用户名: 密码: 验证码:
基于Web服务的虚拟采办若干关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
虚拟采办,即基于仿真的采办(SBA),是一种新型防务采办方法,主要思想是将建模与仿真(M&S)技术协同地应用到采办过程的各阶段中,从而使大型复杂产品的采办“更好、更快、更省”。实施虚拟采办的前提条件之一就是要实现采办的信息化,通过软件基础设施的强健支持达到信息的及时按需获取、M&S工具的互操作、采办参与人员的协同工作等目的,然而目前还缺少这样的软件基础设施。Web服务是一种面向服务的新型分布式计算技术,具有模块化、松耦合、平台无关等特性,在实现广域、跨异构平台的软件系统方面具有优势。在省部级预先研究项目的资助下,本文提出了一个基于Web服务的虚拟采办软件系统的体系结构,研究了其中的服务质量动态预测、Web服务系统的访问控制等关键技术,并在虚拟采办软件系统中对这些关键技术进行了实现和应用。论文的主要研究工作包括:
     首先,针对国内大多数复杂产品的采办流程仍然为串行瀑布式的问题,借鉴当前国际上有关虚拟采办的新思路,设计了一种循环改善、螺旋式上升的虚拟采办流程;另外结合该流程,提出了一个基于Web服务的虚拟采办软件系统的体系结构,并从Web服务这一分布式计算技术方面分析了实现该系统所需要研究的主要关键技术,包括Web服务组合、Web服务质量(QoS)、Web服务的系统安全等。
     其次,在Web服务QoS的研究方面,由于影响Web服务QoS的因素很多且动态变化,如何能动态及时地获取QoS是基于QoS进行其他研究的前提,因此论文提出了一种反馈式的Web服务QoS动态获取方法(FQCM)。该方法将UDDI兼容地扩展为UDDI-Q,增加了一些与QoS相关的内部模块和对外接口,使之具有收集服务请求者所反馈的服务质量信息的能力。文中还给出了FQCM的详细实现途径,例如UDDI-Q的内部结构、数据模型、函数接口等。
     Web服务QoS预测能够结合已采集到的QoS数据来增强评估质量,而目前国内在Web服务QoS动态预测方面的研究还处于起步阶段。论文通过引入贝叶斯动态模型提出了一种Web服务QoS动态预测方法,并给出了采用常均值模型进行预测的步骤,还深入研究了预测过程中预测参数的确定、非均匀时间间隔的处理、主动干预等问题。在基于Web服务构建的实际系统中,对该QoS预测方法进行了参数选取变化、主动干预等情形下的有效性实验。
     再次,在Web服务的系统安全和访问控制方面,采用Web服务实现的虚拟采办软件系统面临着功能和资源的松耦合分离,传统的访问控制模型难以动态、异步地应对这种情况。论文在深入分析了当前Web服务安全需求和安全技术的基础上,提出了一种基于属性的双重访问控制模型(ABDAC),从而实现系统功能和资源的双重访问控制。ABDAC通过证书代理实现广域范围内的用户身份鉴别,文中详细研究了功能端和资源的访问控制授权策略、属性-权限映射算法和授权决定算法,并分析了ABDAC的安全性。采用XACML语言实现了ABDAC模型的应用实例,并测试了其对系统性能的影响。
     最后,论文采用扩展QoS和安全的Web服务体系结构,设计并实现了基于Web服务虚拟采办软件系统的两个重要子系统——综合集成研讨厅和产品数据管理系统。这两个系统都得到了实际应用,表明上述研究工作是有效的。
Simulation Based Acquisition (SBA) is a new theory and method of defense equipments acquisition. By apply modeling and simulation (M&S) technologies to all stages of the acquisition process collaboratively, SBA can make the acquisition of complex products and equipment better, faster and cheaper. One of the prerequisites to implement SBA is the support of a robust information infrastructure, which should achieve on-demand access to information in a timely manner, interoperability of M&S tools and resources, collaborative working of participate, and so on. However, there is a lack of such information infrastructure currently. Fortunately, web service is a service-oriented distributed computing technology, with features of modular, loosely coupled and platform-independent. And it has advantages in the realization of wide-area, heterogeneous cross-platform software system, which meet demand of information infrastructure for SBA. In this dissertation, web services are utilized to construct architecture of SBA software support system, and the dissertation focuses on some key technologies, such as dynamic forecast of Quality of Service (QoS) and double access control for web service.
     Firstly, as domestic acquisition process was serial-style, a spiral-style process for SBA of complex product is designed, which adopts concurrent engineering. Furthermore, the dissertation proposes a web service based software architecture for SBA, and then discuss some major research thrusts: quality of web service, web service based system security, etc.
     The QoS of Web service is affected by many factors and they change frequently, and it is a challenge to collecting QoS timely for other QoS-based researches. Thus, it presents a feedback-based web service QoS dynamic collection method (FQCM). FQCM extends UDDI to UDDI-Q, which has capability of collecting and storing QoS information from service requesters. Without changing UDDI, UDDI-Q appends some QoS-related functions and interfaces, and it is compatible with the classic web service architecture.
     Web service QoS forecast can be combined with collected data to improve QoS assessment quality and to reflect the trends of web service QoS timely, but research of Web service QoS forecast in domestic is still at an initial stage. By introducing bayesian dynamic model, the dissertation proposes a novel QoS forecast method of web service and describe the forecast steps of dynamic linear model. The dissertation also discusses some problems of QoS forecast, such as determination of parameters, solution of non-uniform time interval, active intervention. The results of experiment in running system indicate that the forecast method is valid.
     Because the functions and resources of web service based system are separated and loosely coupled, the traditional access control models are difficult to deal with such situation. In this dissertation, after analyzing security requirements of web service based system, an attributed based double access control model (ABDAC) is presented to achieve access control of functions and resources in the web service based system. The dissertation proposes access control policy and attributes-privileges mapping algorithms of ABDAC, and discusses consistency and integrity of ABDAC. Moreover, XACMLis used to realize an application of ABDAC and test the impact to system performance.
     At last, the dissertation introduces web service architecture with QoS and security extended, and then we implement two sub-systems of software infrastructure to SBA: Hall for Workshop of Metasynthetic Engineering and Product Data Management System. These two sub-systems have been applied in projects of complex product acquisition.
引文
[1]Joint Simulation Based Acquisition Task Force.A Road Map for Simulation Based Acquisition[OL].(1998-12-04)[2003-4-6].http://www.msosa.dmso.mil/sba_documents/.
    [2]John F.Keane,Robert R.Lutz,Stephen E.Myers,et al.An Architecture for Simulation Based Acquisition[J].JOHNS HOPKINS APL TECHNICAL DIGEST.2000,21(3).
    [3]李伯虎,柴旭东,毛嫒.现代仿真技术发展中的两个热点---ADS,SBA[J].系统仿真学报.2001,13(1):101-105.
    [4]周振浩,曹建国,王行仁.基于仿真的采办(SBA)研究与应用对策[J].系统仿真学报.2003,15(9):1261-1264。
    [5]李伯虎,柴旭东,朱文海等.SBA支撑环境技术的研究[J]。系统仿真学报。2004,16(3):181-185.
    [6]Navy Acquisition Reform Office.Simulation Base Acquisition(SBA) Status and International Implications[R].2000.http://www.msiac.dmso.mil/sba_documents/SBA%20status%20&%20internat'l%20imp.pdf,(2000-9-1).
    [7]Michael Vo R.Johnson,Mark F.Mckeon,Terence R.Szanto.Simulation Based Acquisition:A New Approach[R].DEFENSE SYSTEMS MANAGEMENT COLLEGE,1998,134.http://wwwodau.mil/pubs/mfrpts/pdf/sba.pdf,(1998-12-15).
    [8]杨明,张冰,王子才。建模与仿真技术发展趋势分析[J]系统仿真学报.2004,16(9):1901-1904.
    [9]李伯虎,柴旭东,朱文海等.现代建模与仿真技术发展中的几个焦点[J].系统仿真学报.2004,16(9):1871-1878.
    [10]ADPA.Study on the Application of Modeling and Simulation to the Acquisition of Major Weapon Systems[R].Washington D.C.American Defense Preparedness Association,1996.
    [11]James E.Coolahan,John F.Keane,Charles Ho Sinexo SBA Collaborative Environment Concepts for Mission and Product Areas[R].2000.http://ms.ie.org/SIW_LOG/00S/00S-SIW-113.doc.
    [12]John F.Keane,Robert R.Lutz,Stephen E.Myers,et al.An Architecture for Simulation Based Acquisition[J].Johns Hopkins APL Technical Digest.2000,21(3):348-358.
    [13]Bipin Chadha,John Welsh.Next-Generation Architecture to Support Simulation-Based Acquisition[C].In:American Society of Naval Engineers(ASNE) Day 2000.2000.
    [14]Bipin Chadha,John Welsh.Architecture Concepts for Simulation-based Acquisition of Complex Systems[C].In:Summer Computer Simulation Conference.2000.
    [15]Joe Holle.The New SBA - Revisited[OL].(2004-02-24)[2005-6-14].http://www.msiac.dmso.mil/sba/.
    [16]Michael Papay,Michael Aldinger.A Distributed Systems Engineering Environment for Simulation Based Acquisition[C].In:Interservice/lndustry Training,Simulation,and Education Conference(I/ITSEC).2004.
    [17]Michael S.Anderson,Puja Gupta,Michelle W.Chen.Simulation based acquisition for the rest of us[C].In:IEEE Aerospace Conference.2006.
    [18]NASA Simulation Based Acquisition Support Office.Simulation Based Acquisition(SBA)Implementation Strategy[R].2005.http://www.ndia.org/Content/ContentGroups/Divisions1/Systems_Engineering/PDFs18/Modelin g_Committee_PDFs/SBAStrategy_Final_w_signatures.pdf.
    [19]Lieutenant Commander 'Monty' Long Royal Navy.SeBA - The UK flavour of SBA/SMART[OL].(2001-10-08)[2005-11-13].http://www.sisostds.org/webletter/siso/iss_78/art_406.htm.
    [20]William F.Waite,David H.Smith.SBA/SeBA - Implementing the Inevitable[C].In:Huntsville Simulation Conference.Huntsville,Alabama,2002.
    [21]Henk Janssen,Jan Klomp,Jim Poelstra.Simulation Based Acquisition - The European Way[C].In:The Interservice/Industry Training,Simulation & Education Conference.2008.
    [22]Song hui PARK.Simulation Based Acquisition Korea[C].In:DAPA's 1st International Acquisition Conference.Seoul,2007:215-230.
    [23]段红,黄柯棣.基于仿真的采办体系结构[J].系统仿真学报.2001,13(2):247-250。
    [24]段红,黄柯棣,李革.基于仿真的采办协同环境研究[J].系统仿真学报.2002,14(2):149-152.
    [25]张建明,吴慧中,李薇.基于仿真采办的体系结构研究[J].南京理工大学学报.2002,26(3):299-302.
    [26]韩祥兰,吴慧中,张建明 等.武器装备虚拟采办总体框架研究[J].系统仿真学报.2004,16(8):1771-1778.
    [27]张建明,吴慧中,韩祥兰.面向复杂产品的SBA系统体系结构研究[J].计算机辅助设计与图形学学报.2004,16(2):197-200。
    [28]卿杜政,熊新平,李伯虎 等.仿真网格的初步实践[J].现代防御技术.2004,32(4):67-72.
    [29]燕雪峰,李凤霞,战守义等.基于网格的虚拟样机仿真关键技术[J].北京理工大学学报.2005,25(4):319-323.
    [30]王江云,林新,王行仁.基于HLA的SBA协同环境研究[J].计算机仿真.2001,18(5):7-10.
    [31]王江云,彭晓源,王行仁.基于网格技术的先进分布仿真协同环境[J].计算机工程.2004, 30(8):98-99.
    [32]李妮,彭晓源,徐丽娟 等.基于网格的HLA/RTI仿真系统互联与资源共享[J].系统仿真学报.2006,18(S2):304-307.
    [33]Mike P.Papazoglou.Service-Oriented Computing:Concepts,Characteristics and Directions[C].In:Fourth International Conference on Web Information Systems Engineering.2003:3.
    [34]Mike P.Papazoglou,D.Georgakopoulos.Service-Oriented Computing[J].Communications of the ACM.2003,46(10):25-28.
    [35]Munindar P.Singh,Michael N.Huhns.Service-Oriented Computing:Semantics,Processes,Agents[M].John Wiley and Sons,2005.
    [36]Mark Endrei,Jenny Ang,Ali Arsanjani,et al.Patterns:Service-Oriented Architecture and Web Services[M].International Business Machines Corporation,2004.
    [37]Heather Kreger.Web Services Conceptual Architecture[OL].(2001-05-01)[2005-9-23].http://www.ibm.com/developerworks/cn/webservices/ws-wsca/part1/.
    [38]Microsoft Corporation..NET术语表[OL].[2008-5-18].http://www.microsoft.com/china/net/glossary.mspx.
    [39]Inc Sun Microsystemso Java Web Service at a Glance[OL].(2008-05-02)[2008-5-17].http://java.sun.com/webservices/.
    [40]David Booth,Hugo Haas,Francis McCabe,et al.Web Services Architecture[OL].(2004-02-11)[2004-7-12].http://www.w3.org/TR/2004/NOTE-ws-arch-20040211/.
    [41]Thomas Erl.Service-Oriented Architecture:Concepts,Technology,and Design[M].Prentice Hall PTR,2005.792.
    [42]Web Service Description Language[OL].http://www.w3.org/TR/wsdl/.
    [43]Simple Object Access Protocol[OL].http://www.w3.org/TR/soap/.
    [44]Universal Description Discovery and Integration[OL].http://www.uddi.org/.
    [45]Karl Czajkowskio WSRF-The WS-Resource Framework[OL].(2004-01-20)[2006-6-11].http://www.globus.org/wsrf/.
    [46]IBM,Microsoft,Web Services Flow Language[OL].(2001-06-06)[2006-6-20].http://xml.coverpages.org/wsfl.html.
    [47]Satish Thatte.XLANG:Web Services for Business Process Design[OL].(2001-06-19)[2005-4-16].http://www.gotdotnet.com/team/xml_wsspecs/xlang-c/default.htm.
    [48]田松,张凤鸣,苏恩泽.SBA武器系统演化开发过程的数学分析框架[J].装备指挥技术学院学报.2004,15(3):9-13.
    [49]冯珊,郭四海.面向虚拟采办的智能决策支持系统概念框架[J].智能系统学报.2008,3(3):201-210.
    [50]韩祥兰.SBA系统的综合集成研讨厅研究与应用[D].南京:南京理工大学,博士,2005.
    [51]Defense Acquisition University.DAU ATL Management Framework[OL].(2005-8)[2005-11-3].http://www.dau.mil/pubs/IDA/IDA_04.aspx.
    [52]Jim Hollenbach.Improving M&S Support to Acquisition:A Progress Report on Development of the Acquisition M&S Master Plan[C].In:8th Annual Systems Engineering Conference.San Diego,CA,2005.
    [53]Robert I.Winner,James P.Pennell,Harold E.Bertrand,et al.The role of Concurrent Engineering in Weapons Systems Acquisition[R].Alexandria,VA:Institute for Defense Analyses,1988,Ad-A203/615,197.http://stinet.dtic.mil/oai/oai?verb=getRecord&metadataPrefix=html&identifier=ADA203615,(1988-12).
    [54]韩祥兰,吴慧中,陈圣磊 等.武器装备论证综合集成研讨厅系统[J].南京理工大学学报.2005,29(4):446-450.
    [55]BEA,IBM,Microsoft.Business Process Execution Language for Web Services[OL].(2003-04-16)[2006-6-20].http://xml.coverpages.org/bpel4ws.html.
    [56]Vladimir Tosic,David Mennie,Bernard Pagurek.On dynamic service composition and its applicability to E-business software systems[C].In:Workshop on Object-Oriented Business Solutions at ECOOP 2001.Budapest,Hungary,2001:95-108.
    [57]Daniela Florescu,Andreas Grunhagen,Donald Kossmann.XL:An XML programming language for Web service specification and composition[C].In:World Wide Web 2002.Honolulu,Hawaii,2002:65-76.
    [58]Monika Solanki,Antonio Cau,Hussein Zedan.ASDL:A Wide Spectrum Language For Designing Web Services[C].In:World Wide Web Conference 2006.Edinburgh,Scotland,2006.
    [59]UlrichK(u|¨)ster,Birgitta Konig-Ries,Micro Stem,et al.DIANE-An Integrated Approach to Automated Service Discovery,Matchmaking and Composition[C].In:World Wide Web Conference 2007.Banff,Alberta,Canada,2007:1033-1042.
    [60]岳昆,王晓玲,周傲英.Web服务核心支撑技术:研究综述[J].软件学报.2004,15(3):428-442.
    [61]Daniel A.Menasce.QoS Issues in Web Services[J].Internet Computing,IEEE.2002,6(6):72-75.
    [62]Daniel A.Menasce.Composing Web Services:A QoS View[J].Internet Computing,IEEE.2004,8(6):88-90.
    [63]Suihui Zhu,Zhihui Du,Yinong Chen,et al.Qos Enhancement for PDES Grid Based on Time Series Prediction[C].In:The sixth International Conference on Grid and Cooperative Computing (GCC2007).2007:423-429.
    [64]Lingshuang Shao,Jing Zhang,Yong Wei,et al.Personalized QoS Prediction forWeb Services via Collaborative Filtering[C].In:IEEE International Conference on Web Services 2007(ICWS 2007).2007:439-446.
    [65]张晓杰,孟庆春,曲卫芬.基于蚁群优化算法的服务网格的作业调度[J].计算机工程.2006,32(8):216-218.
    [66]IEEE Standard for Modeling and Simulation(M&S) High Level Architecture(HLA)-Framework and Rules[S],IEEE Std 1516-2000,IEEE Computer Society,2000.
    [67]IEEE Standard for Modeling and Simulation(M&S) High Level Architecture(HLA)-Federate Interface Specification[S],IEEE Std 1516.1-2000,IEEE Computer Society,2000.
    [68]IEEE standard for modeling and simulation(M&S) high level architecture(HLA)-object model template(OMT) specification[S],IEEE Std 1516.2-2000,IEEE Computer Society,2000.
    [69]Don Brutzman,Michael Zyda,J.Mark Pullen,et al.Extensible Modeling and Simulation Framework(XMSF):Challenges for Web-Based Modeling and Simulation[OL].(2002-10-22)https://www.movesinstitute.org/xmsf/XmsfWorkshopSymposiumReportOctober2002.pdf.
    [70]李伯虎,柴旭东,朱文海 等.现代建模与仿真技术发展中的几个焦点[J].系统仿真学报.2004,16(9):1871-1878.
    [71]Katherine L.Morse,Ryan Brunton,David Drake.Web Enabling an RTI - an XMSF profile[C].In:Proceedings of the IEEE 2003 European Simulation Interoperability Workshop.2003:Number 03E-SIW-046.
    [72]Yong Xie,Yong Meng Teo,Wentong Cai,et al.A distributed simulation backbone for executing HLA-based simulation over the Internet[C].In:Workshop on Grid Computing & Applications of the 2nd International Conference on Scientific and Engineering Computation.Singapore,2004:96-103.
    [73]Yong Xie,Yong Meng Teo,Wentong Cai,et al.Service Provisioning for HLA-based Distributed Simulation on the Grid[C].In:the Workshop on Principles of Advanced and Distributed Simulation.Monterey,USA,2005:282-291.
    [74]徐丽娟,彭晓源.基于网格的RTI资源管理系统[J].系统仿真学报.2005,17(8):2012-2014.
    [75]Katarzyna Zajac,Marian Bubak,Maciej Malawski,et al.Towards a Grid Management System for HLA-Based Interactive Simulations[C].In:the Seventh IEEE International Symposium on Distributed Simulation and Real-Time Applications.Delft,Netherlands,2003:4-11.
    [76]吴泽彬.基于Web服务的分布式仿真关键技术研究[D].南京:南京理工大学,博士,2007.
    [77]吴泽彬,吴慧中,李蔚清.HLA分布式仿真扩展研究[J].中国工程科学.2008,10(7):141-146.
    [78]Terms and definitions related to quality of service and network performance including dependability[R].Geneva:CCITT/ITU-T,1994,Recommendation E.800. http://www.itu.int/rec/T-REC-E.800-199408-I/en,(1994-8).
    [79]Liangzhao Zeng,Boualem Benatallah,Marlon Dumas,et al.Quality Driven Web Services Composition[C].In:World Wide Web Conference 2003.2003.
    [80]Yutu Liu,Anne H.H,Liangzhao Zeng.QoS Computation and Policing in Dynamic Web Service Selection[C].In:World Wide Web Conference 2004.2004.
    [81]杨胜文,史美林.一种支持QoS约束的Web服务发现模型[J].计算机学报.2005,28(4):589-594.
    [82]代钰,杨雷,张斌等.支持组合服务选取的QoS模型及优化求解[J].计算机学报.2006,29(7):1067-1078.
    [83]郭得科,任彦,陈洪辉 等.一种QoS有保障的Web服务分布式发现模型[J].软件学报.2006,17(11):2324-2334.
    [84]Shuping Ran.A Model for Web Services Discovery With QoS[J].ACM SIGecom Exchanges.2003,4(1):1-10.
    [85]Jin Xiao,Raouf Boutaba.QoS-Aware Service Composition and Adaptation in Autonomic Communication[J].IEEE Journal on Selected Areas in Communications.2005,23(12):2344-2360.
    [86]Liangzhao Zeng,Boualem Benatallah,Anne H.H,et al.QoS-Aware Middleware for Web Service Composition[J].IEEE Transactions on Software Engineering.2004,30(5):311-327.
    [87]Ahlem Ben Hassine,Shigeo Matsubara,Toru Ishida.A Constraint-based Approach to Horizontal Web Service Composition[C].In:International Semantic Web Conference 2006.2006:130-143.
    [88]刘书雷,刘云翔,张帆 等.一种服务聚合中QoS全局最优服务动态选择算法[J].软件学报.2007,18(3):646-656.
    [89]廖渊,唐磊,李明树.一种基于QoS的服务构件组合方法[J].计算机学报.2005,28(4):627-634.
    [90]张成文,苏森,陈俊亮.基于遗传算法的QoS感知的Web服务选择[J].计算机学报.2006,29(7):1029-1037.
    [91]张伟哲,方滨兴,胡铭曾 等.基于信任QoS增强的网格服务调度算法[J].计算机学报.2006,29(7):1057-1066.
    [92]林剑柠,吴慧中.一种基于QoS约束的信任模型研究[J].信息与控制.2007,36(4):427-433.
    [93]胡业发,陶飞,周祖德.制造网格资源服务Trust-QoS评估及其应用[J].机械工程学报.2007,43(12):203-211.
    [94]刘克非,王红,许作萍.一种基于服务质量预测的Web服务选择方法[J].计算机技术与发展.2007,17(8):103-105.
    [95]李海华,杜小勇,田萱.一种能力属性增强的Web服务信任评估模型[J].计算机学报.2008, 31(8):1471-1477.
    [96]李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报.2007,18(6):1510-1521.
    [97]马宝林,孙济洲,于策 等.基于信任模型的网格安全机制[J].计算机工程.2007,33(10):123-125.
    [98]羌卫中,金海,石宣化 等.基于分布式信任管理机制的网格授权研究[J].华中科技大学学报(自然科学版).2005,33(12):115-117.
    [99]George Theodorakopoulos,John S.Baraso On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks[J],IEEE Journal on Selected Areas in Communications.2006,24(2):318-328.
    [100]常俊胜,王怀民,尹刚.DyTrust:一种P2P系统中基于时间帧的动态信任模型[J].计算机学报.2006,29(8):1301-1307.
    [101]李建欣,怀进鹏.COTN:基于契约的信任协商系统[J].计算机学报.2006,29(8):1290-1300.
    [102]李景涛,荆一楠,肖晓春 等.基于相似度加权推荐的P2P环境下的信任模型[J].软件学报.2007,18(1):157-167.
    [103]OASIS.UDDI Spec Technical Committee Draft[OL].(2004-10-19)http://uddi.org/pubs/uddi-v3.0.2-20041019.htm.
    [104]Apache Software Foundation.Apache jUDDI[OL].(2007-12-11) http://ws.apache.org/juddi/.
    [105]Joakim Recht,Rolf Njor Jensen,Jeppe Sommer.OpenUDDI[OL].(2008-10-08)[2008-10-19].http://openuddi.sourceforge.net/.
    [106]P.Jeff Harrison,Colin F.Stevens.Bayesian forecasting(with discussion)[J].Journal of the Royal Statistical Society Series B.1976(38):205-247.
    [107]West Mike,Harrison Jeff.Bayesian Forecasting and Dynamic Models[M],New York:Springer-Verlag New York Inc.,1989.
    [108]张孝令,刘福升,张承进等.贝叶斯动态模型及其预测[M].济南:山东科学技术出版社,1992.
    [109]刘福升,蒋金凤,张孝令.采样间隔非均匀情况下的线性增长模型及其贝叶斯预测[J].山东矿业学院学报.1996,15(4):79-87.
    [110]Information technology - Security techniques - Code of practice for information security management[S],ISO/IEC 17799:2005,International Organization for Standardization,2005.
    [111]The TLS Protocol[S],RFC2246,The Internet Engineering Task Force,1999.
    [112]Takeshi Imamura,Blair Dillaway,Ed Simon.XML Encryption Syntax and Processing[OL].(2002-12-10) http://www.w3.org/TR/2002/CR-xmlenc-core-20020304/.
    [113]Mark Bartel,John Boyer,Barb Fox,et al.XML-Signature Syntax and Processing[OL].(2002-02-12)http://www.w3.org/TR/2002/REC-xmldsig-core-20020212/.
    [114]Mark Bartel,John Boyer,Barb Fox,et al.XML-Signature Syntax and Processing(Second Edition)[OL].(2008-06-10)http://www.w3.org/TR/2008/REC-xmldsig-core-20080610/.
    [115]Warwick Ford,Phillip Hallam-Baker,Barbara Fox,et al.XML Key Management Specification (XKMS)[OL].(2001-03-30)[2007-8-30].http://www.w3.org/TR/2001/NOTE-xkms-20010330/.
    [116]Phillip Hallam-Baker,Shivaram H.Mysore.XML Key Management Specification(XKMS 2.0)[OL].(2005-06-28)[2007-8-30].http://www.w3.org/TR/2005/REC-xkms2-20050628/.
    [117]IBM,Microsoft.Security in a Web Services World:A Proposed Architecture and Roadmap[OL].(2002-04-07)[2007-8-23].
    [118]Scott Cantor,John Kemp,Rob Philpott,et al.Assertions and Protocols for the OASIS Security Assertion Markup Language[OL].(2005-03-15)[2007-9-3].http://www.oasis-open.org/committees/security/.
    [119]Moses Tim.OASIS eXtensible Access Control Markup Language[OL].(2005-02-01)[2007-8-24].http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=xacml.
    [120]Carlos Gutierrez,Eduardo Fernandez-Medina,Mario Piattini.Towards a Process for Web Services Security[J].Journal of Research and Practise in Information Technology.2006,38(1):57-68.
    [121]陈荦祺,陈克非.高性能可信Web Service研究[J].计算机工程.2006,32(17):227-229.
    [122]Ninghui Li.Delegation Logic:A Logic-based Approach to Distributed Authorization[D].New York:New York University,Ph.D,2000.
    [123]马天驰.网格环境下移动进程的安全性支持研究[D].杭州:浙江大学,博士,2004.
    [124]R.Housley,W.Ford,W.Polk,et al.Internet X.509 Public Key Infrastructure Certificate and CRL Profile[OL].(1999-1) http://www.ietf.org/rfc/rfc2459.txt.
    [125]Markus Lorch,Bob Cowles.Conceptual Grid Authorization Framework and Classification[OL].(2005-08-23) http://www.ogf.org/documents/GFD.38.pdf.
    [126]Trusted Computer System Evaluation Criteria[S],DoD 5200.28-STD,National Computer Security Center,U.S.Department of Defense,1985,
    [127]David Ferraiolo,Richard Kuhn.Role Based Access Control[C].In:15th National Computer Security Conference.1992.
    [128]Ravi S.Sandhu,Edward J.Coyne,Hal L.Feinstein,et al.Role-Based Access Control Models[J].IEEE Computer.1996,29(2):38-47.
    [129]David F.Ferraiolo,Ravi Sandhu,Serban Gavrila,et al.Proposed NIST Standard for Role-Based Access Control[J].ACM Transaction on Information and System Security.2001,4(3):224-274.
    [130]American national standard for information technology - role based access control[S],ANSI INCITS 359-2004,ANSI,2004.
    [131]Lingyu Wang,Duminda Wijesekera,Sushil Jajodia.A Logic-based Framework for Attribute based Access Control[C].In:ACM workshop on Formal methods in security engineering.ACM,2004:45-55.
    [132]Eric Yuan,Jin Tong.Attributed Based Access Control(ABAC) for Web Services[C].In:IEEE International Conference on Web Services.2005.
    [133]Jan Kolter,Rolf Schillinger,Gunther Pernul.A Privacy-enhanced Attribute-based Access Control System[C].In:the 21st Annual IFIP WG 11.3 Working Conference on Data and Application Security(DBSec 2007).Redondo Beach,CA,USA,2007:129-143.
    [134]Christian Emig,Frank Brandt,Sebastian Abeck,et al.An Access Control Metamodel for Web Service-Oriented Architecture[C].In:International Conference on Software Engineering Advances.Cap Esterel,French Riviera,France,2007:57.
    [135]David D.Clark,David R.Wilson.A Comparison of Commercial and Military Computer Security Policies[C].In:1987 IEEE Symposium on Security and Privacy.Los Alamitos,CA,1987:184-194.
    [136]Sun Microsystems.Sun's XACML Implementation[OL].(2006-06-21)[2007-9-12].http://sunxacml.sourceforge.net/.
    [137]Bill Baker,Jim Basney,Shiva Shankar Chetan,et al.MyProxy Credential Management Service[OL].(2007-04-13)[2007-5-23].http://grid.ncsa.uiuc.edu/myproxy/.
    [138]Diego Gonzalez,Ariel Neisen.XACML.NET Project[OL].(2005-03-21)[2007-10-12].http://sourceforge.net/projects/mvpos/.
    [139]钱学森,于景元,戴汝为.一个科学新领域--开放的复杂巨系统及其方法论[J].自然杂志.1990,13(1):3-10.
    [140]戴汝为.从定性到定量的综合集成技术[J].模式识别与人工智能.1991,4(1):5-10.
    [141]钱学森.再谈开放的复杂巨系统[J].模式识别与人工智能.1991,4(1):1-4。
    [142]王丹力,戴汝为.综合集成研讨厅体系中专家群体行为的规范[J].管理科学学报.2001,4(2):1-6.
    [143]戴汝为,李耀东.基于综合集成的研讨厅体系与系统复杂性[J].2004.2004,1(4):1-24.
    [144]王丹力,戴汝为.群体一致性及其在研讨厅中的应用[J].系统工程与电子技术.2001,23(7):33-37.
    [145]崔霞,戴汝为,李耀东.群体智慧在综合集成研讨厅体系中的涌现[J].系统仿真学报.2003,15(1):146-153.
    [146]谭俊峰,张朋柱,黄丽宁.综合集成研讨厅中的研讨信息组织模型[J].系统工程理论与实践.2005,25(1):86-92.
    [147]董玉成,徐寅峰,张桂清.群体思维收敛性定量验证[J].系统工程理论与实践.2006,26(3): 108-111.
    [148]操龙兵,戴汝为.基于Internet的综合集成研讨厅系统体系结构研究[J].计算机科学.2002,29(6):63-66.
    [149]李耀东,崔霞,戴汝为.综合集成研讨厅的理论框架、设计与实现[J].复杂系统与复杂性科学.2004,1(1):27-32.
    [150]操龙兵,戴汝为.综合集成研讨厅的软件体系结构[J].软件学报.2002,13(8):1430-1435.
    [151]Yaodong Li,Xia Cui,Ruwei Dai.MESSIA:Combining MESSAGE with GAIA[C].In:4th International Conference on Control and Automation.Montreal,Canada,2003:804-808.
    [152]韩祥兰,吴慧中,窦万春 等.面向复杂问题求解的综合集成型决策支持系统[J].计算机集成制造系统.2005,11(1):109-115.
    [153]张志强,张朋柱.面向复杂决策任务的综合集成决策研讨总体框架设计[J].系统工程理论与实践.2006,26(1):9-17.
    [154]Luis Ribeiro,Jose Barata,Pedro Mendes.MAS and SOA:Complementary Automation Paradigms[C].In:Eighth IFIP International Conference on Information Technology for Balanced Automation Systems.Porto,Portugal,2008:259-268.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700