博碩士論文 93524001 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:14 、訪客IP:3.15.6.140
姓名 謝碩峰(James S. F. Hsieh)  查詢紙本館藏   畢業系所 網路學習科技研究所
論文名稱 可信賴網際服務之合成與評估
(Composition and Evaluation of Trustworthy Web Services)
相關論文
★ 透過視覺化影片瀏覽行為分析提升磨課師課程之完課率★ 應用智慧分類法提升文章發佈效率於一企業之知識分享平台
★ 家庭智能管控之研究與實作★ 開放式監控影像管理系統之搜尋機制設計及驗證
★ 資料探勘應用於呆滯料預警機制之建立★ 探討問題解決模式下的學習行為分析
★ 資訊系統與電子簽核流程之總管理資訊系統★ 製造執行系統應用於半導體機台停機通知分析處理
★ Apple Pay支付於iOS平台上之研究與實作★ 應用集群分析探究學習模式對學習成效之影響
★ 應用序列探勘分析影片瀏覽模式對學習成效的影響★ 一個以服務品質為基礎的網際服務選擇最佳化方法
★ 維基百科知識推薦系統對於使用e-Portfolio的學習者滿意度調查★ 學生的學習動機、網路自我效能與系統滿意度之探討-以e-Portfolio為例
★ 藉由在第二人生內使用自動對話代理人來改善英文學習成效★ 合作式資訊搜尋對於學生個人網路搜尋能力與策略之影響
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) “網際服務”是種可以讓不同平台的軟體根據商業的需求做到無縫高度整合的一項技術. 目前網際服務這項技術相關的研究都著重在於描述服務的軟體介面, 還有功能性的描述, 與自動化整合的相關技術. 一個基本的服務流程可以用以下幾個簡單的步驟來說明: 服務需求者可以針對他們的需求提出服務需求的要素, 網際服務代理人會根據功能性的需求找到適合的服務提供者, 服務提供者會提供服務來滿足服務需求者的要求, 然後整個網際服務的整個流程完整結束. 因為服務所需要的資訊是藉由網路的方式傳送於不同單位的服務提供者來整合分散式鬆耦合架構的多個服務,所以存在一個重要的課題需要解決, 那就是網際服務的鬆耦合與分散架構下會造成安全性與信賴上的問題產生. 學生的論文中我嘗試提出解決方法來解決這類的問題.基本的概念就是我們可以根據過去服務執行時收集非功能性的特性與資訊來評估一個服務提供者的信賴度, 我使用彈性的Ontology架構來描述與記錄服務執行後產生的非功能性特性(服務執行過所留下的經驗), 藉由統計方法根據服務需求者所提出的信賴需求策略與過去經驗來評估一個不可分割網際服務之信賴度, 然後, 我使用了派翠網路 (Petri nets) 來描述一個合成的網際服務 (Composite web service) 之執行流程, 再根據派翠網路模擬執行過程所產生的 Coverability Graph 結合之前所計算每個不可分割服務的信賴度之結果來評估一個合成之網際服務的整體信賴程度. 這樣的方式將比傳統的方法更可以完整的評估一個合成之網際服務是否在服務需求者的要求之下是值得信賴的.
摘要(英) Web service technology enables seamlessly integration of different software to fulfill dynamic business demands in a platform-neutral fashion. By means of standard interfaces, service requesters can obtain desired functionalities through certain service discovery mechanism and service providers can offer the functionality to service requesters without exposing details of provided services. However, the adoption of loosely coupled and distributed services will cause trustworthiness problems. In this these, I used ontology to describe experience and utilize statistical techniques along with Petri nets to conduct a trustworthy evaluation method for composite Web services. The degree of trustworthiness of all involved services in an aggregated composite service will be evaluated by analyzing past experiences so that the trustworthiness of the composite service could be estimated from the evaluation.
關鍵字(中) ★ 派翠網路
★ 本體論
★ 可信賴之網際服務
★ 組合之網際服務
★ 自動化運算
★ 信賴
關鍵字(英) ★ Trustworthy Web services
★ Composite Web services
★ Ontology
★ Petri nets
★ Quality of Service (QoS)
★ Service selection
★ Autonomic Computing
★ Trust
論文目次 Chapter 1 Introduction 1
1.1 Classification of Trustworthiness Research 2
1.2 Research Motivation 4
1.3 Organization of Thesis 6
Chapter 2 Related Work 8
Chapter 3 Experience based Trust Management 11
3.1 Quantification of Trustworthiness 15
3.2 Specification of Experience 16
3.3 Specification of Trustworthy Requirement 18
Chapter 4 Evaluation Trustworthiness of Single Service 20
Chapter 5 Evaluation Trustworthiness of Composite Service 25
5.1 Trustworthy Web Service Evaluation Petri Nets 26
5.2 Trustworthy Evaluation 32
Chapter 6 Conclusion and Future Research 38
References 39
參考文獻 • Aoyama, M.; Weerawarana, S., Maruyama, H., Szyperski, C., Sullivan, K., and Lea, D. (2002) “Web services engineering: promises and challenges,” Proceedings 24th International Conference on Software Engineering ICSE , 2002
• Gisolfi, D. (2001) “An Introduction to dynamic e-business,” IBM Developer, from http://www-128.ibm.com/developerworks/webservices/library/ws-arc1/index.html
• Yang, S., Lan, B., and Chung, J.Y. (2005) “Trustworthy Service-Oriented Business Process Integration,” International Journal of Service Process Modeling (IJSPM).
• Grandison, T. and Sloman, M. (2000) “A Survey of Trust in Internet Applications,” IEEE Communications Surveys, pp.2-16.
• Microsoft, IBM, and VeriSign (2002) “Specification: Web Services Security (WS-Security),” from http://www-128.ibm.com/developerworks/library/ws-secure/
• Microsoft, IBM, and VeriSign (2004) “Web Services Policy Framework (WS-Policy) ,” from http://ifr.sap.com/ws-policy/ws-policy.pdf
• IBM, BEA Systems, Microsoft, Layer 7 Technologies, Oblix, VeriSign, Actional, Computer Associates, OpenNetwork Technologies, Ping Identity, Reactivity, and RSA Security, (2004) “Web Services Trust Language,” from http://www-128.ibm.com/developerworks/webservices/library/specification/ws-trust/
• Anthony, N., Chris, K., Phillip H., and Ronald, M. (2004) “Web Services Security: SOAP Message Security 1.0 (WS-Security 2004),” from http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0
• Box et al, D. (2003) “Web Services Policy Framework (WS-Policy) Specification Version 1.01,” from http://www-106.ibm.com/developerworks/library/ws-polfram/
• IBM Corporation (2003) “Web Services Level Agreements,” from http://www.research.ibm.com/wsla/WSLASpecV1-20030128.pdf
• Mani, A. and Nagarajan, A. (2002) “Understanding Quality of Service for Web Services,” from http://www-106.ibm.com/developerworks/webservices/library/ws-quality.html
• Jøsang, A. (1999) “An Algebra for Assessing Trust in Certification Chains”. In J. Kochmar, editor, Proceedings of the Network and Distributed Systems Security Symposium (NDSS’99). The Internet Society.
• Jøsang, A. (1999) “Trust-based Decision Making for Electronic Transactions,” The 4th Nordic Wksp. Secure IT Systems (NORDSEC’ 99), Stockholm, Sweden: Stockholm University Report 99-005.
• Huhns, M.N. and Buell, D.A. (2002) “Trusted autonomy,” IEEE Internet Computing, pp.92-95.
• Patrick, A.S. (2002) “Building Trustworthy Software Agents,” IEEE Computing, pp.46-53.
• Singh, M.P. (2002) “Trustworthy Service Composition: Challenges and Research Questions,” Proceedings of the Autonomous Agents and Multi-Agent Systems Workshop on Deception, Fraud and Trust in Agent Societies, pp. 39-52.
• Yolum, P. and Singh, M.P. (2002) “An Agent-Based Approach for Trustworthy Service Location,” Proceedings of 1st International Workshop on Agents and Peer-to-Peer Computing (AP2PC), pp. 45-56.
• Maximilien, E. M. and Singh ,M. P. (2002) “Conceptual Model of Web Service Reputation,” SIGMOD Record, 31(4):36–41
• Maximilien, E. M. and Singh, M. P. (2004). “A Framework and Ontology for Dynamic Web Services Selection,” IEEE Internet Computing, 8(5):84–93
• Staab, S., Bhargava, B., Lilien, L., Rosenthal, A. et al (2004) “The Pudding of Trust,” IEEE Intelligent Systems, pp. 74-88.
• Shadbolt, N. (2002) “A Matter of Trust,” IEEE Intelligent Systems, pp. 2-3.
• Bertino, E. and Squicciarini, A. C. (2004) “Trust-X: A Peer-to-Peer Framework for Trust Establishment,” IEEE Transactions on Knowledge and Data Engineering, Vol. 16, No. 7, pp. 827-842.
• McKnight, D.H. and Chervany, N.L. (1996) “The Meanings of Trust,” MISRC 96-04, University of Minnesota, Management Information Systems Research Center, University of Minnesota.
• Nuutila, E. and Soisalon-Soininen, E.(1994) “On finding the strongly connected components in a directed graph,” Information Processing Letters
• Marsh, S.P. (1994) “Formalising Trust as a Computational Concept,” from http://www.cs.stir.ac.uk/research/publications/techreps/pdf/TR133.pdf
• Yolum, P. and Singh, M. P. (2005) “Engineering Self-Organizing Referral Networks for Trustworthy Service Selection,” IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, Vol. 35, No. 3, pp. 396-407.
• Golbeck, J., Parsia, J. and Hendler, B. (2003) “Trust Networks on the Semantic Web,” Proceedings of Cooperative Intelligent Agents.
• Golbeck, J. and Hendler, B. (2004) “Inferring Reputation on the Semantic Web,” Proceedings of 13th International Web Conference (WWW2004).
• Mitchell, T. (1997) “Machine Learning,” WCB McGraw-Hill, pp.128-141.
• Mendenhall, W. and Beaver, R.J. (1999) “Introduction to Probability and Statistics,” Duxbury Press, pp.442-446.
• Thomas, J. P., Thomas, M., and Ghinea, G.,(2003) “Modeling of Web Services Flow,” IEEE International Conference on E-Commerce, Newport Beach, California, USA, June 24 - 27, 2003, pages 391-398.
• Aalst, W.M.P. van der, Hofstede, A.H.M. ter, Kiepuszewski, B., and Barros, A.P. (2000) “Advanced Workflow Patterns,” In O. Etzion en P. Scheuermann, editors, 7th International Conference on Cooperative Information Systems (CoopIS 2000), volume 1901 of Lecture Notes in Computer Science, pages 1829.
• Narayanan S and McIlraith S A, (2002) “Simulation, Verification and Automated Composition of Web Services,” Proceedings ACM WWW 2002, pp. 77-88 23
• Karp, R.M. and Miller, R.E. (1969) “Parallel Program Schemata,” Journal of Computer and System Sciences 3, pp.
• Finkel, A. (1993), “The Minimal Coverability Graph for Petri Nets,” Advances in Petri Nets 1993, Lecture Notes in Computer Science, Vol. 674, pp. 210-243, Springer Verlag.
• Murata, T. (1989) “Petri Nets: Properties, Analysis and Applications,” Proceedings of the IEEE Vol.77, No. 4, pp.541-580.
• Cormen, T.H., Leiserson, C.E. and Rivest, R.L. (1999) “Introduction to Algorithms,” The MIT Press and McGraw-Hill, pp.489-490.
• Noy, N. F. and McGuinness, D. L. (2001) “Ontology development 101: a guide to creating your first ontology,” Stanford Knowledge Systems Laboratory Technical Report KSL-01-05 and Stanford Medical Informatics Technical Report SMI-2001-0880. 2001.
• Castellanos, M., Casati, F., Shan, M. C., and Dayal, U. (2004) “Visibility and Measurability for Trust Management in Cooperative Business Operations,” IEEE CEC-East, pp. 92 – 99, 2004.
• Zhang, J., Zhang, L. J., and Chung, J. Y. (2004) “An Approach to Help Select Trustworthy Web Services,” IEEE CEC-East, pp. 84 – 91, 2004.
• Liu, P., and Chen, Z. (2004) “An Extended RBAC Model for Web Services in Business Process,” IEEE CEC-East, 24 pp.100 – 107, 2004.
指導教授 楊鎮華(Stephen J.H. Yang) 審核日期 2006-7-12
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明