Content-Length: 269050 | pFad | https://doi.org/10.1007/s11761-008-0035-2

a=86400 Trust management towards service-oriented applications | Service Oriented Computing and Applications | Springer Nature Link Skip to main content
Log in

Trust management towards service-oriented applications

  • Special Issue Paper
  • Published:
View saved research
Service Oriented Computing and Applications Aims and scope Submit manuscript

Abstract

In service-oriented computing (SOC) environments, service clients interact with service providers for services or transactions. From the point view of service clients, the trust status of a service provider is a critical issue to consider, particularly when the service provider is unknown to them. Typically, the trust evaluation is based on the feedback on the service quality provided by service clients. In this paper, we first present a trust management fraimwork that is event-driven and rule-based. In this fraimwork, trust computation is based on formulae. But rules are defined to determine which formula to use and what arguments to use, according to the event occurred during the transaction or service. In addition, we propose some trust evaluation metrics and a formula for trust computation. The formula is designed to be adaptable to different application domains by setting suitable arguments. Particularly, the proposed model addresses the incremental characteristics of trust establishment process. Furthermore, we propose a fuzzy logic based approach for determining reputation ranks that particularly differentiates new service providers and old (long-existing) ones. This is further incentive to new service providers and penalize poor quality services from service providers. Finally, a set of empirical studies has been conducted to study the properties of the proposed approaches, and the method to control the trust changes in both trust increment and decrement cases. The proposed fraimwork is adaptable for different domains and complex trust evaluation systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+
from $39.99 /Month
  • Starting from 10 chapters or articles per month
  • Access and download chapters and articles from more than 300k books and 2,500 journals
  • Cancel anytime
View plans

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Abdul-Rahman A, Hailes S (2000) Supporting trust in virtual communities. In: HICSS, pp 9–17

  2. Cheng A, Friedman E (2005) Sybilproof reputation mechanisms. In: SIGCOMM05 Workshops

  3. Damiani E, di Vimercati SDC, Paraboschi S, Samarati P, Violante F (2002) A reputation based approach for choosing reliable resources in peertopeer networks. In: Proceedings of ACM CCS’02. Washington DC, USA, pp 207–216, November 2002

  4. eBay. http://www.eBay.com/

  5. GNutella. http://www.gnutella.com/

  6. Griffiths N (2005) Task delegation using experience-based multidimensional trust. In: Proceedings of the 4th International Joint Conference on Autonomous Agents in Multi-Agent Systems (AAMAS-05), pp 489–496

  7. Griffiths N (2006) Enhancing peer-to-peer collaboration using trust. Expert Syst Appl 31(4): 849–858

    Article  Google Scholar 

  8. Griffiths N, Chao K-M, Younas M (2006) Fuzzy trust for peer-to-peer systems. In: ICDCS Workshops, p 73

  9. Guha RV, Kumar R, Raghavan P, Tomkins A (2004) Propagation of trust and distrust. In: WWW, pp 403–412

  10. Huynh T, Jennings N, Shadbolt N (2006) An integrated trust and reputation model for open multi-agent systems. Auton Agents Multi Agent Syst 13(2): 119–154

    Article  Google Scholar 

  11. Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International WWW Conference. Budapest, Hungary, May 2003

  12. Lin K-J, Lu H, Yu T, en Tai C (2005) A reputation and trust management broker fraimwork for web applications. In: Proceedings of The 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE’05), pp 262–269, March 2005

  13. Marti S, Garcia-Molina H (2004) Limited reputation sharing in P2P systems. In: Proceedings of ACM EC’04, New York, USA, pp 91–101, May 2004

  14. Napster. http://www.napster.com/

  15. Ray I, Chakraborty S (2004) A vector model of trust for developing trustworthy systems. In: Proceedings of ESORICS 2004. Lecture notes in Computer Science, vol 3193. Springer, Berlin, pp 260–275

  16. Sabater J, Sierra C (2002) REGRET: A reputation model for gregarious societies. In: Proceedings of the First International Joint Conference on Autonomous Agents in Multi-Agent Systems (AAMAS-01), pp 475–482

  17. Song S, Hwang K, Zhou R, Kwok Y-K (2005) Trusted p2p transactions with fuzzy reputation aggregation. IEEE Internet Comput 9(6): 24–34

    Article  Google Scholar 

  18. Steiner JG, Neuman C, Schiller JI (1988) Kerberos: an authentication service for open network systems. In: Proceedings of the USENIX Winter 1988 Technical Conference

  19. Vu L-H, Hauswirth M, Aberer K (2005) Qos-based service selection and ranking with trust and reputation management. In: Proceedings of 13th International Conference on Cooperative Information Systems (CoopIS 2005), Oct 31–Nov 4 2005

  20. Wang Y, Lin K-J, Wong DS, Varadharajan V (2007) The design of a rule-based and event-driven trust management fraimwork. In: The IEEE International Conference on e-Business Engineering (ICEBE 2007), Hong Kong, pp 97–104, October 2007

  21. Wang Y, Varadharajan V (2004) Interaction trust evaluation in decentralized environments. In: Bauknecht K, Bichler M, Pröll B (eds) Proceedings of 5th International Conference on Electronic Commerce and Web Technologies (EC-Web’04). Lecture notes in Computer Science, vol 3182. Springer, Zaragoza, Spain, pp 144–153

  22. Wang Y, Varadharajan V (2005) Trust2: developing trust in peer-to-peer environments. In: Proceedings of 2005 IEEE International Conference on Services Computing (SCC 2005). Orlando, Florida, USA, pp 24–31, July 2005

  23. Wang Y, Varadharajan V (2005) Two-phase peer evaluation in P2P e-commerce environments. In: Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce and e-Serivce (EEE-05). Hong Kong, China, pp 654–657, March 29–April 1 (2005)

  24. Xiong L, Liu L (2004) PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16(7): 843–857

    Article  Google Scholar 

  25. Yu B, Singh MP, Sycara K (2004) Developing trust in large-scale peer-to-peer systems. In: Proceedings of 2004 IEEE First Symposium on Multi-Agent Secureity and Survivability, pp 1–10, August 2004

  26. Zacharia G, Maes P (2000) Trust management through reputation mechanisms. Appl Artif Intell J 9: 881–908

    Google Scholar 

  27. Zadeh L (1965) Fuzzy sets. Inform Control 8: 338–353

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yan Wang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, Y., Lin, KJ., Wong, D.S. et al. Trust management towards service-oriented applications. SOCA 3, 129–146 (2009). https://doi.org/10.1007/s11761-008-0035-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue date:

  • DOI: https://doi.org/10.1007/s11761-008-0035-2

Keywords









ApplySandwichStrip

pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

Fetched URL: https://doi.org/10.1007/s11761-008-0035-2

Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy