期刊文献+

一种面向可信的工作流系统监控方法 被引量:3

An Trust-Oriented Approach to Monitoring and Controlling Workflow Systems
下载PDF
导出
摘要 提出了一种面向可信的工作流系统监控方法,该方法可对工作流引擎执行性能、工作流实例状态、以及负载情况等系统信息进行实时监测,并能对运行的工作流实例进行动态调整,有效的保证了工作流系统的可靠性、安全性和鲁棒性。该方法应用到了面向可信的动态工作流管理系统中,验证了该方法的有效性。 This paper presents an approach to monitor and control workflow systems, which is enable to monitor and control workflow engine, workflow instance state and operating load. This approach assures workflow system's reliability, security and robustness effectively. Finally, this approach is applied to Trust-Oriented Dynamic Workflow Systems and is efficiency by verifying
出处 《软件》 2011年第12期8-10,16,共4页 Software
基金 湖南省教育厅科学研究项目基金(09C326) 中国博士后科学基金资助项目(20080440216) 湖南省自然科学基金资助项目(09JJ6087) 湖南工业大学教改项目(09E48)
关键词 可信 工作流系统 监控方法 Trustworthy Workflow system An approach of monitoring and controlling
  • 相关文献

参考文献9

  • 1王怀民,唐扬斌,尹刚,李磊.互联网软件的可信机理[J].中国科学(E辑),2006,36(10):1156-1169. 被引量:59
  • 2GAO J, ZHU E Y, SHIM S. Monitoring software components and component-based software [ C] .Proceedings of the 24th IEEE Annual International Computer Software and Applications Conference. Washington, DC: IEEE Computer Society, 2000:403-412.
  • 3HERRMANM P, KRUMM H. Trust-adapted enforcement of security policies in distributed component-structured applications[C].Proceedings of the 6th IEEE Symposium on Computers and Communications. New York:ACM,2001:2-8.
  • 4DIAKOV N K, BATTERAM H J, ZANDBEL H, et al. Monitoring of distributed component interactions[C]. Proceedings of the IFIP International Conference on Distributed Systems Platforms and Open Distributed Processing. New York: University of Twente Publications, 2000: 229-243.
  • 5HASSSELMEYER P, MARCO V. Monitoring component interaction in Jini federations[C].Proceedings of the 2001 International Conference on Dependable Systems and Networks. Washington, DC:IEEE Computer Society, 2001 : 151-160.
  • 6AVGUSTINOV P, BODDEN E, HAJIYEV E, et al. Aspect for trace monitoring [C] .Formal Approaches to Software Testing and Runtime Verification, LNCS 4262. Berlin: Springer, 2006: 20-39.
  • 7张瞩熹,王怀民.基于AOP的软件运行轨迹捕获技术研究与实现[J].计算机应用,2008,28(5):1322-1324. 被引量:9
  • 8GATES A Q, TELLER P J. An integrated design of a aynamic software fault monitoring systems [J]. Journal of Integrated Design & Process Science, 2000,14(3): 63-78.
  • 9KIM M. Information extraction for run- time formal analysis [D]. Philadelphia, US: University of Pennsylvania, 2001.

二级参考文献39

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:252
  • 2闵应骅.容错计算二十五年[J].计算机学报,1995,18(12):930-943. 被引量:16
  • 3Anderson J P.Computer Security Technology Planning Study.ESD-TR-73-51,Vol.I,AD-758 206,ESD/AFSC,Hanscom AFB,Bedford MA,October 1972
  • 4ISO/IEC,Information technology-security Techniques-Evaluation Criteria for IT Security.Part 1:Introduction and General Model.2nd ed.2005.(Available at URL:http://standards.iso.org/ittf/PubliclyAvailableStandards/c040612_ISO_IEC_15408-1_2005(E).zip,accessed on April 14,2006)
  • 5Trusted Computing Group,TCG Architecture Overview,v1.2,28 April 2004.(Available at URL:https://www.trustedcomputinggroup.org/specs/IWG/TCG 1 0 Architecture_Overview.pdf,accessed on April 14,2006)
  • 6Gates B.Trustworthy Computing.Wired News,Jan.17,2002.(Available at URL:http://www.wired.com/news/business/0,1367,49826,00.html,accessed on April 14,2006)
  • 7Algirdas A,Jean-Claude L,Brian R,et al.Basic concepts and taxonomy of dependable and secure computting.IEEE Trans Dependable Secure,2004,1(1):11-33
  • 8Friedman B,Kahn P H Jr,Howe D C.Trust online.Comm of the ACM,2000,43(12):34-40
  • 9Lazowska E D,Patterson D A.Distributed computing.Science,2005,308(6),May (Available at URL:http://www.sciencemag.org/sciext/computers/,accessed on April 14,2006)
  • 10Beruardo E A,Huberman A,Free Riding on Gnutella.Tech Rept:SSL-00-63,XeroxPARC,2000.8

共引文献62

同被引文献19

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部