Web上的多主体系统若干关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着Internet的迅猛发展,要求具有高度开放性特点的应用需求越来越大,因为Internet本身就可看作是高度开放的分布式计算环境。构造能够充分利用Int-ernet潜力的软件一直是上个世纪90年代以来计算机界最重要的挑战之一。多主体系统具有作为Internet上主流分布式计算模式的极大潜力。但若要使潜力变成事实,一方面需要继续发展和完善多主体系统的一些关键技术,如通信、本体、内容语言、信息发现、协调以及信任管理等;另一方面,多主体系统技术的发展必须能够与Web的发展结合起来,才能在Internet上获得更多的应用空间。为了促进多主体系统技术在Internet和Web上的应用,本文对多主体系统的若干关键技术进行了有效的探索,具体内容包括主体能力匹配、多主体系统中的信任管理、基于XML文档的主体外部资源库管理以及将多主体系统从P2P结构透明迁移到B/S结构的实现技术等。本文取得的创新性成果主要表现在以下几个方面:
     1) 对简单有向无环网络中任意两个结点之间的所有可能路径、最短(长)路径以及(直接)前驱后继等问题,本文提出一种新的算法A~H。该算法将一些路径信息作为每个结点的附加信息预先保存起来,并对这些信息建立Hash索引。在进行简单有向无环网络中任意两个结点之间的可能路径、最短(长)路径以及(直接)前驱后继等问题的求解时,可以利用这些预先保存的信息来降低计算的时间复杂度。
     2) 利用A~H算法提高基于本体的主体能力匹配的效率。领域本体可以模型化为一个简单有向无环网络,概念之间的包含关系可以通过A~H中的(直接)前驱后继算法来求解,而概念之间的关联度可以通过A~H中的最短路径算法来求解。相比于概念语言和描述逻辑中的推理机制,A~H提高了主体能力语义匹配的效率。
     3) 发展了基于扩展路径表达式的XML查询理论框架。Web上的主体需要具有访问XML文档的能力,访问XML文档的一个重要手段是查询。为了支持XML文档的有序性查询,本文发展了一种基于扩展路径表达式的XML查询理论框架。一方面通过在扩展路径表达式中引入通配符来降低查询表达式编写难度,提高查询的效率;另一方面提出带截止集自动机概念,进一步降低了查询计算的时间复杂度。
     4) 在委派逻辑(D1LP)的基础上,提出一种支持角色委派的逻辑D1LP-R,并将其应用于多主体系统的信任管理。在D1LP-R中,一个角色对应一些访问权限,不同的角色可以形成一个树形结构,角色树中一个结点对
    
     WCb上的多主体系统若干关键技术研究
     应的权限包含它的所有子结点对应的权限。如果一个主体拥有委派某个
     角色的权力,那么它可以委派这个角色的所有子角色。通过这种方式,
     本文实现了较大粒度访问权限委派和对访问权限的分割委派。
    5)提出并实现了一种体系结构,使得现有的具有PZP分布式结构的多主体
     系统能够透明移植到BIS结构下。即在高性能服务器上为PZP多主体系
     统建立运行时环境。当用户通过测览器登录多主体系统时,该体系结构
     将相应的用户主体在主体运行时环境中实例化,并采用改进的RAWT技
     术将用户主体的图形用户界面作为程序片由用户下载到测览器。这样,
     用户可以通过测览器与对应的用户主体进行交互。
Along with the fast and fierce evolution of the Internet, the need for open applications become more and more great, because Internet itself is a distributed calculating environment of high degree openness. How to develop this kind of software that can make the best of the Internet is always a great challenge in computer science since 1990s. Multi-agent system (MAS) has great potential to be the mainstream distributed computing mode on Internet. But, to make this to be reality, on one hand, we must continually develop the key technologies of MAS, such as communicating, Ontology, content language, information discovery, coordinate, trust management and so on. On the other hand, we must combine the MAS technologies and the Web technology to promote the application of MAS on the Internet. To facilitate the application of MAS on Internet and Web, this thesis addresses several key technical problems, which covers agent capability matching, trust management, integration of agent and XML document and issues concerning transparent migration of MAS from P2P to B/S. Major contributions of this thesis include:
    1) advances a new algorithm A~(H) to compute all possible paths, the shortest (longest) path and the (immediate) ancestor or descendent relation between two nodes on a simple directed acyclic network. Firstly, A~(H) save some path information for each node as add-ons and build hash index on these information, then A~(H) use these information to reduce time complexity of all computing above.
    2) enhances the efficiency of Ontology based agent capability matching by using A~(H) algorithm. Domain Ontology can be modeled a simple directed acyclic network, Subsumption relation between two concepts can be computed by the (immediate) ancestor or descendent algorithm in A~(H), Association degree between two concepts can be computed by the shortest path algorithm in A~(H). Comparing to the reasoning mechanism in concept language and description logic, A~(H) improves the efficiency of semantic matching between agent capabilities.
    3) improves the extended path expressions based XML querying theory framework. Agents on the Web need an ability to access XML documents. One important way to access an XML document is querying. To make full use of the orderliness of XML documents while querying, this thesis improves the extended path expressions based XML querying theory Framework. On one hand, extended path expressions are made simpler and more flexible by introducing wildcard into them, on the other hand, the time complexity of the algorithm is also reduced by putting forward a new kind of automata, namely automata with a stop set.
    4) advances a role delegation supported logic D1LP-R based on delegation logic(D1LP), and utilizes D1LP-R to realize trust management in MAS. In D1LP-R, a role refers to some access rights, different roles can form a tree
    
    
    
    structure, access rights corresponding to a node in the role tree contain all access rights corresponding to all descend nodes. If an agent has the right to delegate a role, then it has the right to delegate all sub-roles. By this method, this thesis realizes big granularity access right delegating and partial access right delegating.
    5) brings up and realizes a method which can transparently migrate P2P MAS to B/S MAS. This method realizes this by establishing a runtime environment for all agents in MAS on a server of high performance. When a user login in the MAS through a browser, the runtime environment will instantiate the responding agent and then migrate its graphic user interface to the browser as a applet by using improved RAWT technology. By this method, a user can interact with the responding agent through the browser.
引文
[Abiteboul97] S.Abiteboul, D.Quass, J.McHugh, J.Widom, and J.Wiener, The Lorel query language for semistructured data. International Journal on Digital Libraries, 1(1 ):68--88, April 1997. ftp://db.stanford.edu/pub/papers/lorel96. ps
    [Adams97] Adams T, Dworkin S, Workflow Interoperability Between Businesses, In: Lawerence P. (ed.) WfMC Workflow Handbook. John Wiley & Sons, New York, 19 97, pp 211-221.
    [Ankolekar02] A. Ankolekar et al., DAML-S: Web Service Description for the Semantic Web, Proc. 1st Int'l Semantic Web Conf. (ISWC 02) , 2002.
    [agentlink02] http://www.agentlink.org/resources/agent-software.php
    [Baader2000] F. Baader and U. Sattler, An Overview of Tableau Algorithms for De-scription Logics, Studia Logica, Vol69(5-40) , 2001
    [Bergentini00] Bergentini F., Poggi A., Agent Oriented Software Construction with U-ML. Dipartimento di Ingegneria dell'Informazione, Universita degli studi di Parma, Pa-rma, Italy, 2000
    [Blaze96] M.Blaze,J.FeigenbaumJ. Decentralized trust management. IEEE Proceedings of the 17th Symposium. 1996
    [Blaze98] M.Blaze, J.Feigenbaum, and A.D.Keromytis, KeyNote:Trust Management for Public-Key Infrastructures, Security Protocols Int'l. Wksp., Cambridge, England, 19 98, http://www.cis.upenn.edu/~angelos/Papers/keynote-position.ps.gz
    [Boley01] Harold Boley, The Rule Markup Language: RDF-XML Data Model, XML Schema Hierarchy, and XSL Transformations, Invited Talk, INAP2001, Tokyo, Oc-tober2001.
    [Booch94] G. Booch, Object-oriented analysis and design with applications, Addison Wesley. 1994
    [Bray02] T. Bray, J. Paoli, and C. M. Sperberg-McQueen. Extensible Markup Language (XML) 1. 0. W3C http://www.w3. org/XML/
    [Bradshaw97] Bradshaw, J. M. (Ed.), Software Agents, Boston: MIT Press. 1997
    [Brook87] BROOKS, FREDERICK P., JR.: 'No silver bullet: Essence and accidents of software engineering,' (Computer, 1987) ; in F. P. BROOKS, JR.: The Mythical Man-Month: Essays on Software Engineering, Addison-Wesley, Reading, Mass., 1995, pp. 177-203.
    [Browne02] Christopher B. Browne, The X Window System, 2002, http ://cbbrowne. com/info/x. html
    
    
    [Chauhan98] Chauhan, D. & Baker, A.D. JAFMAS: A multi-agent application development system. Proc. Autonomous Agents 98, Minneapolis, MN. pp. 100107, 1998.
    [Chavez96] A. Chavez and P. Maes. Kasbah: An agent marketplace for buying and selling goods. In Proceedings of the First International Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology, London, April 1996. http://citeseer.nj.nec.com/chavez96kasbah.html
    [Christensen01] Erik Christensen, Francisco Curbera, Greg Meredith, and Sanjiva Weerawarana. Web Services Description Language (WSDL) 1. 1 2001, http://www.w3 .org/TR/2001/NOTE-wsdl-20010315
    [Clark99] J.Clark and S.DeRose. XML Path Language(XPath) version 1. 0. W3C Recommendation, November 1999, http://www.w3. org/TR/xpath
    [Clark01] J.Clark. TREX-tree regular expressions for XML, 2001, http://www.thaiopensource.com/trex/
    [Cluet00] Sophie Cluet, Jerome Simeon, YATL: a Functional and Declarative Language for XML, Draft manuscript, Mar. 2000, http: //citeseer. nj. nee. com/cluet00yatl. html
    [DAML+OIL01] DAML Joint Committee. Daml+oil(march 2001) language. 2001 http://www.daml.org/2001/03/daml-oil-index.html
    [Deutsch99] A.Deutsch, M.Fernandez, D.Florescu, A.Levy, and D.Suciu. A query language for XML. In International World Wide Web Conference, 1999. http://www.research.att.com/-mff/files/final.html
    [Ebbinghaus95] H.D.Ebbinghaus and J.Flum. Finite Model Theory. Springer-Verlag. Berlin, 1995
    [Eckel98] Bruce Eckel, Thinking in Java, Prentice Hall, 1998
    [Ellison98] Ellison, C. M.; Frantz, B.; Lampson, B.; Rivest, R.; Thomas, B. M.; and Ylonen, T. SPKI certificate theory. Internet Draft. 1998
    [Fernandez, et al. 99] Mary Fernandez, etc., XML Query Languages Experiences and Exemplars, 1999, http://www.w3 .org/1999/09/ql/docs/xquery.html
    [Gathman97] Stuart D. Gathman, A Text User Interface for the Java AWT, Dr. Dobb's Journal, September 1997, http://www.bmsi.com/tuipeer/
    [Gosof03] B.Grosof,H.Chan, et al. IBM CommonRules home pages, http://www.research.ibm.com/rules and http://alphaworks.ibm.com.2003
    [Greenwald01] A. Greenwald and Peter Stone. Autonomous Bidding Agents in the Trading Agent Competition. IEEE Internet Computing, 5(2) , 2001,52-60.
    [Genesereth94] Genesereth, M. R. & Ketchpel, S. P., Software Agents, Communications of the ACM 37 (7) ,1994,48-53.
    
    
    [Griss01] Griss M. L., Pour G., Accelerating Development with Agent Components, Hewlett-Packard Laboratories, San Jose State University, America, published in Computer magazine (www.computer.org), May 2001.
    [Hawryszkiewycz98] I. Hawryszkiewycz and J. Debenham. A Workflow System Based on Agents. Proceedings of 9 th International Conference on Database and Expert Systems Applications; DEXA'98, Vienna, Austria, Lecture notes in computer science; Vol. 1460, Springer, August 1998
    [Herzberg00] Herzberg; Mass; Mihaeli; Naor; and Ravid, Access control meets public key infrastructure, or: Assigning roles to strangers. In RSP: 21th IEEE Computer Society Symposium on Research in Security and Privacy. 2000
    [Hewitt85] Hewitt CE, The challenge of open system, BYTE(Apr)223-42,1985
    [Hopcroft00] John E.Hopcroft, Jeffrey D.Ullman , Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, Hardcover, 2nd edition, Published November 2000
    [Hosoya01] H.Hosoya and B.C.Pierce. Regular expression pattern matching for XML. In POPL01, 2001,http://citeseer.nj.nec.com/388107. html
    [Huang95] Huang, J., Jennings, N. R., Fox, J. An agent-based approach to health care management. Int. Journal of Applied Artificial Intelligence, 9(4) , 1995
    [ISO/IEC00] . Information Technology-Document Description and Processing Languages-Regular Language Description for XML(RELAX)-Part 1: RELAX Core, 2000. DTR 22250-1, http://www.y-adagio.com/public/standards/iso_tr_relax_core/tr_22250-1. pdf
    [Jan91] J.K.Jan, C.C.Chang, S. A dynamic key-lock-pair access control scheme, Computer and Security, 1991. 10
    [Java96] Java Meets Prolog for Advisors, Analysts and Agents PC AI, Nov/Dec 1996 http://www.amzi.com/articles/java_class.htm
    [JDOM02] http://www.jdom.org.2002
    [Jennings96] Jennings, N. R., Faratin, P., Johnson, M. J., Norman, T. J., O'Brien, P., Wiegand, M. E., Agent-based business process management. Int. Journal of Cooperative Information Systems, 5(2, 3) , 1996
    [Jennings98] Jennings, N. R. & Wooldridge, M., Agent Technology: Foundations, Applications, and Markets, London, Springer. 1998
    [JSSE02] http://java.sun.com/products/jsse,2002
    [Kagal01] Lalana Kagal, Tim Finin, Yun Peng,A Delegation Based Model for Distributed Trust,Workshop on Autonomy, Delegation, and Control: Interacting with Autonomous Agents, International Joint Conferences on Artificial Intelligence, August 2001
    
    
    [Li99] Li, Feigenbaum and Grosof. A logic-based knowledge representation for authorization with delegation.In PCSFW: Proceedings of The 12th Computer Security Foundations Workshop.IEEE Computer Society Press. 1999
    [Li00a]N. Li. Delegation Logic: A Logic-based Approach to Distributed Authorization. PhD thesis, New York University, New York, Sept. 2000. http://citeseer.nj.nec.com/liOOdelegation.html
    [Li00b]N. Li, B. Grosof, and J. Feigenbaum, A Practically Implementable and Tractable Delegation Logic, to appear in Proceedings of the 2000 IEEE Symposium on Security and Privacy. http://citeseer.nj.nec.com/article/li00practically.html
    [Ljungberg , et cl.92] Magnus Ljungberg and Andrew Lucas. The oasis air-traffic management system. In Proceedings of the Second Pacific Rim International Conference on Artificial Intelligence, PRICAI '92, Seoul, Korea, 1992. http://citeseer.nj.nec.com/ljungberg92oasis.html
    [Maes94] Maes, P., Agents that Reduce Work and Information Overload, Communications of the ACM 37 (7) , 1994,31-40
    [Mark97] Mark d'Inverno, David Kinny, Michael Luck, and Michael Wooldridge, A formal Specification of dMARS, In Singh et al, editors, Proceedings of the 4th International Workshop on Agent Theories, Architectures, and Languages (ATAL'97) , LNAI, Vol. 1365, pp. 155-176, Springer, 1998.
    [Martin99] Martin, D., Cheyer, A. & Moran, D., The Open Agent Architecture: A framework for building distributed software systems. Applied Artificial Intelligence: An International Journal. Volume 13, Number 1-2. January-March 1999. http://citeseer.nj.nec.com/martin99open.html
    [Malkhi00] Dahlia Malkhi and Michael K.Reiter, Secure Execution of Java Applets Using a Remote Playground, Transactions on Software Engineering, VOL.25,NO.12,December 2000
    [Murata00] Makoto Murata, Hedge automata a formal model for XML schemata, 2000, http:// www.xml.gr.jp/relax/hedge_nice.html
    [Murata01] Makoto Murata , Extended Path Expressions for XML, In PODS01,2001, 126-137
    [Negroponte95] Negroponte, N. Being Digital. Vintage Books. 1995
    [Neven99a]F.Neven and T.Schwentick. Query automata. In PODS 99, 1999, http://citeseer.nj.nec.com/229464. html
    [Neven99b]F.Neven. Extension of attribute grammars for structured documents queries. In DBPL 99, 1999,http://citeseer.nj.nec.com/neven99extensions.html
    [Neven00] F.Neven and T.Schwentick. Expressive and efficient pattern languages for tree-structured data. In PODS00, 2000, http://www.acm.org/sigmod/pods/proc00/papers/neven.pdf
    
    
    [Nicholas99] Nicholas R. Jennings and Michael Wooldridge, Agent-Oriented Software Engineering, Proceedings of the 9th European Workshop on Modelling Autonomous Agents in a Multi-Agent World : Multi-Agent System Engineering (MAAMAW-99) ,1999
    [Norman94] Norman, D., How might people interact with agents? Communications of the ACM 37 (7) , 1994,68-76.
    [Nwana99] Nwana, H. Ndumu, D., Lee, L. and Collins, J. ZEUS: a toolkit for building distributed multi-agent systems, In Applied Artificial Intelligence Journal, Vol 13(1) , 1999, pp. 129-186.
    [Nwana96] Nwana, H. Software Agents: An Overview, The Knowledge Engineering Review, 11 (3) , 205-244. 1996
    [Nwana97] Nwana, H & Azarmi, N. (eds), Software Agent and Soft Computing: towards enhancing machine intelligence, Lecture Notes in Artificial Intelligence 1198, Springer-Verlag, New York. 1997
    [Nwana99] H. S. Nwana & D. T. Ndumu, A Perspective on Software Agents Research, In: The Knowledge Engineering Review, Vol 14, No 2, pp 1-18, 1999. http://citeseer.nj.nec.com/nwana99perspective.html
    [nwfusion02] http://www.nwfusion.com/intranet/0922review.html
    [Oppliger00] R. Oppliger, G. Pernul, and C. Strauss. Using attribute certificates to implement role_based authorization and access controls. In Proceedings of the 4. Fachtagung Sicherheit in Informationssystemen (SIS 2000) , 2000, pp 169-184
    [Ovum94] Intelligent agents: the new revolution in software, Ovum Report, 1994
    [Payne02] Terry R. Payne, Rahul Singh, and Katia Sycara. Calendar Agents on the Semantic Web. IEEE Intelligent Systems, Vol. 17(3) , pp. 84-86, May/June 2002. Copyright 2002, IEEE Computer Society. Also appears in IEEE Distributed Systems Online, Vol. 3(5) , 2002.
    [Paolucci et al. 2002] Massimo Paolucci, Takahiro Kawamura, Terry R. Payne, and Katia Sycara, Semantic Matching of Web Services Capabilities. International Semantic Web Conference (ISWC), 2002, pp 333-347
    [Parunak87] Parunak, H. V. D. Manufacturing experience with the contract net. In: M. N. Huhns (Ed.) Distributed AL Morgan Kaufmann. 1987
    [PIE02] http://www.visual-prolog.com/vipexamples/winapps/pie.htm,2002
    [PKI98] An Introduction to PKI, 1998, http://www.bridge-ca.org/architecture/pdf/bridgeca_einf_pki.pdf
    [Poggi01] Poggi , A., Rimassa, G. and Tomaiuolo, M. Multi-user and security support for multi-agent systems, in Proc. of WOA 2001,2001
    [Potter91] B.Potter, J.Sinclair, and D.Till. Introduction to Formal Specification and Z.
    
    Prentice-Hall International Series in Computer Science. 1991
    [RAWT02] http://www.alphaworks.ibm.com/tech/remoteawtforjava,2002
    [Reinhardt94] Reinhardt, A., The Network with Smarts, Byte, October, 1994,51-64.
    [Ricordel00] Pierre-Michel Ricordel, Yves Demazeau, From Analysis to Deployment: a Multi-Agent Platform Survey, Proceedings of the First International Workshop on Engineering Societies in the Agents' World, Berlin, August 2000.
    [Robie99] J.Robie, editor. XQL '99 Proposal, 1999. http://metalab.unc.edu/xql/xql-proposal.html
    [Russel95] Stuart Russel and Peter Norvig, Artificial Intelligence: A Modern Approach. Pearson Education. 1995
    [Sycara99] K. Sycara, J. Lu, M. Klusch, S. Widoff, Matchmaking among Heterogeneous Agents on the Internet, in Proceedings of the 1999 AAAI Spring Symposium on Intelligent Agents in Cyberspace, Stanford University, USA 22-24 March 1999. http://citeseer.nj .nec.com/article/sycara99matchmaking.htnil
    [Sandhu96] Ravi S.Sandhu, Edward J. Coyne et. Role-Based Access Control Models, IEEE Computer, Volume 29, Number 2, February 1996, pp 38-47
    [Sargent92] P. Sargent, Back to school for a brand new ABC, In The Guardian, 12 March, 1992, p 28
    [Shoham91] Shoham Y., AGENT-0: a simple agent language and its interpreter, In Proceedings of the Ninth National Conference on Artificial Intelligence, Vol II Anaheim,CA, MIT Press, 1991, pp. 704-709
    [simcity02] http://simcity.ea.com/, 2003
    [Thompson01] H.S.Thompson, D.Beech, M.Maloney, and N.Mendelsohn. XML Schema Part 1: Structures. 2001. http://www.w3. org/TR/xmlschema-l/.
    [UDDI00] UDDI. The UDDI Technical White Paper. http://www.uddi.org/,2000.
    [Vianu01] Victor Vianu, A Web Odyssey: from Codd to XML, In PODS01,2001,pp 1-15
    [Vliet00] van Vliet H., Software Engineering, Principles and Practice. Wiley, Second Edition, 2000.
    [Wooldridge95] Wooldridge, M. & Jennings, N. R., Intelligent Agents: Theory and Practice, The KnowledgeEngineering Review 10 (2) , 1995, pp115-152.
    [Wooldridge97] Wooldridge M., Agent-Based Software Engineering., Mitsubishi Electrical Digital Library Group, London, United Kingdom, 1997.
    [Wooldridge99] Wooldridge M., Ciancarini P., Agent-Oriented Software Engineering., Dept. of Computer Science, University of Liverpool, Liverpool, United Kingdom, Dipartimento di Scienze dell'Informazione, University of Bologna,
    
    Bologna, Italy, 1999.
    [WWWRDF] Resource Description Framework (RDF) Schema Specification.http://www.w3.org/TR/WD-rdf-schema/.2003
    [XQL02] http://www.garshol.priv.no/download/xmltools/prod/GMD-XQL.html, 2002
    [胡03] 胡勤友,胡运发,基于扩展路径表达式的XML查询,《计算机研究与发展》,No.5,2003
    [傅98] 傅清祥 王晓东,《算法与数据结构》,电子工业出版社,1998,1
    [陆95] 陆汝钤,《人工智能》,科学出版社,1995,8
    [王99] 王炬等,多主体系统AOSDE的安全机制,《计算机研究与发展》,1999,36(5)
    [张02] 张维明,《智能协作信息技术》,电子工业出版社,2002.4

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700