期刊文献+

TSSF:基于QoS分解的可信服务调度框架

Trustworthy Service Scheduling Framework Based on QoS Decomposition
在线阅读 下载PDF
导出
摘要 网络计算环境的松散化、独立性和异构性的特点不断给服务计算发展带来新的挑战,与此同时用户对软件系统实时性、安全性、可靠性、可用性等非功能属性要求又在不断提高,如何保障服务计算系统的可信性是平台设计者和服务应用开发者所面临的重要问题。设计了基于QoS分解的可信服务调度框架(Trustworthy Service Scheduling Framework,TSSF),通过对组合服务的可信QoS规划,并利用自适应的服务调度机制为服务提供可信QoS保障。提出了基于模糊集的可信QoS分解模型,将用户对组合服务的QoS需求分解为每个原子服务单独的可信QoS需求;根据分解后的额定QoS需求,以创建动态服务实体组(Dynamic Service Entity Group,DSEG)的方式为原子服务提供可信QoS保障,并以DSEG为基础详细叙述了变粒度、层次化基于反馈设计思想的自适应可信服务调度技术。最后扩展了JBoss中间件,实现了支持该服务调度框架的平台,并在此平台上进行了实验,结果表明TSSF能够为组合服务的QoS需求提供可信保障。 Interoperability-centric and loosely-coupled distributed computing environment brings forward a new challenge on trustworthiness of service computing. At the same time, user puts more and more pressure on system' s nonfunctional requirements such as real-time, availability, cost and so on. Therefore service' s QoS should be guaranteed trustworthily. In this paper a Trustworthy Service Scheduling Framework(TSSF) was presented to guarantee composite servicers QoS requirement. Fuzzy sets based trustworthy QoS decomposition model was proposed to decompose the QoS requirement of the composite service into separate ones for the atoms; and then TSSF delivers expected QoS for each atomic service with adaptive trustworthy service scheduling mechanisms based on Dynamic Service Entity Group (DSEG) ;finally experimental results indicate good performance of the proposed framework.
出处 《计算机科学》 CSCD 北大核心 2010年第6期70-74,167,共6页 Computer Science
基金 863国家基金项目(2006AA01Z162)面向能力可信服务的自适应软件技术研究资助
关键词 QoS分解 可信计算 组合服务 可信服务调度 QoS decomposition,Trust computing,Composite service,Trustworthy service scheduling
  • 相关文献

参考文献14

  • 1Papazoglou M P, et al. Service-oriented computing: A research roadmap[J]. International Journal of Cooperative Information Systems, 2008,17 (2).
  • 2Papazoglou M P, et al. Service-oriented computing: State of the art and research ehallenges[J]. IEEE Institute of Electrical and Electronics, 2007 : 38.
  • 3Dan A. Dependable Service-Oriented Computing[J]. IEEE Internet Computing, 2009.
  • 4林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:252
  • 5Aurrecoechea C,Campbell A T, Hauw L. A survey of QoS architectures[J]. Multimedia Systems,Springer, 1998: 138-151.
  • 6Erradi A, Maheshwari P. wsBus: QoS-aware middleware for relia ble web services interactions [J]. IEEE Transactions on Software Engineering, 2004,30 (5) : 311-327.
  • 7Sheth A, et al. Qos for service-oriented middleware[C]//Proceedings of the Conference on Systemics, Cybernetics and Informatics. Orlando, FL, July 2002.
  • 8Li Y, et al. Self-reconfiguration of service-based systems: A case study for service level agreements and resource optimization [C]//IEEE International Conference on Web Services. 2005: 266-273.
  • 9Alwagait E, Ghandeharizadeh S. DeW: a dependable web servi - ces framework [C] // Proceedings of the 14th International Workshop on Research Issues on Data Engineering: Web Services for E-Commerce and E- Government Applications. 2004:111- 118.
  • 10Guo H, et al. ANGEL: Optimal Configuration for High Available Service Composition[C]//IEEE International Conference on Web Services (ICWS 2007). 2007 : 280-287.

二级参考文献17

  • 1林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 2.中国互联网发展状况统计[EB/OL].http://www.cnnic.net.cn,.
  • 3Algridas A., Laprie J.C., Brian R., Carl L.. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 11~33
  • 4Nicol D.M., Sanders W.H., Trivedi K.S.. Model-based evaluation: From dependability to security. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 48~65
  • 5Paulson L.D.. Stopping intruders outside the gates. IEEE Computer, 2002, 35(11): 20~22
  • 6International Standards Organization. Information Processing Systems-OSIRM. Part2: Security Architecture, ISO/TC 97 7498-2, 1998
  • 7Vaidya N.H.. A case for two-level recovery schemes. IEEE Transactions on Computers, 1998, 47(6): 656
  • 8Avizienis A.. Design of fault-tolerant computers. In: Proceedings of AFIPS Conference, 1967, 31: 733~743
  • 9Michael Atighetchi, Partha Pal et al.. Adaptive cyberdefense for survival and intrusion tolerance. IEEE Internet Computing, 2004, 8(6): 25~33
  • 10Anderson R.J.. Cryptography and competition policy -issues with trusted computing. In: Proceedings of the PODC'03, Boston, Massachusetts, 2003, 13~16

共引文献251

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部