网格服务应用模型的关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着企事业业务领域的发展和需求的加深,对服务资源共享范围扩展的要求日益高涨,实现跨组织安全服务共享和虚拟组织协同问题求解的网格服务计算技术已成为网络发展中的重要方向之一。企业要求越来越多的网络服务应用系统,系统的应用目标也逐渐由确定性转向动态性。如何在动态变化、分布异构、自治和难控的网格环境下,能够依据用户需求实现丰富的网格服务资源的共享,快速、准确地组装各种原有的和集成新添的业务以及开发复杂多变的业务领域应用系统,已成为网格服务计算面临的一项挑战性研究课题。网格计算环境中,分布式的网格工作流共享和重用是该研究课题问题求解的一项核心技术。许多学者基于以客户需求为中心的面向服务体系架构SOA的设计理念来研究网格工作流安全共享与重用,虽然也取得了丰硕的成果,但还是没能充分地发挥面向服务体系架构SOA的优势并且安全措施复杂,研究结果很难适应当前应用领域瞬息万变的即时需求目标,对于实现业务流程的快速重组与升级效果不明显。因此,为实现网格服务应用系统的快速构建,实现一体化的按需服务,提高现代企事业单位的按需应变能力,必需深入地研究在分布、异构、自治的网格服务资源环境下网格应用系统的动态构建技术。
     本文从面向网格服务体系架构SOA出发,结合现代人工智能规划、粒子群优化、合同网协商协议、工作流管理技术以及组合标识认证等,重点研究了网格服务应用模型构建的以下几个关键理论与技术:
     (1)基于用户需求的网格工作流融合建模给出了基于用户需求的网格服务工作流模型,它由网格服务组织模型,网格业务概念模型,网格业务逻辑模型,用户需求定制模型、网格业务调度模型和网格业务执行模型六部分组成。为了提高网格服务的检索效率,提出的网格服务组织模型由网格服务注册系统GSRS和网格服务生成树GSST组成,同时给出了网格服务生成树构造算法和网格业务逻辑生成图的构造算法。在深入研究规划的表示和规划模型的基础上,利用智能规划技术,给出了基于规划的网格工作流融合建模方法。
     (2)网格服务系统架构提出的自适应网格合同计算管理系统SACCM包括应用层、网格合同计算管理层和应用代理层,其核心网格合同计算管理层有四个组件:合同计算服务工作流管理、合同计算服务协商管理、C_SLA生命周期管理和合同计算服务重组与仲裁等。给出了网格服务实例层面和工作流关系层面上的工作流失效恢复算法。
     (3)基于粒子群算法的工作流优化调度通过研究粒子群算法PSOA的机理结合网格服务工作流调度的特点,依据网格服务质量QoS,提出了基于粒子群的整数-二进制编码业务路径替代、动态服务调度算法IBPSOA。IBPSOA算法采用服务类和服务实例的整数-二进制编码方式,重新定义了粒子群算法的位置、速度、加/减法和乘法,增加了绝对值运算。从仿真的两个方面验证了IBPSOA算法的有效性。
     (4)网格服务协商模型把合同计算思想引入到Multi-Agent协商机制中,提出了基于Agent的网格合同计算模型,为使用网格服务提供一个通用的接口及合同管理全过程的监管机制。提出了一种基于具有精神状态的Agent FIPA合同网协商的方法来实现面向合同计算的合同状态迁移,在状态迁移的同时,实现了业务概念工作流BCWf到业务逻辑工作流BLWf到业务执行工作流BEWf的转换。
     (5)基于标识的网格安全认证体系结构把基于剩余类环Zn的圆锥曲线引入组合公钥中,提出了CPK-CCC密码机制和AAGS安全认证体系结构,给出了AAGS有关网格基础认证协议,同时把AAGS中的可信连接协议与PKI中的认证协议SAP进行了比较分析,说明了AAGS比PKI更直接、有效。
     (6)为验证提出的网格服务应用模型的关键理论与技术的正确性和有效性,开发了网格服务应用原型系统,并以在线旅游管理系统为例从网格服务系统原型的角度描述Agent和基于合同计算的规划工作流的设计与实现。
With the expansion of the scope of shared resources and the demand for the development of business enterprises, grid service computing, which is characterized by its capability for safely sharing cross-organizational resources and providing problem solving environment for virtual organization, has become an important trend. The demand of industry and commerce request for service application system based on user demand for rapid and flexible integration of various existing and new business, make them collaborating to afford on demand service. How to open, dynamic and difficult to control the grid environment to achieve a wide range of services to share and integrate resources and the development of complex business applications, has become a challenging research topic of computing grid services facing. Distributed grid workflow sharing and reuse technology has become a core technology of intelligent problem-solving. Based on customer demand as the center of service-oriented architecture (SOA) designed to study grid workflow technology, many scholars also have made some encouraging results, but did not make full use of the advantages of SOA, the results is very difficult to adapt to the current real-time applications demand ever-changing objectives. Effect for the realization of the rapid restructuring and upgrading of the business processes was not obvious. Therefore, in order to achieve resource sharing and collaboration shield the complexity of the integration of on-demand services and to improve the modern enterprises ability of on-demand, the in-depth study of dynamic construction technology for grid service application are very necessary.
     From the perspective of grid service-oriented architecture (SOA), this paper based on artificial intelligence planning, Particle Swarm Optimization, Contract Net Negotiation Protocol, workflow management technology as well as the combined Identity certification, focus on the following critical theory and technology of grid service applications:
     (1) Grid Workflow Merging Model Based on user demand We put forward the grid service workflow model based on user demand, which is composed of the grid services organizations model, the business concept model, business logic model, custom command model, business scheduling model and business enactment model. In order to improve the retrieval grid service and efficiency, our proposed grid service organizations model made up of grid service registration system(GSRS) and grid service spanning tree (GSST), and we are given a building algorithm for GSST and a business logic spanning graph algorithm. Throughout the in-depth study of planning methods, we use artificial intelligence planning techniques to give a modeling method for grid service workflow.
     (2) Grid Service System Architecture Self-adaptive grid contract computing management (SACCM) system includes application layer, grid contract computing management layer and the application proxy layer. Its core is grid computing contract management layer, which have four main components: contract computing services workflow manager, contract computing services manager for negotiating, C_SLA life cycle manager and contract computing services restructuring. We give grid services failure recovery algorithm for workflow from composing workflow instance level and workflow relations level.
     (3) Based on Particle Swarm Optimization Algorithm for Scheduling Workflow By studying the mechanism of Particle swarm Algorithm and linking grid service workflow scheduling features, according to quality of grid service, IBPSOA is given, which is an alternative path to the integer-binary coding operations, and dynamic service scheduling algorithm. IBPSOA algorithm uses services type and instances of services of the integer - binary encoding, redesigns of the location of particle swarm optimization, speed, add/subtraction and multiplication and increases the absolute value operator. From two aspects of simulation, we educe that the IBPSOA algorithm is more effective.
     (4) Negotiating Model of Grid Services Introducing the contract computing into the Multi-Agent negotiating mechanism, the grid contract computing model based Agent is proposed, which adds features that the use of grid services to provide a common interface and the entire process of contract management the regulatory mechanism of grid services to enhance QoS. The FIPA contract net negotiating approach with mental state of Agents is given to the achievement of contract status migration in contract-oriented computing model. Meanwhile, from the workflow point of view, it realizes a business concept workflow (BCWf) to the business logic workflow (BLWf) to the business executive workflow (BEWf) conversion. In Multi-Agent system is running continuously adjust the process entrusted with the task-related mental state; the system has good flexibility and adaptability.
     (5) Grid Security Architecture for Authentication /Certification based on Identity The Grid Security Infrastructure (GSI) has been accepted as the primary authentication mechanism for the Grid. However the efficiency of the grid system is still required improvement because exchanging certificates and verifying validity are compulsory in the authentication procedure. We propose a Combined Public Key Cryptosystem- CPK-CCC and a novel Authentication Architecture for Grid Security (AAGS), which adopt seeded secret key and combine key technique and employs the features of conic curves over the residue class ring Z_n into the authentication security, and we give precise definitions of the grid infrastructural protocols for AAGS. Compared with the SAP (SSL Authentication Protocol) in the GSI, AAGS is more efficient and convenient for its implementation than PKI.
     (6) Implementation of Prototype System and Application In order to verify correctness and effectiveness of the key theory and technology for our proposed application model of grid services, we developed a prototype system. We give an online travel management system for grid services as an example, which described Agent and the planning design and implementation of workflow.
引文
[1] I. Foster, C. Kesselman, S. Tuecke. The Anatomy of the Grid: Enabling Scalable Virtual Organizations. International J. Supercomputer Applications, 2001, 15(3):200-222
    [2] A. Arsanjani Ph. D. Service-Oriented modeling and architecture: How to identify,specify, and realize services for your SOA. Whitepaper from IBM, Nov. 2004. http://www. ibm.com/developerworks/library/ws-soa-designl/
    [3] G. Alonso, F. Casati, H. Kuno, et al. Web Services - Concepts, Architectures and Applications. NewYork: Springer, 2003
    [4] M. P. Papazoglou. Service-Oriented computing: Concepts, characteristics and directions. In: Proc. of the 4th Int'l Conf. on Web Information Systems Engineering (WISE 2003), M. Massimo, ed. IEEE Computer Society, 2003: 3-12
    [5] I. Foster, H. Kishimoto, A. Savva. The Open Grid Services Architecture Version 1.5. Open Grid Forum (OGF), http: //www. ogf. org/documents/GFD. 80. pdf, 2005
    [6] Borja Sotomayor. OGSA/OGSI, WSRF &Globus. http: //people, cs. uchicago.edu/-borja/lecture/towards_service_oriented_grid. pdf, 2004
    [7] S. Tuecke, K. Czajkowski, I. Foster, et al. Open Grid Services Infrastructure (OGSI)Version1.0. GlobalGrid Forum Draft Recommendation, 2003
    [8] K. Czajkowski, D. F. Ferguson, I. Foster. The WS-Resource Framework, http://www. globus. org/wsrf/specs/ws-wsrf. pdf, March 5, 2004
    [9] S. Graham, K. Czajkowski, D. F. Ferguson, et al. Web Services Resource Properties 1.0.2004, http: //www. globus. org/wsrf/WS-ResourceProperties. pdf
    [10] I. Foster, C. Kesselman, G. Tsudik, et al. A Security Architecture for Computational Grids, In: Proc. of the 5th ACM conference on Computer and communications security. ACM, 1998: 83-92
    [11] V. Welch, F. Siebenlist, I. Foster, et. al. Security for Grid Services. In: Proc. of the 12th IEEE International Symposium on High Performance Distributed Computing,IEEE Computer Society Washington, DC, USA. 2003: 48-57
    [12] I. Foster. Globus Toolkit Version 4: Software for Service-Oriented Systems. In: Proc.of International Conference On Network and Parallel Computing(IFIP).Springer-Verlag,2005(LNCS 3779):2-13 http://www.globus.org/alliance/publications/papers/IFIP-2005.pdf
    [13]南湘浩著.CPK标识认证.北京:国防工业出版社,2006:10
    [14]T.Defanti,I.Foster,M.Papka,et al.Overview of the I-WAY:Wide Area Visual Supercomputing.International Journal of Supercomputer Applications,1996,10(2):123-131
    [15]SETI@home.http://setiathome.ssl.berkeley.edu/
    [16]I.Foster,C.Kesselman.The Globus project:A status report.In:Proc.of the IPPS/SPDP'98 Heterogeneous Computing Workshop.IEEE Computer Society Press,ftp://ftp.globus.org/pub/globus/papers/globus-hcw98.pdf:1998:4-18
    [17]M.J.Litzkow,M.Livny,M.W.Mutka.Condor-A hunter of idle workstations.In:Proc.of the 8th International Conference of Distributed Computing Systems(ICDCS'88),IEEE Computer Society Press,1988:104-111
    [18]S.J.Chapin,D.Katramatos,J.Karpovich,et al.Resource management in legion.FutureGeneration Computer Systems,1999,15(5-6):583-594
    [19]Open Grid Forum(OGF),http://www.ogf.org/(或Global Grid Forum,http://www.gridforum.org/)
    [20]G.Coulouris,J.Dollimore,Tim Kindberg.Distributed Systems:Concepts and Design(4th Edition).Addison Wesley.2007
    [21]http://www.omg.org/technology/documents/corba_spec_catalog.htm
    [22]http://java.sun.com/javaee/technologies/
    [23]W.T.Tsai,B.Xiao,Q.Huang,et al.Collaborative software design in an SOA environment.Science in China(Series F),2006,49(6):821-842
    [24]Web Services:www.w3.org/2002/ws/
    [25]M.Stevens.Service-Oriented Architecture Introduction,Part 1 & Part 2.http://www.developer.com/services/article.php/1010451.2009
    [26]W3C Working Group Note.Web Services Architecture.http://www.w3.org/TR/2004/NOTE-ws-arch-20040211/,2004
    [27]Heather Kreger.Web Services Conceptual Architecture(WSCA 1.0).IBM Software Group.www-3.ibm.com/software/solution/webservices/pdf/WSCA.pdf
    [28]SOAP Version 1.2 Published as a W3C Recommendation.http://xml.coverpages.org/soap.html
    [29]Universal Description,Discovery,and Integration(UDDI)version 3.0.2.http://xml.coverpages.org/uddi.html
    [30]WSDL:Web Service Description Language(WSDL)1.2.W3C,Draft 2003,6.
    [31]F.Leymann.Web Service Flow Language(WSFL1.0).http://www-4.ibm.com/software/solutions/webservices/pdf/WSFL.pdf,2001.(或http://xml.coverpages.org/wsfl.html)
    [32]S.Thatte.XLANG:Web Services for Business Process Design.Available at http://www.gotdotnet.com/team/xml_wsspecs/xlang-c/,2001
    [33]BEA,IBM,and Microsoft.Business Process Execution Language for Web Services(BPEL4WS).http://xml.coverpages.org/bpel4ws.html
    [34]http://www.oasis-open.org/specs/index.php#wsrfv1.2
    [35]http://www.w3.org/Submission/OWL-S/
    [36]David Martin,Mark Burstein,Jerry Hobbs.OWL-S:Semantic Markup for Web Services.2004.http://www.w3.org/Submission/2004/SUBM-OWL-S-20041122/
    [37]蔡自兴,姚莉著.人工智能及其在决策系统中的应用.国防科技大学出版社, 2006.3
    [38]M.J.Wooldridge,N.R.Jennings.Intelligent Agents:Theory and Practice.In:Journal of Knowledge Engineering Review,1995,10(2):115-152
    [39]Marius Walliser.Monique Calisti.Thomas Hempfling.Stefan Brantschen.Software Agent-Based Applications,Platforms and Development Kits.Birkhauser Verlag.2005
    [40]T.Finin,Y.Labrou,J.Mayfield.KQML as Agent communication language.In:Bradshaw Jed.Software Agents.Cambridge:MIT Press,1997
    [41]FIPA:FIPA Request Interaction Protocol Specification.http://www.fipa.org/specs/fipa00030/SC00026H.pdf,2002
    [42]R.G.Smith.The Contact Net Protocol:High-level Communication and Control in a Distributed Problem Solver.IEEE Transactions on Computers,1980(29): 1104-1113
    [43] L. Xu, H. Weigand. The Evolution of the Contract Net Protocol. In: Proc.of Web-Age Information Management, Second International Conference, WAIM2001,Xi'an China, 2001: 257-266
    [44] WFMC. Workflow Management Coalition Specification, Workflow Reference Model. Document Number TC00-1003, http: //www. wfmc.org/[45] Yan Yuhong, Z. Maamar, Shen Weiming. Integration of workflow and agent technology for business processmanagement. In: Proc. of the Sixth International Conference on Computer Supported Cooperative Work in Design. London, Ont.,Canada, 2001: 420-426
    [46] S. Krishnan, P. Wagstrom,G. von Laszewski. GSFL: A Workflow Framework for Grid services. ANL/MCS, Argonne, 2002: 802-980
    [47] http: //www. gridworkflow. org/snips/gridworkflow/space/start
    [48] N. Stone, D. Simmel, T. Kielmann. An Architecture for Grid Checkpoint and Recovery Services,www.ogf.org/documents/GFD. 93. pdf, 2007
    [49] http: //www. swinflow. org/swindew/grid/SwinDeW-G (Swinburne Decentralised Workflow for Grid) System System_Architecture. Pdf, 2008
    [50] J. Yu and R. Buyya. A Novel Architecture for Realizing Grid Workflow using Tuple Spaces. In: Proc. of the 5th IEEE/ACM International Workshop on Grid Computing(GRID 2004), Pittsburgh, USA, IEEE Computer Society Press, Los Alamitos, CA, USA. 2004:119-128
    [51] J. Yan, R. Kowalczyk, J. Lin, et al.Autonomous service level agreement negotiation for service composition provision. Future Generation Computer Systems, 2007, 23(6): 748-759
    [52] J. Cao, S. A. Jarvis, S. Saini, et al. GridFlow: Workflow Management for Grid Computing. In: Proc. of the 3rd International Symposium on Cluster Computing and the Grid (CCGrid), Tokyo, Japan, IEEE Computer Society Press, Los Alamitos,2003: 198-205
    [53] E. Deelman, J. Blythe, Y. Gil, C. Kesselman. Workflow Management inGriPhyN.In: The Grid Resource Management, Kluwer, Netherlands, 2003
    [54] Cao Lei. Li Minglu, Cao Jian, et al. CNP-based Implementation of Service-oriented Workflow Mapping in SHGWMS.World Wide Web.2008,11(2):199-226
    [55]Cao Lei,Li Minglu,Cao Jian,et al.Method of Using BDI Agents to Implement Service-oriented Workflow Mapping in AGWMS.In:Proc.of the Fifth International Conference on Grid and Cooperative Computing(GCC'06),IEEE Computer Society,2006:213-220
    [56]L.Pearlman,C.Kesselman,V.Welch,et al.The Community Authorization Service:Status and Future.In Proc.of Computing in High Energy Physics 03(CHEP '03),La Jolla,California,2003:1-9
    [57]G.Laccetti,G.Schmid.A framework model for grid security.Future Generation Computer Systems.Elsevier Science Publishers B.V.2007,23(5):702-713
    [58]V.Welch,I.Foster,C.Kesselman,et al.X.509 Proxy Certificates for Dynamic Delegation.In:Proc.of the 3rd Annual PKI R&D Workshop.Gaithersburg MD,USA,NIST Technical Publications,2004
    [59]A.O.Freier,P.Karlton,P.C.Kocher.the SSL Protocol Version 3.0.Internet-draft,draff-freier-ssl-version3-02.txt,November 1996
    [60]T.Dierks,C.Allen,The TLS Protocol Version1.0,RFC2246,1999
    [61]荆继武,林璟锵,冯登国著.PKI技术(信息安全国家重点实验室信息安全技术).科学出版社,2008.5
    [62]Marco Carbone,Oliver Danvy,Ivan Damgaard,et al.A model for trust.SECURE Deliverable 1.1,2002
    [63]余波,周龙骧,钟锡昌等.网格工作流技术综述.计算机工程,2006,32(2):4-6
    [64]Ian Foster.What is the Grid? A Three Point Checklist.http://www-fp.mcs.anl.gov/-foster/Articles/WhatIsTheGrid.pdf,2002
    [65]Stuart Russell,Peter Norvig.Artificial Intelligence:A Modern Approach(Second Edition),Prentice Hall,2002:375-461
    [66]胡春华,吴敏,刘国平等.服务工作流中基于用户需求的调度模型及算法研究.小型微型计算机系统,2007,28(6):1008-1014
    [67]胡春华,吴敏,刘国平等.一种基于业务生成图的Web服务工作流构造方法.软件学报,2007,18(8):1870-1882
    [68]Chao Kuo-Ming,Younas M,Lo Chi-Chun,et al.Fuzzy Matchmaking for Web Services.In:Proc.of 19 IEEE Conferences on Advanced Network and Information Applications.IEEE CS,2005:721-726
    [69]Hong SH,Kim YC.Implementation of a bandwidth allocation scheme in a token-passing fieldbus network.IEEE Trans.On Instrumentation and Measurement,2002,51(2):246-251
    [70]孙海龙,怀进鹏,富公为.一种自适应的网格计算资源组织与发现机制.软件学报.2009,20(1):152-163
    [71]E.P.D.Pednault.ADL:Exploring the Middle Ground Between STRIPS and the Situation Calculus,In:Proc.of the First International Conference on Principles of Knowledge Representation and Reasoning(KR'89),Morgan Kaufmann,Inc.,Toronto,Canada,1989:324-332
    [72]http://www.ai.sri.com/-wilkins/mpa/mpa.pdf
    [73]姚莉,张维明.用于协作信息处理的基组织结构模型.小型微型计算机系统,2000,21(6):628-630
    [74]鲍爱华,姚莉,刘芳等.基于组织的多Agent系统建模方法研究.小型微型计算机系统,2008,29(1):66-72
    [75]范玉顺主编.工作流管理技术基础-实现企业业务过程重组、过程管理和业务过程自动化的核心技术.北京:清华大学出版社,柏林:施普林格出版社,2001
    [76]Yun Yang,K.Liu,J.Chen,et al.Peer-to-Peer Based Grid Workflow Runtime Environment of SwinDeW-G.In:Proc.of Third IEEE International Conference on e-Science and Grid Computing.IEEE Computer Society,2007:51-58
    [77]Jini:Jini community.http://www.jini.org
    [78]A.Andrieux,K.Czajkowski.A.Dan,et al.Web Service Agreement Specification(WS-Agreement).http://www.ogf.org/documents/GFD.107.pdf,2007
    [79]A.Pokahr,L.Braubach,W.Lamersdorf.A Flexible BDI Architecture Supporting Extensibility.In:Proc.of the 2005 IEEE/WIC/ACM International Conference on Intelligent Agent Technology(IAT-2005),France,September 2005:379-385
    [80]http://jadex.informatik.uni-hamburg.de/bin/view/About/Overview
    [81]王勇,胡春明,杜宗霞.服务质量感知的网格工作流调度.软件学报,2006, 17(11):2341-2351
    [82]D.Ardagna,G.Ciunta,N.Ingraffia,et al.QoS-driven web services selection in autonomic grid environments.Lecture notes in computer scienceL 2006,4276:1273-1289
    [83]谷清范,吴介一,张飒兵.网格环境下多服务质量约束的复合服务调度机制.计算机集成制造系统,2005,11(12):1775-1780
    [84]张成文,苏森,陈俊亮.基于遗传算法的QoS感知的Web服务选择.计算机学报.2006,29(7):1029-1037
    [85]Zeng LZ,Benatallah B,Anne HH,et al.QoS-Aware middleware for Web services composition.IEEE Trans.on Software Engineering,2004,30(5):311-327
    [86]代钰,杨雷,张斌.支持组合服务选取的Qos模型及优化求解.计算机学报,2006,29(7):1167-1178
    [87]J.Cardoso,A.Seheth.Quality of service for workflows and Web service processes.Journal of Web Semantic,2004,13:281-308
    [88]蒋运承,汤庸.服务组合的质量估计模型.小型微型计算机系统,2006,27(8): 1519-1925
    [89]S.Rueda,P.Morillo,J.M.Ordu(?)a,et al.A genetic approach for adding QoS to distributed virtual environments.Computer Communications.2007,30(4):731-739
    [90]K.E.Parsopoulos,M.N.Vrahatis.Particle swarm optimization method in multiobjective problems.In:Proc.of the 2002 ACM symposium.ACM Press.2002,11:603-607
    [91]R.Eberhart,J.Kennedy.A new optimizer using particles swarm theory.In:Proc.of the 6th Int'l symposium on micro machine and human science.1995:39-43
    [92]Hu X.H.,Shi Y.H.,Eberhart R.Recent advances in particle swarm.In:Proc.of Congress on Evolutionary Computation,2004:90-97
    [93]朱穗晖,都志辉,林伟坚.网格环境合同计算元服务的设计与应用.计算机学报,2005,28(4):486-494
    [94]A.Keller,H.Ludwig.Defining and monitoring service level agreements for dynamic e-business,In:Proc.of the 16th System Administration Conference, USENIX Association Berkeley,CA,USA,2002:189-204
    [95]C.K.Hung,H.Li,J.Jeng.WS-negotiation:An overview of research issues,In:Proc.of the 37th Hawaii International Conference on System Sciences-2004,2004:1-10
    [96]K.Czajkowski,I.Foster,Kesselman C.,et al.SNAP:A protocol for negotiating service level agreements and coordinating resource management in distributed systems.Lecture Notes in Computer Science 2537,2002:153-183
    [97]万武南,王晓京,宋春雨等.基于范例推理的合同网模型.小型微型计算机系统,2005,26(9):1578-1581
    [98]张海俊,史忠植.动态合同网协议.计算机工程,2004,30(21):44-46
    [99]Cao Lei,Li Minglu,Cao Jian,et al.An Agent-based Grid Workflow Management System using AI Planning.In:Proc.of the International Conference on Next Generation Web Services Practices(NWeSP'05).IEEE Computer Society,2005:357-363
    [100]Chen Xueguang,Song Haigang.Further extensions of FIPA Contract Net Protocol:threshold plus DoA.In:Proc.of t he 2004 ACM symposium on Applied computing.ACM Press,2004:45-51
    [101]鲁黎,杨寿保,刘鹏展等.基于动态定价的网格资源调度系统设计与仿真.系统仿真学报,2006,18(4):932-937
    [102]Hongwei Li,Shixin Sun.Identity-Based Cryptography for Grid.In:Proc.of the Eighth ACIS International Conference on Software Engineering,Artificial Intelligence,Networking,and Parallel/Distributed Computing.2007:132-137
    [103]Bruce Beckles,Von Welch,Jim Basney.Mechanisms for increasing the usability of grid security.Elsevier Ltd.2005:74-101
    [104]Zhao Shushan.Aggarwal,Akshai.Kent,Robert D.PKI-Based Authentication Mechanisms in Grid Systems.In:Proc.of International Conference on NAS 2007.2007,29(31):83-90
    [105]Mao Wenbo.An Identity-based Non-interactive Authentication Framework for Computational Grids.http://www.hpl.hp.corn/techreports/2004/HPL-2004-96.pdf.avaible,2009
    [106]W.Diffie,M.E.Hellman.New directions in cryptography.IEEE Transactions on Information Theory,1976,22(6):644-564
    [107]A.Shamir,Identity-Based Cryptosystems and Signature Schemes.In:Proc.of Crypto'84 Advances in Cryptology,Springer LNCS 196,1984:47-53
    [108]D.Boneh,M.Franklin.Identity Based Encryption from the Weil Pairing,In:Proc.of Advances in Cryptology-Crypto'2001,Lecture Notes in Computer Science,Springer-Verlag,2001:213-229
    [109]W.Tang,X.Nan,Z.Chen.Combined public key cryptosystem.In:Proc.of International Conference on Software,Telecommunications and Computer Networks(SottCOM'04),IEEE ComSoc.,Los Alamitos,2004
    [110]曹珍富,薛庆水.密码学的发展方向与最新进展.计算机教育,2005,1:19-21
    [111]曹珍富.基于有限域Fp上圆锥曲线的公钥密码系统.密码学进展-chinacypt98. 科学出版社,1998:45-49
    [112]王标,朱文余,孙琦.基于剩余类环Zn圆锥曲线的公钥密码体制.四川大学学 报(工程科学版),2005,37(5):110-116
    [113]孙琦,朱文余,王标.环Zn上圆锥曲线和公钥密码协议.四川大学学报(自然科 学版),2005,42(3):471-478
    [114]肖龙,王标,孙琦.基于环Zn上的圆锥曲线数字签名和多重数字签名方法.西 安交通大学学报,2006,40(6):648-650
    [115]F.I.Blake,Gadiel Seroussi,N.P.Smart.Advances in Elliptic Curve Cryptography.Cambridge university press,2005
    [116]Mao Wenbo.Modern Cryptography:Part Ⅲ:Basic Cryptographic Techniques of Theory and Practice:Advances in Elliptic Curve Cryptography,Publisher:Prentice Hall PTR,2003:246-386