期刊文献+

Web服务组装中的隐私暴露分析方法 被引量:7

Research on Privacy Disclosure Analysis for Web Services Composition
下载PDF
导出
摘要 保护Web服务用户的隐私已经成为目前服务计算领域的一个研究热点,但它们很少关注Web服务组装中的隐私暴露问题。针对上述不足,提出了一种Web服务组装隐私暴露分析方法。首先利用超图对服务组装隐私暴露进行建模,并给出了相应的转换方法。在此基础上提出了最小隐私暴露代价算法,利用该算法分析了隐私暴露最小的服务组装方案。最后通过实例说明了该方法的正确性及有效性。 Currently, to protect the privacy of Web services users is an important aspect of the research field for service computing. However, it is lack of research on privacy disclosure analysis for Web services composition. Based on improvement and expansion of existing related work, this paper proposes an approach for privacy disclosure analysis of Web services composition. Firstly, it models privacy disclosure for Web services composition based on hypergraph, and proposes a transformation method. Then, it gives an algorithm which can get the minimal privacy disclosure. Finally, it validates the effectiveness and correctness of the proposed approach through a case.
出处 《计算机科学与探索》 CSCD 2012年第4期319-326,共8页 Journal of Frontiers of Computer Science and Technology
基金 国家自然科学基金Nos.61100034 61170043 中国博士后科学基金No.20110491411 江苏省博士后科研资助计划项目No.1101092C~~
关键词 隐私 WEB服务组装 超图 privacy Web services composition hypergraph
  • 相关文献

参考文献12

  • 1岳昆,王晓玲,周傲英.Web服务核心支撑技术:研究综述[J].软件学报,2004,15(3):428-442. 被引量:552
  • 2Fabio Massacci,John Mylopoulos,Nicola Zannone.Hierarchical hippocratic databases with minimal disclosure for virtual organizations[J].The VLDB Journal.2006(4)
  • 3Yuan Min,Huang Zhiqiu,Li Xiang,et al.Towards a formal verification approach for business process coordination[].Proceedings of theIEEE International Conference on Web Services (ICWS).2010
  • 4Shen Guohua,Huang Zhiqiu,Zhu Xiaodong,et al.Reasoning about Web services with dynamic description logics[].Proceedings of theWRI World Congress on Computer Science and Information Engineering (CSIE).2009
  • 5Kolter J P.User-centric privacy—a usable and providerindependent privacy infrastructure[]..2009
  • 6W3C Group.The platform for privacy preferences1.1 (P3P1.1)specification. http://www.w3.org/TR/P3P11/ . 2006
  • 7Moses T.Extensible access control markup language ver-sion2.0 (XACML)[]..2005
  • 8Meziane H,Benbernou S.A dynamic privacy model for Web services[].Computers and Standards.2010
  • 9Liu Linyuan,Zhu Haibin,Huang Zhiqiu.Analysis of the minimal privacy disclosure for Web services collaborations with role mechanisms[].Expert Systems With Applications.2011
  • 10Ausiello G,Giaccio R,Italiano G F,et al.Optimal traversal of directed hypergraphs[].TR-- The International Computer Science Institute (ICSI).1992

二级参考文献59

  • 1周傲英 凌波.Peer-to-Peer系统及其应用.计算机科学,2002,29(8):200-203.
  • 2Web Services Transaction Specification. http://www-106.ibm.com/developerworks/library/ws-transpec/
  • 3Cabrera F, Copeland G, Cox B, Freund T, Klein J, Storey T, Thatte S. Web services transaction. http://www.infosys.tuwien.ac.at/Teaching/Courses/IntAppl/Papers/ws-transpec.pdf
  • 4Mikalsen T, Rouvellou I, Tai S. Reliability of composed Web services from object transactions to Web transactions. In: Proc. of the OOPSLA 2001 Workshop on Object-Oriented Web Services. 2001.
  • 5Benatallah B, Dumas M, Sheng QZ, Ngu AHH. Declarative composition and peer-to-peer provisioning of dynamic services. In:Proc. of the 18th Int'l Conf. on Data Engineering. San Jose: IEEE Computer Society, 2002. 297~308.
  • 6Mennie D, Pagurek B. A runtime composition service creation and deployment and its applications in internet security,E-commerce and software provisioning. In: Proc. of the 25th Annual Int'l Computer Software and Applications Conf. (COMPSAC 2001). Chicago:
  • 7Tosic V, Mennie D, Pagurek B. On dynamic service composition and its applicability to business software systems. In: Workshop on Object-Oriented Business Solutions (WOOBS2001). 2001.
  • 8Steen MV, Tanenbaum A, Kuz I, Sips H. A scalable middle-ware solution for advanced wide-aera Web services. Distributed Systems Engineering, 1999,6( 1 ): 34-42.
  • 9Burstein MH, Hobbs JR, Lassila O, Martin D, McDermott DV, McIlraith SA, Narayanan S, Paolucci M, Payne T, Sycara K.DAML-S: Web service description for the semantic Web. In: Horrocks, ed. Proc. of the Int'l Semantic Web Conf. Sardinia:Springer-Verlag, 2002
  • 10Narayanan S, McIlraith SA. Simulation, verification and automated composition of Web services. In: Proc. of the 11th Int'l World Wide Web Conf. WWW2002. Honolulu: ACM, 2002.77-88.

共引文献551

同被引文献73

  • 1Luo M, Yokota H. An evaluation of Fat-Btree based and HDFS based Storage Systems for Small File I/O Applications[J]. An evaluation of Fat-Btree based and HDFS based Stor- age Systems for Small File I/O Applications, 2011 (1):531- 533.
  • 2Lensing P, Meister D, Brinkmann A. hashfs: Applying has hing to optimize file systems for small file reads[J]. Proceed- ings of SNAPI2010,2010 : 33-42.
  • 3Xu C, Huang X, Wu N, et al. Using memcached to promote read throughput in massive small file storage system[C]//Pro eeedings of the 9th International Conference on Grid and Coop- erative Computing, 2010 : 24-29.
  • 4李柱,周恩强,廖湘科.FilterCache:一种提高LustreI/O性能的方法[c]//第15届全国信息存储技术学术会议论文集,2008:71-77.
  • 5Jiang L, Li B, Song M. The optimization of HDFS based on small files [C]//Proceedings of the 3rd IEEE International Conference on Broadband Network and Multimedia Technolo- gy,2010:912-915.
  • 6Liu X, Han J, Zhong Y, et al. Implementing WebGIS on Ha- doop: A case study of improving small file I/O performance on HDFS[C]//Proceedings of the IEEE International Conferenceon Cluster Computing and Workshops, 2009 : 1-8.
  • 7Stoiea I, Morris R, Karger D, et al. Chord: A scalable peeF to-peer lookup service for internet applications[J]. ACM SIG- COMM Computer Communication Review, 2001,31 ( 4 ) : 149- 160.
  • 8Zhu Y, Wang H, Hu Y. A supe-peer based lookup in struc- tured peer-to-peer systems[C]//Proceedings of the Proceedings of the 16th International Con{erence on Parallel and Distributed Computing Systems, 2003 : 465-470.
  • 9GlusterFS. http://www, gluster, org.
  • 10Liu LinYuan, Zhu Haibin, Huang Zhiqiu. Analysis of the minimal privacy disclosure for web services collaborations with role mechanisms[J]. Expert Syst. Appl. , 2011,38(4) : 4540-4549.

引证文献7

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部