Please wait a minute...
Advanced Search
现代图书情报技术  2008, Vol. 24 Issue (9): 1-9     https://doi.org/10.11925/infotech.1003-3513.2008.09.01
  数字图书馆 本期目录 | 过刊浏览 | 高级检索 |
数字图书馆服务信任协商——框架及模型
李宇 张晓林
(中国科学院国家科学图书馆 北京 100190)
Framework and Model of Trust Negotiation for Digital Library Services
Li Yu  Zhang Xiaolin 
(National Science Library, Chinese Academy of Sciences, Beijing 100190, China)
全文: PDF (662 KB)  
输出: BibTeX | EndNote (RIS)      
摘要 

重点研究数字图书馆服务环境中,基于多个伙伴服务之间的信任协商来建立未经事先注册的用户与被请求服务之间信任度的功能模型和技术机制。

服务
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章
李宇
张晓林
关键词 信任协商信任协商引擎多伙伴信任协商信任度计算数字图书馆    
Abstract

This research focuses on the basic model and technical mechanism for trust negotiation between friendly systems to support users without prior trust (authorization) to be able to access dynamically discovered digital library services.

Key wordsTrust negotiation    Trust negotiation engine    Trust negotation between friend-of-friend services    Trust calculation    Digital library services
收稿日期: 2008-05-27      出版日期: 2008-09-25
: 

TP391.1

 
通讯作者: 李宇     E-mail: liy@mail.las.ac.cn
作者简介: 李宇,张晓林
引用本文:   
李宇,张晓林. 数字图书馆服务信任协商——框架及模型[J]. 现代图书情报技术, 2008, 24(9): 1-9.
Li Yu,Zhang Xiaolin . Framework and Model of Trust Negotiation for Digital Library Services. New Technology of Library and Information Service, 2008, 24(9): 1-9.
链接本文:  
https://manu44.magtech.com.cn/Jwk_infotech_wk3/CN/10.11925/infotech.1003-3513.2008.09.01      或      https://manu44.magtech.com.cn/Jwk_infotech_wk3/CN/Y2008/V24/I9/1

[1] 张晓林.开放数字图书馆的设计与实现:CSDL的实践[J].情报学报,2003,22(5):520-525.
[2] Lee W.Towards Agent-based Decision Making in the Electronic Marketplace: Interactive Recommendation and Automated Negotiation[J].Expert Systems with Applications,2004,27(4):665-679.
[3] ebXML - Enabling a Global Electronic Market.[EB/OL]. [2008-05-18]. http://www.ebxml.org/.
[4] ebXML CPPA. Automated Negotiation of Collaboration-protocol Agreements Specification Version 0.04[EB/OL]. [2008-05-18]. http://www.oasis-open.org/committees/documents.php?wg_abbrev=ebxml-cppa-negot.
[5] Yu T, WINSLETT M, Seamons K.Supporting Structured Credentials and Sensitive Policies Through Interoperable Strategies for Automated Trust Negotiation[J].ACM Transactions on Information and System Security, 2003,6(1):1-42.
[6] Chiu D K W, Cheung S C, Hung P C K,et al.Developing e-Negotiation Support with a Meta-modeling Approach in a Web Services Environment[J].Decision Support Systems, 2005,40(1):51-69.
[7] Liu X, Wirtz K W.Sequential Negotiation in Multiagent Systems for Oil Spill Response Decision-making[J].Marine Pollution Bulletin,2005,50(4):469-474
[8] Lin R J, Chou S T.Mediating a Bilateral Multi-issue Negotiation[J]. Electronic Commerce Research and Applications,2004,3(2):126-138.
[9] Seamons K E, Winslett M, Yu T et al.Protecting Privacy During on Line Trust Negotiation[J]. Lecture Notes in Computer Science, 2003,2482(1):249-253.
[10] Bertino E, Ferrari E, Squicciarini A.Trust Negotiations: Concepts, Systems, and Languages[J].Computing in Science & Engineering,2004,6(4):27-34.
[11] Skogsrud H, Benatallah B, Casati F. Trust-serv: Model-driven Lifecycle Management of Trust Negotiation Policies for Web Services[C].In: Proceedings of the 13th International Conference on World Wide Web.New York,  USA: ACM Press, 2004:53-62.
[12] Nejdl W, Olmedilla D, Winslett M. PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web [EB/OL]. [2008-05-18].http://www.learninglab.de/pdf/L3S_Project_peertrust.pdf.
[13] Grosof BN, Poon TC.SweetDeal: Representing Agent Contracts with Exceptions Using XML Rules, Ontologies, and Process Descriptions[EB/OL]. [2008-05-18].http://www2003.org/cdrom/papers/refereed/p115/p115-grosof.htm.
[14] Trust Establishment[EB/OL]. [2008-05-18].http://www.haifa.il.ibm.com/projects/software/e-Business/TrustManager/index.html.
[15] TrustBuilder Research Projects[EB/OL]. [2008-05-18].http://isrl.cs.byu.edu/projects.html.
[16] Yu T, Ma X, Winslett M.PRUNES: An Efficient and Complete Strategy for Automated Trust Negotiation over the Internet[C].  In: Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens,Greece. New York: ACM Press.2000:210-219.
[17] Li N, Mitchell J. RT: A Role-based Trust-management Framework[C]. In: Proceedings of The Third DARPA Information Survivability Conference and Exposition,Washington DC. 2003.
[18] Winsborough W H. Jacobs J.Automated Trust Negotiation Technology with Attribute-based Access Control[C]. DARPA Information Survivability Conference and Exposition, Washington DC.2003.
[19] Leithead T, Nejdl W, Olmedilla D,et al.How to Exploit Ontologies in Trust Negotiation[EB/OL]. [2008-05-18]. http://trust.mindswap.org/trustWorkshop/papers/12-f.pdf.
[20] Hung P C K, Li H, Jeng J.WS-Negotiation: An Overview of Research Issues[C].In:Proceedings of the 37th Hawaii International Conference on System Sciences,BigIsland, Hawaii,2004.
[21] KAoS Semantic Policy and Domain Services: An Application of DAML to Web Services-based Grid Architectures[EB/OL]. [2008-05-18]. http://www.agentus.com/WSABE2003/program/johnson.pdf.
[22] Bradshaw J M, Beautement P, Breedy M R,et al.Making Agents Acceptable to People[EB/OL]. [2008-05-18].http://www.ihmc.us/research/projects/KAoS/biit-jeff.pdf.
[23] Bradshaw J M, DutfieldS, Benoit P, et al. KAoS: Toward an Industrial-strength Generic Agent Architecture[M]. Software Agents. The MIT Press,1997: 375-418.
[24] HP Labs. Rei: A Policy Language for the Me-Centric Project[EB/OL]. [2008-05-18].http://www.hpl.hp.com/techreports/2002/HPL-2002-270.html.
[25] Blaze M, Feigenbaum J, Lacy J.Decentralized Trust Management[M].In: Proc. IEEE Symposium on Security and Privacy, Oakland, CA. IEEE Press.1996:164-173.
[26] Blaze M, Feigenbaum J, Ioannidis J et al.The KeyNote Trust-management System Version 2. [EB/OL]. [2008-05-18].http://www.rfc-editor.org/rfc/rfc2704.txt.
[27] Trust Establishment[EB/OL]. [2008-05-18].http://www.haifa.il.ibm.com/projects/software/e-Business/TrustManager/index.html.
[28] TrustBuilder Research Projects[EB/OL]. [2008-05-18]. http://isrl.cs.byu.edu/projects.php.
[29] Skogsrud H, Benatallah B, Casati F.A Trust Negotiation System for Digital Library Web Services[J].International Journal on Digital Libraries, 2004,4(3):185-207.
[30] Bertino E, Ferrari E, Squicciarini A C.Trust-X: A Peer-to-Peer Framework for Trust Establishment[J].IEEE Transactions on Knowledge and Data Engineering,2004,16(7): 827-842.
[31] Granovetter M. The Strength of Weak Tie [J].The American Journal of Sociology,1973,78(6): 1360-1380.

[1] 齐云飞, 赵宇翔, 朱庆华. 关联数据在数字图书馆移动视觉搜索系统中的应用研究*[J]. 数据分析与知识发现, 2017, 1(1): 81-90.
[2] 洪亮,钱晨,樊星. 移动数字图书馆资源的情境感知个性化推荐方法研究*[J]. 现代图书情报技术, 2016, 32(7-8): 110-119.
[3] 刘健,毕强,马卓. 数字图书馆微服务评价指标体系构建及实证研究*[J]. 现代图书情报技术, 2016, 32(5): 22-29.
[4] 王传清, 毕强. 数字图书馆自动化语义标注工具系统模型研究[J]. 现代图书情报技术, 2014, 30(6): 17-24.
[5] 尉萌. 利用演化模式做文献推荐[J]. 现代图书情报技术, 2014, 30(4): 20-26.
[6] 胡昌平, 陈果. 共词分析中的词语贡献度特征选择研究[J]. 现代图书情报技术, 2013, 29(7/8): 89-93.
[7] 王忠义, 夏立新, 石义金, 郑森茂. 数字图书馆中层关联数据的创建与发布[J]. 现代图书情报技术, 2013, (5): 28-33.
[8] 刘炜, 夏翠娟, 张春景. 大数据与关联数据:正在到来的数据技术革命[J]. 现代图书情报技术, 2013, (4): 2-9.
[9] 周姗姗, 毕强, 高俊峰. 基于社会网络分析的信息检索结果可视化呈现方法研究[J]. 现代图书情报技术, 2013, 29(11): 81-85.
[10] 陈俊杰, 黄国凡. 移动图书馆APP的构建策略和关键技术——以iOS为例[J]. 现代图书情报技术, 2012, (9): 75-80.
[11] 董丽, 曾婷, 陈武, 姜爱蓉. 2011年亚太数字图书馆会议(ICADL 2011)综述[J]. 现代图书情报技术, 2012, 28(7): 33-39.
[12] 乔建忠. 一种基于统计特征面向“类型”主题抓取的网页相关性判断策略研究[J]. 现代图书情报技术, 2012, 28(6): 9-16.
[13] 刘剑涛. 图书馆云翻译书签的设计与实现[J]. 现代图书情报技术, 2012, 28(6): 84-88.
[14] 钱力, 张智雄, 邹益民, 黄永文. 信息可视化检索在数字图书馆中的应用实践[J]. 现代图书情报技术, 2012, 28(4): 74-78.
[15] 刘田, 张文德. 营利性数字图书馆著作权评估系统开发[J]. 现代图书情报技术, 2012, 28(4): 89-94.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
版权所有 © 2015 《数据分析与知识发现》编辑部
地址:北京市海淀区中关村北四环西路33号 邮编:100190
电话/传真:(010)82626611-6626,82624938
E-mail:jishu@mail.las.ac.cn