Abstract
Web services have been gathering an increasing amount of attention lately. The raison d’etre of Web services is that we compose them to create new services. For Web services to be effectively composed, however, requires that they be trustworthy and in fact be trusted by their users and other collaborating services. In our conceptual scheme, principals interact as autonomous peers to provide services to one another. Trust is captured as a composite relationship between the trusted and the trusting principal. Principals help each other discover and locate trustworthy services and weed out untrustworthy players. The interactions of the principals combined with the needs of different applications induce interesting structures on the network. We apply multiagent systems techniques to model interactions among the principals.
By varying the requirements of different applications, the needs of different principals, the existence of special principals such as trusted authorities, and the mechanisms underlying the interactions, we draw attention to a variety of important settings where Web services would be composed. One, leading to superior methods through which trust can be evolved and managed in realistic service-composition settings. Two, studying the relationships between aspects of trust for Web services and the evolution of Web structure.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Réka Albert, Hawoong Jeong, and Albert-László Barabási. Diameter of the world-wide web. Nature, 401:130–131, September 1999.
Matt Blaze, Joan Feigenbaum, and Angelos D. Keromytis. The role of trust management in distributed systems security. In [28], pages 185–210. 1999.
Don Box, David Ehnebuske, Gopal Kakivaya, Andrew Layman, Noah Mendelsohn, Henrik Frystyk Nielsen, Satish Thatte, and Dave Winer. Simple object access protocol (SOAP) 1.1, 2000. http://www.w3.org/TR/SOAP.
Sergey Brin and Lawrence Page. The anatomy of a large-scale hypertextual Web search engine. Computer Networks and ISDN Systems, 30(1–7):107–117, 1998.
Cristiano Castelfranchi. Commitments: From individual intentions to groups and organizations. In Proceedings of the International Conference on Multiagent Systems, pages 41–48, 1995.
Cristiano Castelfranchi and Rino Falcone. Principles of trust for MAS: cognitive anatomy, social importance, and quantification. In Proceedings of the 3rd International Conference on Multiagent Systems, pages 72–79, 1998.
Erik Christensen, Francisco Curbera, Greg Meredith, and Sanjiva Weerawarana. Web services description language (WSDL) 1.1, 2001. http://www.w3.org/TR/wsdl.
Mark d’Inverno, David Kinny, and Michael Luck. Interaction protocols in Agentis. In Proceedings of the 3rd International Conference on Multiagent Systems (ICMAS), pages 112–119. IEEE Computer Society Press, July 1998.
Freenet. Home page, 2001. http://www.freenet.sourceforge.net.
Noah E. Friedkin. Information flow through strong and weak ties in intraorganizational social network. Social Networks, 3:273–285, 1982.
Les Gasser. Social conceptions of knowledge and action: DAI foundations and open systems semantics. In [15], pages 389–404. 1998. (Reprinted from Artificial Intelligence, 1991).
David Gibson, Jon Kleinberg, and Prabhakar Raghavan. Inferring Web communities from link topology. In Proceedings of the 9th ACM Conference on Hypertext and Hypermedia: Links, Objects, Time and Space — Structure in Hypermedia Systems, pages 225–234. ACM, 1999.
Gnutella. Home page, 2001. http://www.gnutella.wego.com.
Tyrone Grandison and Morris Sloman. A survey of trust in Internet applications. IEEE Communications Surveys and Tutorials, 3(4):2–16, December 2000.
Michael N. Huhns and Munindar P. Singh, editors. Readings in Agents. Morgan Kaufmann, San Francisco, 1998.
Henry Kautz, Bart Selman, and Mehul Shah. Referral Web: Combining social networks and collaborative filtering. Communications of the ACM, 40(3):63–65, March 1997.
Ebrahim (Abe) Mamdani and Jeremy Pitt. Responsible agent behavior: A distributed computing perspective. IEEE Internet Computing, 4(5):27–31, September 2000.
Steven P. Marsh. Formalising Trust as a Computational Concept. PhD thesis, Department of Computing Science and Mathematics, University of Stirling, April 1994.
Uttam Mukhopadhyay, Larry Stephens, Michael Huhns, and Ronald Bonnell. An intelligent system for document retrieval in distributed office environments. Journal of American Society for Information Sciences, 37: 123–135, 1986.
Bonnie A. Nardi, Steve Whittaker, and Heinrich Schwarz. It’s not what you know, it’s who you know: work in the information age. First Monday, 5(5), May 2000.
Lars Rasmusson and Sverker Janson. Simulated social control for secure Internet commerce. In Proceedings of the Workshop on New Security Paradigms, pages 18–25, 1996.
Tim Rea and Peter Skevington. Engendering trust in electronic commerce. British Telecommunications Engineering, 17(3):150–157, 1998.
Peter H. Reingen and Jerome B. Kernan. Analysis of referral networks in marketing: Methods and illustration. Journal of Marketing Research, 23:370–378, November 1986.
Michael Schillo and Petra Funk. Who can you trust: Dealing with deception. In Proceedings of the Autonomous Agents Workshop on Deception, Fraud and Trust in Agent Societies, pages 95–106, 1999.
Munindar P. Singh. Peering at peer-to-peer computing. IEEE Internet Computing, 5(1):4–5, January 2001. Instance of the column Being Interactive.
Marvin A. Sirbu. Credits and debits on the Internet. In [15], pages 299–305. 1998. (Reprinted from IEEE Spectrum, 1997).
UDDI technical white paper, 2000. http://www.uddi.org/pubs/Iru-UDDI-Technical-White-Paper.pdf.
Jan Vitek and Christian D. Jensen, editors. Secure Internet Programming: Security Issues for Mobile and Distributed Objects, volume 1603 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1999.
Duncan J. Watts and Steven H. Strogatz. Collective dynamics of’ small-world’ networks. Nature, 393:440–442, June 1998.
Uwe G. Wilhelm, Sebastian M. Staamann, and Levente Buttyán. A pessimistic approach to trust in mobile agent platforms. IEEE Internet Computing, 4(5):40–48, September 2000.
Pinar Yolum and Munindar P. Singh. Commitment machines. In Proceedings of the 8th International Workshop on Agent Theories, Architectures, and Languages (ATAL-01). Springer-Verlag, 2002. In press.
Giorgos Zacharia, Alexandros Moukas, and Pattie Maes. Collaborative reputation mechanisms in electronic marketplaces. Decision Support Systems, 29(4):371–388, December 2000.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Singh, M.P. (2003). Trustworthy Service Composition: Challenges and Research Questions. In: Falcone, R., Barber, S., Korba, L., Singh, M. (eds) Trust, Reputation, and Security: Theories and Practice. TRUST 2002. Lecture Notes in Computer Science, vol 2631. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36609-1_5
Download citation
DOI: https://doi.org/10.1007/3-540-36609-1_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00988-7
Online ISBN: 978-3-540-36609-6
eBook Packages: Springer Book Archive