Skip to main content

Trustworthy Service Composition: Challenges and Research Questions

  • Conference paper
  • First Online:
Trust, Reputation, and Security: Theories and Practice (TRUST 2002)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 2631))

Included in the following conference series:

Abstract

Web services have been gathering an increasing amount of attention lately. The raison d’etre of Web services is that we compose them to create new services. For Web services to be effectively composed, however, requires that they be trustworthy and in fact be trusted by their users and other collaborating services. In our conceptual scheme, principals interact as autonomous peers to provide services to one another. Trust is captured as a composite relationship between the trusted and the trusting principal. Principals help each other discover and locate trustworthy services and weed out untrustworthy players. The interactions of the principals combined with the needs of different applications induce interesting structures on the network. We apply multiagent systems techniques to model interactions among the principals.

By varying the requirements of different applications, the needs of different principals, the existence of special principals such as trusted authorities, and the mechanisms underlying the interactions, we draw attention to a variety of important settings where Web services would be composed. One, leading to superior methods through which trust can be evolved and managed in realistic service-composition settings. Two, studying the relationships between aspects of trust for Web services and the evolution of Web structure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. RĂ©ka Albert, Hawoong Jeong, and Albert-LĂ¡szlĂ³ BarabĂ¡si. Diameter of the world-wide web. Nature, 401:130–131, September 1999.

    Google Scholar 

  2. Matt Blaze, Joan Feigenbaum, and Angelos D. Keromytis. The role of trust management in distributed systems security. In [28], pages 185–210. 1999.

    Google Scholar 

  3. Don Box, David Ehnebuske, Gopal Kakivaya, Andrew Layman, Noah Mendelsohn, Henrik Frystyk Nielsen, Satish Thatte, and Dave Winer. Simple object access protocol (SOAP) 1.1, 2000. http://www.w3.org/TR/SOAP.

  4. Sergey Brin and Lawrence Page. The anatomy of a large-scale hypertextual Web search engine. Computer Networks and ISDN Systems, 30(1–7):107–117, 1998.

    Article  Google Scholar 

  5. Cristiano Castelfranchi. Commitments: From individual intentions to groups and organizations. In Proceedings of the International Conference on Multiagent Systems, pages 41–48, 1995.

    Google Scholar 

  6. Cristiano Castelfranchi and Rino Falcone. Principles of trust for MAS: cognitive anatomy, social importance, and quantification. In Proceedings of the 3rd International Conference on Multiagent Systems, pages 72–79, 1998.

    Google Scholar 

  7. Erik Christensen, Francisco Curbera, Greg Meredith, and Sanjiva Weerawarana. Web services description language (WSDL) 1.1, 2001. http://www.w3.org/TR/wsdl.

  8. Mark d’Inverno, David Kinny, and Michael Luck. Interaction protocols in Agentis. In Proceedings of the 3rd International Conference on Multiagent Systems (ICMAS), pages 112–119. IEEE Computer Society Press, July 1998.

    Google Scholar 

  9. Freenet. Home page, 2001. http://www.freenet.sourceforge.net.

  10. Noah E. Friedkin. Information flow through strong and weak ties in intraorganizational social network. Social Networks, 3:273–285, 1982.

    Article  Google Scholar 

  11. Les Gasser. Social conceptions of knowledge and action: DAI foundations and open systems semantics. In [15], pages 389–404. 1998. (Reprinted from Artificial Intelligence, 1991).

    Google Scholar 

  12. David Gibson, Jon Kleinberg, and Prabhakar Raghavan. Inferring Web communities from link topology. In Proceedings of the 9th ACM Conference on Hypertext and Hypermedia: Links, Objects, Time and Space — Structure in Hypermedia Systems, pages 225–234. ACM, 1999.

    Google Scholar 

  13. Gnutella. Home page, 2001. http://www.gnutella.wego.com.

  14. Tyrone Grandison and Morris Sloman. A survey of trust in Internet applications. IEEE Communications Surveys and Tutorials, 3(4):2–16, December 2000.

    Article  Google Scholar 

  15. Michael N. Huhns and Munindar P. Singh, editors. Readings in Agents. Morgan Kaufmann, San Francisco, 1998.

    Google Scholar 

  16. Henry Kautz, Bart Selman, and Mehul Shah. Referral Web: Combining social networks and collaborative filtering. Communications of the ACM, 40(3):63–65, March 1997.

    Article  Google Scholar 

  17. Ebrahim (Abe) Mamdani and Jeremy Pitt. Responsible agent behavior: A distributed computing perspective. IEEE Internet Computing, 4(5):27–31, September 2000.

    Article  Google Scholar 

  18. Steven P. Marsh. Formalising Trust as a Computational Concept. PhD thesis, Department of Computing Science and Mathematics, University of Stirling, April 1994.

    Google Scholar 

  19. Uttam Mukhopadhyay, Larry Stephens, Michael Huhns, and Ronald Bonnell. An intelligent system for document retrieval in distributed office environments. Journal of American Society for Information Sciences, 37: 123–135, 1986.

    Google Scholar 

  20. Bonnie A. Nardi, Steve Whittaker, and Heinrich Schwarz. It’s not what you know, it’s who you know: work in the information age. First Monday, 5(5), May 2000.

    Google Scholar 

  21. Lars Rasmusson and Sverker Janson. Simulated social control for secure Internet commerce. In Proceedings of the Workshop on New Security Paradigms, pages 18–25, 1996.

    Google Scholar 

  22. Tim Rea and Peter Skevington. Engendering trust in electronic commerce. British Telecommunications Engineering, 17(3):150–157, 1998.

    Google Scholar 

  23. Peter H. Reingen and Jerome B. Kernan. Analysis of referral networks in marketing: Methods and illustration. Journal of Marketing Research, 23:370–378, November 1986.

    Google Scholar 

  24. Michael Schillo and Petra Funk. Who can you trust: Dealing with deception. In Proceedings of the Autonomous Agents Workshop on Deception, Fraud and Trust in Agent Societies, pages 95–106, 1999.

    Google Scholar 

  25. Munindar P. Singh. Peering at peer-to-peer computing. IEEE Internet Computing, 5(1):4–5, January 2001. Instance of the column Being Interactive.

    Google Scholar 

  26. Marvin A. Sirbu. Credits and debits on the Internet. In [15], pages 299–305. 1998. (Reprinted from IEEE Spectrum, 1997).

    Google Scholar 

  27. UDDI technical white paper, 2000. http://www.uddi.org/pubs/Iru-UDDI-Technical-White-Paper.pdf.

  28. Jan Vitek and Christian D. Jensen, editors. Secure Internet Programming: Security Issues for Mobile and Distributed Objects, volume 1603 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1999.

    Google Scholar 

  29. Duncan J. Watts and Steven H. Strogatz. Collective dynamics of’ small-world’ networks. Nature, 393:440–442, June 1998.

    Google Scholar 

  30. Uwe G. Wilhelm, Sebastian M. Staamann, and Levente ButtyĂ¡n. A pessimistic approach to trust in mobile agent platforms. IEEE Internet Computing, 4(5):40–48, September 2000.

    Article  Google Scholar 

  31. Pinar Yolum and Munindar P. Singh. Commitment machines. In Proceedings of the 8th International Workshop on Agent Theories, Architectures, and Languages (ATAL-01). Springer-Verlag, 2002. In press.

    Google Scholar 

  32. Giorgos Zacharia, Alexandros Moukas, and Pattie Maes. Collaborative reputation mechanisms in electronic marketplaces. Decision Support Systems, 29(4):371–388, December 2000.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Singh, M.P. (2003). Trustworthy Service Composition: Challenges and Research Questions. In: Falcone, R., Barber, S., Korba, L., Singh, M. (eds) Trust, Reputation, and Security: Theories and Practice. TRUST 2002. Lecture Notes in Computer Science, vol 2631. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36609-1_5

Download citation

  • DOI: https://doi.org/10.1007/3-540-36609-1_5

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00988-7

  • Online ISBN: 978-3-540-36609-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics