Results 1 - 10
of
921
Trustworthy Service Selection and Composition
"... We consider service-oriented computing (SOC) environments. Such environments are populated with services that stand proxy for a variety of information resources. A fundamental challenge in SOC is to select and compose services—to support specified user needs directly or by providing additional servi ..."
Abstract
-
Cited by 10 (3 self)
- Add to MetaCart
We consider service-oriented computing (SOC) environments. Such environments are populated with services that stand proxy for a variety of information resources. A fundamental challenge in SOC is to select and compose services—to support specified user needs directly or by providing additional
Locating Trustworthy Services
- In Proceedings of the First International Workshop on Agents and Peer-to-Peer Computing (AP2PC
, 2002
"... We view the Internet as supporting a peer-to-peer information system whose components provide services to one another. The services could involve serving static pages, processing queries, or carrying out transactions. We model service providers and consumers as autonomous agents. Centralized inde ..."
Abstract
-
Cited by 6 (1 self)
- Add to MetaCart
We view the Internet as supporting a peer-to-peer information system whose components provide services to one another. The services could involve serving static pages, processing queries, or carrying out transactions. We model service providers and consumers as autonomous agents. Centralized
Trustworthy Service-Oriented Computing
"... In service-oriented computing environments, computing resources are managed as services, which can be used directly or composed into larger services. Service-oriented architecture has been widely adopted in modern distributed environments such as for cloud computing. However, the problem of finding ..."
Abstract
- Add to MetaCart
In service-oriented computing environments, computing resources are managed as services, which can be used directly or composed into larger services. Service-oriented architecture has been widely adopted in modern distributed environments such as for cloud computing. However, the problem of finding
Trustworthy Services Through
, 2010
"... Remote attestation is a promising mechanism for assurance of distributed systems. It allows users to identify the software running on a remote system before trusting it with an important task. This functionality is arriving at exactly the right time as security-critical systems, such as healthcare a ..."
Abstract
- Add to MetaCart
and financial services, are increasingly being hosted online. However, attestation has limitations and has been criticized for being impractical. Too much effort is required for too little reward: a large, rapidly-changing list of software must be maintained by users, who then have insufficient information
5 Trustworthy Service Selection and Composition
, 2011
"... We consider Service-Oriented Computing (SOC) environments. Such environments are populated with ser-vices that stand proxy for a variety of information resources. A fundamental challenge in SOC is to select and compose services, to support specified user needs directly or by providing additional ser ..."
Abstract
- Add to MetaCart
We consider Service-Oriented Computing (SOC) environments. Such environments are populated with ser-vices that stand proxy for a variety of information resources. A fundamental challenge in SOC is to select and compose services, to support specified user needs directly or by providing additional
Trustworthy Service Composition: Challenges and Research Questions
- PROCEEDINGS OF THE 1ST INTERNATIONAL JOINT CONFERENCE ON AUTONOMOUS AGENTS AND MULTIAGENT SYSTEM (AAMAS
, 2002
"... Web services have been gathering an increasing amount of attention lately. The raison d'etre of Web services is that we compose them to create new services. For Web services to be effectively composed, however, requires that they be trustworthy and in fact be trusted by their users and other ..."
Abstract
-
Cited by 14 (0 self)
- Add to MetaCart
Web services have been gathering an increasing amount of attention lately. The raison d'etre of Web services is that we compose them to create new services. For Web services to be effectively composed, however, requires that they be trustworthy and in fact be trusted by their users
Selecting Trustworthy Service in Service-Oriented Environments
"... Abstract. Most of current service selection approaches in service-oriented environments fail to capture the dynamic relationships between services or assume the complete knowledge of service composition is known as a prior. In these cases, problems may arise when consumers are not aware of the under ..."
Abstract
- Add to MetaCart
Abstract. Most of current service selection approaches in service-oriented environments fail to capture the dynamic relationships between services or assume the complete knowledge of service composition is known as a prior. In these cases, problems may arise when consumers are not aware
In Service-Oriented MSN Providing Trustworthy Service Evaluation
"... Abstract: In this paper, we are going to propose survey based administration assessment to empower clients to share administration audit in administration situated versatile interpersonal organization. Every administration supplier freely keeps up a TSE for itself, which gathers and stores clients & ..."
Abstract
- Add to MetaCart
Abstract: In this paper, we are going to propose survey based administration assessment to empower clients to share administration audit in administration situated versatile interpersonal organization. Every administration supplier freely keeps up a TSE for itself, which gathers and stores clients ' surveys about its administrations without requiring any third trusted power. The administration surveys can then be made accessible to intrigued clients in settling on savvy administration choice choices. This paper portrays how the audit related normal dangers are destroyed and makes these surveys more fitting and valid. It portrays two frameworks bTSE and SrTSE, these frameworks are depicted to survey related issues and their suitable arrangements. The regular dangers of audits are Linkability, survey dismissal and change which are evacuated by utilizing bTSE; which makes utilization of tokens give incorporated surveys and the framework is progressed and the most vital risk called as Sybil assault is uprooted by utilizing SrTSE; which makes utilization of pseudonyms. Through execution assessment, we demonstrate that the bTSE accomplishes better execution as far as accommodation rate and defer than an administration audit framework that does not receive client collaboration.
Implementing Trustworthy Services Using Replicated State Machines
- IEEE SECURITY AND PRIVACY
, 2005
"... ..."
An agent-based approach for trustworthy service location
- In Proceedings of the 1st Workshop on Agents and Peer-to-Peer Computing (AP2PC
, 2002
"... Abstract. We view the Internet as supporting a peer-to-peer information system whose components provide services to one another. The services could involve serving static pages, processing queries, or carrying out transactions. We model service providers and consumers as autonomous agents. Centraliz ..."
Abstract
-
Cited by 8 (1 self)
- Add to MetaCart
Abstract. We view the Internet as supporting a peer-to-peer information system whose components provide services to one another. The services could involve serving static pages, processing queries, or carrying out transactions. We model service providers and consumers as autonomous agents
Results 1 - 10
of
921