety-and security-critical software systems. Information Security Technical Report,2008,13:10-16.
    [23]阚红星.可信软件自动测试成本与风险研究.合肥工业大学博士论文,2008.
    [24]杨善林,阚红星,余本功.一种软件自动测试代价的估算控制模型.电子学报,2007,35(8):1588-1591.
    [25]Mohammad M., Alagar V. A formal approach for the specification and verification oftrustworthy component-based systems. The Journal of Systems and Software,2011,84:77-104.
    [26]Weldemariam K., Kemmerer R. A., Villafiorita A. Formal analysis of an electronic votingsystem: An experience report. Journal of Systems and Software,2011.
    [27]陈意云,华保健,葛琳.一种用于指针安全性证明的指针逻辑.计算机学报,2008,31(3):372-380.
    [28]Li Z. J., Chen S. K., Simplifying buffer overflow detection using site-safe expressions. The8the IEEE/ACIS International Conference on Computer and Information Science,2009.
    [29]Dai Y. S., Xie M., Ng S. H. Uncertainty Analysis in Software Reliability Modeling byBayesian with Maximum-Entropy Principle. IEEE Transaction on Software Engineering,2007,33(1):781-795.
    [30]Delong T. A., Smith D. T., Johnson B. W. Dependability Metrics to Assess Safety-CriticalSystems[J]. IEEE Transactions on Reliability,2005,54(3):498-505.
    [31]Bunea C., Charitos T., Cooke R.M., Becker G. Two-stage Bayesian models-application toZEDB project. Reliability Engineering&System Safety,2005,90:123-130.
    [32]Jung H. W., Kim S. G., Chung C. S. Measuring Software Product Quality: A Survey ofISO/IEC9126. IEEE Software,2004,21(5):88-92.
    [33]Thomas M. The role of formal methods in achieving dependable software, ReliabilityEngineering&System Safety,1994,43(2):129-134.
    [34]Alawneh L., Lhadj A. H. An exchange format for representing dynamic information generatedfrom high performance computing applications. Future Generation Computer Systems,2011,27:381-394.
    [35]Betous C. A., Kanoun K. Construction and stepwise refinement of dependability models.Performance Evaluation,2004,56:277-312.
    [36]王慧强,吕宏武,赵倩.一种关键任务系统自律可信性模型与量化分析.软件学报,2010,21(2):344-358.
    [37]赵倩,王慧强.基于自配置的软件可信性增长方法.江苏大学学报(自然科学版),2010,31(5):586-591.
    [38]Lenzini G., Tokmakoff A. Managing trustworthiness in component-based embedded systems.Electronic Notes in Theoretical Computer Science,2007,179:143-155.
    [39]Damiani E., Sabrina D.C. Samarati P. A WOWA-based aggregation technique on trust valuesconnected to metada. Electronic Notes in Theoretical Computer Science,2006,157:131-142.
    [40]Chen Y. X., Wu H.Y. Domain semantics of possibility computations. Information Sciences,2008,178:2661-2679.
    [41]Ma Y. F., Zhang M. A computation model of trustworthy degree. Proceedings2008International Symposium on Intelligent Information Elec. And Elec. Eng. Computer Society,2008,523-526.
    [42]Tao H. W., Chen Y. X. A metric model for trustworthiness of software. IEEE/WIC/ACMInternational Conference on Web Intelligence and Intelligent Agent Technology,2009.
    [43]Li J., Liu C. M., Li, Z. G. An Ontology-Based Framework Model for Trustworthy SoftwareEvolution. Lecture Notes in Computer Science, Advanced Data Mining and Applications,2010,6441,537-544.
    [44]Leung K., Ng J., Yeung W. L. Accessing embedded program in untestable mobile environment:Experinece of a trustworthiness approach. The Journal of Systems and Software,2006,79:962-968.
    [45]Zheng Z., Ma S., Li W., Jiang X., Wei W., Ma L., Tang S. Dynamical characteristics ofsoftware trustworthiness and their evolutionary complexity. Science in China, Series F,Information Sciences,2009,52(8):1328–1334.
    [46]Zheng Z., Ma S., Li W., Jiang X., Wei W., Ma L., Tang S. Complexity of softwaretrustworthiness and its dynamical statistical analysis methods. Science in China, Series F,Information Sciences,2009,52:1651–1657.
    [47]Basili V., Donzelli P., Asgari S. A unified model of dependability: Capturing dependability incontext, IEEE Software,2004,21(6):19-25.
    [48]Uzunov K., Nguyen T. Dependability of software in airborne mission systems, TechnicalReport, DSTO-TR-2111, Deference Science and Technology Organization, AustralianGovernment Department of Deference,2008.http://dspace.dsto.defence.gov.au/dspace/bitstream/1947/9335/1/DSTO-TR-2111%20PR.pdf.
    [49]Paul R., et al. An ontology-based integrated assessment framework for high-assurancesystems, In: The IEEE International Conference on Semantic Computing (ICSC),2008386-393.
    [50]Whitworth B., Fjermestad J., Mahinda D. The web of system performance, Communicationsof the ACM,2006,49(5):93-99.
    [51]Water J. G. Software dependability evaluation based on markov usage models. PerformanceEvaluation,2000,40(4):199-222.
    [52]Shi H. L., Ma J., Zou F. Y. Software dependability evaluation model based on fuzzy theory, In:International Conference on Computer Science and Information Technology,2008,102-106.
    [53]Ma Y. F., Zhang M. A computation model of trustworthy degree. International Symposium onIntelligent Information Technology Application Workshops,2008,523-526.
    [54]Mei L., Xu Y. S.. An adaptive dependability model of component-based software, ACMSIGSOFT Software Engineering Notes,2003,28(2):10-14.
    [55]Zhang Y., Fang B., Xu C. Y. Trustworthy metrics models for internetware. Wuhan UniversityJournal of Natural Sciences,2008,13(5):547-552.
    [56]Anne I., Marko P. Trustworthiness evaluation and testing of open source components. Proc. ofSeventh International Conference on Quality Software,2007.
    [57]Joe H., Reid N. On the software reliability models of Jelinski-Moranda and Littlewood. IEEETransactions on Reliability,2007,34(3):216-218.
    [58]Khan K. M., Han J., A security characterization framework for trustworthy component basedsoftware systems. In:27th IEEE Annual International Computer Software and ApplicationsConference (COMPSAC),2003.
    [59]Tokuno K., Yamada S. Relationship between software availability measurement and thenumber of restorations with imperfect debugging. Computers&Mathematics withApplications,2003,46(7):1155-1163.
    [60]赵会群,孙晶.一种SOA软件系统可信性评价方法研究.计算机学报,2010,33(11):2202-2209.
    [61]蔡斯博,邹艳珍,邵凌霜.一种支持软件资源可信评估的框架.软件学报,2010,21(2):359-372.
    [62]Qiao H. B., Zhu X. J., Jin M. Z. Research on testing-based software credibility measurementand assessment. World Congress on Software Engineering (WCSE),2009.
    [63]古亮,郭耀,王华.基于TPM的运行时软件可信收据收集机制.软件学报,2010,21(2):373-387.
    [64]Alhamad M, Dillon T, Chang E. SLA-based trust model for cloud computing. In13thInternational Conference on Network-based Information Systems,2010,321-324.
    [65]Yang Z. M., Qiao L. X., Liu C., et al. A collaborative trust model of firewall-through based oncloud computing.14th International Conference on Computer Supported Cooperative Workin Design,2010,329-334.
    [66]Ma L., Zhang Y.M., Ma L. A synthesize trust degree evaluation method in distributed system.In8th World Congress on Intelligent Control and Automation,2010,5186-5190.
    [67]Tian L. Q., Lin C., Ni Y. Evaluation of user behavior trust in cloud computing. InternationalConference on Computer Application and System Modeling (ICCASM),2010,567-572.
    [68]Everett C. Cloud computing–A question of trust. Computer Fraud&Security,2009,(6):5-7
    [69]Michael Bret. In clouds shall we trust. IEEE Security&Privacy,2009,7(5):3.
    [70]Khan K. M., Malluhi Q. Establishing trust in cloud computing. IT Professional,2010,12(5):20-27.
    [71]Mahbub H. S., Sebastian R., Max M. Cloud computing landscape and research challengesregarding trust and reputation. In7th International Conference on Ubiquitous Intelligence&Computing and7th International Conference on Autonomic&Trusted Computing(UIC/ATC),2010,410-415.
    [72]陈海波.云计算平台可信性增强技术的研究.复旦大学博士论文,2008.
    [73]Zissis D., Lekkas D. Addressing cloud computing security issues. Future GenerationComputer Systems,2011, doi:10.1016/j.future.2010.12.006.
    [74]Abawajy J. Determining service trustworthiness in intercloud computing environments. In200910th International Symposium on Pervasive Systems, Algorithms, and Networks,784-788.
    [75]Michael K., Sebastian Hanigk. Security management interoperability challenges forcollaborative clouds. In4th International DMTF Academic Alliance Workshop on Systemsand Virtualization Management,2010,43-49.
    [76]Snatos N., Gummadi P. K., Rodrigues R. Towards trusted cloud computing. In HotCloud’09Proceedings of the2009Conference on Hot Topics in Cloud Computing, USENIX,2009.
    [77]Shen Z. D., Li L., Yan F., Wu X. P.. Cloud computing system based on trusted computingplatform. In International Conference on Intelligent Computation Technology andAutomation,2010,942-945.
    [78]Wang H. Z., Huang L. S. An improved trusted cloud computing platform model based onDAA and privacy CA scheme. In International Conference on Computer Application andSystem Modeling,2010,33-39.
    [79]Cheng G., Ohoussou A. K. Sealed storage for trusted computing. In International Conferenceon Computer Design and Applications,2010,335-339.
    [80]Zhang C. L., et al. Construction of a trusted SaaS platform. In Fifth IEEE InternationalSymposium on Service Oriented System Engineering,2010,244-251.
    [81]Svantesson D., Clarke R. Privacy and consumer risks in cloud computing. Computer Law&Security Review,2010,26:391-397.
    [82]Pearson S. Taking account of privacy when designing cloud computing services. In ICSEWorkshop on Software Engineering Challenges of Cloud Computing,2009,44-52.
    [83]Wang C., Ren K., Lou W. J., Li J. Toward publicly auditable secure cloud data storageservices. IEEE Network,24(4):19-24.
    [84]Brandic I., Dustdar S., Anstett T. Compliant Cloud Computing (C3): Architecture andLanguage Support for User-Driven Compliance Management in Clouds. IEEE3rdInternational Conference on Cloud Computing,2010,244-251.
    [85]Jensen M., Schage S., Schwenk J. Towards an anonymous access control and accountabilityscheme for cloud computing. IEEE3rd International conference on Cloud Computing,2010,540-541.
    [86]Li W. J., Ping L. D., Pan X. Z. Use trust management module to achieve effective securitymechanisms in cloud environment. In International Conference on Electronics andInformation Engineering,2010,14-19.
    [87]王怀民,唐扬斌,尹刚,李磊.互联网软件的可信机理.中国科学E辑(信息科学),2006,36(10):1156-1169.
    [88]卢刚,王怀民,毛晓光.基于认知的软件可信评估证据模型.南京大学学报(自然科学版),2010,46(4):456-462.
    [89]Jung H. W., Kim S. G., Chung C. S. Measuring software product quality: A survey of ISO/IEC9126. IEEE Software,2004,21(5):88-92.
    [90]Lehman M. M., Ramil F. Juan. Software evolution–Background, theory, practice.Information Processing Letters,2003,88(1):33-44.
    [91]Xie F., Yang G. W., Song X. Y. Component-based hardware/software co-verification forbuilding trustworthy embedded systems. Journal of Systems and Software,2007,80(5):643-654.
    [92]Voas J. Trusted software’s holy grail. Software Quality Journal,2003,11(1):9-17.
    [93]Liu Y. Z., Jiang Y. C., Zhang J. K. Utility analysis of belief in evidence theory. SystemsEngineering–Theory&Practice,2008,28(3):103-110.
    [94]Agarwai H., Renaud J. E., Preston E. L., Padmanabhan D. Uncertainty quantification usingevidence theory in multidisciplinary design optimization. Reliability Engineering&SystemSafety,2004,85(1):281-294.
    [95]Beccacece F., Borgonovo E. Functional ANOVA, ultramodularity and monotonicity:Applications in multiattribute utility theory. European Journal of Operational Research,2011,2:326-335.
    [96]Yang J. B., Wang Y. M., Xu D. L. The evidential reasoning approach for MADA under bothprobabilistic and fuzzy uncertainties. European Journal of Operational Research,2006,171(1):309-343
    [97]Yang J. B., Singh M. G. An evidential reasoning approach for multiple attribute decisionmaking with uncertainly. IEEE Transaction on Systems, Man, and Cybernetics,1994,24(1):1-18.
    [98]Yang J. B. Rule and utility based evidential reasoning approach for multi-attribute decisionanalysis under uncertainties. European Journal of Operational Research,2001,131(1):31-61.
    [99]吴静,吴晓燕,滕江川,陈永兴.基于误差特征分析的仿真模型可信性综合评估.计算机集成制造系统,2011,17(3):649-652.
    [100] Pal N. R., Bezdek J. C., Hemasinha R. Uncertainty measures for evidential reasoning II: Anew measure of total uncertainty. International Journal of Approximate Reasoning,1993,8(1):1-16.
    [101] Yager R. R. Entropy and specificity in a mathematical theory of evidence. InternationalJournal of General Systems,1983,9(4):249-260.
    [102] Joe H., Reid N. On the software reliability models of Jelinski-Moranda and Littlewood.IEEE Transactions on Reliability,2007,34(3):216-218.
    [103] Elouedi Z., Mellouli K., Smets P. Assessing sensor reliability for multiSensor data fusionwithin the transferable belief model. IEEE Transactions on systems, man, andcybernetics-Part B: cybernetics,2004,34(1):782-787.
    [104]詹辉,张其才.铸铁材质参数液态在线智能检测和质量控制系统.中国科技奖励,2007,3:38-41.
    [105] Denoux T. Conjunctive and disjunctive combination of belief functions induced bynondistinct bodies of evidence. Artificial Intelligence,2008,172:234-264.
    [106] Shafer G. A mathematical theory of evidence. Princeton University Press, Princeton, NJ,1976.
    [107] Smets P. The canonical decomposition of a weighted belief. In Int. Joint Conf. on ArtificialIntelligence, Morgan Kaufman, SanMateo, CA,1995:1896-1901.
    [108] Peter Mell, Tim Grance. The NIST Definition of Cloud Computing.http://www.drieottawa.org/presentations/20100602_roger_mcilmoyle_sungard.pdf.
    [109] Mlanden A. Vouk. Cloud Computing–Issues, Research and Implementations. Proceedingsof ITI200830international conference on information technology interface, June23-26,2008, Cavtat, Croatia. Pages:31-40.
    [110] Henry E. Schaffer, Samuel F. Averitt, Marc I. Hoit, etc. NCSU’s Virtual Computing Lab: ACloud Computing Solution. IEEE Computer Society.2009,07:94-97.
    [111] Pradeep Teregowda, Bhuvan Urgaonkar, C. Lee Giles. Cloud Computing: A Digital librariesperspective. Proceedings of2010third international conference on cloud computing.2010,115-122.
    [112] Dickinson M. W., Thornton A. C., Graves S. Technology portfolio management: Optimizinginterdependent projects over multiple time periods. IEEE Trans on EngineeringManagement,2001,48(4):518-527.
    [113] Armbrust M., Fox A., Griffith R., et al. Above the Clouds: A Berkeley view of cloudcomputing. University of California at Berkeley,2009.
    [114] Alhamad M., Dillon T., Chang E. Conceptual SLA framework for cloud computing. In:4thIEEE International Conference on Digital Ecosystems and Technologies,(DEST),2010.
    [115] Messinger P. R., Stroulia E., Lyons K., Bone M., Niu Run H, et al. Virtual worlds—past,present, and future: New directions in social computing. Decision Support Systems,200947(3), Pages:204-228.
    [116] Rodriguez M. A., Steinbock D. A social network for societal-scale decision-making systems.In NAACSOS’04: Proceedings of the North American Association for Computational Socialand Organizational Science Conference, Pittsburgh, PA, USA,2004.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700