用户名: 密码: 验证码:
基于Petri网的Web服务组合的交互模型及其应用机理的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
当前,互联网不仅是信息传输的基础设施,而且是信息处理和服务共享的基础设施。以资源聚合和按需服务为主要理念的云计算的迅速发展,使未来的用户不必再关心如何根据自己的业务需求去购买服务器、软件和解决方案,而只需关心如何通过互联网来获取满足自己需求的云服务。面向服务的计算(Service-Oriented Computing,SOC)把服务作为构建软件应用系统的基本单元,为网络资源和服务共享提供了统一的技术规范。面向服务的体系架构(Service-Oriented Architecture,SOA)已成为新一代Web服务的基础架构。在这一架构下,开发者无需进行底层的程序实现,而只需编写服务组合脚本便可构建一个复杂的业务应用。
     以Web服务为代表的软件服务及服务协同正成为互联网应用的主流形态。但是,由于恶意客户或异常伙伴服务的存在,服务协同未必能正常完成。为此,需要以服务组合监控为目的,对Web服务组合过程中所有伙伴服务之间的交互行为建立定性分析模型。另一方面,考虑到网络传输速度和可靠性等环境因素对服务组合性能的影响,需要以环境优化为目的,引入定量化的环境因素,在前一模型基础上建立交互行为的量化模型。本文在分析国内外相关最新研究成果的基础上,从定性定量两个方面研究了Web服务组合的交互模型、交互行为检测算法、运行时监控机制和基于模型模拟的环境优化方法,主要成果包括:
     1.提出了一种基于有色Petri网的Web服务组合交互定性分析模型WS-PIM。目前,业务流程执行语言BPEL可以作为服务组合脚本语言用于描述服务组合的流程,而WS-PIM模型关注于服务组合过程中的服务之间的协同交互关系是否发生异常。在WS-PIM模型中,这种协同交互关系是基于有色Petri网描述的,该模型将服务组合流程所处的状态映射为有色Petri网的“令牌”(Token)在其“库所”(Place)中的分布,将流程状态的变化映射为“变迁”(Transition),将BPEL中用于装配流程的“活动”(Activity)映射为WS-PIM模型的基本模式,进而采用库所融合的方式实现模型基本模式的嵌套迭代和组合。本文还给出了WS-PIM模型的首、尾库所唯一性,后继状态可达性以及后继节点的出入度约束等重要性质。实验表明,该模型比同类模型更适合于描述服务组合过程中的协同交互关系。
     2.提出了一种基于时序属性一致性的Web服务组合交互行为检测算法。交互行为的时序属性包括偏序关系、活性、安全性等。在服务组合流程的实际执行过程中,消息是交互行为的唯一表征,代表交互过程的是实际发生的消息序列;另一方面,WS-PIM模型所描述的服务组合的流程状态变化过程是通过定性分析得到的变迁发生序列。两个序列所体现的时序属性必须是一致的。本文以一个BPEL描述的典型服务组合流程为实例,提出了一种基于时序属性一致性的Web服务组合交互行为检测算法。该算法将实际捕获到的交互行为序列与模型分析得到的变迁发生序列进行时序关系比对,便能判定服务组合执行是否存在异常。实验表明,该算法能有效检测服务组合过程中发生的服务异常。
     3.提出了一种基于Web服务组合交互行为检测算法的运行时监控机制。该机制由交互模型特征抽取器、交互行为捕获器以及时序属性一致性检测器三部分构成。交互模型特征抽取器能够自动将BPEL描述的服务组合映射为WS-PIM模型,并抽取出交互过程中的变迁发生序列及其必须遵循的时序属性。交互行为捕获器部署在负责处理交互行为的消息引擎中,实时捕获所有与被监控的服务组合进程相关的交互消息,并将消息转发给时序属性一致性检测器。时序属性一致性检测器运用Web服务组合交互行为检测算法,对捕获到的交互行为进行运行时检测。该检测器的判定逻辑所对应的软件代码是由交互模型特征提取器自动生成的。
     4.提出了一种基于广义随机Petri网的Web服务组合定量化交互模型WS-GIM。该模型聚焦于Web服务组合的性能与网络交互环境之间的关系,关注直接影响系统吞吐率性能的各个伙伴服务的执行时间和消息在网络中的传输速度以及它们的失效率。WS-GIM模型以WS-PIM模型为基础,增加服务的执行和消息的传输两个广义随机Petri网基本模式,并在泊松分布的假设下,通过设置服务的往返时间、失效率和分支流程执行概率等个体服务有关的均值参数,从而建立相应的定量化模型。通过实例的模型模拟和统计分析,可以得到整个服务组合的平均吞吐率、失效率等属性。该定量模型可用于评估网络交互环境因素对服务组合吞吐率性能的影响,进而给出了一种基于网络交互环境的服务组合性能优化的途径。同时,本文将该模型预测的平均吞吐率、失效率与组合服务部署代价、运营商信誉等属性聚合成决策矩阵,并赋予不同的权重,基于多属性效用理论,研究了组合服务的部署方案,从中选取偏好排序结果。
Currently, the Internet is not only information transmission infrastructure, but also information processing and services sharing infrastructure. Cloud computing is developing rapidly, the main concept of which is resources aggregation and on-demand services. So that future users do not care about how to buy the servers, software and solutions according to their business requirements, and only concern about how to obtain cloud services via the Internet to meet their own demands. Service-oriented computing (SOC), which provides network resources and services sharing with a uniform technical specifications, builds software application system by using services as basic units. Service-oriented architecture (SOA) has become a new generation of Web services infrastructure. In this framework, developers do not need to implement programs. They just write Web service composition scripts to build complex business applications.
     Software services and services collaboration are becoming a mainstream form of Internet applications. However, for the existence of malicious clients or abnormal partner services, service coordination may not be properly completed. For this reason, a qualitative analysis model is required to describe the interactions between all partner services as the purpose of runtime monitoring service composition. On the other hand, considering the relationship between service composition performance and Internet environmental factors such as network speed and reliability, it is needed to import quantitative Internet environmental factors to build a quantitative model based on the previous interaction model, in order to optimize service execution environment. On the basis of the latest research results related to this dissertation, it presents Web service composition interaction model, interaction behavior detection algorithm, runtime monitoring mechanism and model simulation based Internet environment optimization methods qualitatively and quantitatively. The key contributions of this dissertation include:
     Firstly, this dissertation proposes colored Petri net (CPN) based Web service composition interaction model WS-PIM for the purpose of qualitative analysis. Recently, the Business Process Execution Language (BPEL) serves as a service composition description language to describe service composition process. WS-PIM model focuses on collaborative interactions between partner services in the process of service composition. In the WS-PIM model, these synergistic interactions relationships are described by CPN. The model maps process status to the“token”distribution in the“place”of CPN, maps the changing of process to the“transition”of CPN, and maps the BPEL activities for process assembly to WS-PIM basic patterns. Then, the nested iteration and combination of WS-PIM basic patterns are implemented, by the way of“place”fusion. Several important properties of WS-PIM model are also provided. Experiments show that the model is more suitable than the similar models in describing the collaborative interactions of service composition process.
     Secondly, a temporal properties consistency based Web service composition interactions behavior detection algorithm is introduced. Temporal properties of interaction behaviors contain partial order, liveness, safety properties etc. In actual service composition process, the message is the only evidence of interaction behavior. These message sequences are representative of the actual interaction course; on the other hand, the changing course of service composition process status is showed by the transition firing sequences, which are obtained by analyzing WS-PIM model. The temporal properties reflected by the two sequences are consistent. Using a typical service composition process as an example, this dissertation gives temporal properties consistency based Web service composition interactions behavior detection algorithm. The algorithm captures the actual message sequences, and compares them with transition firing sequences to determine whether the execution of composite service is abnormal or not. Experiments show that the algorithm effectively detect the exception of service composition occurred during the process.
     Thirdly, the dissertation presents a runtime monitoring mechanism based on the Web service composition interaction behavior detection algorithm. This mechanism is composed of interaction model feature extractor, interaction behavior capturer and temporal property consistency checker. Interaction model feature extractor is capable of automatically transforming service composition script described by BPEL to WS-PIM model, and extracting the interaction behaviors and their temporal properties. Interaction behavior capturer is deployed in SOAP message engine, which can capture all the interaction messages related to monitored Web service composition process in real-time. These messages are forwarded to temporal property consistency checker. Temporal property consistency checker uses Web service composition interaction behavior detection algorithm to check the captured interaction behaviors. The core logic of checker is automatically generated by interaction model feature extractor.
     Finally, a generalized stochastic Petri nets (GSPN) based quantitative Web services interaction model WS-GIM is introduced. The model focuses on the relationship between the performance of Web service composition and network interaction environment. It concerns about the execution time of partners services and the speed of message transmission in the network and their failure rates, all of which directly affect the service composition system throughput performance. On the basis of WS-PIM model, WS-GIM model appends the service execution and message transmission two basic GSPN patterns. Under the Poisson distribution assumption, the mean parameters of individual services, such as service execution round trip time, service failure rate and process branch execution probability, are set in order to establish the quantitative WS-GIM model. By model simulation and statistical analysis, we acquire the average system throughput and failure rate of the whole service composition sample. The quantitative model can be used to evaluate the impact of interaction network environment on service composition throughput performance, so that it is applied to service composition performance optimization methods. At the same time, a composite service deployment plan selection method is also provided. By using the WS-GIM model prediction results, this method makes the use of multi-attribute utility theory to select preferable composite service deployment plan.
引文
[1] Erl T. Service-Oriented Architecture: Concepts, Technology, and Design [M]. Prentice Hall PTR Upper Saddle River, NJ, USA, 2005.
    [2] Booth D., Haas H., Mccabe F., et al. Web Services Architecture [J]. W3C Working Group Note, 2004, 11: 2001-2005.
    [3] Christensen E., Curbera F., Meredith G., et al. Web Services Description Language (WSDL) 1.1 [Z]. 2001.
    [4] Gudgin M., Hadley M., Mendelsohn N., et al. Simple Object Access Protocol (SOAP) 1.2 [J]. World Wide Web Consortium, 2003.
    [5] Petrie C., Bussler C. Service Agents and Virtual Enterprises: A Survey [J]. IEEE Internet Computing, 2003, 7(4): 68-78.
    [6]李景霞,侯紫峰.Web服务组合综述[J].计算机应用研究,2005,22(012):4-7.
    [7] Milanovic N., Malek M. Current Solutions for Web Service Composition [J]. IEEE Internet Computing, 2004, 8(6): 51-59.
    [8]朱锐.可信服务组合若干关键技术研究[D].长沙:国防科技大学,2009.
    [9] Papazoglou M. P., Georgakopoulos D. Service-Oriented Computing [J]. Communications of the ACM, 2003, 46(10): 25-28.
    [10] Al-Masri E., Mahmoud Q. H. Investigating Web Services on the World Wide Web [C]// Proceeding of the 17th international conference on World Wide Web. ACM, 2008: 795-804.
    [11] Kim S. M., Rosu M. C. A Survey of Public Web Services [J]. E-Commerce and Web Technologies, 2004, 3182(2004): 96-105.
    [12] Lu J., Yu Y., Roy D., et al. Web Service Composition: a Reality Check [C]// Proceedings of the 8th international conference on Web information systems engineering. Springer-Verlag, 2007: 523-532.
    [13] Bachlechner D., Siorpaes K., Fensel D., et al. Web Service Discovery-a Reality Check [C]// the 3rd European Semantic Web Conference (ESWC 2006). 2006
    [14] Srivatsa M., Iyengar A., Mikalsen T., et al. An Access Control System for Web Service Compositions [C]// IEEE International Conference on Web Services 2007 (ICWS'07). US: IEEE, 2007: 1-8.
    [15] Singh M. Trustworthy Service Composition: Challenges and Research Questions [J]. Trust, Reputation, and Security: Theories and Practice, 2003, 2631: 117-135.
    [16] Zheng Z., Ma H., Lyu M. R., et al. WSREC: A Collaborative Filtering Based Web Service Recommender System [C]// IEEE International Conference on Web Services 2009 (ICWS'09). IEEE, 2009: 437-444.
    [17] Murata T. Petri Nets: Properties, Analysis and Applications [J]. Proceedings ofthe IEEE, 2002, 77(4): 541-580.
    [18]袁崇义.Petri网原理[M].电子工业出版社,1998.
    [19] Girault C., Valk R. Petri Nets for Systems Engineering: A Guide to Modeling, Verification, and Applications [M]. Springer Verlag, 2003.
    [20] Tgi. Petri Nets Tool Database [EB/OL]. http://www.informatik.uni-hamburg.de/TGI/PetriNets/tools/db.html, 2011-02-07/2011-2-16.
    [21] Oasis. Web Services Business Process Execution Language Version 2.0 (WS-BPEL 2.0) [Z]. 2007.
    [22] Alves A., Arkin A., Askary S., et al. Web Services Business Process Execution Language version 2.0 [S]. Oasis, 2007.
    [23] Juric M. B. Business Process Execution Language for Web Services BPEL and BPEL4WS 2nd Edition [M]. Packt Publishing, 2006.
    [24]王紫瑤.SOA核心技术及应用[M].电子工业出版社,2008.
    [25]梁爱虎.SOA思想、技术与系统集成应用详解[M].北京:电子工业出版社,2007.
    [26] Juric M. B. A Hands-on Introduction to BPEL [J]. Oracle (white paper), 2006.
    [27]邓水光.Web服务自动组合与形式化验证的研究[D].杭州:浙江大学,2007.
    [28] Milner R. A Calculus of Communicating Systems [M]. Springer-Verlag New York, Inc. Secaucus, NJ, USA, 1982.
    [29] Hoare C. A. R. Communicating Sequential Processes [J]. Communications of the ACM, 1978, 21(8): 666-677.
    [30] Milner R. Communicating and Mobile Systems: the Pi-Calculus [M]. Cambridge Univercity Press, 1999.
    [31] Ferrara A. Web Services: a Process Algebra Approach [C]// the 2nd international conference on Service oriented computing. New York, NY, USA : 2004: 242-251.
    [32] Salaun G., Bordeaux L., Schaerf M. Describing and Reasoning on Web Services using Process Algebra [J]. International Journal of Business Process Integration and Management, 2006, 1(2): 116-128.
    [33] Haddad S., Melliti T., Moreaux P., et al. Modelling Web Services Interoperability [C]// Proceedings of the Sixth International Conference on Entreprise Information Systems. 2004: 287-295.
    [34] Hopcroft J. E., Motwani R., Ullman J. D. Introduction to Automata Theory, Languages, and Computation [M]. Addison-Wesley Reading, MA, 1979.
    [35] Alur R., Dill D. L. A Theory of Timed Automata [J]. Theoretical computer science, 1994, 126(2): 183-235.
    [36] Fu X., Bultan T., Su J. Analysis of Interacting BPEL Web Services [C]// Proceedings of the 13th international conference on World Wide Web. ACM, 2004:621-630.
    [37] Diaz G., Pardo J. J., Cambronero M. E., et al. Automatic Translation of WS-CDL Choreographies to Timed Automata [J]. Formal Techniques for Computer Systems and Business Processes, 2005: 230-242.
    [38] Holzmann G. J. The Model Checker SPIN [J]. IEEE Transactions on software engineering, 1997, 23(5): 279-295.
    [39] Bengtsson J., Larsen K., Larsson F., et al. UPPAAL - a Tool Suite for Automatic Verification of Real-Time Systems [J]. Hybrid Systems III, 1996: 232-243.
    [40] Van der Aalst W. A Class of Petri Nets for Modeling and Analyzing Business Processes [R]. Eindhoven: Eindhoven University of Technology, 1995.
    [41] Hinz S., Schmidt K., Stahl C. Transforming BPEL to Petri Nets [C]// Proceedings of the 3rd International Conference on Business Process Management (BPM’05). Springer, 2005: 220-235.
    [42] Ouyang C., Verbeek E., van der Aalst W. M. P., et al. Formal Semantics and Analysis of Control Flow in WS-BPEL [J]. Science of Computer Programming, 2007, 67(2-3): 162-198.
    [43] Lohmann N., Massuthe P., Stahl C., et al. Analyzing Interacting WS-BPEL Processes using Flexible Model Generation [J]. Data & Knowledge Engineering, 2008, 64(1): 38-54.
    [44] Jensen K. Coloured Petri Nets: Basic Concepts, Analysis Methods, and Practical Use [M]. Springer Verlag, 1996.
    [45] Yang Y. P., Tan Q. P., Xiao Y. Verifying Web Services Composition Based on Hierarchical Colored Petri Nets [C]// Proceedings of the first international workshop on Interoperability of heterogeneous information systems. ACM, 2005: 47-54.
    [46] Tan W., Fan Y., Zhou M. A Petri Net-Based Method for Compatibility Analysis and Composition of Web Services in Business Process Execution Language [J]. IEEE Transactions on Automation Science and Engineering, 2009, 6(1): 94-106.
    [47] Verbeek H., van der Aalst W. Analyzing BPEL Processes Using Petri Nets [C]// Proceedings of the Second International Workshop on Applications of Petri Nets to Coordination, Workflow and Business Process Management. Citeseer, 2005: 59-78.
    [48] Van der Aalst W. The Application of Petri Nets to Workflow Management [J]. Journal of Circuits Systems and Computers, 1998, 8: 21-66.
    [49] Holanda H., Barroso G. C., Serra A. SPEWS: A Framework for the Performance Analysis of Web Services Orchestrated with BPEL4WS [C]// Fourth International Conference on Internet and Web Applications and Services (ICIW'09). IEEE, 2009: 363-369.
    [50] Yang H., Li Z. Extended GSPN Modeling and Reduction Algorithms for Rapid Performance Analysis of Service Composition System [C]// IEEE International Conferenceon Intelligent Computing and Intelligent Systems, (ICIS 2009). IEEE, 2009: 180-185.
    [51]门鹏,段振华.广义随机Petri网下的组合Web服务建模与评价[J].西安交通大学学报,2008,42(8):967-971.
    [52] Havelund K., Rosu G. Monitoring Java Programs with Java Pathexplorer [C]// Proceedings of the 1st International Workshop on Runtime Verification (RV' 01). Paris, France: Elsevier Science, 2001
    [53] Chen F., Rosu G. MOP: an Dfficient and Generic Runtime Verification Framework [J]. ACM SIGPLAN Notices, 2007, 42(10): 569-588.
    [54] Chen F., Rosu G. Towards Monitoring-Oriented Programming: A Paradigm Combining Specification and Implementation [J]. Electronic Notes in Theoretical Computer Science, 2003, 89(2): 108-127.
    [55] Gu W., Eisenhauer G., Kraemer E., et al. Falcon: On-Line Monitoring and Steering of Large-Scale Parallel Programs [C]// Fifth Symposium on the Frontiers of Massively Parallel Computation, (Frontiers' 95). US: IEEE, 2002: 422-429.
    [56] Peters D. K., Parnas D. L. Requirements-Based Monitors for Real-Time Systems [J]. IEEE Transactions on Software Engineering, 2002, 28(2): 146-158.
    [57] Kim M., Lee I. Monitoring, Checking, and Steering of Rreal-Time Systems [J]. Electronic Notes in Theoretical Computer Science, 2002, 70(4): 95-111.
    [58] Jeffery C., Zhou W., Templer K., et al. A Lightweight Architecture for Program Execution Monitoring [J]. ACM SIGPLAN Notices, 1998, 33(7): 67-74.
    [59] Rosenblum D. S. A Practical Approach to Programming with Assertions [J]. IEEE Transactions on Software Engineering, 1995, 21(1): 19-31.
    [60] Mok A. K., Liu G. Efficient Run-Time Monitoring of Timing Constraints [C]// Third IEEE Real-Time Technology and Applications Symposium (RTAS'97). US: IEEE Computer Society, 1997: 252-262.
    [61] Gates A. Q., Roach S., Mondragon O., et al. DynaMICs: Comprehensive Support for Run-Time Monitoring [J]. Electronic Notes in Theoretical Computer Science, 2001, 55(2): 164-180.
    [62] Meyer B. Applying Design by Contract [J]. Computer, 2002, 25(10): 40-51.
    [63] Snodgrass R. A Relational Approach to Monitoring Complex Systems [J]. ACM Transactions on Computer Systems (TOCS), 1988, 6(2): 157-195.
    [64] Bowring J., Orso A., Harrold M. J. Monitoring Deployed Software using Software Tomography [J]. ACM SIGSOFT Software Engineering Notes, 2003, 28(1): 2-9.
    [65] Ogle D. M., Schwan K., Snodgrass R. Application-Dependent Dynamic Monitoring of Distributed and Parallel Systems [J]. IEEE Transactions on Parallel and Distributed Systems, 2002, 4(7): 762-778.
    [66] Marzullo K., Cooper R., Wood M. D., et al. Tools for Distributed Application Management [J]. Computer, 2002, 24(8): 42-51.
    [67] Gao J., Zhu E. Y., Shim S., et al. Monitoring Software Components and Component-Based Software [C]// The 24th Annual International Computer Software and Applications Conference (COMPSAC 2000). IEEE, 2002: 403-412.
    [68] Voas J. Why is it so hard to predict software system trustworthiness from software component trustworthiness? [C]// Proceedings of 20th IEEE Symposium on Reliable Distributed Systems. IEEE, 2002: 179.
    [69] Robinson W. N. Monitoring Web Service Requirements [C]// the 11th IEEE International Conference on Requirements Engineering. IEEE, 2003: 65-74.
    [70] Mahbub K., Spanoudakis G. A Framework for Requirents Monitoring of Service Based Systems [C]// Proceedings of the 2nd international conference on Service oriented computing. ACM, 2004: 84-93.
    [71] Pistore M., Barbon F., Bertoli P., et al. Planning and Monitoring Web Service Composition [J]. Artificial Intelligence: Methodology, Systems, and Applications, 2004: 106-115.
    [72] Hasselbring W., Reussner R. Toward Trustworthy Software Systems [J]. Computer, 2006, 39(4): 91-92.
    [73] Delgado N., Gates A. Q., Roach S. A Taxonomy and Catalog of Runtime Software-Fault Monitoring Tools [J]. IEEE Transactions on Software Engineering, 2005, 30(12): 859-872.
    [74] Bruegge B., Gottschalk T., Luo B. A Framework for Dynamic Program Analyzers [J]. ACM SIGPLAN Notices, 1993, 28(10): 65-82.
    [75] Falcarin P., Lago P., Morisio M. Dynamic Architectural Changes for Distributed Services [C]// the Eighth International Workshop on Component-Oriented Programming (WCOP'03). 2003: 22-25.
    [76] Wang Q. MASS: Middleware-Based Adaptive Software System [C]// the 31st Annual International Computer Software and Appllication Conference. 2007: 204-210.
    [77]怀进鹏,胡春明,李建欣,等.CROWN:面向服务的网格中间件系统与信任管理[J].中国科学:E辑,2006,36(010):1127-1155.
    [78] Papazoglou M. P., Georgakopoulos D. Service-Oriented Computing [J]. Communications of the ACM, 2003, 46(10): 25-28.
    [79] Van der Aalst W., Weijters T., Maruster L. Workflow Mining: Discovering Process Models from Event Logs [J]. IEEE Transactions on Knowledge and Data Engineering, 2004: 1128-1142.
    [80] Move, Lip. Coloane [DB/CD]. Paris: LIP6, 2010.
    [81] van der Aalst W. M. P., Dumas M., Ouyang C., et al. Conformance Checking of Service Behavior [J]. ACM Transactions on Internet Technology (TOIT), 2008, 8(3): 1-30.
    [82]廖军,谭浩,刘锦德.基于Pi-演算的Web服务组合的描述和验证[J].计算机学报,2005,28(4):635-643.
    [83]雷丽晖,段振华.一种基于扩展有限自动机验证组合Web服务的方法[J].软件学报,2007,18(12):2980-2990.
    [84]门鹏.基于Petri网的Web服务组合相关技术研究[D].西安电子科技大学,2009.
    [85]闫春钢,蒋昌俊,李启炎.基于Petri网的Web服务组合与分析[J].计算机科学,2007,34(2).
    [86]张佩云,黄波,孙亚民.基于Petri网的Web服务组合模型描述和验证[J].系统仿真学报,2007,19(12).
    [87]张常有,曹元大,胡晶晶,等.基于Petri网的Web服务组合分析方法[J].北京理工大学学报,2009,29(7).
    [88] Barbon F., Traverso P., Pistore M., et al. Run-Time Monitoring of Instances and Classes of Web Service Compositions [C]// Proceedings of the 4th IEEE International Conference on Web Services (ICWS’06). 2006: 63-71.
    [89]陈今梁,吴国全,魏峻.一种WS-BPEL流程的运行时监控方法[J].电子学报,2007,35(B12):174-178.
    [90]孙明杰,李必信,张鹏程.一种基于监控需求的Web服务运行时监控方法[J].东南大学学报(自然科学版),2009,39(4):716-722.
    [91] Li Z., Jin Y., Han J. A Runtime Monitoring and Validation Framework for Web Service Interactions [C]// Proceedings of the 2006 Australian Software Engineering Conference (ASWEC’06). 2006: 70-79.
    [92] Jones C. Assessment and Control of Software Risks [M]. Yourdon Press , 1994.
    [93] Schroeder B. A. On-line Monitoring: A Tutorial [J]. Computer, 1995, 28(6): 72-78.
    [94] Li Z., Han J., Jin Y. Pattern-Based Specification and Validation of Web Services Interaction Properties [C]// Proceedings of the 3th International Conference on Service-Oriented Computing (ICSOC'05). Springer, 2005: 73-86.
    [95] Apache. Orchestration Director Engine [EB/OL]. http://ode.apache.org/, 2011-02-06/2009-05-11.
    [96] Apache. Apache Axis2 [EB/OL]. http://axis.apache.org/axis2/java/core/, 2010-11-12/2011-03-19.
    [97] Ben-Natan R. CORBA: A Guide to Common Object Request Broker Architecture [M]. McGraw-Hill, 1995.
    [98] Kartson D., Balbo G., Donatelli S., et al. Modelling with Generalized Stochastic Petri Nets [M]. John Wiley & Sons, Inc. New York, NY, USA, 1994.
    [99]范贵生,虞慧群,陈丽琼,等.基于Petri网的服务组合故障诊断与处理[J].软件学报,2010,21(2):231-247.
    [100] Zheng Z., Lyu M. R. WS-DREAM: A Distributed Reliability Assessment Mechanism for Web Services [C]// IEEE International Conference on Dependable Systems and Networks (DSN'08). IEEE, 2008: 392-397.
    [101]林闯.随机Petri网和系统性能评价[M].清华大学出版社,2005.
    [102] Hwang C. L., Yoon K. Multiple Attribute Decision Making: Methods and Applications: a State-of-the-Art Survey [M]. Springer Verlag, 1981.
    [103] Yoon K. Systems Selection by Multiple Attribute Decision Making [D]. Manhattan: Kansas State University, 1980.
    [104]蒋哲远,韩江洪,王钊.动态的QoS感知Web服务选择和组合优化模型[J].计算机学报,2009,32(5):1014-1025.
    [105]刘雅冬,吴健.基于QoS多属性决策的服务发现模型研究[J].航空计算技术,2008,38(4):78-83.
    [106] Tong H., Zhang S. A Fuzzy Multi-Attribute Decision Making Algorithm for Web Services Selection Based on QoS [C]// IEEE Asia-Pacific Conference on Services Computing, 2006. APSCC'06. 2006: 51-57.
    [107]李祯,杨放春,苏森.基于模糊多属性决策理论的语义Web服务组合算法[J].软件学报,2009,20(3):583-596.
    [108]胡旭东,曾国荪,陈波.一种基于非功能属性决策的可信Web服务发现模型[J].计算机科学,2009,36(2):95-98.
    [109]李小勇,桂小林.可信网络中基于多维决策属性的信任量化模型[J].计算机学报,2009,32(3):405-416.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700