用户名: 密码: 验证码:
服务网络中服务协同的可信机制与算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着Web服务技术的发展,单一功能的服务系统已难以支撑用户的复杂需求。因此,以网络化和集成化服务系统为手段来满足用户复杂需求的服务网络已成为当前研究所关注的焦点。然而,服务网络环境的开放性、服务资源快速演变的特性导致了服务网络环境中相互陌生的服务实体在协同过程中面临着“可信”问题。目前,服务协同场景下应用整体的可信问题已经成为制约服务网络良性发展的关键问题之一。
     针对上述问题,本文在分析服务网络中服务的可信协同所面临挑战的基础上,主要从服务本身的可信性以及服务系统的可靠、可用性两个角度出发,围绕单个服务的可信选取以及信任感知的Web服务组合优化两个方面展开探索和研究,主要工作和贡献包括:
     (1)提出服务化网络中服务协同的可信管理框架。多个服务在复杂协同过程中涉及到服务的选择、按需组合、资源优化以及服务的动态演化和流程重构。因此,考虑服务协同的可信问题需要顾及协同过程中的各个环节。针对这一问题,首先根据服务网络的特点,提出支持服务可信协同的三种基本机制:完善的服务信任评估机制、均衡的服务组合优化机制以及可靠的服务失效容错和流程重构机制;并立足与上述机制提出服务协同的可信管理框架,为开展可信服务协同的研究奠定基础。
     (2)提出基于社会网络的服务信任评估模型。服务网络中,参与协同的实体不可避免的要选择一些未知的服务进行交互,这时不同实体间共享的交互经验将是评估未知服务可信度的唯一信息来源。针对这一问题,提出基于社会网络的服务信任评估模型。首先通过实体的历史服务评价信息构建实体之间的推荐信任关系,从而可基于该具有边权重的信任网络进行信任的传递和汇聚操作以评估目标服务的信任。实验表明,该模型能够为实体选择性能良好的服务,并能较好的抵抗开放环境下各种欺诈行为攻击以及稀疏网络环境下推荐信息不足导致无法有效评估信任等问题。与同类研究相比,该模型具有较好的准确性、较强的抗攻击性和鲁棒性。
     (3)提出对分服务网络中基于本体的信任评估模型。在对分服务网络环境下,由于其特殊的网络拓扑结构导致实体之间的直接信任信息不能在网络中直接传递。另外,不同的服务实体对同一服务具有不同的偏好需求和满意度标准,导致服务的信任评估不但要满足服务质量信息的客观准确性又要考虑实体的个性化需求。针对上述问题,提出对分服务网络环境下基于本体的信任评估模型。首先引入一种评论本体来半结构化表述用户的反馈信息,接着基于评论本体构建请求者之间推荐信任网络并基于该网络进行信任传播以评估目击者的可信度,最后取得可信目击者的交互经验评估目标服务的可信度。实验结果表明,比较现阶段主流的基于信任的服务选择方法,该模型具有更高的准确性,并能有效抵制节点的主观性、动态性、欺诈性等行为带来的攻击,并且在反馈信息较少的情况下也能表现出较强的鲁棒性。
     (4)提出信任感知的服务组合优化算法。基于QoS的服务组合优化问题是一个被证明了的NP难问题,因此在服务规模较大的情况下,不可能在合理的时间内得到最优的结果。当前的研究没有很好的解决如何权衡优化结果和执行时间的问题,并在选择服务的时候缺乏对服务的可信性考虑。针对这一问题,提出-种信任感知服务组合优化算法(T-HEU)。首先对构成组合服务流程的各个任务进行基于信任的组件服务选择,以保证单个服务的可信性,接着对各个任务进行凸包构建以减少搜索空间,最终通过对初始解向量的多次升级和一次降级操作以达到全局优化的目标。实验表明,相对与现阶段存在的一些主流方法,T-HEU不仅能得到一个比较理想的结果,并且具有良好的效率。
With the development of Web Services techonology, service systems with single function have been unable to be satified by the user with complex requirements. Therefore, Internet of Service which in order to satify user's individual requirements via networking and integrating service systems have become the focus attention in the Web service research area. However, the open characteristic of Internet of Service and the rapid evolution of service resources cause the trustworthy problem when collaborating with unkown services. Currently, the trust problem in the scenario of service collaboration has become one of the key factors which hindered the development of Internet of Service.
     In order to solve the problem described above, we conducted a study on two aspects of service collaboration in Internet of Service based on the analysis of the challenges which might face with when doing such a research. One is how to select a trustworthy component service and the other is trust-aware service selection in composition. We considered the problem of services'crebility and the reliability of service systems in both when defining the trustworthy problem of service collaboration. Our main work and contributions include:
     (1) We proposed a trustworthy management framework for service collaboration. The process of service collaboration includes multiple setps such as service selection, service composition, resource optimazition, service evolution and process reconstruction. Therefore, consider the problem of trustworthy service collaboration must involve various aspects of service collaboration. We firstly proposed three basic mechanisms that support trustworthy service collaboration which include thorough trust evaluation mechanism, balanced trust-aware service selection in composition and reliable sevice fault tolerance and process reconstruction mechanism for Web services. Based on the three mechanisms, we proposed a trustworthy management framework for service collaboration which lay sound foundation for our work.
     (2) We proposed a social network based trust model. In a service-oriented environment, it is inevitable and indeed quite common to deal with web services, whose reliability is unknown to the users. The reputation system is a popular technique currently used for providing a global quality score of a service provider to requesters. However, such global information is far from sufficient for service requesters to choose the most qualified services. In order to tackle this problem, we present a trust based architecture containing a computational trust model for quantifying and comparing the trustworthiness of services. In this trust model, we firstly construct a network based on the direct trust relations between participants and rating similarity in service oriented environments, then propose an algorithm for propagating trust in the social network based environment which can produce personalized trust information for a specific service requester, and finally implement the trust model and simulate various malicious behaviors in not only dense but also sparse networks which can verify the attack-resistant and robustness of the proposed approach. The experiment results also demonstrate the feasibility and benefit of the approach.
     (3) Proposed an ontology based trust model for bipartite service network. Tthe special topology structure of bipartite service network causes the trust information unable to be propagated directly among service requesters. In addition, different service requesters have different preferences and satisfaction criterion to the same service which cause trust evaluation of services not only satisify the accuracy of the objective information but also should consider the requirements of entities. In order to solve the problem mentioned above, we proposed an ontology based trust model which consist three components. We first introduce an review ontology to structure express the feedback by the users, then construct the trust network between service requesters based on the review ontology, finally get the review information from the witnesses to evaluate the trustworthiness of a specific service. Experiments results also demonstrate the feasibility and benefit of the approach.
     (4) With the rapid increasing number of the independently developed web services that provide the same or similar functionalities but differ in quality ofservice (QoS), the service composition can be considered as a problem on the selection of component services in accordance with user's QoS requirements, a practice known as QoS-aware service composition problem. However, current solutions are not only not suitable for most real-time decision-making service composition applications which are required to obtain an optimal result in reasonable time, but also not as reliable as intended because in an open service-oriented environment, services may be unreliable or even harmful. In this paper, we present a trust based approach which addresses the issue of Web service composition in a way that maximizes the QoS value of composite services expressed as utility functions over a set of QoS attributes, while satisfying the constraints set by the end-users and promising all the selected services are trustworthy. The proposed heuristic algorithm consists of three steps:first, a trust based local selection method is used to filter untrustworthy component services. Second, convex hulls are constructed for reducing the search space for each task. Finally, a heuristic global optimization approach based on M-HEU is used to obtain the near-optimal solution.The results of the experiments evaluation demonstrate that our approach can obtain a close-to-optimal and trustworthy solution in a reasonable time.
引文
[1]Wooldridge M, Jennings N. Intelligent Agents:Theory and Practice [J]. Knowledge Engineering Review,1995,10(2):115-152
    [2]Wooldridge M. An Introduction to Multi-agent Systems. John Wiley&Sons: Chichester, England,2002
    [3]Larsen K.R.T, Mcinerney C.R. Preparing to Work in The Virtual Organization [J]. Inf. Manage,2002,39(6):445-456
    [4]Lee J, Jayatilaka B. Virtual Organization:Duality of Human Identities in Consciousness and Entity Managing IT in Government Business\& Communities. IGI Publishing.2003:207-215
    [5]Travica B. Virtual organization and electronic commerce [J]. SIGMIS Database. 2005,36(3):45-68
    [6]Vazquez-Salceda J. The role of norms and electronic institutions in multi-agent systems applied to complex domains. The HARMONIA framework. Technical University of Catalonia,2003
    [7]Henrique L. C. Eugenio, O. Virtual enterprise normative framework within electronic institutions[C]//Proceedings of the Fifth International Workshop Engineering Societies in the Agents World (ESAW).2004:14-32
    [8]Chaudhuri S, Dayal U. An Overview of Data Warehousing and OLAP Technology[J]. SIGMOD Rec,1997,26(1):65-74
    [9]Foster I, Kesselman C, Tuecke S. The Anatomy of the Grid:Enabling Scalable Virtual Organizations [J]. Int. J. High Perform. Compute. Appl,2001,15(31): 200-222
    [10]Papazoglou M.P, Traverso P, Dustdar S. Service-Oriented Computing [J]. Communications of the ACM.2003,46(10):25-28
    [11]European Future Internet Portal, http://www.future-internet.eu
    [12]Oberle D, Bhatti N, Brockmans S. Countering Service Information Challenges in the Internet of Services. Business & Information Systems Engineering,2009, 1(5):370-390.
    [13]Cardoso J, Voigt K, Winkler M. Service Engineering for the Internet of Services. Enterprise Information Systems, LNBIP,2009,19:15-27.
    [14]Schroth C, Janner T. Web 2.0 and SOA:Converging Concepts Enabling the Internet of Services. IT Professional,2007,3:36-41.
    [15]Gao J, Lv H. IGTASC:A Model for Institution-Governed Trusted and Autonomic Service Cooperation [C]//In Proceedings of the Eighth International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS-2009), Budapest, Hungary,2009:1331-1332
    [16]Abdul-Rahman A, Hailes S. Supporting trust in virtual communities[C]//In Proceedings of the Hawaii's International Conference on Systems Sciences, Maui, Hawaii.2000:1-9
    [17]Buskens V. The Social Structure of Trust[J]. Social Networks.1998,20:265-298
    [18]Kosfeld M, Heinrichs M, Zak P.L, Fischbacher U, Fehr E. Oxytocin Increases Trust in Humans [J]. Nature,435(7042):673-676, June 2005.
    [19]Rasmusson L, Jansson S. Simulated Social Control for Secure Internet Commerce[C]//Proceedings of the 1996 New Security Paradigms Workshop, ACM, New York, USA,1996:18-26.
    [20]Jasong A, Knapskog S.J. A Metric for Trusted Systems[J]. Austrian Computer Society,1998,31(8):541-549.
    [21]Wang Y, Vassileva J. Trust and Reputation Model in Agent-to-Agent Networks. 2003, www.cs.usask.ca/grads/yaw181/publications/120 wang y.pdf.
    [22]Marsh S P. Formalizing Trust as a Computational Concept. PhD Thesis[D]. Department of Mathematics and Computer Science, University of Stirling,1994.
    [23]Aberer K, Despotovic Z. Managing Trust in a Peer-2-Peer Information System [C]//The 9th International Conference on Information and Knowledge Management, Atlanta, USA, November.2001:310-317
    [24]Mekouar L, Iraqi Y, and Boutaba R. A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems [C]//The 15th IFIP/IEEE International Workshop on Distributed Systems:Operations & Management (DSOM'04), Springer-Verlag,2004:208-219
    [25]Marti S and Garcia-Molina H. Limited Reputation Sharing in P2P Systems[C]// ACM Conference on Electronic Commerce, New York, USA.2004:91-101
    [26]Tran T, Cohen R. A Reputation-Oriented Reinforcement Learning Approach for Agents in Electronic Marketplaces[C]//Proceedings of the Eighteenth National Conference on Artificial Intelligence (AAAI'02), Doctoral Consortium.2002: 989-989
    [27]Tao-Huan T, Theon W. Towards a Generic Model of Trust in Electronic Commerce [J]. International Journal of Electronic Commerce,2001,5(2):61-74
    [28]Papalilo E, Freisleben B. Towards a Flexible Trust Model for Grid Environments [J]. GSEM 2004, LNCS 3270 Springer-Verlag Berlin Heidelberg 2004:94-106
    [29]Tie-Yan L, HuaFei Z, Kwok-Yan L. A Novel Two-Level Trust Model for Grid [J]. ICICS 2003, LNCS 2836 Springer-Verlag Berlin Heidelberg.2003:214-225
    [30]Dewan P. Trusting Routers and Relays in Ad hoc Networks [C]//In the International Conference in Parallel Processing Workshops, Kaohsiung, Taiwan. 2003,10:06-09
    [31]Senn D. Reputation and Trust Management in Ad Hoc Networks with Misbehaving Nodes[D]. Diploma Thesis DA-2003,2003,7,27
    [32]Ely J.C, Valimaki J. Bad Reputation. Quarterly Journal of Economics[J].2003, 118:785-814
    [33]Fudenberg D and Levine D.K. Maintaining a Reputation when Strategies are Imperfectly Observed. Review of Economics Studies,1992,59:561-579
    [34]Golbeck J. Trust and Nuanced Profile Similarity in Online Social Networks[J]. ACM Transactions on the Web. In press.
    [35]Hang C-W, Wang Y.H, Singh M.P. Operators for propagating trust and their evaluation in social networks[C]//AAMAS (2) 2009:1025-1032
    [36]Bentahar J, Khosravifar B, Gomrokchi M. Social Network-Based Trust for Agent-Based Services[C]//Proceedings of the 2009 International Conference on Advanced Information Networking and Applications Workshops,2009:298-303
    [37]Maximilien E.M, Singh M.P. A Framework and Ontology for Dynamic Web Services Selection, IEEE Internet Computing[J],2004,8(5):84-93
    [38]Maximilien E.M, Singh M.P. Toward Autonomic Web Services Trust and Selection[C]//In ICSOC '04 Proceedings of the 2nd International Conference on Service Oriented Computing, New York, NY, USA,2004:212-221
    [39]Maximilien E.M, Singh M.P. Agent-based Trust Model Involving Multiple Qualities[C]//In AAMAS 05:Proceedings of 4th International Autonomous Agents and Multi Agent Systems, New York, NY, USA,2005:519-526
    [40]Maximilien E.M, Singh M.P. Conceptual Model of Web Service Reputation. SIGMOD Record,2002,31(4):36-41
    [41]Dellarocas C. The Digitalization of Word-of-Mouth:Promise and Challenges of Online Feedback Mechanisms. Management[J]. Science,2003,49(10): 1275-1286
    [42]W3C. Web Services Architecture Requirements. http://www.w3.org/TR/wsa-reqs Oct 2002.
    [43]Shankar R. Ponnekanti, Armando Fox. SWORD:A Developer Toolkit for Web Service Composition[C]//The Eleventh International World Wide Web(WWW), New York, USA,2002:83-107
    [44]Matskin M, Rao J. Value-Added Web Services Composition using Automatic Program Synthesis[C]//Revised Paper from the International Workshop on Web Services, E-Business, and the Semantic Web. Springer-Verlag,2002:213-224.
    [45]邓水光.Web服务自动组合与形式化验证的研究[D].浙江:浙江大学,2007:1-157
    [46]Ran SP. A Model for Web Services Discovery with QoS[J]. ACM SIGecom Exchanges.2003,4(1):1-10
    [47]Mani A, Nagarajan A. Understanding Quality of Service for Web services. IBM, 2002, http://www-106.ibm.com/developerworks/library/ws-quality.html
    [48]Michael C. Jaeger, Gregor R.G, Gero M. QoS Aggregation for Web Service Composition using Workflow Patterns[C]//The 8th IEEE International Enterprise Distributed Object Computing Conference(EDOC'04), Monterey, California,2004:149-159
    [49]Zeng L, Benatallah B, Dumas M. Quality Driven Web Services Composition[C]//In Proceedings of the 12th International Conference on World Wide Web(WWW), Budapest, Hungary.2003,5:411-421
    [50]Canfora G, Penta M.D, Esposito R, Villani M.L. QoS-Aware Replanning of Composite Web Services[C]//IEEE International Conference on Web Services(ICWS'05),2005:121-129
    [51]Garey M, Johnson D.S. Computers and Intractability:A Guide to the Theory of NP-Completeness[M], San Francisco:W. H. Freeman,1979
    [52]Yu T, Lin K J. Service Selection Algorithm for Web Services with End-to-End QoS constraints[C]//Proceedings of the IEEE International Conference on E-Commerce Technology, California, USA,2004:129-136
    [53]Canfora G, Penta M D, Esposito R. A Lightweight Approach for QoS-aware Service Composition[C]. Proceedings of the 2nd International Conference on service Oriented Computing, New York, USA,2004:36-47
    [54]Zhang L, Li B, Chao T et al. On Demand Web Services-based Business Process Composition[C]//Proceedings of the IEEE International Conference of System, Man and Cybernetics, Washington, USA,2003:4057-4064
    [55]张成文,苏森,陈俊亮.基于遗传算法的QoS感知的Web服务选择[J].计算机学报,2006,29(7):1029-1037
    [56]Schneider F.B. Implementing Fault-Tolerant Services Using the State Machine Approach:A Tutorial[C]//ACM Computing Surveys,1990:299-319
    [57]Guo H.P, Huai J.P, Li H, Deng T, Li Y, Du Z.X. ANGEL:Optimal Configuration for High Available Service Composition[C]//IEEE International Conference on Web Services(ICWS'07),2007:280-287
    [58]David B, Fabio P, Santosh K. Constructing Dependable Web Services[C]// Distributed Systems, LNCS 1752.2000:277-294
    [59]Canfora G, Penta M D, Esposito R. A Framework for QoS-aware Binding and Rebinding of Composite Web Services[J]. Journal of Systems and Software, 2008,81(10):1754-1769
    [60]Yolum P, Singh M P. Locating Trustworthy Services[C]//Proceedings of the First Int'l Workshop on Agents and Peer-to-Peer Computing,2002:1-12
    [61]Schillo M, Funk P, Rovatsos M. Using Trust for Detecting Deceitful Agents in Artificial Societies [J]. Applied Artificial Intelligence,2000,14:825-848
    [62]Melaye D, Demazeau Y. Bayesian Dynamic Trust Model[C]//LNCS 3690, Berlin:Springer-Verlag,2005:480-489.
    [63]Wang Y, Vassileva J. Bayesian Network Trust Model in Peer to Peer Networks[C]//Proceedings of the 2nd International Workshop on Agents and Peer to Peer Computing, Berlin:Springer-Verlag,2004:23-34.
    [64]Yu B, Singh M. P. An Evidential Model of Distributed Reputation Management[C]//In Proceedings of First International Joint Conference on Autonomous Agents and Multi-gent System,2002:294-301
    [65]Song S, Hwang K. Fuzzy Trust Integration for Security Enforcement in Grid Computing[C]//Proceedings of the International Symposium on Network and Parallel Computing(NPC04), LNCS 3222, Berlin:Springer-Verlag,2005:9-21
    [66]Castelfranchi C, Falcone R, Pezzulo G. Trust in Information Sources As a Source for Trust:A Fuzzy Approach[C]//In Proceedings of the Second International Joint Conference on Autonomous Agents and Multi-agent Systems, Melbourne Australia,2003:89-96
    [67]Schmidt S, Steele R, Dillon T, Chang E, Building a Fuzzy Trust Network in Unsupervised Multi-agent Environments[C]//International Workshop on Web Semantics, Agia Napa,2005:816-825
    [68]Liu Wei. Trustworthy Service Selection and Composition-Reducing the Entropy of Service-Oriented Web[C]//Proceedings of International Conference on Industrial Informatics,2005:104-109.
    [69]Chang E, Dillon T. S, Hussain F. K. Trust and Reputation Relationships in Service-Oriented Environments[C]//Proceedings of the Third International Conference on Information Technology and Applications,2005:4-14
    [70]Michael M. E, Singh M. P. Toward Autonomic Web Services Trust and Selection[C]//Proceedings of the 2nd International Conference on Service Oriented Computing,2004:212-221
    [71]Dan A. Web services on demand:WSLA-Driven Automated Managemen[J]. IBM Systems Journal,43(1),2004:136-158
    [72]Keller A, Ludwig H. Defining and Monitoring Service Level Agreements for Dynamic e-Business[C]//In Proceedings of the 16th USENIX System Administration Conference (LISA'02), November 2002:16
    [73]Brooks K. C, Damon T, Cedric A, Colin F.C, Steven R.Q, Montague, P. Read. Getting to Know You:Reputation and Trust in a Two-Person Economic Exchange[J], Science,2005,308 (5718):78-83
    [74]Golbeck J. Weaving a Web of Trust[J], Science,2008,321 (5896):1640-1641
    [75]Centola D. The Spread of Behavior in an Online Social Network Experiment[J], Science,2010,329(5996):1194-1197
    [76]贺利坚,黄厚宽,张伟。多Agent系统中信任和信誉系统研究综述[J],计算机研究与发展,2008,45(7):1151-1160
    [77]Malaga R. A Web Based Reputation Management Systems:Problems and Suggested Solutions [J], Electronic Commerce Research,2001,1(4):403-417
    [78]Resnick P, Zeckhauser R. Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay's Reputation System[J], Advances in Applied Microeconomics,2002,11:1-26
    [79]Chen M and Singh P. J. Computing and Using Reputations for Internet Ratings[C]//In 3rd ACM Conference on Electronic Commerce, New York, NY, USA, ACM.2001:154-162
    [80]Dellarocas C. Immunizing Online Reputation Reporting Systems Against Unfair Ratings and Discriminatory Behavior[C]//In Proceedings of the 2nd ACM Conference on Electronic Commerce, New York, NY, USA,2000:150-157
    [81]Ekstrom M. A, Bjornsson H. C, Nass C. I. A Reputation Mechanism for B2B Electronic Commerce that Accounts for Rater Credibility [J]. Journal of Organizational Computing and Electronic Commerce,2005,15(1):1-18
    [82]Lam S. k, Riedl J. Shilling. Recommender Systems for Fun and Profit[C]/7 In Proceedings of the 13th International World Wide Web Conference (WWW), New York, NY, USA,2004:393-402
    [83]Ming F, Yong T, Whinston A. B. Evaluation and Design of Online Cooperative Feedback Mechanisms for Reputation Management[J]. IEEE Transactions on Knowledge and Data Engineering,2005,17(2):244-254
    [84]Zacharia G and Maes P. Trust Management Through Reputation Mechanisms. Applied Artificial Intelligence Journal,2000, (14):881-907
    [85]Aberer K. P-grid:A Self-Organizing Access Structure for P2P Information Systems[C]//The 6th International Conference on Cooperative Information Systems, LNCS 2172, Berlin:Springer,2001,179-194
    [86]Huynh T. D. Trust and Reputation in Open Multi-agent Systems[D]. Southampton:Electronics and Computer Science, University of Southampton, 2006
    [87]Gupta M, Judge P, and Ammar M. A Reputation System for P2P Networks[C]// In Proceedings Of the 13th International Workshop on Network and Operating Systems Support for Digital Audio and Video, Monterey, CA, USA,2003: 144-152
    [88]Damiani E, Vimercati S, Paraboschi S, and Samarati P. Managing and Sharing Servents'Reputations in P2P Systems[J]. IEEE Trans, on Knowledge and Data Engineering,2003,15(4):840-854
    [89]Dingledine R, Mathewson N. and Syverson P. Reputation in P2P Anonymity Systems[C]//In Workshop on Economics of Peer-to-Peer Systems, June 2003.
    [90]Aberer K, Despotovic Z. Managing Trust in a Peer-2-Peer Information System[C]//In Proceedings of the ACM Conference on Information and Knowledge Management (CIKM), Atlanta, Georgia,2001:310-317
    [91]Kamvar S. D, Schlosser M. T, Garcia-Molina H. The Eigentrust Algorithm for Reputation Management in p2p networks[C]//In Proceedings of the 12th International Conference on World Wide Web(WWW"03), New York, NY, USA, 2003:640-651
    [92]Page L, Brin S, Motwani R, Winograd T. The PageRank Citation Ranking: Bringing Order to the Web. Technical Report, Stanford Digital Library Technologies Project,1998
    [93]Zhou R and Hwang K. PowerTrust:A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing[J]. IEEE Transactions on Parallel and Distributed Systems,2007,18(4):460-473
    [94]Xiong L and Liu L. PeerTrust:Supporting Reputation-based Trust for Peer-to-Peer Electronic Communities[J]. IEEE Transactions on Knowledge and Data Engineering (TKDE),2004,16(7):843-857
    [95]Dewan P, Dasgupta P. Pride:Peer-to-Peer Reputation Infrastructure for Decentralized Environments[C]//In WWW (Alternate Track Papers & Posters), pages:480-481,2004
    [96]Damiani E, Vimercati C. D, Paraboschi S, Samarati P, Violante F. A Reputation based Approach for Choosing Reliable Resources in Peer-to-Peer Networks[C]// In ACM Conference on Computer and Communications Security, pages 207-216, 2002
    [97]Alunkal B. K. Grid Eigen Trust:A Framework for Computing Reputation in Grids[D]. Master's thesis, Computer Science Department, Illinois Institute of Technology, Chicago, December,2003
    [98]Azzedin F, Maheswaran M. Integrating Trust into Grid Resource Management Systems[C]//In Proceedings of the 31st International Conference on Parallel Processing (ICPP), Vancouver, BC, Canada,2003:47-54,
    [99]Azzedin F, Maheswaran M. Towards Trust-Aware Resource Management in Grid Computing Systems[C]//In Proceedings of 2nd IEEE International Symposium on Cluster Computing and the Grid (CCGrid), Berlin, Germany,2002:452-457
    [100]Huhns M. N, Buell D. A. Trusted Autonomy[J]. IEEE Internet Computing, 2002,6(3):92.95
    [101]Ramchurn S D, Huynh T D, Jennings N R. Trust in Multi-agent Systems[J]. The Knowledge Engineering Review,2004,19(1):1-25
    [102]Richardson M, Agrawal R, Domingos P. Trust Management for the Semantic Web[C]//Proceedings of the Second International Semantic Web Conference. Sanibel Island, Florida,2003:351:368
    [103]Golbeck J, Hendler J. Accuracy of Metrics for Inferring Trust Reputation in Semantic Web-based Social Networks[C]//International Conference on Knowledge Engineering and knowledge Management.2004:116-131
    [104]Golbeck J. Computing and Applying Trust in Web-based Social Networks[D]. Ph.D. Dissertation.2005.
    [105]The FoaF Project.http://www.foaf-project.org
    [106]Hang C. W, Wang Y. H, Singh M. P. Operators for Propagating Trust and their Evaluation in Social Networks[C]//In AAMAS '09:Proceedings of The 8th International Conference on Autonomous Agents and Multi-agent Systems,2009: 1025-1032
    [107]Wang Y, Singh M. P. Trust Representation and Aggregation in a Distributed Agent System[C]//In AAMAS '06:Proceedings of the 5th International Conference on Autonomous Agents and Multi-agent Systems,2006:1425-1430
    [108]The FilmTrust Dataset. http://trust.mindswap.org
    [109]The Opinions Dataset. http://www.trustlet.org/wiki/Epinions dataset
    [110]Caverlee J, Liu L. WEBB S. Towards Robust Trust Establishment in Web-based Social Networks with Social trust[C]//The 17th International Conference On World Wide Web(WWW'08),2008:1163-1164
    [111]Kuter U, Golbeck J. Sunny:A new Algorithm for Trust Inference in Social Networks Using Probabilistic Confidence Models[C]//In the Proceedings of Association for the Advancement of Artificial Intelligence(AAAI'07),2007: 1377-1382
    [112]Maximilien E. M, Singh M. P. Agent-based Trust Model Involving Multiple Qualities[C]//In AAMAS 05:Proceedings of 4th International Autonomous Agents and Multi Agent Systems, pages 519-526, New York, NY, USA,2005, ACM.
    [113]Malik Z, Bouguettaya A. Rater Credibility Assessment in Web Services Interactions[J]. WWW Journal,12(1):3.25, March 2009
    [114]Manchala D. W. Trust metrics, models and protocols for electronic commerce transactions[C]//International Conference on Distributed Computing Systems, vol.0, p.312,1998.
    [115]Nepal S, Sherchan W, Hunklinger J, Bouguettaya A. A Fuzzy Trust Management Framework for Service Web[C]//In the Proceedings of 2010 IEEE 8th International Conference on Web Services, ICWS,2010:321-328
    [116]Jamal Bentahar, Babak Khosravifar, and Maziar Gomrokchi, Social Network-Based Trust for Agent-Based Services, Proceedings of the 2009 International Conference on Advanced Information Networking and Applications Workshops,2009, Pages:298-303.
    [117]Galizia, S, Gugliotta, A, Domingue J. A Trust Based Methodology for Web Service Selection[C]//2007 International Conference on Semantic Computing. Sept.17-19,2007 Page(s):193-200
    [118]Zhu M, Zhi J. An Agent-Based Trust Model for Service-Oriented Systems[J]. TRUST 2008, Page(s).16-181,2008
    [119]Liu W. Trustworthy service selection and composition-reducing the entropy of service oriented web[C]//In Proceedings of the 3rd IEEE International Conference on Industrial Informatics (INDENT), pages 104-109, Los Alamitos, CA, USA,2005. IEEE Computer Society
    [120]Hang C. W, Singh M. P. Trustworthy Service Selection and Composition[J]. ACM Transactions on Autonomous and Adaptive Systems (TAAS), volume 6(1), pages 5:1-5:17, February 2011
    [121]梅宏、曹东刚.软件可信性:互联网带来的挑战[J].中国计算机学会通信,2010,6(2):20-27.
    [122]王远,吕建,徐锋,张林.一种面向网构软件体系结构的信任驱动服务选取机制[J].软件学报,2008,19(6):1350-1362.
    [123]王怀民,尹刚.网络时代的软件可信演化[J],中国计算机学会通讯,2010,6(2):28-36。
    [124]Casati F, Ilnicki S, Jin L J. Adaptive and Dynamic Service Composition in eFlow[J]. Advanced Information Systems Engineering,2000,1789(4):13-31
    [125]Shankar R P, Fox A. SWORD:A Developer Toolkit for Web Service Composition[C]//In Proceedings of the 11th International World wide Web Conference, Honolulu, Hawaii, USA,2002:83-107
    [126]Yuan Y, Li X, Wang O. Dynamic Heuristics for time and cost reduction in Grid Workfiows[C]//LNCS 4402, Computer Supported Cooperative Work in Design III. Springer'2007.5:499-508
    [127]Yuan Y, Li X, Wang Q. Time-Cost Tradeoff Dynamic Scheduling Algorithm for Workflows in Grids[C]//The 10th International Conference on Computer Supported Cooperative Work in Design, Nanjing, China,2006,5:872-877
    [128]Zeng L, Benatallah B, Ngu A. A. H, Dumas M, Kalagnanam J, Chang H. Qos-aware Middleware for Web Services Composition[J]. IEEE Transactions on Software Engineering,2004,30(5):311-327.
    [129]Canfora G, Penta M. D, Esposito R, Villani M. L. Approach for QoS-aware Service Composition based on Genetic Algorithms[C]//In:Proceedings of the 5th Conference on Genetic and Evolutionary Computation(GEC),2005: 1069-1075
    [130]Yu T, Zhang Y, Lin K. J. Efficient Algorithms for Web Services Selection with End-to-End Qos Constraints[J]. ACM Transactions on the Web 2007,1(1):1-26
    [131]Akbar M. M, Manning E.G, Shoja G. C, Khan S. Heuristic Solutions for the Multiple-choice Multi-dimension Knapsack Problem[J]. In Proceedings of the International Conference on Computational Science-Part Ⅱ,2001:659-668
    [132]Alrifai M, Risse T. Combining Global Optimization with Local Selection for Efficient QoS-aware Service Composition[C]//In Proceedings of the 18th International World Wide Web Conference (WWW),2009:881-890
    [133]Qi L Y, Tang Y, Dou W C, Chen J J. Combining Local Optimization and Enumeration for QoS-aware Web Service Composition[C]//In Proceedings of ICWS'2010,2010:34-41
    [134]Wada H, Suzuki J, Yamano Y, Oba K. A Multi-objective Optimization Framework for SLA-aware Servcie Composition[J]. IEEE Transactions on Service Computing,2011,99:1-14
    [135]Oliver M, Florian R, Schahram D. Non-Intrusive Monitoring and Service Adaptation for WS-BPEL[C]//In Proceedings of WWW'08,2008:815-824
    [136]Wang G, Wang C, Chen A, Wang H, Fung C, Uczekaj S, Chen YL, Guthmiller W, Lee J. Service level management using QoS monitoring, diagnostics, and adaptation for networked enterprise systems[C]//EDOC Enterprise Computing Conference,2005:239-248
    [137]Ardissono L, Console L, Goy A, Petrone G, Picardi C, Segnan M. Enhancing Web Services with Diagnostic Capabilities. Third IEEE European Conference on Web Services (ECOWS 2005),2005:10 pp
    [138]Zhang Y, Lin K. J, Jane Y. J. Hsu, Accountability monitoring and reasoning in service-oriented architectures[J]. Service Oriented Computing and Applications, 2007, 1(1):35-50
    [139]Zucker L. G. Production of Trust:Institutional of the Economic Structure [J]. Research in Organizational Behavior,1986, (8):53-111
    [140]Yolum P, Singh M. P. An Agent-Based Approach for Trustworthy Service Location[C]//In Proceedings of 1th International Workshop on Agents and Peer-to-Peer Computing(AP2PC),2002:45-56
    [141]Huang J, Fox M. S. An Ontology of Trust — Formal Semantics and Transitivity[C]//In Proceedings of 8th International Conference Electronic Commerce (ICEC 06),2006:259-270
    [142]Reiter R. Knowledge in Action, The MIT Press,2001
    [143]Karta, Kenneth. An Investigation on Personalized Collaborative Filtering for Web Service Selection[R]. The University of Western Australia,2005:1-53
    [144]Badrul M, Sarwar, George Karypis, Joseph A, Konstan. John T. Riedl. Application of Dimensionality Reduction in Recommender System-A Case Study[C]//ACM WebKDD, Workshop.2000
    [145]Jasong A, Hayward R, Pope S. Trust network analysis with subjective logic[C]//Hobart, Australia:Australian Computer Society, Inc,2006:85-94.
    [146]Stewart D. A platform with six degrees of freedom[J]. Aircraft Engineering and Aerospace Technology.38(4),1993:30-35.
    [147]Zipf G. Human Behavior and the Principle of least Effort[M]. Cambridge: Addison-Wesley Press,1949
    [148]BreslauL, Cao P, Fan L. Web Caching and Zipf-like Distributions:Evidence and Implications[C]//Proceedings of 18th Annual Conference of the IEEE Computer and Communications Societies. New York, USA, IEEE computer Society,1999:126-134
    [149]Gruber T. R. A Translation Approach to Portable Ontologies[J]. Knowledge Acquisition,5(2):199-220
    [150]Berners-Lee, T, Hendler J, and Lassila O. The Semantic Web. Scientific American.Com,2001
    [151]Sirin E, Parsia B, Grau B.C, Kalyanpur A, Katz, Y. Pellet:a practical OWL-DL reasoned[J]. Web Semantics,2007,5(2):51-53
    [152]Horrocks, I., P. F. Patel-Schneider, H. Boley, S. Tabet, B. Grosof, and M. Dean. A Semantic Web Rule Language Combining OWL and RuleML, http://www.w3.org/Submission/SWRL,2004
    [153]Sheila A. M, Tran-Cao S. Adapting golog for composition of semantic web services [C]//Proc of KR'02, Toulouse,2002:22-25
    [154]Nikola M, Miroslaw M. Search Strategies for Automatic Web Service Composition[J]. International Journal of Web Service Research,2006, 3(2):1-32
    [155]Akbar M. M, Manning E. G, Shoja G. C, Khan S. Heuristic Solutions for the Multiple-choice Multi-dimension Knapsack Problem [C]//Proc of the International Conference on Computational Science-Part Ⅱ, Springer-Verlag, pages:659-668, London, UK,2001
    [156]Akbar M. M, Rahman M. S, Kaykobad M. Solving the Multi-dimensional Multiple-choice Knapsack Problem by Constructing Convex Hulls[J]. Computers and Operations Research,33:1259-1273,2006
    [157]Martello S, Toth P. Algorithms for Knapsack Problems. Annals of Discrete Mathematics,1987,31:70-9
    [158]Magazine M. J, Nemhauser G. L, Trotter L. E. When the Greedy Solution Solves a Class of Knapsack Problem[J]. Operations Research,1975, 23:207-217
    [159]Toyoda Y. A Simplified Algorithm for Obtaining Approximate Solution to Zero-one Programming Problem [J]. Management Science,1975,21:1417-1427
    [160]Aalst W. M. P. Don't go with the flow:Web Services Composition Standards Exposed, in: S.Staab(Ed), Web Services:Been There Done That?[J]. IEEE Intelligent Systems,2003,18(1),72-76
    [161]Yoon K. P, Hwang C. L. Multiple Attribute Decision Making:An In-troduction. Quantitative Applications in the Social Sciences, Sage Pub-lications,1995
    [162]Thomas H. C, Clarles E. L, Ronald L. R. Introduction to Algrithms. Beijing: China Machine Press,2006
    [163]Khan. S. Quality adaptation in a multisession multimedia system:Model, algorithms and architecture [PhD. Thesis]. Department of ECE, University of Victoria,1998
    [164]Al-Masri E, Mahmoud Q. H. The QWS Dataset. Web page, http: //www.uoguelph.ca/qmahmoud/qws/index.html/.
    [165]Al-Masri E, Mahmoud Q. H. Investigating web services on the world wide web[C]//In Proceedings of the International World Wide Web Conference, Beijing, China, pp:795-804,2008
    [166]Lee C. On QoS management. PhD dissertation. School of Computer Science, Carnegie Mellon University, August 1999
    [167]Acharya M, Kulkarni A, Kuppili R, Mani R, More N, Narayanan S, Patel P, Schuelke K. W, Subramanian S. N. SO A in The Real World Experiences[C]// Proceedings of the 3rd International Conference on Service-Oriented Computing.2005:437-449
    [168]田春歧,江建慧.,胡治国,李峰.一种基于聚集超级节点的P2P网络信任模型.计算机学报,2010,33(2):345-355
    [169]冯景瑜,张玉清,陈深龙,付安民.P2P声誉系统中GoodRep攻击及其防御机制.计算机研究与发展,2011,48(8),1473-1480
    [170]张兴,黄强,沈昌祥.一种基于无干扰模型的信任链传递分析方法.计算机学报,2010,33(1):74-81
    [171]冯登国,秦宇,汪丹,初晓博.可信计算技术研究.计算机研究与发展 2011,48(8):1332-1349
    [172]Mohaisen A, Hopper N, and Kim Y. Keep your friends close:Incorporating trust into social network-based sybil defenses. In IEEE INFOCOM,2011
    [173]Gupta B, Kaur H, Bedi P. An Agent based Reputation System for Unreliable Grid Environment. The 3rd International Conference on Computer Modeling and Simulation(ICCMS 2011), pp 175-180, Vol.1 Bombay, India,2011

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700