Skip to main content

Small-World Network Inspired Trustworthy Web Service Evaluation and Management Model

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4459))

Abstract

The trustworthiness between anonymous web service client and provider influences service stability and collaboration. Trustworthiness includes some aspects such as service’s security, controllability and survivability. So, a definition of trustworthiness for web service is given in the paper, and then a web service trustworthiness evaluation and management model is brought forth inspired by human small-world network. The model consists of three web service federations: WSRRC, APAEAS and AWSORT. WSRRC is a Web Service Resource Register Center, which is established by UDDI protocol. APAEAS is an Area Proxy Authentication Evaluating Autonomy System, which collects some authentication information of web service clients, accepts clients’ special requirement and feedbacks service’s trustworthiness values to AWSORT. AWSORT is an Area WS Resource Organizing Tree, which organizes and manages web service resources; records web service trustworthiness values, keeps web service state, assigning web service. The model establishes a trustworthy environment for anonymous web service clients and providers. Furthermore, some detailed evaluating parameters about service trustworthiness and quality is discussed and some service management algorithms are proposed in the paper. The simulation results show that model is feasible for semantic grid integration and establishment for virtual organization.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Pirzada, A.A., Datta, A., McDonald, C.: Incorporating trust and reputation in the DSR protocol for dependable routing. Computer Communications 29(15), 2806–2821 (2006)

    Article  Google Scholar 

  2. Schweitzer, M.E., Hershey, J.C., Bradlow, E.T.: Promises and lies: Restoring violated trust. Organizational Behavior and Human Decision Processes 101(1), 1–19 (2006)

    Article  Google Scholar 

  3. Blobel, B., et al.: Modeling privilege management and access control. International Journal of Medical Informatics 75(8), 597–623 (2006)

    Article  Google Scholar 

  4. Antoci, A., et al.: Generalized trust and sustainable coexistence between socially responsible firms and nonprofit organizations. Chaos, Solitons & Fractals 293(3), 783–802 (2006)

    Article  MathSciNet  Google Scholar 

  5. Mekouar, L., Iraqi, Y., Boutaba, R.: Peer-to-peer’s most wanted: Malicious peers. Computer Networks 50(4), 545–562 (2006)

    Article  MATH  Google Scholar 

  6. Busco, C., Riccaboni, A., Scapens, W.: Trust for accounting and accounting for trust. Management Accounting Research 17(1), 11–41 (2006)

    Article  Google Scholar 

  7. Selin, C.: Trust and the illusive force of scenarios. Futures 38(2), 1–14 (2006)

    Article  Google Scholar 

  8. Ratnasingam, P.: Trust in inter-organizational exchanges: a case study in business to business electronic commerce. Decision Support Systems 39(3), 525–544 (2005)

    Article  Google Scholar 

  9. Riegelsberger, J., Angela Sasse, M., McCarthy, J.D.: The mechanics of trust: A framework for research and design. International Journal of Human-Computer Studies 62(3), 381–422 (2005)

    Article  Google Scholar 

  10. Chang, Y.-F., Chang, C.-C., Huang, H.: Digital signature with message recovery using self-certified public keys without trustworthy system authority. Applied Mathematics and Computation 161(4), 211–227 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  11. Sadeghi, A.R., Stüble, C.: Towards multilaterally secure computing platforms-with open source and trusted computing. Information Security Technical Report 10(2), 83–95 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Christophe Cérin Kuan-Ching Li

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Meng, Q., Ding, Y. (2007). Small-World Network Inspired Trustworthy Web Service Evaluation and Management Model. In: Cérin, C., Li, KC. (eds) Advances in Grid and Pervasive Computing. GPC 2007. Lecture Notes in Computer Science, vol 4459. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72360-8_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72360-8_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72359-2

  • Online ISBN: 978-3-540-72360-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics