• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 921
Next 10 →

Trustworthy Service Selection and Composition

by Chung-wei Hang, Munindar P. Singh
"... We consider service-oriented computing (SOC) environments. Such environments are populated with services that stand proxy for a variety of information resources. A fundamental challenge in SOC is to select and compose services—to support specified user needs directly or by providing additional servi ..."
Abstract - Cited by 10 (3 self) - Add to MetaCart
We consider service-oriented computing (SOC) environments. Such environments are populated with services that stand proxy for a variety of information resources. A fundamental challenge in SOC is to select and compose services—to support specified user needs directly or by providing additional

Locating Trustworthy Services

by Pínar Yolum, Munindar P. Singh - In Proceedings of the First International Workshop on Agents and Peer-to-Peer Computing (AP2PC , 2002
"... We view the Internet as supporting a peer-to-peer information system whose components provide services to one another. The services could involve serving static pages, processing queries, or carrying out transactions. We model service providers and consumers as autonomous agents. Centralized inde ..."
Abstract - Cited by 6 (1 self) - Add to MetaCart
We view the Internet as supporting a peer-to-peer information system whose components provide services to one another. The services could involve serving static pages, processing queries, or carrying out transactions. We model service providers and consumers as autonomous agents. Centralized

Trustworthy Service-Oriented Computing

by Chung-wei Hang
"... In service-oriented computing environments, computing resources are managed as services, which can be used directly or composed into larger services. Service-oriented architecture has been widely adopted in modern distributed environments such as for cloud computing. However, the problem of finding ..."
Abstract - Add to MetaCart
In service-oriented computing environments, computing resources are managed as services, which can be used directly or composed into larger services. Service-oriented architecture has been widely adopted in modern distributed environments such as for cloud computing. However, the problem of finding

Trustworthy Services Through

by John Lyle , 2010
"... Remote attestation is a promising mechanism for assurance of distributed systems. It allows users to identify the software running on a remote system before trusting it with an important task. This functionality is arriving at exactly the right time as security-critical systems, such as healthcare a ..."
Abstract - Add to MetaCart
and financial services, are increasingly being hosted online. However, attestation has limitations and has been criticized for being impractical. Too much effort is required for too little reward: a large, rapidly-changing list of software must be maintained by users, who then have insufficient information

5 Trustworthy Service Selection and Composition

by Chung-wei Hang, Munindar P. Singh, North Carolina , 2011
"... We consider Service-Oriented Computing (SOC) environments. Such environments are populated with ser-vices that stand proxy for a variety of information resources. A fundamental challenge in SOC is to select and compose services, to support specified user needs directly or by providing additional ser ..."
Abstract - Add to MetaCart
We consider Service-Oriented Computing (SOC) environments. Such environments are populated with ser-vices that stand proxy for a variety of information resources. A fundamental challenge in SOC is to select and compose services, to support specified user needs directly or by providing additional

Trustworthy Service Composition: Challenges and Research Questions

by Munindar P. Singh - PROCEEDINGS OF THE 1ST INTERNATIONAL JOINT CONFERENCE ON AUTONOMOUS AGENTS AND MULTIAGENT SYSTEM (AAMAS , 2002
"... Web services have been gathering an increasing amount of attention lately. The raison d'etre of Web services is that we compose them to create new services. For Web services to be effectively composed, however, requires that they be trustworthy and in fact be trusted by their users and other ..."
Abstract - Cited by 14 (0 self) - Add to MetaCart
Web services have been gathering an increasing amount of attention lately. The raison d'etre of Web services is that we compose them to create new services. For Web services to be effectively composed, however, requires that they be trustworthy and in fact be trusted by their users

Selecting Trustworthy Service in Service-Oriented Environments

by Chung-wei Hang, Munindar P. Singh
"... Abstract. Most of current service selection approaches in service-oriented environments fail to capture the dynamic relationships between services or assume the complete knowledge of service composition is known as a prior. In these cases, problems may arise when consumers are not aware of the under ..."
Abstract - Add to MetaCart
Abstract. Most of current service selection approaches in service-oriented environments fail to capture the dynamic relationships between services or assume the complete knowledge of service composition is known as a prior. In these cases, problems may arise when consumers are not aware

In Service-Oriented MSN Providing Trustworthy Service Evaluation

by unknown authors
"... Abstract: In this paper, we are going to propose survey based administration assessment to empower clients to share administration audit in administration situated versatile interpersonal organization. Every administration supplier freely keeps up a TSE for itself, which gathers and stores clients & ..."
Abstract - Add to MetaCart
Abstract: In this paper, we are going to propose survey based administration assessment to empower clients to share administration audit in administration situated versatile interpersonal organization. Every administration supplier freely keeps up a TSE for itself, which gathers and stores clients ' surveys about its administrations without requiring any third trusted power. The administration surveys can then be made accessible to intrigued clients in settling on savvy administration choice choices. This paper portrays how the audit related normal dangers are destroyed and makes these surveys more fitting and valid. It portrays two frameworks bTSE and SrTSE, these frameworks are depicted to survey related issues and their suitable arrangements. The regular dangers of audits are Linkability, survey dismissal and change which are evacuated by utilizing bTSE; which makes utilization of tokens give incorporated surveys and the framework is progressed and the most vital risk called as Sybil assault is uprooted by utilizing SrTSE; which makes utilization of pseudonyms. Through execution assessment, we demonstrate that the bTSE accomplishes better execution as far as accommodation rate and defer than an administration audit framework that does not receive client collaboration.

Implementing Trustworthy Services Using Replicated State Machines

by Fred B. Schneider, Lidong Zhou - IEEE SECURITY AND PRIVACY , 2005
"... ..."
Abstract - Cited by 18 (0 self) - Add to MetaCart
Abstract not found

An agent-based approach for trustworthy service location

by Pınar Yolum, Munindar P. Singh - In Proceedings of the 1st Workshop on Agents and Peer-to-Peer Computing (AP2PC , 2002
"... Abstract. We view the Internet as supporting a peer-to-peer information system whose components provide services to one another. The services could involve serving static pages, processing queries, or carrying out transactions. We model service providers and consumers as autonomous agents. Centraliz ..."
Abstract - Cited by 8 (1 self) - Add to MetaCart
Abstract. We view the Internet as supporting a peer-to-peer information system whose components provide services to one another. The services could involve serving static pages, processing queries, or carrying out transactions. We model service providers and consumers as autonomous agents
Next 10 →
Results 1 - 10 of 921
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University