用户名: 密码: 验证码:
基于服务组合的跨企业协作关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着经济全球化的迅猛发展以及信息技术的不断进步,大型企业级应用系统在社会经济中扮演着越来越重要的地位。当今竞争激烈的商业社会,要求企业对瞬息万变的市场做出迅速反应,不断地调整自身业务形态;如何实现企业应用系统以服务为导向、随需应变成为了当今软件产业的焦点问题,而面向服务的架构与Web服务技术正是在这样的背景下应运而生。由于Web服务的平台无关、松耦合以及可复用性等特点,使得它在企业遗留系统改造、异构系统应用集成乃至实现跨企业的业务流程协作等方面存在着巨大的应用价值。
     当前,Web服务的相关标准已经逐渐成熟,服务组合的构建技术也已受到相当广泛的关注。然而在实际应用过程中,要使其正确、安全而又高效地为企业服务,仍然存在着较多问题有待解决。本文以基于服务组合的跨企业协作为应用背景,围绕着组合服务运行时支撑保障相关问题,从正确性验证、访问控制以及性能优化等几个方面展开研究。本文的主要工作与贡献如下:
     1)提出了基于Petri网的服务流程建模与验证方法。合作伙伴之间业务协作常常包含复杂的业务逻辑和消息交互。仅仅依靠静态的接口匹配的约束方法,无法保证流程的动态行为正确性。本文以Petri网理论为基础,提出一种服务控制与数据接口一致性Web服务建模方法,形式化地描述了组合服务基本构建单元及其构建过程;针对组合服务的正确性验证问题,提出了基于服务工作流网合理性的正确性定义,以此为基础对多个组合服务之间的业务流程协作进行建模,提出了流程正确性及兼容性分析算法,通过案例分析验证了算法的有效性。
     2)提出了基于RBAC的权限最小化动态访问控制授权机制。企业的业务过程从原有的单域环境向跨企业的多域环境迁移时,其原有的针对单域的访问控制策略无法很好地满足新环境的需求。提出一种以基于角色访问控制(RBAC)为基础的多域动态访问授权模型,根据组合服务的流程结构分析服务执行所需的权限,提出一个权限最小化的角色集挖掘算法,从原有的面向单域的角色授权关系中挖掘满足服务执行的角色集。针对组合服务中的跨域操作进行端对端的域间自主授权协商,并根据挖据出的角色集建立最小成本的跨域角色映射以满足跨域访问授权需求。在此基础上提出一套与现有的工业标准相结合运行时框架,实现了根据组合服务实际运行状态进行授权的动态访问控制机制,并通过模拟实验证明了算法的有效性。
     3)提出了一种面向跨企业组合服务性能优化的服务部署策略。跨企业的业务协作以公共网络作为信息传输的基础架构,网络本身的不稳定性以及各企业地理位置、网络位置的分布以及安全策略的部署等因素,对组合服务性能带来难以忽视的影响。本文以组合服务分布式执行为讨论基础,以服务执行成本作为组合服务性能优化指标,提出了服务间交互强度的概念,并通过对企业内服务部署区间的调整来达到降低服务执行成本的目的。通过将服务可部署区域的作为限制条件,将问题转化为多约束条件的下的最优化问题,并提出了一个基于遗传算法建模方法对这一优化问题进行求解。模拟实验表明算法在不同场景下均对组合服务执行成本有较大的优化。
As the development of economic globalization and the progress of information technologies, large scale information applications are taking a more and more important character in the economic society. Enterprises need to align themselves to the rapid changing market and adjust their business destinations. How to turn enterprise applications into services oriented and to be changed dynamically becomes the dominating problem in today's software industry. Service oriented architecture and Web Service technology come into real in such background. Web services have the advantages of platform independence, loosely coupling and reusability so that they have very large of application values in enterprises including legacy system migration, heterogeneous systems integrations and crossing enterprises business cooperation.
     Currently, the industry standards of Web services are being continuously improved; methods and technologies for services composition are receiving considerable attentions. However, it still remains a lot of unresolved problems while adopting them into enterprise applications to make them work correctly, safely and efficiently. The researches in this paper take cross enterprises business cooperation based on services composition as the application background, focus on the runtime problems of service composition execution such as correctness verification, access control and performance optimization. Major work and contributions include:
     1) A formalized modeling and verification method for business processes based on Petri Net is proposed. The business cooperation between businesses partners usually contain complicated business logics and message exchanges. The static restriction methods based on interface compatibility cannot guarantee the correctness of dynamic behaviors of processes. This paper proposed a consistent model for control and data interface of web services based on Petri Net theory. The basic construction units of services composition is formalized descripted with this model. The soundness of service workflow net is defined to descript the correctness of composited services. The business cooperation process is modeling based on this definition and an analysis algorithm for the verification of correctness and compatibility for composite services is proposed. Availability of the algorithm is evaluated by several cases.
     2) A dynamic multiple domains access control model base on role based access control (RBAC) was proposed. The existing single domain based access control model cannot fulfill the authorization requirements for service compositions cross multiple enterprises. The process structures of composite services were analyzed and a role mining algorithm was proposed to find the role set with minimized permissions that meet the access requirements of composite services. Authorization negotiations were set up among relevant domains for each cross domain operation in composite services and cross domain role mappings were built according the mined role sets with minimized cost to fulfill the cross domain operations. Based on this model, a runtime framework aligned with current industry standard was proposed to authorize dynamically based on the current running status of composite services. Simulation experiments showed the effectiveness of key part of the role mining algorithm.
     3) A services deployment strategy is proposed for performance optimization of cross enterprise service compositions. The cross enterprise business cooperation uses public network as its information delivery infrastructure. The unstable nature of public network, the geographical and network locations distributions and the deployment of security policies of each enterprise brings non negligible effect on the performance of composited services. Execution cost of composited services is considered as the optimization objective and a concept named interaction dependency is proposed. The performance is optimized based on adjusting the deployment domains of component services in order to reduce the overall execution costs. With the limitation of deployable domains of services, the problem is converted into an optimization problem under multiple restrictions, and a genetic algorithm based method is proposed to resolve this problem. The simulation experiments show the algorithm has considerable improvement in different scenarios.
引文
[1]杨芙清,梅宏,吕建,金芝.浅论软件技术发展.电子学报,2002,30(12A):1901-1906.
    [2]杨芙清,梅宏,李克勤.软件复用与软件构件技术.电子学报,1999,27(2):68-75.
    [3]M. P. Papazoglou, P. Traverso, S. DustdarF. Leymann. Service-Oriented Computing:State of the Art and Research Challenges. Computer.2007,40 (11). 38-45.
    [4]L.J. Zhang, J. Zhang, H. Cai. Service Computing. Springer,2007.
    [5]IBM. Service Oriented Architecture-SOA. http://www.ibm.com/soa
    [6]Thomas Erl. Service Oriented Architecture:Concepts, Technology and Design. Prentice Hill,2005.
    [7]F. Curbera, M Duftler, R. Khalaf, W. Nagy, N. Mukhi,S. Weerawarana. Unraveling the Web Services Web:An Introduction to SOAP, WSDL, and UDDI. IEEE Internet Computing,2002,6(2):86-93.
    [8]中国电子化标准研究所.中国SOA标准体系研究报告(征求意见稿),2009.6.
    [9]J. C. Okika, A. P. Ravn. Classification of SOA Contract Specification Languages. IEEE International Conference on in Web Services (ICWS '08).2008:433-440.
    [10]Web Services Description Language v2.0 http://www.w3.org/TR/wsd120-primer/
    [11]OWL-S:Semantic Markup for Web Services http://www.w3.org/Submission/ OWL-S/
    [12]ebXML:http://www.ebxml.org/
    [13]刘志忠,王怀民,郭艳玲.基于语义的服务发现技术研究综述.计算机工程与科学,2007,29(9):12-15.
    [14]S. Ran, A model for web services discovery with QoS. SIGecom Exch. 2003(4):1-10.
    [15]邓水光,黄龙涛,尹建伟,等.Web服务组合技术框架及其研究进展.计算机集成制造系统,2011(2):405-412
    [16]J Rao, X Su. A Survey of Automated Web Service Composition Methods. Proceeding of 1st International Workshop on Semantic Web Services and Web Process Composition.2004
    [17]S Dustdar, W Schreiner. A survey on Web Services composition. International Journal of Web and Grid Service,2005,1(1):1-30.
    [18]M. Papazoglou, Web services:principles and technology. Addison-Wesley, 2008.
    [19]OASIS Standard.2007 Web Services Business Process Execution Language Version 2.0. http://docs.oasis-open.org/wsbpel/2.0/OS/wsbpel-v2.0-OS.html
    [20]WS-CDL:http://www.w3.org/TR/2004/WD-ws-cdl-10-20040427/
    [21]G. Monsieur, M. Snoeck, W. Lemahieu. On the concept of service coordination. Open Access publications from Katholieke Universiteit Leuven,2010.
    [22]D. Liu, K. H. LawG. Wiederhold. Analysis of integration models for service composition. Proceeding of the 3rd international workshop on Software and performance.2002:158-165.
    [23]G. Pedraza, J. Estublier. Distributed Orchestration versus Choreography:The FOCAS Approach. Trustworthy Software Development Processes,2009:75-86.
    [24]Michael Poulin. Why We Don't Recommend WS-CDL for SOA and What Is the Alternative. http://www.ebizq.net/blogs/service_oriented/2011/06/
    [25]G.Chafle, S. Chandra, V.Mann, M.G. Nanda. Decentralized orchestration of composite web services. In Proc. of 13th Int'l Conf. World Wide Web (WWW), New York, NY, USA.2004:134-143 [26]Nanda, M. G., Chandra, S., and Sarkar, V. Decentralizing execution of composite web services. SIGPLAN Not.2004 39(10):170-187.
    [27]D. Martin, D. Wutke, F. Leymann. A novel approach to decentralized workflow enactment.12th International IEEE Enterprise Distributed Object Computing Conference (EDOC'08),2008:127-136.
    [28]R. Khalaf, F. Leymann. E Role-based Decomposition of Business Processes using BPEL. International Conference on Web Services (ICWS '06),2006: 770-780.
    [29]U. Yildiz, C. Godart. Towards decentralized service orchestrations. in Proceedings of the 2007 ACM symposium on Applied computing,2007: 1662-1666.
    [30]W. Fdhila, U. Yildiz, C. Godart. A flexible approach for automatic process decentralization using dependency tables. IEEE International Conference on Web Services (ICWS '09),2009:847-855.
    [31]H. Fernandez, T. Priol, C. Tedeschi. Decentralized approach for execution of composite web services using the chemical paradigm. IEEE International Conference on Web Services (ICWS'10),2010:139-146.
    [32]F. Casati, S. Ilnicki, L.J. Jin, M.C. Shan. An Open, Flexible, and Configurable System for Service Composition. International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems.2000.
    [33]B. Benatallah, Q.Z. Sheng, M. Dumas. The Self-Serv Environment for Web Services Composition. IEEE Internet Computing,2003.7(1):p40-48.
    [34]R. Aggarwal, K. Verma, J. Miller, W. Milnor. Dynamic Web Service Composition in METEOR-S. Proceeding of the World Wide Web Conference, 2004.
    [35]刘必欣.动态Web服务组合关键技术研究.博士学位论文,国防科技大学,2005.
    [36]翟岩龙.开放网络环境中动态自适应服务组合技术研究.博士学位论文,北京理工大学,2009.
    [37]M. O'Neill, Web services security: McGraw-Hill Osborne Media,2003.
    [38]XML Encryption Syntax and Processing:http://www.w3.org/TR/xmlenc-core/
    [39]XML Signature Syntax and Processing:http://www.w3.org/TR/xmldsig-core/
    [40]OASIS, Security Assertion Markup Language (SAML) http://saml.xml.org/about-saml.
    [41]吴敏.Web Services访问控制机制及其整合研究.博士学位论文,东华大学,2006.
    [42]DAMIANI E, VIMERCATI S, PARABOSCHI S. et al. Fine grained access control for SOAP e-services.10th Int. Conference on World Wide Web (WWW), 2001:504-513.
    [43]R Wonohoesodo, Z Tari. A role based access control for Web services. IEEE International Conference on Services Computing,2004:49-56.
    [44]J Fischer, R Majumadar. A Theory of Role Composition. IEEE International Conference on Web Services,2008:320-328.
    [45]许峰,赖海光,黄皓,等.面向服务的角色访问控制技术研究.计算机学报,2005(28):686-693.
    [46]E. Yuan, J. Tong. Attributed based access control (ABAC) for Web services. Proceedings of IEEE International Conference on Web Services 2005.
    [47]H. Shen, F. Hong. An attribute-based access control model for web services. Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06) 2006.
    [48]R. Bhatti, E. Bertino, A. Ghafoor. A Trust-Based Context-Aware Access Control Model for Web-Services. IEEE International Conference on Web Services (ICWS'04).2004:184-192.
    [49]M. Mecella, M. Ouzzani, F. Paci, E. Bertino. Access control enforcement for conversation-based web services. Proceedings of the 15th international conference on World Wide Web(WWW '06),2006:257-266.
    [50]M Srivatsa, A Iyengar, T Mikalsen et al. An Access Control System for Web Service Compositions. Proceeding of IEEE International Conference on Web Services.2007
    [51]H. Sun, W. Zhao, J. Yang. SOAC:A Conceptual Model for Managing Service-Oriented Authorization. Proceeding of IEEE International Conference on Services Computing,2010:546-553.
    [52]T. Suzumura, T. Takase, M. Tatsubori. Optimizing Web services performance by differential deserialization. In Proceeding of the IEEE International Conference on Web Services.2005,185-194
    [53]Ericsson, M.2007. The Effects of XML Compression on SOAP Performance. Proceeding of 16th International Conference of World Wide Web,2007 10(3): 279-307.
    [54]李磊,牛春雷,陈宁江,魏峻.一种高效的Web服务性能优化策略.计算机研究与发展,200744(7):1191-1198.
    [55]Yutu Liu, Anne H. H. Ngu, Liangzhao Zeng. QoS computation and policing in dynamic web service selection. WWW (Alternate Track Papers & Posters) 2004: 66-73.
    [56]Daniel A. Menasce. QoS Issues in Web Services. IEEE Internet Computing, 2002,6(6):72-75
    [57]Liangzhao Zeng, Boualem Benatallah, Anne H. H. et, al:QoS-Aware Middleware for Web Services Composition. IEEE Transactions on Software Engineering,2004 30(5):311-327.
    [58]M C. Jaeger, G Rojec-Goldmann, G Muhl:QoS Aggregation for Web Service Composition using Workflow Patterns. International IEEE Enterprise Distributed Object Computing Conference (EDOC'04) 2004:149-159
    [59]J Cardoso, A P. Sheth, J. A. Miller, et al. Quality of service for workflows and web service processes. Journal of WebSemantics,2004,1(3):281-308.
    [60]Pinedof. Scheduling: Theory, Algorithms, and Systems, second edition. Prentice Hall,2001
    [61]Danilo Ardagna, Barbara Pernici. Adaptive Service Composition in Flexible Processes. IEEE Transactions on Software Engineering,2007,33(6):369-384.
    [62]F Rosenberg, P Celikovic, A Michlmayr,et al. An End-to-End Approach for QoS-Aware ServiceComposition. IEEE International Enterprise Distributed Object Computing Conference (EDOC'09),2009:151-160
    [63]T. Yu, Y. Zhang, K. J. Lin, Efficient algorithms for Web services selection with end-to-end QoS constraints. ACM Transactions on the Web (TWEB),2007.
    [64]Gu X, Nahrstedt K, Chang RN, Ward C. QoS-Assured service composition in managed service overlay networks. In: Proc. of the 23rd Int'l Conf. on Distributed Computing Systems (ICDCS 2003).2003:194-203.
    [65]Raman B, Katz RH. Load balancing and stability issues in algorithms for service composition. In:Proc. of the 22nd Annual Joint Conf. of the IEEE Computer and Communications Societies (INFOCOM 2003),2003:1477-1487.
    [66]李文中,郭胜,许平,等.服务组合中一种自适应的负载均衡算法.软件学报,2006,17(5):1068-1077
    [67]Chandy KM, Misra J. Distributed computation on graphs:Shortest path algorithms. Communications of the ACM,1982,25(11):833-837.
    [68]J. M. Jaffe, Algorithms for finding paths with multiple constraints, Networks, 1984 (14):95-116
    [69]M. Jain, P. Sharma, S. Banerjee. QoS-guaranteed path selection algorithm for service composition. Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, 2008.
    [70]W. Binder, I. Constantinescu, B. Faltings. Decentralized orchestration of compositeweb services. IEEE International Conference on Web Services,2006
    [71]S. Mitra, R. Kumar, S. Basu. Optimum decentralized choreography for web services composition. IEEE International Conference on Services Computing, 2008:395-402.
    [72]S. Mitra, R. Kumar, S. Basu. A framework for optimal decentralized service-choreography. IEEE International Conference on Web Services.2009: 493-500.
    [73]Yanlong Zhai, Hongyi Su, Shouyi Zhan. A Data Flow Optimization basedapproach for BPEL Processes Partition. IEEE International Conference on e-BusinessEngineering,2007.
    [74]A. Aho, R. Sethi, J. Ullman. Compilers:principles, techniques, and tools. Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA,1986
    [75]R. Khalaf, F. Leymann. E role-based decomposition of business processes using BPEL. IEEE International Conference on Web Services,2006.
    [76]邓水光,李莹,吴健等.Web服务行为兼容性的判定与计算.软件学报,2007,18(12):3001-3014
    [77]Murata T. Petri nets:Properties, analysis and applications. Proceedings of the IEEE,1989,77(4):541-580.
    [78]L. Bordeaux, G. Salaun. Using process algebra for Web services:Early results and perspectives. Technologies for E-Services,2005:54-68.
    [79]Chang S H, Chua F F, Kim S D. An Approach for Verification in Service-Oriented Computing:IEEE Congress on Services 2008-Part Ⅰ,2008.
    [80]Brogi A, Canal C, Pimentel E, et al. Formalizing Web Service Choreographies. Electronic Notes in Theoretical Computer Science,2004, (105):73-94.
    [81]刘方方史玉良张亮施伯乐,基于进程代数的Web服务合成的替换分析.计算机学报,2007(11),2033-2039.
    [82]T. Bultan, X. Fu, R. Hull, J. Su. Conversation Specification: A New Approach to Design and Analysis of E-service Composition. Proceedings of WWW,2003.
    [83]X. Fu, T. Bultan, J. Su. Analysis of Interacting BPEL Web Services. Proceedings of the 13thconference on World Wide Web,2004:621-630.
    [84]X. Fu. Formal Specification and Verification of Asynchronously Communicating Web Services. University of California,2004.
    [85]Hamadi R, Benatallah B. A Petri net-based model for web service composition: Proceedings of the 14th Australasian database conference 2003.
    [86]W. M. P. Van Der Aalst, M. Dumas, Ter Hofstede. Web service composition languages:old wine in new bottles? Proceedings of 29th Euromicro Conference, 2003.
    [87]W. M. P. Van Der Aalst. Verification of workflow nets. Application and Theory of Petri Nets,1997:407-426.
    [88]W. M. P. Van Der Aalst, K B Lassen. Translating workflow nets to BPEL. Citeseer,2005.
    [89]H M W Verbeek, Basten T, W M P. van der Aalst. Diagnosing workflow processes using Woflan. The Computer Journal,2001,44(4):246.
    [90]Martens A. On compatibility of web services. Petri Net Newsletter,2003, 65:12-20.
    [91]郭玉彬,杜玉越,奚建清.Web服务组合的有色网模型及运算性质.计算机学报,2006,29(007):1067-1075.
    [92]李喜彤,范玉顺.Web服务过程建模及其逻辑正确性验证.计算机集成制造系统,2008,14(4):675-682.
    [93]李喜彤,范玉顺.Web服务流程相容性和相似性分析.计算机学报,2009,32(12):2429-2437.
    [94]W. M. P. Van der Aalst. Petri-net-based Workflow Management Software. In A. Sheth, editor, Proceedings of the NFS Workshop on Workflow and Process Automation in Information Systems, Athens, Geogia, May 1996,114-118
    [95]袁崇义.Petri网原理.电子工业出版社,1998.
    [96]N Trcka, W. M. P. van der Aalst, N Sidorova. Data-flow anti-patterns: Discovering data-flow errors in workflows. Advanced Information Systems Engineering,2009
    [97]W.M.P van der Aalst. Workflow verification: Finding control-flow errors using petri-net-based techniques. Business Process Management.2000:19-128.
    [98]J. Pathak, S. Basu, V. Honavar. On context-specific substitutability of web services. IEEE International Conference on Web Services (ICWS 2007),2007: 192-199
    [99]W. M. P. Van der Aalst, de Medeiros A, Weijters A. Process equivalence: Comparing two process models based on observed behavior. Business Process Management,2006:129-144.
    [100]胡昊,殷琴,吕建.虚拟计算环境中服务行为与质量的一致性.软件学报,2007,18(8):1943-1957.
    [101]P. Samarati, S. de Vimercati, Access control: Policies, models, and mechanisms, Foundations of Security Analysis and Design,2001:137-196.
    [102]R.S.Sandhu, P.Samarati. Access Control-Principles and Practice. IEEE Communication.1994(32):40-48.
    [103]R S Sandhu, E Coyne, H Feinstein, et al, Role-based access control models. IEEE Computer,1996,29(2):38-47.
    [104]D. F. Ferraiolo, D. R. Kuhn, R. Chandramouli, J. Reynaldo, C. CISM, Role-based access control (RBAC), Procceedings of Feaures and Motivations 11 th Annual Computer Security Appilcations,2001.
    [105]BEEK M, BUCCHIARONE A, GNESI S. Web Service Composition Approaches:From Industrial Standards to Formal Methods. Proceedings of the Second International Conference on Internet and Web Applications and Services 2007:15-21.
    [106]王雅哲,冯登国,域间授权互操作研究综述.计算机研究与发展,2010,47(10):1673-1689.
    [107]D. Jonscher, K. R. Dittrich, An approach for building secure database federations, in proceedings of the International conference on Very Large Databases,1994.
    [108]L. Gong, X. Qian, Computational issues in secure interoperation. IEEE Transactions on Software Engineering,1996(22):43-52.
    [109]B.D. Joshi, R Bhatti, E Bertino, et al. Access-control language for multi-domain environments. IEEE Internet Computing,2004,8(6):40-50
    [110]Zhang Y, Joshi J. A request-driven secure interoperation framework in loosely-coupled multi-domain environments employing RBAC policies. IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing.2007:25-32.
    [111]HU Jin-wei, Li Rui-xuan, Lu Zheng-ding, Establishing RBAC-based secure interoperability in decentralized multi-domain environments. Proceedings of the 10th international conference on Information security and cryptology, 2007:49-63
    [112]HUANG Chao, SUN Jian-ling, WANG Xin-yu, et al. Minimal role mining method for Web service composition. Journal of Zhejiang University-Science C, 2010(11):28-339.
    [113]DU S, JOSHI J, Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy. Proceedings of the 17th ACM symposium on Access control models and technologies,2006:228-236.
    [114]OASIS, Security Assertion Markup Language (SAML) http://saml.xml.org/about-saml.
    [115]SALTZER J, SCHROEDER M, The protection of information in computer systems. Proceedings of the IEEE,1975(63):1278-1308,.
    [116]Moses T, eXtensible Access Control Markup Language (XACML) V2.0 http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdf.
    [117]Mullaley, M. The Impact of SOA and Web Services on Wide-Area Networks. Available From:http://au.sys-con.com/node/164551,2005.
    [118]K. Yin, B. Zhou, S. Zhang, et al. Optimizing services composition in multi-network environment. Information Technology Journal,2010(9):399-411.
    [119]Xitong Kang, Xudong Liu, Hailong Sun, et al. Improving Performance for Decentralized Execution of Composite Web Services. IEEE 6th World Congress on Services,2010.
    [120]Chafle, G., Chandra, S., Karnik, N., Mann, V., and Nanda, M.G. Improving Performance of Composite Web Services Over a Wide Area Network. Proceeding of 2007 IEEE Congress on Services,2007:292-299
    [121]陈香兰,李曦,龚育昌.服务组合中一种静态基础服务部署研究.小型微型计算机系统,2008(4).
    [122]Renders, J.M., Flasse, S.P. Hybrid methods using genetic algorithms for global optimization. IEEE Transactions on Systems, Man, and Cybernetics, Part B,1996,26(2):243-258.
    [123]Hu J J., Tang C J., Duan L., Zuo J., Peng Jing, Yuan C A. The strategy for diversifying initial population of gene expression programming. CHINESE JOURNAL OF COMPUTERS,2007,30(2):305-310.
    [124]Cui XX, Lin C. Multicast QoS routing optimization based multi-objective genetic algorithm. Journal of Computer Research and Development,2004,41(7): 1144-1150
    [125]SHAFIQ B, JOSHI J, BERTINO E, et al. Secure interoperation in a multi domain environment employing RBAC policies. IEEE Transactions on Knowledge and Data Engineering,2005,17(11):1557-1577.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700