dc.contributor.advisor | 胡毓忠 | zh_TW |
dc.contributor.advisor | Yuh-Jong Hu | en_US |
dc.contributor.author (作者) | 陳世庭 | zh_TW |
dc.contributor.author (作者) | Se-Ting Chen | en_US |
dc.creator (作者) | 陳世庭 | zh_TW |
dc.creator (作者) | Se-Ting Chen | en_US |
dc.date (日期) | 2003 | en_US |
dc.date.accessioned | 17-九月-2009 13:52:46 (UTC+8) | - |
dc.date.available | 17-九月-2009 13:52:46 (UTC+8) | - |
dc.date.issued (上傳時間) | 17-九月-2009 13:52:46 (UTC+8) | - |
dc.identifier (其他 識別碼) | G0090753011 | en_US |
dc.identifier.uri (URI) | https://nccur.lib.nccu.edu.tw/handle/140.119/32623 | - |
dc.description (描述) | 碩士 | zh_TW |
dc.description (描述) | 國立政治大學 | zh_TW |
dc.description (描述) | 資訊科學學系 | zh_TW |
dc.description (描述) | 90753011 | zh_TW |
dc.description (描述) | 92 | zh_TW |
dc.description.abstract (摘要) | 可信度是網路服務首要解決的問題,我們從數位憑證,認證、授權、委任授權等安全層面去研究代理者可信度,並提出一套完整可信度規則分類機制當作信任度判斷的依據。在此篇論文中,我們論證如何將規則概念應用在代理者的溝通協定、服務流程控制上。我們並同時整合語意網規則和本體論的技術,以達到可信的網路服務環境。 | zh_TW |
dc.description.abstract (摘要) | Trust is one of the most important issues for Web Services. We studied the agent trust problem based on security technologies, such as digital certificates, authentication, authorization, and delegation, etc. Furthermore, we propose a complete trust rule taxonomy mechanism to assistant us on the evaluation of agent trustworthiness. In this thesis, we justify the feasibility of using rule concepts on the agent communication protocol and service process control. We also demonstrated how to integrate the semantic web rules and ontologies to have a trusted web services environment. | en_US |
dc.description.tableofcontents | 目錄第一章 導論 11.1 研究背景 11.2 研究目的 21.3 已完成項目 31.4 各章節概述 3第二章 相關研究 42.1 網路服務的安全考量 42.1.1 認證 52.1.2 授權 52.1.3 交易和溝通的完整性 62.2 語意網規則的起源和應用 72.2.1 語意網 72.2.2 語意網與網路服務 82.2.3 語意網中規則的角色 92.2.4 規則與軟體代理者的結合 102.2.5 語意網規則與網路服務安全上的結合 11第三章 安全機制 123.1 數位憑證 123.2 規則分類 133.2.1 基本規則分類 133.2.2 規則標記語言(RULE MARKUP LANGUAGE, RULEML) 153.2.3信任度規則的使用時機 163.2.4策略分類 173.2.5 信任度規則分類 183.2.6 基本規則分類、安全規則分類與策略分類三者的關係 213.2.7 規則的存放、蒐集與交換 233.3 安全溝通機制 253.3.1 安全溝通協定 253.3.2實做安全通訊協定 293.4決策推論 31第四章 系統架構與實做 334.1 系統架構 334.2 推論引擎 344.2.1 JESS 344.2.2 MANDARAX 354.3溝通模組 354.3.1 訊息處理器(MESSAGE PROCESSOR) 354.3.2 動作控制元件(ACTION CONTROLLER) 364.4決策推論模組 374.4.1 策略處理器(POLICY PROCESSOR) 374.4.2 密碼學處理器(CRYPTO PROCESSOR) 384.4.3 資料轉換器(DATA TRANSFORMER) 384.4.4 規則和本體論知識的資料整合 394.4.5 限制條件檢查器(CONSTRAINT CHECKER) 424.5 資料處理流程 42第五章 系統分析 455.1 場景介紹 455.2 實驗系統可行性與正確性 485.2.1 實驗1:服務要求端 485.2.1.1 溝通流程規則設計 485.2.1.2 流程的正確性分析 495.2.1.3 信任度規則設計 515.2.1.4 推論的正確性分析 535.2.2 實驗2:服務提供者 555.2.2.1 溝通流程的正確性 555.2.2.2 信任度規則的設計 565.2.2.3 推論的正確性分析 575.3 效能分析 59第六章 結論與未來展望 636.1 結論 636.2 未來展望 64參考文獻 66附錄一 策略內容 69附錄二 通訊規則 72附錄三 基本規則分類在RULEML中的結構 76圖目錄圖2- 1 DAML-S的程序關係圖。 6圖2- 2 語意網技術、概念堆疊圖。 8圖3- 1 基本規則分類關係圖。 15圖3- 2 網路服務架構圖。 16圖3- 3 策略的使用時機 18圖3- 4 RDF中的TRIPLE概念圖。 19圖3- 5 DAML+OIL所不能表達的關係。 19圖3- 6 認證協定流程圖。 26圖3- 7 委任授權協定流程圖。 27圖3- 8 授權協定流程圖。 28圖3- 9 (A)通訊模組堆疊圖 (B)通訊模組的虛擬碼。 30圖3- 10 (1)轉換函數示意圖 (2)輸出函數示意圖。 31圖4- 1 系統架構圖。 32圖4- 2 動作控制元件處理流程圖。 36圖4- 3 資料轉換流程圖。 38圖4- 4 推論系統架構圖。 39圖4- 5 資料流程圖 42圖5- 1 仲介服務類型示意圖。 45圖5- 2 場景流程圖。 45圖5- 3 服務要求端的FSM示意圖。 48圖5- 4 服務要求者的溝通狀態一。 49圖5- 5 服務要求者的溝通狀態二。 49圖5- 6 AUTHENTICATION POLICY的知識庫內容呈現。 52圖5- 7 AUTHENTICATION POLICY的完整性規則檢查。 53圖5- 8 DELEGATION POLICY的知識庫內容呈現。 53圖5- 9 DELEGATION POLICY的完整性規則檢查。 53圖5- 10 服務提供者的FSM示意圖。 54圖5- 11 服務提供者的溝通狀態。 55圖5- 12 AUTHENTICATION POLICY的知識庫內容呈現。 57圖5- 13AUTHENTICATION POLICY完整性規則檢查。 57圖5- 14 AUTHORIZATION POLICY知識庫內容呈現。 57圖5- 15 AUTHORIZATION POLICY完整性規則檢查。 58圖5- 16 策略的訊息回覆時間群組比較圖。 59表目錄表3- 1規則分類關係表 22表5-1訊息回覆時間分析表 59 | zh_TW |
dc.format.extent | 77762 bytes | - |
dc.format.extent | 84016 bytes | - |
dc.format.extent | 169493 bytes | - |
dc.format.extent | 121100 bytes | - |
dc.format.extent | 182723 bytes | - |
dc.format.extent | 522627 bytes | - |
dc.format.extent | 493931 bytes | - |
dc.format.extent | 533059 bytes | - |
dc.format.extent | 128903 bytes | - |
dc.format.extent | 71448 bytes | - |
dc.format.extent | 398377 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | application/pdf | - |
dc.language.iso | en_US | - |
dc.source.uri (資料來源) | http://thesis.lib.nccu.edu.tw/record/#G0090753011 | en_US |
dc.subject (關鍵詞) | Semantic Web | en_US |
dc.subject (關鍵詞) | Agent | en_US |
dc.subject (關鍵詞) | Trust | en_US |
dc.subject (關鍵詞) | Web Service | en_US |
dc.subject (關鍵詞) | Rule | en_US |
dc.title (題名) | 以規則分類機制來建立一個具可信度的網路服務架構 | zh_TW |
dc.type (資料類型) | thesis | en |
dc.relation.reference (參考文獻) | 參考文獻 | zh_TW |
dc.relation.reference (參考文獻) | [1] Andreas Eberhart, OntoAgent: A Platform for Declarative Specification of Agents, Proc. International Workshop on Rule Markup Languages for Business Rules on the Semantic Web, Sardinia (Italy), June (2002). | zh_TW |
dc.relation.reference (參考文獻) | [2] Benjamin Grosof and Terrence Poon, Representing Agent Contracts with Exceptions using XML Rules, Ontologies, and Process Descriptions, Proc. International Workshop on Rule Markup Languages for Business Rules on the Semantic Web, Sardinia (Italy), June (2002). | zh_TW |
dc.relation.reference (參考文獻) | [3] Benjamin N. Grosof and Ian Horrocks, Description Logic Programs: Combining Logic Programs with Description Logic, Working Paper, version of Nov. 21, (2002), http://ebusiness.mit.edu/bgrosof/paps/dlp-wp-v19.pdf. | zh_TW |
dc.relation.reference (參考文獻) | [4] Benjamin N.Grosof, Yannis Labrou and Hoi Y.Chan, A Declarative Approach to Business Rules in Contracts:Courteous Logic Programs in XML, Proc. ACM E-Commerce 99, Denver, (1999), 68-77. | zh_TW |
dc.relation.reference (參考文獻) | [5] DAML Services Coalition, DAML-S:Semantic Markup for Web Services, Proc. International Semantic Web Working Symposium (SWWS), Standford, CA., (2001), 411-430. | zh_TW |
dc.relation.reference (參考文獻) | [6] DARPA Agent Markup Language Program http://www.daml.org/. | zh_TW |
dc.relation.reference (參考文獻) | [7] FIPA (Foundation for Intelligent Physical Agents) Agent Communication Language standards effort, http://www.fipa.org. | zh_TW |
dc.relation.reference (參考文獻) | [8] Gerd Wagner, How to Design a General Rule Markup Language?, Invited Talk, Workshop XML Technologien für das Semantic Web (XSW 2002), Berlin, June (2002). | zh_TW |
dc.relation.reference (參考文獻) | [9] Harold Boley, Said Tabet, and Gerd Wagner, Design Rationale of RuleML: A Markup Language for Semantic Web Rules, Proc. SWWS`01, Stanford, July/August (2001). | zh_TW |
dc.relation.reference (參考文獻) | [10] Yuh-Jong Hu, Some Thoughts on Agent Trust and Delegation. The Fifth International Conference on Autonomous Agents, Montreal, Quebec, Canada, May 28-June 1, (2001), 489-496. | zh_TW |
dc.relation.reference (參考文獻) | [11] Yuh-Jong Hu, Trusted Agent-Mediated E-Commerce Transaction Services via Digital Certificates Management. Electronic Commerce Research (ECR),Vol. 3, Issues 3-4, April (2003). | zh_TW |
dc.relation.reference (參考文獻) | [12] James Hendler, Agents and the Semantic Web, IEEE Intelligent Systems, vol. 16, no. 2, Mar./Apr. (2001), 30–37. | zh_TW |
dc.relation.reference (參考文獻) | [13] Lalana Kagal, Tim Finin, Anupam Joshi, Developing Secure Agent Systems Using Delegation Based Trust Management, Security of Mobile Multi-Agent Systems Workshop, Autonomous Agents and Multiagent Systems (AAMAS 2002), Bologna, Italy, July 16 (2002). | zh_TW |
dc.relation.reference (參考文獻) | [14] Mandarax, http://www.mandarax.org/ | zh_TW |
dc.relation.reference (參考文獻) | [15] Mizuho Iwaihara, Masayuki Kozawa, Jun Narazaki and Yahiko Kambayashi ,A System for Querying and Viewing Business Constraints, Proc. International Workshop on Rule Markup Languages for Business Rules on the Semantic Web, Sardinia (Italy), June (2002). | zh_TW |
dc.relation.reference (參考文獻) | [16] Ninghui Li, Benjamin Grosof and Joan Feigenbaum, A Practically Implementable and Tractable Delegation Logic, Proc. of IEEE Symp. on Security and Privacy, Oakland, CA, USA, May (2000). | zh_TW |
dc.relation.reference (參考文獻) | [17] RuleML, http://www.dfki.uni-kl.de/ruleml/. | zh_TW |
dc.relation.reference (參考文獻) | [18] Security in a Web Services World: A Proposed Architecture and Roadmap. A joint security white paper from IBM Corp. and Microsoft Corp., Version 1.0, April 7, (2002). http://www.-106.ibm.com/developworks/library/ws-secmap. | zh_TW |
dc.relation.reference (參考文獻) | [19] Sheila A. McIlraith, Tran Cao Son, and Honglei Zeng, Semantic Web Services, IEEE Intelligent Systems, vol. 16, no. 2, Mar./Apr. (2001), 46–53. | zh_TW |
dc.relation.reference (參考文獻) | [20] Theo Dimitrakos, Brian Matthews and JuanBicarregui, Towards security and trust management policies on the Web, ERCIM workshop, Zurich, Switzerland, October 3, (2001). | zh_TW |
dc.relation.reference (參考文獻) | [21] Tuomo Lampinen, Using SPKI Certificates for Authorization in CORBA based Distributed Object-Oriented Systems, Proceedings of the NordSec`99, the Fourth Nordic Workshop on Secure IT Systems, Stockholm, Sweden, November 1st-2nd, (1999). | zh_TW |
dc.relation.reference (參考文獻) | [22] XML Encryption, http://www.w3.org/Encryption/2001/ | zh_TW |
dc.relation.reference (參考文獻) | [23] XML Signature, http://www.w3.org/TR/xmldsig-core/ | zh_TW |
dc.relation.reference (參考文獻) | [24] Bradshaw, M. Jeffrey, et al., KaoS:Toward An Industrial-Strength Open Agent Architecture. Software Agents, Edited by Jeffrey M. Bradshaw, (1997), 375-418. | zh_TW |
dc.relation.reference (參考文獻) | [25] Stuart Russell and Peter Norvig, Artificial Intelligence:A Modern Approach, Prentice Hall, New Jersey, US, (1995). | zh_TW |