期刊文献+

一种Web服务组合的可信评估方法 被引量:3

Approach for Web Service Composition Trustworthiness Evaluation
下载PDF
导出
摘要 软件可信性日益成为软件工程研究中的热点问题,作为软件资源主要形态的Web服务的可信性也受到了越来越多的关注。目前对于Web服务可信性的研究主要集中在单一服务QoS属性的可信评价,而针对服务组合的可信性研究较少。提出了一种通用的原子服务可信评估模型,并结合原子服务在服务组合执行时的权重,给出了一种基于结构分析的服务组合可信性的评估方法。最后,结合网络购物实例描述了服务组合可信性评估方法的实验过程。 As software trustworthiness has become an important aspect in software engineering research, more and more researchers have focused on Web service trustworthiness evaluation while Web service has been the main form in soft- ware resource. Current research about Web service trustworthiness has concentrated on QoS attributes evaluation of single service rather than on Web service composition trustworthiness evaluation. This paper presented a general model of atomic service trustworthiness evaluation and an approach for composite service trustworthiness evaluation based on the weight of atomic services executed in composite service and the structure of composite service. Finally, we described the experiment of the approach by using a detailed case in a real online shopping.
出处 《计算机科学》 CSCD 北大核心 2013年第2期163-166,171,共5页 Computer Science
关键词 服务组合 可信评估 评估模型 Web service composition,Trustworthiness evaluation, Evaluation model
  • 相关文献

参考文献14

  • 1Zhang J. Trustworthy Web Services: Actions for Now[J]. IT Professional, 2005,7 (1) : 32-36.
  • 2Zaki M, Athman B. Reputation Bootstrapping for Trust Estab- lishment among Web Services[J]. IEEE Intemet Computing,2009,13(1),40-47.
  • 3蔡斯博,邹艳珍,邵凌霜,谢冰,邵维忠.一种支持软件资源可信评估的框架[J].软件学报,2010,21(2):359-372. 被引量:26
  • 4郎波,刘旭东,王怀民,谢冰,毛晓光.一种软件可信分级模型[J].计算机科学与探索,2010,4(3):231-239. 被引量:39
  • 5洪宏,黄志球,沈国华,钱巨,刘春勇.支持软件可信评估的框架及其应用研究[J].计算机科学与探索,2011,5(2):170-178. 被引量:6
  • 6沈国华,黄志球,钱巨,徐拥军,郝进,赵文耘,彭鑫.软件可信评估模型及其工具实现[J].计算机科学与探索,2011,5(6):553-561. 被引量:4
  • 7Zhao Wei-nan, Sun Hai-long, Huang Zi-cheng, et al. A User-Orien- ted Approach to Assessing Web Service Trustworthiness [C]// ATC' 10 Proceedings of the 7th International Conference on Au- tonomic and Trusted Computing. 2010:195-207.
  • 8Kalepu S, Krishnaswamy S, Loke SW. Verity A QoS Metric for Selecting Web Services and Providers[C]//Proceedings of the 4th International Conference on Web Information Systems Engi- neering. ROME:Fourth International Conference on Web Infor- mation Systems Engineering Workshops. 2003:131-139.
  • 9Kim Y,Doh K G. A Trust Type Based Model for Managing QoS in Web Services Composition[C]//Proceedings of the 2007 In- ternational Conference on Convergence Information Technolo- gy. Washington: IEEE Computer Society, 2007 : 438-443.
  • 10刘国奇,朱志良,王浩,李丹程,刘莹.一种Web服务QoS可信性评价模型[J].小型微型计算机系统,2009,30(11):2216-2221. 被引量:7

二级参考文献31

  • 1陈火旺,王戟,董威.高可信软件工程技术[J].电子学报,2003,31(z1):1933-1938. 被引量:115
  • 2潘颖,刘洋,谢冰,杨芙清.支持管理在线构件的基本构件描述模型[J].电子学报,2003,31(z1):2110-2114. 被引量:7
  • 3WANG Huaimin TANG Yangbin YIN Gang LI Lei.Trustworthiness of Internet-based software[J].Science in China(Series F),2006,49(6):759-773. 被引量:28
  • 4W3C workshop on Web services[ EB/OL]. http ://www. w3. org/ 2001/03/WSWS-popa/. 2001 April.
  • 5IONA Technologies. Web services definition [ EB/OL]. http:// www. w3. org/2001/03/WSWS-popa/paper13. 2001 March.
  • 6November 2006 Web server survey [ EB/OL]. http ://news. netcraft, tom/archives/2006/11/01 / november_2006_web_server_survey. html. 2006.
  • 7Zeng Liang-zhao, Boualem Benatallah. Qos-aware middleware for web services composition[ J]. IEEE Transactions on Software Engineering, 2004,30 ( 5 ) : 311-327.
  • 8Li Lei, Yah Wang. A trust vector approach to service-oriented applications[ C]. International Conference on Web Services, Los Angeles, 2008, 270-277.
  • 9Kim SM, Rosu MC. A survey of public Web services[C]. WWW 2004 ,New York, 2004,312-313.
  • 10Shao Ling-shuang , Zhang Jing , Wei Yong . Personalized QoS prediction for web services via collaborative filtering[ J]. IEEE International Conference on Web Services, San Diego ,2007, 439 - 446.

共引文献93

同被引文献23

  • 1吴哲辉.Petri网导论[M].北京:机械工业出版社,2004.
  • 2Manuel M,Nicola D.Implementing workflow reconfiguration in WS-BPEL[J].Journal of Internet Services and Information Security,2012,2(2):73-92.
  • 3Bertino E,Martino D L,et al.Security for Web services and serviceoriented architectures[M].Berlin:Springer,2010:170-175.
  • 4Ahmed A.A compliance management framework for Business Process models[D].Potsdam:University of Potsdam,2010.
  • 5Rafael A.An approach to datadriven detective internal controls for process aware information Systems[C]//Workshop on Data Usage Management on the Web 2012.2012:20-25.
  • 6Mohsen R.Security analysis for web services compositions[J].Journal of Scientific & Engineering Research,2012,3 (5):1-8.
  • 7Alberto C,Silvio R,et al.Automated validation of security-sensitive Web Services specified in BPEL and RBAC[C]//Proc of the 12th International Symposium on Symbolic and Numeric A1gorithms for Scientific Computing.2010:456-464.
  • 8Barry D.Policy Driven Development:SOA Evolvability through Late Binding[D].San Diego:University of California,2013.
  • 9Karima M.On Transforming Business Patterns to Labeled Petri Nets Using Graph Grammars[J].Information Technology and Computer Science,2013,20(2):15-27.
  • 10Agnarsson G,Greenlaw R.Graph Theory:Modeling,Applications,and Algorithms[M].New York:Prentice Hall Press,2007:89-97.

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部