Trustworthy service composition: Challenges and research questions

被引:0
|
作者
Singh, MP [1 ]
机构
[1] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Web services have been gathering an increasing amount of attention lately. The raison d'etre of Web services is that we compose them to create new services. For Web services to be effectively composed, however, requires that they be trustworthy and in fact be trusted by their users and other collaborating services. In our conceptual scheme, principals interact as autonomous peers to provide services to one another. Trust is captured as a composite relationship between the trusted and the trusting principal. Principals help each other discover and locate trustworthy services and weed out untrustworthy players. The interactions of the principals combined with the needs of different applications induce interesting structures on the network. We apply multiagent systems techniques to model interactions among the principals. By varying the requirements of different applications, the needs of different principals, the existence of special principals such as trusted authorities, and the mechanisms underlying the interactions, we draw attention to a variety of important settings where Web services would be composed. One, leading to superior methods through which trust can be evolved and managed in realistic service-composition settings. Two, studying the relationships. between aspects of trust for Web services and-the evolution of Web structure.
引用
收藏
页码:39 / 52
页数:14
相关论文
共 50 条
  • [11] Trustworthy service composition using swift trust in SON
    Ma, Xiaoning
    Journal of Computational Information Systems, 2010, 6 (14): : 4761 - 4766
  • [12] A trustworthy web service composition method for ubiquitous computing
    Zhao, Shenghui
    Chen, Guilin
    Wang, Huibin
    Chen, Haibao
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2017, 26 (01) : 44 - 55
  • [13] Trustworthy service selection and composition - Reducing the entropy of service-oriented Web
    Liu, W
    2005 3RD IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2005, : 104 - 109
  • [14] Research Challenges of Digital Misinformation: Toward a Trustworthy Web
    Ciampaglia, Giovanni Luca
    Mantzarlis, Alexios
    Maus, Gregory
    Menczer, Filippo
    AI MAGAZINE, 2018, 39 (01) : 65 - 74
  • [15] Establishing and evaluating trustworthy AI: overview and research challenges
    Kowald, Dominik
    Scher, Sebastian
    Pammer-Schindler, Viktoria
    Muellner, Peter
    Waxnegger, Kerstin
    Demelius, Lea
    Fessl, Angela
    Toller, Maximilian
    Mendoza Estrada, Inti Gabriel
    Simic, Ilija
    Sabol, Vedran
    Truegler, Andreas
    Veas, Eduardo
    Kern, Roman
    Nad, Tomislav
    Kopeinik, Simone
    FRONTIERS IN BIG DATA, 2024, 7
  • [16] Trustworthy service composition with secure data transmission in sensor networks
    Tao Zhang
    Lele Zheng
    Yongzhi Wang
    Yulong Shen
    Ning Xi
    Jianfeng Ma
    Jianming Yong
    World Wide Web, 2018, 21 : 185 - 200
  • [17] Trustworthy Web Service Security Risk Assessment Research
    Pang Jianjing
    Peng Xinguang
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 417 - 420
  • [18] Dynamic evolution mechanism for trustworthy software based on service composition
    Zeng J.
    Sun H.-L.
    Liu X.-D.
    Deng T.
    Huai J.-P.
    Ruan Jian Xue Bao/Journal of Software, 2010, 21 (02): : 261 - 276
  • [19] Trustworthy service composition with secure data transmission in sensor networks
    Zhang, Tao
    Zheng, Lele
    Wang, Yongzhi
    Shen, Yulong
    Xi, Ning
    Ma, Jianfeng
    Yong, Jianming
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (01): : 185 - 200
  • [20] Prototype for Design-time Secure and Trustworthy Service Composition
    Zhou, Bo
    Llewellyn-Jones, David
    Shi, Qi
    Asim, Muhammad
    Merabti, Madjid
    2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2013, : 847 - 848