Skip to main content

Aggregation and Optimisation of Trustworthiness of Composite Services

  • Chapter
Secure and Trustworthy Service Composition

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8900))

  • 458 Accesses

Abstract

The chapter presents the Aniketos approach to aggregating and predicting the trustworthiness of services that are assembled from component services. Some of the important characteristics of service environments are that they are dynamic, distributed and loosely coupled. These characteristics result in the existence of different levels of functional and non-functional attributes of the services operating in such environments. Consequently, it creates challenges for interacting service consumers that require to only deal with services that are trustworthy. In service compositions, the component services may be mandatory or optional and vary in their contribution to the trustworthiness of the composite service. Composition techniques must be able to select trustworthy components and to dynamically adapt to subsequent changes in the services and the environment. The availability of multiple services providing the same or similar functionality but with different trustworthiness levels helps composite service providers to establish and maintain trustworthy compositions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sabater, J.: Trust and reputation for agent societies, PhD dissertation, Universitat Autònoma de Barcelona (2002)

    Google Scholar 

  2. Huynh, T.D.: Trust and Reputation in Open Multi-Agent Systems, PhD dissertation, University of Sourthampton (2006)

    Google Scholar 

  3. Noorian, Z., Ulieru, M.: The State of the Art in Trust and Reputation Systems A Framework for Comparison. J. Theoretical and Applied Electronic Commerce Research (2010)

    Google Scholar 

  4. Khalid, O., Khan, S.U., Madani, S.A., Hayat, K., Khan, M.I.: Comparative study of trust and reputation systems for wireless sensor networks. J. Security and Communication Networks 6(6), 669–688 (2013)

    Article  Google Scholar 

  5. Hoffman, K., Zage, D., Nita-Rotaru, C.: A survey of attack and defense techniques for reputation systems. ACM Computing Surveys 42(1), 1–31 (2009)

    Article  Google Scholar 

  6. WS-Trust specification document, http://docs.oasis-open.org/ws-sx/ws-trust/v1.4/ws-trust.html (February 2009)

  7. Singhal, A., Winograd, T., Scarfone, K.: Guide to Secure Web Services, National Institute of Standards and Technology, Technical Report (August 2007)

    Google Scholar 

  8. Malik, Z., Bouguettaya, A.: Trust Management for Service Oriented Environments. Springer (2009)

    Google Scholar 

  9. Takabi, H., Joshi, J., Ahn, G.: Security and Privacy Challenges in Cloud Computing Environments. IEEE Security and Privacy 8(6), 24–31 (2010)

    Article  Google Scholar 

  10. Paradesi, S., Doshi, P., Swaika, S.: Integrating Behavioral Trust in Web Service Compositions. In: 2009 IEEE Int. Conf. Web Services, pp. 453–460 (2009)

    Google Scholar 

  11. Hang, C.-W., Singh, M.P.: Trustworthy Service Selection and Composition. ACM Trans. Autonomous and Adaptive Systems 6(1), 1–18 (2011)

    Article  Google Scholar 

  12. Lee, G.-G., Lin, H.-F.: Customer perceptions of e-service quality in online shopping. Int. J. Retail & Distribution Management 33(2), 161–176 (2005)

    Article  Google Scholar 

  13. Li, H., Suomi, R.: A Proposed Scale for Measuring E-service Quality. Int. J. u-and e-Service 2(1), 1–10 (2009)

    Google Scholar 

  14. Parasuraman, A., Zeithaml, V., Berry, L.: SERVQUAL: A multiple-item scale for measuring consumer perceptions of service quality. J. Retailing 64(1), 12–40 (1988)

    Google Scholar 

  15. Udo, G.J., Bagchi, K.K., Kirs, P.J.: An assessment of customers’ e-service quality perception, satisfaction and intention. Int. J. Information Management 30(6), 481–492 (2010)

    Article  Google Scholar 

  16. Ciszkowski, T., Mazurczyk, W., Kotulski, Z., Hoßfeld, T., Fiedler, M., Collange, D.: Towards Quality of Experience-based reputation models for future web service provisioning. Telecommunication Systems 51(4), 283–295 (2012)

    Article  Google Scholar 

  17. Moser, O., Rosenberg, F., Dustdar, S.: Non-Intrusive Monitoring and Service Adaptation for WS-BPEL. In: Proc. 17th Int. Conf. World Wide Web, pp. 815–824 (2008)

    Google Scholar 

  18. Hwang, S., Wang, H., Tang, J., Srivastava, J.: A probabilistic approach to modeling and estimating the QoS of web-services-based workflows. Information Science J. 177(23), 5484–5503 (2007)

    Article  MATH  Google Scholar 

  19. Grassi, V., Patella, S.: Reliability prediction for service-oriented computing environments. Internet Computing 10(3), 43–49 (2006)

    Article  Google Scholar 

  20. Elshaafi, H., Mcgibney, J., Botvich, D.: Trustworthiness Monitoring and Prediction of Composite Services. In: Proc. 17th IEEE Symposium on Computers and Communications, pp. 580–587 (July 2012)

    Google Scholar 

  21. Elshaafi, H., Botvich, D.: Aggregation of Trustworthiness Properties of BPMN-based Composite Services. In: Proc. 17th IEEE Int. Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (September 2012)

    Google Scholar 

  22. Bianco, V., Lavazza, L., Morasca, S., Taibi, D.: A Survey on Open Source Software Trustworthiness. In: IEEE Software (2011)

    Google Scholar 

  23. Object Management Group, Business Process Model and Notation (BPMN) 2.0, http://www.omg.org/spec/BPMN/2.0

  24. Weske, M.: Business Process Management. Concepts, Languages, Architectures, 2nd edn. Springer (2012)

    Google Scholar 

  25. Russell, N., ter Hofstede, A.H.M., van der Aalst, W.M.P., Mulyar, N.: Workflow Control-Flow Patterns: A Revised View, BPM Center Report BPM-06-22 (2006), http://bpmcenter.org

  26. Workflow Patterns Initiative, http://www.workflowpatterns.com

  27. Steel, C., Nagappan, R., Lai, R.: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services and Identity Management, Pearson Education (2006)

    Google Scholar 

  28. Rehman, Z.U., Hussain, F.K., Hussain, O.K.: Towards Multi-criteria Cloud Service Selection. In: Proc. 5th Int. Conf. Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 44–48 (June 2011)

    Google Scholar 

  29. OSGi Alliance Specifications, http://www.osgi.org/Specifications

  30. Drools - The Business Logic integration Platform, http://www.jboss.org/drools

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Elshaafi, H., McGibney, J., Botvich, D. (2014). Aggregation and Optimisation of Trustworthiness of Composite Services. In: Brucker, A.D., Dalpiaz, F., Giorgini, P., Meland, P.H., Rios, E. (eds) Secure and Trustworthy Service Composition. Lecture Notes in Computer Science, vol 8900. Springer, Cham. https://doi.org/10.1007/978-3-319-13518-2_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13518-2_11

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13517-5

  • Online ISBN: 978-3-319-13518-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics