期刊文献+

一种基于信任的Web服务工作流组织模型 被引量:1

A Workflow Federation Trust Model Based on Network Interaction
原文传递
导出
摘要 跨组织工作流致力于跨越组织界限的业务重组,经过组织体间的网络行为的直接交互与间接推荐,从而形成松散藕合的工作流联盟。这种基于网络行为形成的联盟信任机制具有身份信任不可替代的作用。文章提出了一种基于网络行为的联盟信任模型,研究了D-S证据理论和冲突处理方法在工作流联盟信任模型中的应用。为了解决间接信任度的计算问题,对经验推荐路径的搜索进行了研究。利用这些理论来解决模型中信任的度量、传递和组合问题。结果分析表明,与已有的工作流联盟模型相比,提出的工作流联盟信任模型具有更细的可信实体粒度和更精确的组合信任度。模拟实验结果证实了工作流信任模型可有效提高联盟的稳定性,提高了工作流执行的成功率。 The cross organization workflow devotes to the service reorganization of spanning organization boundary'. passing direct alternation and indirect recommendation of network behavior among organizations,whilh forms a loose coupling workflow alliance. This kind of alliance trust mechanism of,based on the network behavior has the function that the status trust is unable to be substituted. The paper proposed a kind of alliance trust model based on the network behavior, and has studied the application of D-S evidence theory and the improvement evidence conflict processing method in the workflow alliance trust model. In order to solve the indirect confidence level estimation problem, the search method of experience recommendation path is also discussed. The measure, the transmission and the combination problems in the model trusts have also been solved basing on these theories. The result analysis indicated that, comparing to the existing work flow alliance model, the work flow alliance trust model proposed in this paper has thinner credible entity granularity and more precise combination confidence level. The simulating result confirmed that workflow trust model has enhanced effectively the alliance stability and the execution success ratio of workflow.
作者 刘安丰 刘蓉
出处 《长沙医学院学报》 2006年第2期38-42,46,共6页 Journal of Changsha Medical University
基金 湖南省教育厅科研项目(05C070)。
关键词 工作流联盟 信任模型 D-S证据 经验推荐路径 Workflow Federation trust model D-S evidence experience recommendation path
  • 相关文献

参考文献2

二级参考文献11

  • 1[3]范玉顺.工作流管理技术基础--经营过程重构、过程管理和过程自动的核心技术.北京:清华大学出版社,2001
  • 2Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD. The role of trust management in distributed systems security. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185-210.
  • 3Beth T, Borcherding M, Klein B. Valuation of trust in open network. In: Gol!mann D, ed. Proceedings of the European Symposiumon Research in Security (ESORICS). Brighton: Springer-Verlag, 1994. 3-18.
  • 4Jcsang A. The right type of trust for distributed systems. In: Meadows C, ed. Proceedings of the 1996 New Security Paradigms Workshop. Lake Arrowhead: ACM Press, 1996.
  • 5Jcsang A, Knapskog SJ. A metric for trusted systems. In: Global IT Security. Wien: Austrian Computer Society, 1998. 541-549.
  • 6Jcsang A. A subjective metric of authentication. In: Quisquater J, ed. Proceedings of the ESORICS'98. Louvain-la-Neuve.:Springer-Verlag, 1998. 329-344.
  • 7Gambetta D. Can we trust trust? In: Gambetta D, ed. Trust: Making and Breaking Cooperative Relations. Basil Blackwell: Oxford Press, 1990. 213-237.
  • 8Reiter MK, Stubblebine SG. Toward acceptable metrics of authentication. In: Proceedings of the 1997 IEEE SYmposium on Research in Security and Privacy. Oakland: ACM Press, 1998.
  • 9Levien LR. Attack resistant trust metric [Ph.D. Thesis]. Berkeley: University of California, 2002.
  • 10史美林,杨光信,向勇,伍尚广.WfMS:工作流管理系统[J].计算机学报,1999,22(3):325-334. 被引量:291

共引文献85

同被引文献8

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部