簡易檢索 / 詳目顯示

研究生: 吳李祺
Chi Wu-Lee
論文名稱: 雲端環境中為服務導向架構支援安全性, 可信任及協同合作
Support Security, Trust, and Collaboration for SOA System in the Cloud
指導教授: 黃冠寰
Hwang, Gwan-Hwan
學位類別: 博士
Doctor
系所名稱: 資訊工程學系
Department of Computer Science and Information Engineering
論文出版年: 2014
畢業學年度: 102
語文別: 英文
論文頁數: 158
中文關鍵詞: 服務導向架構Web服務業務過程執行語言安全性策略存取控制模型雲端協同合作同步控制可廢止邏輯工作流程描述語言不可否認性循序性證明違約
英文關鍵詞: SOA, Web Services, BPEL, security policy, access control model, cloud collaboration, concurrency control, defeasible logic, Workflow definition language, nonrepudiation, serializability, proof of violation
論文種類: 學術論文
相關次數: 點閱:277下載:26
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著服務導向架構(SOA)及雲端運算等技術的誕生,網路應用迎接了革命性的演進,除了發展出在Web以及雲端環境的新系統及軟體外,也同時產生了需要面對的新問題,使得近代的資訊工程領域有了新的研究方向,例如: 服務導向架構的安全性設置,雲端服務的可信任性以及協同合作,執行流程的同步控制等。
    在服務導向架構處理安全性及權限控制相關的標準規範中,並沒有設計如何與整個SOA系統的整合應用,此論文中提出了兩個新的語言,能使系統開發者動態且有效地部署其安全性策略到系統中的Web服務上。除了安全性問題之外,我們也發現傳統資料庫系統的ACID特性,在SOA系統中是需要被釋放的,我提出了一個新的架構,能有效的同步控制複數的執行流程在整個系統中的運作狀態,且支援其同步控制規則的動態更新。
    協同合作是雲端服務中一個新的應用,它讓使用者們可以透過網路來異地共同編輯一份文件或交換意見,此論文提出了一個新的工作流程描述語言及雲端服務,使用者能透過語言來提出需求,並提交給服務來共同定義一個工作流程。
    一個雲端服務是否值得相信,需要有辦法能證明參與者們是否有違反的行為,除了數位簽章提供的不可否認性外,我發現還需要確保雲端資源存取的循序性,才能消除資源在大量使用時可能發生的爭議,此論文最後提出一個新的溝通協議,能證明服務提供者是否有違反循序性,來確保此雲端服務是值得相信的。

    With the birth of Cloud and service-oriented architecture (SOA), there are various new issues discovered in computer science and information engineering domain, for example: the deployment of security and access control policies and the concurrency control of long-running transactions in SOA system, the cloud collaboration of defining a workflow definition, and the proof of violations of services in the cloud.
    The related security and access control standards of Web service lack the integration with SOA system. This paper proposed two new languages to help the system developer dynamically deploy the security and access control policies. The separate of concern is convenient for the administrator to handle the quality of system. A transaction of SOA system needs to relax the ACID properties since it can be long-running. A proposed new model can deal with the concurrent control of them by exploring the global context, and support the dynamic modification of control rules.
    We also proposed a novel language for defining workflow in the working model of cloud collaboration. The language enables the distributed definition and concurrent revision of a workflow by multiple users from different places in the cloud.
    For a trustworthy cloud service, it is necessary to have a scheme to detect or proof any probable violation from transaction participants. In the last topic of this paper, we proposed a novel scheme which can let SOA system provide the non-repudiation and serializability. Users and the service provider exchange attestations for every request. The user only has to store the last attestation it received, and the service provider keeps all the attestations, so that they can be used when proving is required.

    摘 要 i Abstract ii 誌 謝 iii Table of Contents iv List of Tables vi List of Figures vii Chapter 1. Introduction 1 Chapter 2. A Framework and Language Support for Dynamic Security Policy in Service-Oriented Architecture 4 2-1. Motivating examples 6 2-2. Related work 11 2-3. The DPSL 13 2-4. Architecture to support the DPSL in the BPEL run-time system 21 2-5. Implementation and experiments 26 Chapter 3. Transient Policy to Support Dynamic Access Control in Service-Oriented Architectures and Workflow Management Systems 29 3-1. Motivating examples 34 3-2. WBDAC model 37 3-3. Specifying dynamic access control in the DACL4SOA 42 3-4. Architecture to support the DACL4SOA in the BPEL run-time system 52 3-5. Implementation and experiments 58 3-6. Related work 62 Chapter 4. Concurrency Control of Long-Running Autonomous Transactions by Exploring the Global Context 67 4-1. A motivating example 71 4-2. The concurrency control model 74 4-3. A programming language for concurrency control 77 4-3-1. Introduction to defeasible logic 77 4-3-2. The DLCCL 79 4-3-3. Predicates, functions, and variables in the DLCCL 83 4-3-4. Examples to demonstrate the activation of DLCCL codes 84 4-4. Architecture of the CCS to support the DLCCL 87 4-5. Implementation and experimental results 90 4-6. Distributed synchronization in the DLCCL 93 4-7. Previous work 94 Chapter 5. Workflow Definition by Cloud Collaboration 97 5-1. A definition language for collaboration workflow definition 105 5-2. Conflicts between CLWfDL Rules 112 5-3. Distributed Definition and Concurrent Revision in the CLWfDL 114 5-4. The CLWfDL Document and API 116 5-5. Related work 120 Chapter 6. POV Schemes for SOA Systems 123 6-1. A new protocol from C&L for SOA 127 6-2. Architecture of C&L and DoubleC schemes for SOA 132 6-3. Implementation and experimental results 134 6-4. Related work 138 Chapter 7. Conclusion and Future Work 141 References 145 Appendix A 155

    1. OASIS, "Reference Model for Service Oriented Architecture 1.0," OASIS Standard, 2006.
    2. W3C, "Simple Object Access Protocol 1.2," W3C Recommendation, 2007.
    3. Chi Wu-Lee and Gwan-Hwan Hwang, "A Framework and Language Support for Quality of Service in Service-Oriented Architecture," Appear in Journal of Information Science and Engineering.
    4. Chi Wu-Lee and Gwan-Hwan Hwang, "Workflow definition by cloud collaboration," Collaborative Computing: Networking, Applications and Worksharing (IEEE Collaboratecom), 2013 IEEE 9th International Conference on, pp.123-132, Oct. 2013.
    5. Gwan-Hwan Hwang, Chi Wu-Lee and Han-Meng Chiang, "A New Concurrency Control Language for Transactional Process in Service-Oriented Architecture," Advanced Information Networking and Applications (IEEE AINA), 2013 IEEE 27th International Conference on, pp.227-234, March 2013.
    6. Gwan-Hwan Hwang, Chi Wu-Lee and Zhong-Xiang Jiang, "Workflow-Based Dynamic Access Control in a Service-Oriented Architecture," Advanced Information Networking and Applications Workshops (IEEE AINA), 2012 IEEE 26th International Conference on, pp.47-52, March 2012.
    7. Chi Wu-Lee and Gwan-Hwan Hwang, "Dynamic policies for supporting quality of service in service-oriented architecture," Electronics and Information Engineering (IEEE ICEIE), 2010 IEEE International Conference On, vol.1, pp.V1-50-55, Aug. 2010.
    8. M. Bell, Service-Oriented Modeling (SOA): Service Analysis, Design, and Architecture, Wiley, 2008.
    9. M. Papazoglou, Web Services: Principles and Technology, Pearson Education, 2008.
    10. OASIS, "Web Services Business Process Execution Language 2.0," OASIS Standard, 2007.
    11. L. O’Brien, L. Bass and P. Merson, "Quality Attributes and Service-Oriented Architectures," Technical Report, CMU/SEI-2005-TN-014, Software Engineering Institute, Carnegie-Mellon University, 2005.
    12. OASIS, "Web Services Security: SOAP Message Security (WS-Security) 1.1," OASIS Standard, 2006.
    13. OASIS, "Security Assertion Markup Language (SAML) 1.1," OASIS Standard, 2005.
    14. OASIS, "WS-Trust 1.4," OASIS Standard, 2009.
    15. OASIS, "WS-SecureConversation 1.4," OASIS Standard, 2009.
    16. OASIS, "WS-SecurityPolicy 1.3," OASIS Standard, 2009.
    17. W3C, "Web Services Policy 1.5," W3C Recommendation, 2007.
    18. H. Gaur and M. Zirn, BPEL Cookbook: Best Practices for SOA-based integration and composite applications development, Packt Publishing, 2006, Chap. 7.
    19. W3C, "Web Services Description Language (WSDL) 1.1," W3C Note, 2001.
    20. W3C, "Web Services Policy 1.5 – Attachment," W3C Recommendation, 2007.
    21. W3C, "Web Services Addressing 1.0," W3C Recommendation, 2006.
    22. V. Tosic, A. Erradi and P. Maheshwari, "WS-Policy4MASC - A WS-Policy Extension Used in the MASC Middleware," IEEE International Conference on Services Computing (SCC), 2007, pp.458-465.
    23. H. Liang, W. Sun, X. Zhang, and Z. Jiang, "A Policy Framework for Collaborative Web Service Customization," Second IEEE International Workshop on Service-Oriented System Engineering (SOSE), 2006, pp. 197–204.
    24. G. Yee and L. Korba, "Negotiated Security Policies for E-Services and Web Services," IEEE International Conference on Web Services (ICWS), vol. 2, 2005, pp. 605-612.
    25. M. Mathes, S. Heinzl and B. Freisleben, "WS-TemporalPolicy: A WS-Policy Extension for Describing Service Properties with Time Constraints," 32nd Annual IEEE International Computer Software and Applications Conference (COMPSAC), 2008, pp. 1180-1186.
    26. B. Hollunder, "WS-Policy: On Conditional and Custom Assertions," IEEE International Conference on Web Services (ICWS), 2009, pp. 936-943.
    27. L. Baresi, S. Guinea, and P. Plebani, "WS-Policy for Service Monitoring," 6th VLDB International Workshop on Technologies for E-Services, Lecture Notes in Computer Science, Vol. 3811, 2006, pp. 72-83.
    28 C. N. Fischer and R. J. LeBlanc Jr., Crafting A Compiler with C, Addison-Wesley, 1991.
    29. Apache Axis2/Java, http://ws.apache.org/axis2/.
    30. Apache Axis2 SOAP Monitor Module, http://axis.apache.org/axis2/java/core/docs/soapmonitor-module.html.
    31. Eclipse Web Tools Platform, http://www.eclipse.org/webtools/.
    32. soapUI eclipse-plugin, http://www.soapui.org/eclipse/index.html.
    33. ActiveBPEL , http://www.activevos.com/community-open-source.php.

    34 C. M. MacKenzie, K. Laskey, F. McCabe, P. F. Brown, R. Metz and B. A. Hamilto, “Reference Model for Service Oriented Architecture 1.0,” OASIS Standard, October 2006, Available at: <http://docs.oasis-open.org/soa-rm/v1.0/>.
    35 M. Bell, “Service-Oriented Modeling (SOA): Service Analysis, Design, and Architecture,” Wiley & Sons, ISBN: 978-0-470-14111-3.
    36 M. P. Papazoglou, “Web Services: Principles and Technology,” Prentice-Hall, ISBN: 978-0-321-15555-9.
    37 D. Jordan and J. Evdemon, “Web Services Business Process Execution Language (BPEL) Version 2.0” OASIS Standard, April 2007, Available at: <http://docs.oasis-open.org/wsbpel/2.0/wsbpel-v2.0.html>.
    38 B. W. Lampson, “Protection,” Proceedings of the 5th Princeton Conference on Information Sciences and Systems, Princeton, 1971, pp.437.
    39 T. Rhodes, “File System Access Control Lists,” FreeBSD Handbook, 2003, Chap. 14, Available at: <http://www.freebsd.org/doc/en/books/handbook/fs-acl.html>.
    40 Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman, "Role-Based Access Control Models," Computer, vol. 29, no. 2, February 1996, pp. 38-47.
    41 A. Elliott and S. Knight, “Role Explosion: Acknowledging the Problem,” Proc. Software Engineering Research and Practice, July 2010, pp.349-355.
    42 R. Fernandez, “Enterprise Dynamic Access Control Version 2 Overview,” US Space and Naval Warfare Systems Center, January 2006.
    43 M. J. Covington, W. Long, S. Srinivasan, A. K. Dev, M. Ahamad and G. D. Abowd, "Securing Context-Aware Applications Using Environment Roles", Proc. of the sixth ACM symposium on Access control models and technologies, May 2001, pp.10-20.
    44 D. Richard Kuhn, Edward J. Coyne, Timothy R. Weil, “Adding Attributes to Role-Based Access Control,” Computer, vol. 43, no. 6, June 2010, pp. 79-81.
    45 Alan H. Karp, “Authorization-Based Access Control for the Services Oriented Architecture,” Fourth International Conference on Creating, Connecting and Collaborating through Computing (C5'06), January 2006, c5, pp.160-167.
    46 F. Paci, E. Bertino, and J. Crampton, “An Access-Control Framework for WS-BPEL,” International Journal Web Service Res., 2008, pp.20-43.
    47 Tim Moses, Entrust Inc., “eXtensible Access Control Markup Language (XACML) Version 2.0,” OASIS Standard, February 2005, Available at: < http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdf >.
    48 S. Cantor, J. Kemp, R. Philpott, E. Maler, “Security Assertion Markup Language (SAML) V2.0,” OASIS Standard, March 2005, Available at: < http://saml.xml.org/saml-specifications>.
    49 L. Frank, R. Dieter, “Production Workflow: Concepts and Techniques,” Prentice Hall, 1999, ISBN: 978-0-130-21753-0, Chap.3.
    50 J. Park and R. Sandhu, “The UCONABC usage control model,” ACM Transactions on Information and System Security, vol. 7, February 2004, pp. 128-174.
    51 Control Data Corporation, “ALGOL-60 version 5 reference manual,” CDC, 1979, Appendix D, Available at: <http://www.lrz.de/~bernhard/Algol-BNF.html>.
    52 “Apache ODE (Orchestration Director Engine),” Apache Software Foundation, Available at: <http://ode.apache.org/>.
    53 “Apache Axis2/Java,” Apache Software Foundation, Available at: <http://axis.apache.org/axis2/java/core/>.
    54 “Sun's XACML Implementation,” Sun Microsystems, Inc., Available at: <http://sunxacml.sourceforge.net/>.
    55 “Eclipse Technology Project: BPEL Designer Project,” Eclipse Foundation, Available at: <http://www.eclipse.org/bpel/>.
    56 J. Hunter, “JDOM Project,” Available at: <http://www.jdom.org/>.
    57 A.H. Karp, H. Haury, and M.H. Davis, “From ABAC to ZBAC: the Evolution of Access Control Models,” tech. report HPL-2009-30, HP Labs, February 2009.
    58 E. C. Cheng, “An Object-Oriented Organizational Model to Support Dynamic Role-based Access Control in Electronic Commerce Applications,” vol. 8, Thirty-second Annual Hawaii International Conference on System Sciences, vol. 8, 1999, pp.8022.
    59 A. D. Ali and K. Chitra, “Modelling Access Control with Dynamic Role Binding,” Computational Intelligence and Modern Heuristics, InTech, February 2010, ISBN: 978-953-7619-28-2.
    60 H. Yao, H. Hu, B. Huang and R. Li, “Dynamic Role and Context-Based Access Control for Grid Applications,” Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05), 2005, pp.404-406.
    61 P. Balbiani, Y. Chevalier and M. E. Houri, “A Logical Approach to Dynamic Role-Based Access Control”, Proc. AIMSA, 2008, pp.194-208.
    62 E. Bertino, J. Crampton, and F. Paci, “Access Control and Authorization Constraints for WS-BPEL,” in International Conference on Web Services (ICWS), 2006, pp. 275-284.
    63 C. Emig, F. Brandt, S. Abeck, J. Biermann, and H. Klarl, “An Access Control Metamodel for Web Service-Oriented Architecture,” in International Conference on Software Engineering Advances (ICSEA), 2007.
    64 A. Kumar, P. Barthelmess, and J. Wainer, “W-RBAC-A workflow security model incorporating controlled overriding of constraints,” Relation, vol. 10, no. 1.37, p. 9582, 2001.
    65 M. Leitner, S. Rinderle-Ma, and J. Mangler, “AW-RBAC: Access Control in Adaptive Workflow Systems,” in 2011 Sixth International Conference on Availability, Reliability and Security (ARES), 2011, pp. 27-34.
    66 J. Mendling, K. Ploesser, and M. Strembeck, “Specifying Separation of Duty Constraints in BPEL4People Processes,” in Business Information Systems, 2008, pp. 273-284.
    67 S. Tai, T. Mikalsen, E. Wohlstadter, N. Desai, and I. Rouvellou, “Transaction policies for service-oriented computing,” Data & Knowledge Engineering, vol. 51, no. 1, pp. 59-79, Oct. 2004.
    68 E. Yuan and J. Tong, “Attributed Based Access Control (ABAC) for Web Services,” in Web Services, IEEE International Conference on, Los Alamitos, CA, USA, 2005, vol. 0, pp. 561-569.
    69 G. Zhang and M. Parashar, “Context-aware Dynamic Access Control for Pervasive Applications”, Proc. of the Communication Networks and Distributed Systems Modeling and Simulation Conference, Jan. 2004 , pp. 21-30.
    70 A. Corradi, R. Montanari and D. Tibaldi, “Context-based Access Control for Ubiquitous Service Provisioning”, Proc. of the 28th Annual International Computer Software and Applications Conference, vol.1, Sep. 2004, pp.444-451.
    71 X. Feng, X. Jun, H. Hao and X. Li, “Context-Aware Role-Based Access Control Model for Web Services”, Proc. of the Grid and Cooperative Computing Workshops, Sep. 2004, pp.430-436.
    72 S. Haibo and H. Fan, “A Context-Aware Role-Based Access Control Model for Web Services”, IEEE International Conference on e-Business Engineering, Oct. 2005, pp.220-223.
    73 R. J. Hulsebosch, A. H. Salden, M. S. Bargh, P. W. G. Ebben and J. Reitsma, “Context Sensitive Access Control”, Proc. of the tenth ACM symposium on Access control models and technologies, Jun. 2005, pp.111-119.
    74 H. Yao, H. Hu, B. Huang and R. Li, “Dynamic Role and Context-Based Access Control for Grid Applications”, International Conference on Sixth Parallel and Distributed Computing, Applications and Technologies, Dec. 2005, pp.404-406.
    75 S.S. Yau, Y. Yao and V. Banga, “Situation-Aware Access Control for Service-Oriented Autonomous Decentralized Systems”, Proc. of Autonomous Decentralized Systems, Apr. 2005, pp.17-24.
    76 A. Toninelli, R. Montanari, L. Kagal and O. Lassila, “A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments”, 5th International Semantic Web Conference, Nov. 2006, pp.473-486.
    77 A. Samuel, A. Ghafoor and E. Bertino, “Context-Aware Adaptation of Access-Control Policies”, Internet Computing, IEEE, vol.12, issue 1, Feb. 2008, pp.51-54.
    78 Theo H, and Andreas R. Principles of Transaction-Oriented Database Recovery. ACM Computing Surveys 1983, 15 (4): 287–317. DOI: 10.1145/289.291.
    79 Philip AB, Vassos H, Nathan G. Concurrency Control and Recovery in Database Systems. Addison Wesley Publishing Company, ISBN 0-20110-715-5, 1987.
    80 Philip B, and Nathan G. Concurrency Control in Distributed Database Systems. ACM Computing Surveys 1981, 13 (2): 185-221. DOI: 10.1145/356842.356846.
    81 Michael B. Service-Oriented Modeling (SOA): Service Analysis, Design, and Architecture. Wiley & Sons, ISBN: 978-0-470-14111-3, 2008.
    82 M. P. Papazoglou. Web Services: Principles and Technology. Prentice-Hall, ISBN: 978-0-321-15555-9, 2007.
    83 D. Jordan and J. Evdemon. Web Services Business Process Execution Language (BPEL) Version 2.0. http://docs.oasis-open.org/wsbpel/2.0/wsbpel-v2.0.html, April, 2007.
    84 G. Alonso, D. Agrawal, A.E. Abbadi, M. Kamath, R. Gunthor, and C. Mohan, Advanced Transaction Models in Workflow Contexts. Proceedings of the Twelfth International Conference on Data Engineering. (ICDE’96), Washington, DC, USA, 1996, 574-581.
    85 Coulouris, G., Dollimore, J., and Kindberg, T. Distributed Systems: Concepts and Design (3rd Edition). Addison Wesley Publishing Company, ISBN 0-20161-918-0, 2000.
    86 G. H. Hwang, Y. C. Lee, and B. Y. Wu, A Flexible Failure-Recovery Model for Workflow Management Systems. International Journal of Cooperative Information Systems 2005, 14 (1): 1-24. DOI:10.1142/S0218843005000992.
    87 Hector GM and Kenneth S. SAGAS. Proceedings of the 1987 ACM SIGMOD international conference on Management of data (SIGMOD), Dec. 1987. New York, NY, 1987, 249-259.
    88 Gerhard W. and Hans-J. S. Concepts and Applications of Multilevel Transactions and Open Nested Transactions,” In A. Elmagarmid (ed.): Database Transaction Models for Advanced Applications. Morgan Kaufmann Publishers, pp. 515-553, 1992.
    89 Hector Garcia-Molina, Using Semantic Knowledge for Transaction Processing in a Distributed Database. ACM TODS, Vol. 8, No. 2, 1983, 186-213.
    90 Nancy A. Lynch, Multilevel Atomicity – A New Correctness Criterion for Database Concurrency Control. ACM Transactions on Database Systems, 8 (4), 1983, 484-502.
    91 Gerhard Weikum and Hans-J. Schek, Architectural Issues of Transaction Management in Multi-Layered Systems. Proc. Int’l Conf. Very Large Databases (VLDB ’84), 1984, 454-465.
    92 S. Choi, H. Jang, H. Kim, J. Kim, S. Kim, J. Song, and Y. Lee, Maintaining Consistency under Isolations Relaxation of Web Services Transactions. Proc. Int’l Conf. Web Information Systems Eng. (WISE’05), 2005, 245-257.
    93 Alrifai M., Dolog P., Balke W.-T., and Nejdl W, Distributed Management of Concurrent Web Service Transactions. IEEE Transactions on Services Computing, 2 (4), pp. 289-302, 2009.
    94 Donald Nute, Defeasible reasoning. In Proc. 20th Hawaii International Conference on System Science, pages 470–477. IEEE Press, 1987.
    95 Michael Covington, Donald Nute, and A. Vellino, Prolog Programming in Depth. Prentice Hall, 1997.
    96 Governatori, Guido, ter Hofstede, Arthur H. M. and Oaks, Philippa, Is Defeasible Logic Applicable? The 2nd Australasian Workshop on Computational Logic, Gold Coast, Queensland, Australia, (47-62), 2001.
    97 Michael A. C. Defeasible Logic on an Embedded Microcontroller. Journal Applied Intelligence, Volume 13, Issue 3, 2000.
    98 Leland L. Beck, An Introduction to Systems Programming. Third Edition. Addison Wesley Publishing Company, ISBN 0-201-42300-6, 1997.
    99 Oracle Corporation. Oracle VM VirtualBox. https://www.virtualbox.org/.
    100 Andrew Rock. Deimos: Query Answering Defeasible Logic System. http://www.ict.griffith.edu.au/arock/defeasible/Defeasible.cgi.
    101 The Haskell Programming Language. http://www.haskell.org/haskellwiki/Haskell.
    102 Sheng Liang. The Java Native Interface (Programmer's Guide and Specification). http://java.sun.com/docs/books/jni/html/titlepage.html.
    103 Abraham Silberschatz, Peter Baer Galvin, and Greg Gagne. Operating System Concepts. John Wiley & Sons, ISBN: 0471417432, 6th Edition (June 26, 2001).
    104 Anne Dinning, A Survey of Synchronization Methods for Parallel Computers. IEEE Computer, July 1989.
    105 K. Haller, H. Schuldt, and C. Türker, Decentralized coordination of transactional processes in peer-to-peer environments. 14th International Conference on Information and Knowledge Management (CIKM), Bremen, Germany, October 31st - November 5th, 2005, 28-35.
    106 OASIS Web Service Coordination (WS-Coordination). http://docs.oasis-open.org/ws-tx/wscoor/2006/06, 2007.
    107 OASIS Standard - Web Services Business Activity (WS-BusinessActivity), Version 1.1. http://docs.oasis-open.org/ws-tx/wstx-wsba-1.1-spec-os.pdf [16 April 2007].
    108 D. Georgakopoulos, M. Hornick and A. Sheth, “An overview of workflow management: from process modeling to workflow automation infrastructure,” Distributed and Parallel Databases, vol. 3, issue 2, pp. 119–153, April 1995.
    109 WFMC, “Workflow Management Coalition Workflow Standard: Workflow Process Definition Interface – XML Process Definition Language (XPDL) (WFMCTC- 1025),” Technical report, Workflow Management Coalition, Lighthouse Point, Florida, USA, 2002.
    110 OASIS, “Web Services Business Process Execution Language (WSBPEL),” http://docs.oasis-open.org/wsbpel/2.0/OS/wsbpel-v2.0-OS.html, OASIS Standard, April 2007.
    111 W.M.P. van der Aalst, and A.H.M. ter Hofstede, “YAWL: yet another workflow language,” Information Systems, vol. 30, issue 4, pp. 245–275, 2005.
    112 “JaWE - Java Workflow Editor,” http://www.together.at/prod/workflow/twe.
    113 OMG “Business Process Model And Notation (BPMN),” http://www.omg.org/spec/BPMN/2.0/, Object Management Group, January 2011.
    114 “Eclipse BPEL Designer Project,” http://www.eclipse.org/bpel/.
    115 “Google Docs,” https://docs.google.com/.
    116 “Google Calendar,” https://calendar.google.com/.
    117 “Workflow Patterns Home Page,” http://www.workflowpatterns.com.
    118 “Google Forms,” https://docs.google.com/forms/.
    119 P. M. Sant, “Exclusive read, exclusive write,” in Dictionary of Algorithms and Data Structures, Paul E. Black, ed., U.S. National Institute of Standards and Technology. December 17, 2004.
    120 F. Casati, S. Ceri, S. Paraboschi, and G. Goodman, “Concurrency Control and Recovery in Database Systems,” Addison Wesley Publishing Company, 1987, ISBN 0-201-10715-5.
    121 Chi Wu-Lee and Gwan-Hwan Hwang, “Workflow Definition by Cloud Collaboration,” Chi Wu-Lee and Gwan-Hwan Hwang, Technical Report, National Taiwan Normal University, 2013. http://www.csie.ntnu.edu.tw/~ghhwang/TR/CLWfDL_Technical_Report_2013_08_06.pdf
    122 F. Casati, S. Ceri, S. Paraboschi, and G. Pozzi, “Specification and implementation of exceptions in workflow management systems,” ACM Transactions on Database Systems, 24(3): 405-451, 1999.
    123 B. Kiepuszewski, A. H. M. ter Hofstede, and C. Bussler, “On Structured Workflow Modelling,” The 12th International Conference on Advanced Information Systems Engineering (CAiSE), LNCS 1789, pp. 431-445, 2000.
    124 Control Data Corporation, “ALGOL-60 version 5 reference manual,” CDC, 1979, Appendix D, Available at: <http://www.lrz.de/~bernhard/Algol-BNF.html>.
    125 “dom4j,” http://dom4j.sourceforge.net/.
    126 “IBM FlowMark: Modeling Workflow,” Version 2 Release 2. Publ. No. SH-19-8241-01, 1996.
    127 “JBoss, jBPM, jPDL,” http://www.jboss.org/jbpm/.
    128 “YAWL System,” http://www.yawlfoundation.org/.
    129 R. Vegesna, “Collaboration in Context: From the Desktop to the Cloud,” The 2012 45th Hawaii International Conference on System Science (HICSS), pp. 669-673, January 2012.
    130 T. Mikkonen and A. Nieminen, “Elements for a cloud-based development environment: online collaboration, revision control, and continuous integration,” The 10th Working IEEE/IFIP Conference on Software Architecture & 6th European Conference on Software Architecture (WICSA/ECSA), pp. 14-20, August 2012.
    131 B. Stephenson, J. Li, F. Lins, R. Medeiros, B. Silva, A. Souza, D. Aragao, J. Damasceno, P. Maciel and N. Rosa, “SSC4Cloud Tooling: An Integrated Environment for the Development of Business Processes with Security Requirements in the Cloud,” The 7th IEEE 2011 World Congress on Services, pp. 53-60, July 2011.
    132 H. D. Jørgensen, “Interaction as a Framework for Flexible Workflow Modelling,” Proceedings of the International ACM SIGGROUP Conference on Supporting Group Work 2001, pp. 32-41, October 2001.
    133 S. Carlsen, “Action Port Model: A Mixed Paradigm Conceptual Workflow Modeling Language,” CoopIS '98, New York, 1998.
    134 H. D. Jørgensen and S. Carlsen, “Emergent Workflow: Integrated Planning and Performance of Process Instances,” Workflow Management '99, Münster, Germany, 1999.
    135 N. S. Glance, D. S. Pagani, and R. Pareschi, “Generalized process structure grammars GPSG for flexible representations of work,” Proceedings of the 1996 ACM conference on Computer supported cooperative work, pp. 180-189, November 1996.
    136 N. Glance, Pagani, D., and Pareschi, R. “Generalized Process Structure Grammars for Modeling Collaborative Writing,” Rank Xerox Research Centre, Grenoble, Technical Report March 1996
    137 “Apache Rampart - Axis2 Security Module,” Apache Software Foundation, Available at: <http://axis.apache.org/axis2/java/rampart/>
    138 Jianying Z. and Gollman, D., "A fair non-repudiation protocol,"Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium on, pp.55-61, May 1996.
    139 Steve K., Olivier M., and Jianying Z., "An intensive survey of fair non-repudiation protocols," Comput. Commun. 25, pp.1606-1621. Nov. 2002.
    140 W3C, " XML Signature Syntax and Processing," W3C Recommendation, 2008.
    141 Robinson, P., Cook, N., Shrivastava, S., "Implementing fair non-repudiable interactions with Web services," EDOC Enterprise Computing Conference, 2005 Ninth IEEE International, pp.195-206, Sept. 2005.
    142 Bilal, M., Thomas, J.P., Thomas, M., Abraham, S., "Fair BPEL processes transaction using non-repudiation protocols," Services Computing, 2005 IEEE International Conference on, pp.337-340 vol.1, July 2005.
    143 Marrington A., Branagan M., Smith J., "Forensic challenges in service oriented architecture, " In: 2007 Research Network for a Secure Australia : Security Technology Conference, 28 September 2007, Melbourne University, Melbourne, Victoria, 2007.
    144 Gunestas, M.; Wijesekera, D.; Elkhodary, A, "An evidence generation model for web services,"System of Systems Engineering, 2009. SoSE 2009. IEEE International Conference on, pp.1,6, June 2009.
    145 Singhal, A., Gunestas, M., & Wijesekara, D. (2010). Forensics Web Services (FWS). NIST Interagency Report 7559.
    146 Gunestas, M.; Mehmet, M.; Wijesekera, D.; Singhal, A, "Forensic Web Services Framework,"IT Professional, vol.13, no.3, pp.31-37, May-June 2011.
    147 Ben Martini, Kim-Kwang Raymond Choo, An integrated conceptual digital forensic framework for cloud computing, Digital Investigation, Volume 9, Issue 2, November 2012, Pages 71-80.
    148 Hwang G.-H., Huang W.-S., Peng J.-Z. and Lin Y.-W. "Fulfilling mutual nonrepudiation for cloud storage, " Appear in Concurrency and Computation: Practice and Experience. 2014, doi: 10.1002/cpe.3315

    下載圖示
    QR CODE