Abstract
The chapter presents the Aniketos approach to aggregating and predicting the trustworthiness of services that are assembled from component services. Some of the important characteristics of service environments are that they are dynamic, distributed and loosely coupled. These characteristics result in the existence of different levels of functional and non-functional attributes of the services operating in such environments. Consequently, it creates challenges for interacting service consumers that require to only deal with services that are trustworthy. In service compositions, the component services may be mandatory or optional and vary in their contribution to the trustworthiness of the composite service. Composition techniques must be able to select trustworthy components and to dynamically adapt to subsequent changes in the services and the environment. The availability of multiple services providing the same or similar functionality but with different trustworthiness levels helps composite service providers to establish and maintain trustworthy compositions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Sabater, J.: Trust and reputation for agent societies, PhD dissertation, Universitat Autònoma de Barcelona (2002)
Huynh, T.D.: Trust and Reputation in Open Multi-Agent Systems, PhD dissertation, University of Sourthampton (2006)
Noorian, Z., Ulieru, M.: The State of the Art in Trust and Reputation Systems A Framework for Comparison. J. Theoretical and Applied Electronic Commerce Research (2010)
Khalid, O., Khan, S.U., Madani, S.A., Hayat, K., Khan, M.I.: Comparative study of trust and reputation systems for wireless sensor networks. J. Security and Communication Networks 6(6), 669–688 (2013)
Hoffman, K., Zage, D., Nita-Rotaru, C.: A survey of attack and defense techniques for reputation systems. ACM Computing Surveys 42(1), 1–31 (2009)
WS-Trust specification document, http://docs.oasis-open.org/ws-sx/ws-trust/v1.4/ws-trust.html (February 2009)
Singhal, A., Winograd, T., Scarfone, K.: Guide to Secure Web Services, National Institute of Standards and Technology, Technical Report (August 2007)
Malik, Z., Bouguettaya, A.: Trust Management for Service Oriented Environments. Springer (2009)
Takabi, H., Joshi, J., Ahn, G.: Security and Privacy Challenges in Cloud Computing Environments. IEEE Security and Privacy 8(6), 24–31 (2010)
Paradesi, S., Doshi, P., Swaika, S.: Integrating Behavioral Trust in Web Service Compositions. In: 2009 IEEE Int. Conf. Web Services, pp. 453–460 (2009)
Hang, C.-W., Singh, M.P.: Trustworthy Service Selection and Composition. ACM Trans. Autonomous and Adaptive Systems 6(1), 1–18 (2011)
Lee, G.-G., Lin, H.-F.: Customer perceptions of e-service quality in online shopping. Int. J. Retail & Distribution Management 33(2), 161–176 (2005)
Li, H., Suomi, R.: A Proposed Scale for Measuring E-service Quality. Int. J. u-and e-Service 2(1), 1–10 (2009)
Parasuraman, A., Zeithaml, V., Berry, L.: SERVQUAL: A multiple-item scale for measuring consumer perceptions of service quality. J. Retailing 64(1), 12–40 (1988)
Udo, G.J., Bagchi, K.K., Kirs, P.J.: An assessment of customers’ e-service quality perception, satisfaction and intention. Int. J. Information Management 30(6), 481–492 (2010)
Ciszkowski, T., Mazurczyk, W., Kotulski, Z., Hoßfeld, T., Fiedler, M., Collange, D.: Towards Quality of Experience-based reputation models for future web service provisioning. Telecommunication Systems 51(4), 283–295 (2012)
Moser, O., Rosenberg, F., Dustdar, S.: Non-Intrusive Monitoring and Service Adaptation for WS-BPEL. In: Proc. 17th Int. Conf. World Wide Web, pp. 815–824 (2008)
Hwang, S., Wang, H., Tang, J., Srivastava, J.: A probabilistic approach to modeling and estimating the QoS of web-services-based workflows. Information Science J. 177(23), 5484–5503 (2007)
Grassi, V., Patella, S.: Reliability prediction for service-oriented computing environments. Internet Computing 10(3), 43–49 (2006)
Elshaafi, H., Mcgibney, J., Botvich, D.: Trustworthiness Monitoring and Prediction of Composite Services. In: Proc. 17th IEEE Symposium on Computers and Communications, pp. 580–587 (July 2012)
Elshaafi, H., Botvich, D.: Aggregation of Trustworthiness Properties of BPMN-based Composite Services. In: Proc. 17th IEEE Int. Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (September 2012)
Bianco, V., Lavazza, L., Morasca, S., Taibi, D.: A Survey on Open Source Software Trustworthiness. In: IEEE Software (2011)
Object Management Group, Business Process Model and Notation (BPMN) 2.0, http://www.omg.org/spec/BPMN/2.0
Weske, M.: Business Process Management. Concepts, Languages, Architectures, 2nd edn. Springer (2012)
Russell, N., ter Hofstede, A.H.M., van der Aalst, W.M.P., Mulyar, N.: Workflow Control-Flow Patterns: A Revised View, BPM Center Report BPM-06-22 (2006), http://bpmcenter.org
Workflow Patterns Initiative, http://www.workflowpatterns.com
Steel, C., Nagappan, R., Lai, R.: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services and Identity Management, Pearson Education (2006)
Rehman, Z.U., Hussain, F.K., Hussain, O.K.: Towards Multi-criteria Cloud Service Selection. In: Proc. 5th Int. Conf. Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 44–48 (June 2011)
OSGi Alliance Specifications, http://www.osgi.org/Specifications
Drools - The Business Logic integration Platform, http://www.jboss.org/drools
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Elshaafi, H., McGibney, J., Botvich, D. (2014). Aggregation and Optimisation of Trustworthiness of Composite Services. In: Brucker, A.D., Dalpiaz, F., Giorgini, P., Meland, P.H., Rios, E. (eds) Secure and Trustworthy Service Composition. Lecture Notes in Computer Science, vol 8900. Springer, Cham. https://doi.org/10.1007/978-3-319-13518-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-13518-2_11
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13517-5
Online ISBN: 978-3-319-13518-2
eBook Packages: Computer ScienceComputer Science (R0)