Loading...
|
Please use this identifier to cite or link to this item:
https://nccur.lib.nccu.edu.tw/handle/140.119/32623
|
Title: | 以規則分類機制來建立一個具可信度的網路服務架構 |
Authors: | 陳世庭 Se-Ting Chen |
Contributors: | 胡毓忠 Yuh-Jong Hu 陳世庭 Se-Ting Chen |
Keywords: | Semantic Web Agent Trust Web Service Rule |
Date: | 2003 |
Issue Date: | 2009-09-17 13:52:46 (UTC+8) |
Abstract: | 可信度是網路服務首要解決的問題,我們從數位憑證,認證、授權、委任授權等安全層面去研究代理者可信度,並提出一套完整可信度規則分類機制當作信任度判斷的依據。在此篇論文中,我們論證如何將規則概念應用在代理者的溝通協定、服務流程控制上。我們並同時整合語意網規則和本體論的技術,以達到可信的網路服務環境。 Trust is one of the most important issues for Web Services. We studied the agent trust problem based on security technologies, such as digital certificates, authentication, authorization, and delegation, etc. Furthermore, we propose a complete trust rule taxonomy mechanism to assistant us on the evaluation of agent trustworthiness. In this thesis, we justify the feasibility of using rule concepts on the agent communication protocol and service process control. We also demonstrated how to integrate the semantic web rules and ontologies to have a trusted web services environment. |
Reference: | 參考文獻 [1] Andreas Eberhart, OntoAgent: A Platform for Declarative Specification of Agents, Proc. International Workshop on Rule Markup Languages for Business Rules on the Semantic Web, Sardinia (Italy), June (2002). [2] Benjamin Grosof and Terrence Poon, Representing Agent Contracts with Exceptions using XML Rules, Ontologies, and Process Descriptions, Proc. International Workshop on Rule Markup Languages for Business Rules on the Semantic Web, Sardinia (Italy), June (2002). [3] Benjamin N. Grosof and Ian Horrocks, Description Logic Programs: Combining Logic Programs with Description Logic, Working Paper, version of Nov. 21, (2002), http://ebusiness.mit.edu/bgrosof/paps/dlp-wp-v19.pdf. [4] Benjamin N.Grosof, Yannis Labrou and Hoi Y.Chan, A Declarative Approach to Business Rules in Contracts:Courteous Logic Programs in XML, Proc. ACM E-Commerce 99, Denver, (1999), 68-77. [5] DAML Services Coalition, DAML-S:Semantic Markup for Web Services, Proc. International Semantic Web Working Symposium (SWWS), Standford, CA., (2001), 411-430. [6] DARPA Agent Markup Language Program http://www.daml.org/. [7] FIPA (Foundation for Intelligent Physical Agents) Agent Communication Language standards effort, http://www.fipa.org. [8] Gerd Wagner, How to Design a General Rule Markup Language?, Invited Talk, Workshop XML Technologien für das Semantic Web (XSW 2002), Berlin, June (2002). [9] Harold Boley, Said Tabet, and Gerd Wagner, Design Rationale of RuleML: A Markup Language for Semantic Web Rules, Proc. SWWS`01, Stanford, July/August (2001). [10] Yuh-Jong Hu, Some Thoughts on Agent Trust and Delegation. The Fifth International Conference on Autonomous Agents, Montreal, Quebec, Canada, May 28-June 1, (2001), 489-496. [11] Yuh-Jong Hu, Trusted Agent-Mediated E-Commerce Transaction Services via Digital Certificates Management. Electronic Commerce Research (ECR),Vol. 3, Issues 3-4, April (2003). [12] James Hendler, Agents and the Semantic Web, IEEE Intelligent Systems, vol. 16, no. 2, Mar./Apr. (2001), 30–37. [13] Lalana Kagal, Tim Finin, Anupam Joshi, Developing Secure Agent Systems Using Delegation Based Trust Management, Security of Mobile Multi-Agent Systems Workshop, Autonomous Agents and Multiagent Systems (AAMAS 2002), Bologna, Italy, July 16 (2002). [14] Mandarax, http://www.mandarax.org/ [15] Mizuho Iwaihara, Masayuki Kozawa, Jun Narazaki and Yahiko Kambayashi ,A System for Querying and Viewing Business Constraints, Proc. International Workshop on Rule Markup Languages for Business Rules on the Semantic Web, Sardinia (Italy), June (2002). [16] Ninghui Li, Benjamin Grosof and Joan Feigenbaum, A Practically Implementable and Tractable Delegation Logic, Proc. of IEEE Symp. on Security and Privacy, Oakland, CA, USA, May (2000). [17] RuleML, http://www.dfki.uni-kl.de/ruleml/. [18] Security in a Web Services World: A Proposed Architecture and Roadmap. A joint security white paper from IBM Corp. and Microsoft Corp., Version 1.0, April 7, (2002). http://www.-106.ibm.com/developworks/library/ws-secmap. [19] Sheila A. McIlraith, Tran Cao Son, and Honglei Zeng, Semantic Web Services, IEEE Intelligent Systems, vol. 16, no. 2, Mar./Apr. (2001), 46–53. [20] Theo Dimitrakos, Brian Matthews and JuanBicarregui, Towards security and trust management policies on the Web, ERCIM workshop, Zurich, Switzerland, October 3, (2001). [21] Tuomo Lampinen, Using SPKI Certificates for Authorization in CORBA based Distributed Object-Oriented Systems, Proceedings of the NordSec`99, the Fourth Nordic Workshop on Secure IT Systems, Stockholm, Sweden, November 1st-2nd, (1999). [22] XML Encryption, http://www.w3.org/Encryption/2001/ [23] XML Signature, http://www.w3.org/TR/xmldsig-core/ [24] Bradshaw, M. Jeffrey, et al., KaoS:Toward An Industrial-Strength Open Agent Architecture. Software Agents, Edited by Jeffrey M. Bradshaw, (1997), 375-418. [25] Stuart Russell and Peter Norvig, Artificial Intelligence:A Modern Approach, Prentice Hall, New Jersey, US, (1995). |
Description: | 碩士 國立政治大學 資訊科學學系 90753011 92 |
Source URI: | http://thesis.lib.nccu.edu.tw/record/#G0090753011 |
Data Type: | thesis |
Appears in Collections: | [資訊科學系] 學位論文
|
All items in 政大典藏 are protected by copyright, with all rights reserved.
|