Results 1 - 10
of
10
A Survey Study on Reputation-based Trust Mechanisms in Service-Oriented Computing
"... ABSTRACT – The Reputation-Based Trust mechanism (RBT) helps a service assess the trustworthiness of offered services, based on the feedback obtained from their users. A key challenge to apply the RBT is to prevent the cheating behavior of users when they provide recommendations-- they might give unf ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
(Show Context)
ABSTRACT – The Reputation-Based Trust mechanism (RBT) helps a service assess the trustworthiness of offered services, based on the feedback obtained from their users. A key challenge to apply the RBT is to prevent the cheating behavior of users when they provide recommendations-- they might give unfair ratings to benefit themselves. This survey describes the research communities that are making efforts to solve the problems of the RBT in Service-Oriented Computing (SOC) domain. A summary of findings is then discussed to position the trends and directions of future studies. The survey can be used as a reference guide in a hope to make trust-based service systems more reliable and scalable.
A Literature Review on Trust Management in Web Services Access Control
"... ABSTARCT Web Service is a reusable component which has set of related functionalities that service requesters can programmatically access from the service provider and manipulate through the Web. One of the main security issue is to secure web services from the malicious requesters. Since trust pla ..."
Abstract
- Add to MetaCart
(Show Context)
ABSTARCT Web Service is a reusable component which has set of related functionalities that service requesters can programmatically access from the service provider and manipulate through the Web. One of the main security issue is to secure web services from the malicious requesters. Since trust plays an important role in many kinds of human communication, it allows people to work under insecurity and with the risk of negative cost, many researchers have proposed different trust based web services access control model to prevent malicious requesters. In this literature review, various existing trust based web services access control model have been studied also investigated how the concept of a trust level is used in the access control policy of a service provider to allow service requester to access the web services.
Introducing a mathematical model in supply chain by adding trust flow
, 2014
"... Abstract These day, supply chains (SCs) have become more and more complicated and have extensively expanded and due to these complexities, the supply chain management (SCM) has encountered several uncertainties, and, as a result, trust and assurance between members in SCs has become essential for a ..."
Abstract
- Add to MetaCart
Abstract These day, supply chains (SCs) have become more and more complicated and have extensively expanded and due to these complexities, the supply chain management (SCM) has encountered several uncertainties, and, as a result, trust and assurance between members in SCs has become essential for a successful SCM. Although trust is an inevitable component in nearly all fields in SCs, like cooperation, coordination and management. As Trust increases the sense of security among members and cuts back on the losses, this research attempts to introduce a mathematical model that is able to utilize trust as a main element in a two-echelon SC. Defining trust is difficult since it is analyzed from different perspectives, and it is used in a wide range of situations. Therefore, the aim of this study is to propose an appropriate definition for this concept according to SCs, and to present a two-echelon SC, including a retailer and a supplier. The supplier and the retailer play Stackelberg game in newsvendor framework. The order quantity and stock, as the best sections for proposing the definition of trust, is developed for retailer and supplier. In addition, Beta model is presented for calculating trust and finally in order to verify the quality and efficiency of the proposed model, a numerical example is also offered.
A Survey on Trust in Semantic Web Services
"... Abstract — In the past many researchers worked in developing trust management models in various disciplines such as E-Business, Multi-Agent Systems, Web Services, Grid Computing, P2P networks, Adhoc networks etc. These trust models are lacking in accurate computation and evaluation of trustworthines ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract — In the past many researchers worked in developing trust management models in various disciplines such as E-Business, Multi-Agent Systems, Web Services, Grid Computing, P2P networks, Adhoc networks etc. These trust models are lacking in accurate computation and evaluation of trustworthiness for the Semantic web services. The trust level is measured with respect to the service, service provider, service consumer, trust evaluator and the agents that are relaying services. This survey discusses the various definitions, categories, sources and relationship of trust identified in the literature. Moreover this paper focuses in depth on various trust management models and its issues for semantic web services. This paper will provide a footstep for future researchers to develop new trust model taking in to account the limitations of the models identified here.
Trust-Based Personalized Service Recommendation: A Network Perspective
, 2013
"... Abstract Recent years have witnessed a growing trend of Web services on the Internet. There is a great need of effective service recommendation mechanisms. Existing methods mainly focus on the properties of individual Web services (e.g., func-tional and non-functional properties) but largely ignore ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract Recent years have witnessed a growing trend of Web services on the Internet. There is a great need of effective service recommendation mechanisms. Existing methods mainly focus on the properties of individual Web services (e.g., func-tional and non-functional properties) but largely ignore users ’ views on services, thus failing to provide personalized service recommendations. In this paper, we study the trust relationships between users and Web services using network modeling and analysis techniques. Based on the findings and the service network model we build, we then propose a collaborative filtering algorithm called Trust-Based Service Recommendation (TSR) to provide personalized service recommendations. This systematic approach for service network modeling and analysis can also be used for other service recommendation studies.
Integrating a Market-Based Model in Trust-Based Service Systems
"... Abstract: The reputation-based trust mechanism is a way to assess the trustworthiness of offered services, based on the feedback obtained from their users. In the absence of appropriate safeguards, service users can still manipulate this feedback. Auction mechanisms have already addressed the proble ..."
Abstract
- Add to MetaCart
Abstract: The reputation-based trust mechanism is a way to assess the trustworthiness of offered services, based on the feedback obtained from their users. In the absence of appropriate safeguards, service users can still manipulate this feedback. Auction mechanisms have already addressed the problem of manipulation by market-trading participants. When auction mechanisms are applied to trust systems, their interaction with the trust systems and associated overhead need to be quantitatively evaluated. This paper proposes two distributed architectures based on centralized and hybrid computing for integrating an auction mechanism with the trust systems. The empirical evaluation demonstrates how the architectures help to discourage users from giving untruthful feedback and reduce the overhead costs of the auction mechanisms. Key words: trust systems; software architecture; economic mechanisms 1
Graduate Supervisory Committee:
, 2011
"... Service based software (SBS) systems are software systems consisting of ser-vices based on the service oriented architecture (SOA). Each service in SBS systems provides partial functionalities and collaborates with other services as workflows to provide the functionalities required by the systems. T ..."
Abstract
- Add to MetaCart
(Show Context)
Service based software (SBS) systems are software systems consisting of ser-vices based on the service oriented architecture (SOA). Each service in SBS systems provides partial functionalities and collaborates with other services as workflows to provide the functionalities required by the systems. These services may be developed and/or owned by different entities and physically distributed across the Internet. Com-pared with traditional software system components which are usually specifically de-signed for the target systems and bound tightly, the interfaces of services and their communication protocols are standardized, which allow SBS systems to support late binding, provide better interoperability, better flexibility in dynamic business logics, and higher fault tolerance. The development process of SBS systems can be divided to three major phases: 1) SBS specification, 2) service discovery and matching, and 3) service composition and workflow execution. This dissertation focuses on the second phase, and presents a privacy preserving service discovery and ranking approach for multiple user QoS re-quirements. This approach helps service providers to register services and service users to search services through public, but untrusted service directories with the protection of their privacy against the service directories. The service directories can match the registered services with service requests, but do not learn any information about them. Our approach also enforces access control on services during the matching process, which prevents unauthorized users from discovering services. After the service directories match a set of services that satisfy the service users’ functionality requirements, the service discovery approach presented in this dissertation further considers service users ’ QoS requirements in two steps. First, this approach optimizes services ’ QoS by making tradeoff among various QoS aspects with users’ QoS requirements and preferences. Second, this approach ranks services based on how
unknown title
"... Copyright & reuse City University London has developed City Research Online so that its users may access the research outputs of City University London's staff. Copyright © and Moral Rights for this paper are retained by the individual author(s) and / or other copyright holders. All materia ..."
Abstract
- Add to MetaCart
(Show Context)
Copyright & reuse City University London has developed City Research Online so that its users may access the research outputs of City University London's staff. Copyright © and Moral Rights for this paper are retained by the individual author(s) and / or other copyright holders. All material in City Research Online is checked for eligibility for copyright before being made available in the live archive. URLs from City Research Online may be freely distributed and linked to from other web pages. Versions of research The version in City Research Online may differ from the final published version. Users are advised to check the Permanent City Research Online URL above for the status of the paper. Enquiries If you have any enquiries about any aspect of City Research Online, or if you wish to make contact with the author(s) of this paper, please email the team at publications@city.ac.uk.A Framework for Trusted Services
Natural Sciences Publishing Cor. A Trust Evaluation Mechanism for Collaboration of Data-Intensive Services in Cloud
, 2013
"... Abstract: Trust and reputation for services emerges as an important issue in cloud computing. Since data-intensive services in cloud have been used in more and more fields, trust evaluation for collaboration of services meets more challenges. There are not only logical dependencies but also data dep ..."
Abstract
- Add to MetaCart
Abstract: Trust and reputation for services emerges as an important issue in cloud computing. Since data-intensive services in cloud have been used in more and more fields, trust evaluation for collaboration of services meets more challenges. There are not only logical dependencies but also data dependencies among partner services when data-intensive services take part in collaboration. This paper proposes a novel trust evaluation method for collaborations of data-intensive services. It considers not only the trust for individual partner services and the explicit trust relation among partner services that have logical dependencies for each other, but also the implicit trust relation implied in data-dependencies among services. A serial of experiments, using the simulation tool NetLogo, are carried out to compare the evaluation results between the proposed method and the method without data-dependency consideration. The result shows that taking consideration of the data-dependency trust improves the accuracy of trust evaluation to a great extent.