| With the appearance of new network computation form, such as grid, themodern network technology enable the work mode of people to have morecommunity, interaction, distribution and coordination. And opening,cooperation and intelligence are becoming the most important characteristicfeatures of computing systems. In recent years, the computer supportedcollaborative design, which is one of the most important research areas andthe application directions of CSCW, has caused more and more widely attentionof researchers in and abroad, with its improving the ways of man's exchange,and enhancing the work efficiency.The goal of CSCW is to use multimedia and communication technology toestablish a computer supported cooperative work environment, in which peoplemight cooperate mutually and work together based on a productive,researchable area, or a project, or an academic question discussion. Itincludes the construction of computer supported cooperative work and theresearch and application system development of community work method and soon. Therefore the key technology of CSCD research is how to manage the massdata and graph information effectively.The aim of information management in CSCD is to provide a kind ofconvenient coordination data model and a kind of computer supportedcooperative work environment. In this system, researchers might describe allkind s of information with the data models in the environment, and developCSCD with the coordination control service, such as the concurrent control,the driving notice, the data distribution, the visit, the data storage andthe safety control and so on. The duty of the environment is to make theexchanged information intellectualizing and the automating. Completelydifferent from the traditional system in message control request, the CSCDmoreover needs the effective support of correspondence in the supportingenvironment. The main work is:1,Under the P2P network framework, using ant algorithm to resolve thequestions of correspondence, route, service registration and search in webservice.This paper has resolved with the questions of correspondence, route,service registration and search in web service using ant algorithm under theP2P network framework. Its goal is to improve the efficiency of multi-objectives grouping distribution and the extension of the algorithm. So thatit makes the multi-objectives groups distribute according to the mostsuperior distribution tree way, optimize the correspondence of the state ofinformation, and the transmitting using different communication protocols.2,Builded a model of database stream with safety authentication module,using web service technology under the p2p network construction.This paper has analyzed and studied the current information managementsituation in the field of CSCS in the domestic and foreign;and presented usthe corresponding proposal based on the requests of recent informationmanagement development in CSCD. The research includes the peer-to-peer(P2P)network overhead construction, web service technology, such asBrowser/Server customer level, and three distributional systems structures ofWEB server level and database server level, and builded a model of databasestream with safety authentication module. And with the news transmissionmechanism under the hyper text transfer protocol(HTTP), the client can sendout the service request through the browser, and the server return thecorresponding processing results for the client.3,Using WSE2.0 to protect the integrity and the security of the web service.To protect the integrity and the security of the web service, this paperuses WSE2.0, whose superiority is not to rely on the transmission levelintegrity and the security, but only on the transmits by the SOAP news. Theclient expands through SOAP and joins the user's name and password in theSOAP news (definite orders or encryption), and transmits them to the Serviceend;After the news gets the Service end, the service end obtains the user'sname and the password similarly through the expansion from the news context,and carries on the identification authentication and other operations. Usingthis method, in the client side the system can prompt the user the inputpassword, while in the server end, it needs to preserve effectiveuser/password data to the table for system search. It can protect thesecurity of the system information to the better.Massive experiments indicate that the research in this paper has realizedthe information exchange effectively in different network accesses, it hasnothing to do with the platform, and its elasticity is very big. |