Skip to main content

Abstract

In this chapter the research problems of specifying and negotiating QoS and its corresponding quality documents are analyzed. For this reason, this chapter is separated into two main sections, Section 6.1 and 6.2, with each dedicated to one of the two problems, i.e., QoS specification and negotiation, respectively. Each section has a similar structure: they first introduce the problem and then, in the remaining subsections, review related work. Finally, the chapter ends with Section 6.3, which identifies research gaps and presents potential research challenges in QoS modelling, specification and negotiation.

The original version of this chapter was revised: The affiliation of Barbara Pernici was corrected. The correction to this chapter is available at https://doi.org/10.1007/978-3-642-17599-2_10

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. The GEMSS project: Grid-enabled medical simulation services, EU IST project, ist-2001-37153, http://www.gemss.de/

  2. OGF grid resource allocation agreement protocol working group website: https://forge.gridforum.org/sf/projects/graap-wg

  3. OGF grid scheduling architecture research group website: https://forge.gridforum.org/sf/projects/gsa-rg

  4. Interactive Access Control for Web Services. Kluwer (2004)

    Google Scholar 

  5. Ajayi, O., Sinnott, R., Stell, A.: Dynamic trust negotiation for flexible e-health collaborations. In: Proceedings of the 15th ACM Mardi Gras conference (MG), pp. 1–7. ACM Press, New York (2008)

    Google Scholar 

  6. Arenas, A., Wilson, M., Matthews, B.: On trust management in grids. In: Proceedings of the 1st international conference on Autonomic computing and communication systems (Autonomics’07), pp. 1–7. ICST, Brussels, Belgium, Belgium, 2007. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) (2007)

    Google Scholar 

  7. Artz, D., Gil, Y.: A survey of trust in computer science and the semantic web. Web Semant. 5(2), 58–71 (2007)

    Article  Google Scholar 

  8. S. Bajaj, D. Box, D. Chappell, F. Curbera, G. Daniels, P. Hallam-Baker, M. Hondo, C. Kaler, D. Langworthy, A. Nadalin, N. Nagaratnam, H. Prafullchandra, C. von Riegen, D. Roth, J. Schlimmer, C. Sharp, J. Shewchuk, A. Vedamuthu, C.Ü. Yal D. Orchard. Web Services Policy Framework (WS-Policy). IBM (March 2006)

    Google Scholar 

  9. Becker, M., Sewell, P.: Cassandra: Distributed access control policies with tunable expressiveness. In: POLICY ’04: Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, Washington, DC, USA, p. 159. IEEE Computer Society (2004)

    Google Scholar 

  10. Benbernou, S., Brandic, I., Cappiello, C., Carro, M., Comuzzi, M., Kertész, A., Kritikos, K., Parkin, M., Pernici, B., Plebani, P.: A Survey on Service Quality Description. ACM Computing Surveys, submitted (2009)

    Google Scholar 

  11. Benbernou, S., Meziane, H., Li, Y.H., Hacid, M.-S.: A privacy agreement model for web services. In: IEEE SCC, pp. 196–203. IEEE Computer Society Press (2007)

    Google Scholar 

  12. Benkner, S., Engelbrecht, G., Middleton, S.E., Brandic, I., Schmidt, R.: End-to-End QoS support for a medical grid service infrastructure. New Generation Computing, Special Issue on Life Science Grid Computing (2007)

    Google Scholar 

  13. Bertino, E., Ferrari, E., Squicciarini, A.: X-TNL: An XML-based language for trust negotiations. In: POLICY ’03: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, page 81, Washington, DC, USA, IEEE Computer Society (2003)

    Google Scholar 

  14. Bertino, E., Ferrari, E., Squicciarini, A.: Trust negotiations: concepts, systems, and languages. Computing in Science and Engineering 6(4), 27–34 (2004)

    Article  Google Scholar 

  15. Bertino, E., Ferrari, E., Squicciarini, A.: Trust negotiations: Concepts, systems, and languages. Computing in Science and Engineering 06(4), 27–34 (2004)

    Article  Google Scholar 

  16. Bertino, E., Ferrari, E., Squicciarini, A.C.: Trust-X: A peer-to-peer framework for trust establishment. IEEE Transactions on Knowledge and Data Engineering, TKDE 16(7), 827–842 (2004)

    Article  Google Scholar 

  17. Bhargav-Spantzel, A., Squicciarini, A.C., Bertino, E.: Trust negotiation in identity management. IEEE Security and Privacy 5(2), 55–63 (2007)

    Article  Google Scholar 

  18. Blazic, A.J., Dolinar, K., Porekar, J.: Enabling privacy in pervasive computing using fusion of privacy negotiation, identity management and trust management techniques. In: First International Conference on the Digital Society (ICDS 2007), Guadeloupe, French Caribbean, 2-6 January 2007, Springer, Heidelberg (2007)

    Google Scholar 

  19. Bradshaw, R.W., Holt, J.E., Seamons, K.E.: Concealing complex policies with hidden credentials. In: Proceedings of the 11th ACM conference on Computer and communications security CCS ’04, Washingtion, DC, USA, pp. 146–157. ACM Press (2004)

    Google Scholar 

  20. Brandic, I., Pllana, S., Benkner, S.: An approach for the high-level specification of QoS-aware grid workflows considering location affinity. Scientific Programming Journal 14(3-4), 231–250 (2006)

    Article  Google Scholar 

  21. Brandic, I., Pllana, S., Benkner, S.: Specification, planning, and execution of QoS-aware grid workflows within the Amadeus environment. Concurrency and Computation: Practice and Experience 20(4), 331–345 (2008)

    Article  Google Scholar 

  22. Chhetri, M.B., Lin, J., Goh, S., Yan, J., Zhang, J.Y., Kowalczyk, R.: A coordinated architecture for the Agent-based Service Level agreement Negotiation of Web service composition. In: Proc. 2006 Australian Software Engineering Conference, ASWEC’06 (2006)

    Google Scholar 

  23. Chhetri, M.B., Lin, J., Goh, S., Zhang, J.Y., Kowalczyk, R., Yan, J.: A coordinated architecture for the agent-based service level agreement negotiation ofweb service composition. In: ASWEC ’06: Proceedings of the Australian Software Engineering Conference, Washington, DC, USA, pp. 90–99. IEEE Computer Society (2006)

    Google Scholar 

  24. Chiu, D.K.W., Cheung, S.C.: Patrick C.K. Hung, and Ho fung Leung. Facilitating e-negotiation processes with semantic web technologies. In: HICSS ’05: Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS’05) - Track 1, Washington, DC, USA, p. 36.1. IEEE Computer Society (2005)

    Google Scholar 

  25. Chung, L., Nixon, B., Yu, E., Mylopoulos, J.: Non-Functional Requirements in Software Engineering. Kluwer Academic Publishers, Dordrecht (2000)

    Book  Google Scholar 

  26. Comuzzi, M., Pernici, B.: An architecture for flexible Web service QoS negotiation. In: Proceedings of the 9th IEEE Enterprise Computing Conference, Enschede, The Netherlands (2005)

    Google Scholar 

  27. Cortés, A.R., Martín-Díaz, O., Toro, A.D., Toro, M.: Improving the Automatic Procurement of Web Services Using Constraint Programming. Int. J. Cooperative Inf. Syst. 14(4), 439–468 (2005)

    Article  Google Scholar 

  28. Czajkowski, K., Foster, I., Kesselman, C., Sander, V., Tuecke, S.: SNAP: A protocol for negotiating service level agreements and coordinating resource management in distributed systems. In: Feitelson, D.G., Rudolph, L., Schwiegelshohn, U. (eds.) JSSPP 2002. LNCS, vol. 2537, pp. 153–183. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  29. Degwekar, S., Su, S.Y.W., Lam, H.: Constraint specification and processing in web services publication and discovery. In: ICWS, pp. 210–217. IEEE Computer Society (2004)

    Google Scholar 

  30. Di Nitto, E., Di Penta, M., Gambi, A., Ripa, G., Villani, M.L.: Negotiation of Service Level Agreements: An Architecture and a Search-Based Approach. In: Krämer, B.J., Lin, K.-J., Narasimhan, P. (eds.) ICSOC 2007. LNCS, vol. 4749, pp. 295–306. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  31. Dobson, G., Lock, R., Sommerville, I.: QoSOnt: a QoS ontology for service-centric systems. In: EUROMICRO ’05: Proceedings of the 31st EUROMICRO Conference on Software Engineering and Advanced Applications, Porto, Portugal, pp. 80–87. IEEE Computer Society (2005)

    Google Scholar 

  32. Dragoni, N., Massacci, F.: Security-by-contract for web services. In: Proceedings of the 2007 ACM workshop on Secure web services (SWS ’07), New York, NY, USA, pp. 90–98. ACM (2007)

    Google Scholar 

  33. El-Khatib, K., von Bochmann, G.: Protecting the privacy of user’s qos preferences for multimedia applications. In: Proceedings of the 2nd ACM international workshop on Wireless multimedia networking and performance modeling (WMuNeP ’06), New York, NY, USA, pp. 35–42. ACM (2006)

    Google Scholar 

  34. Faratin, P., Sierra, C., Jennings, N.R.: Negotiation decision functions for autonomous agents. Int. Journal of Robotics and Autonomous Systems 23(3-4), 159–182 (1998)

    Article  Google Scholar 

  35. Faratin, P., Sierra, C., Jennings, N.R.: Negotiation decision functions for autonomous agents. Int. Journal of Robotics and Autonomous Systems 24(3-4), 159–182 (1998)

    Article  Google Scholar 

  36. Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed nist standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 224–274 (2001)

    Article  Google Scholar 

  37. FIPA. FIPA standard status specifications, http://www.fipa.org/repository/standardspecs.html

  38. Document Title Fipa. FIPA Communicative Act Library Specification (2003)

    Google Scholar 

  39. Frikken, K., Atallah, M., Li, J.: Hidden access control policies with hidden credentials. In: Proceedings of the 2004 ACM workshop on Privacy in the electronic society (WPES ’04), New York, NY, USA, pp. 27–28. ACM (2004)

    Google Scholar 

  40. Frølund, S., Koistinen, J.: Quality of services specification in distributed object systems design. In: COOTS’98: Proceedings of the 4th conference on USENIX Conference on Object-Oriented Technologies and Systems (COOTS), 5(4), pp. 179–202 (1998)

    Google Scholar 

  41. Garofalakis, J., Panagis, Y., Sakkopoulos, E., Tsakalidis, A.: Contemporary Web Service Discovery Mechanisms. Journal of Web Engineering 5(3), 265–290 (2006)

    Google Scholar 

  42. Gavriloaie, R., Nejdl, W., Olmedilla, D., Seamons, K., Winslett, M.: No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web (2004)

    Google Scholar 

  43. Giallonardo, E., Zimeo, E.: More semantics in QoS matching. In: International Conference on Service-Oriented Computing and Applications, Newport Beach, CA, USA, pp. 163–171. IEEE Computer Society (2007)

    Google Scholar 

  44. Gimpel, H., Ludwig, H., Dan, A., Kearney, B.: PANDA: Specifying policies for automated negotiations of service contracts. In: Orlowska, M.E., Weerawarana, S., Papazoglou, M.P., Yang, J. (eds.) ICSOC 2003. LNCS, vol. 2910, pp. 287–302. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  45. Grandison, T., Sloman, M.: A Survey of Trust in Internet Applications. IEEE Communications Surveys and Tutorials 3(4), http://www.comsoc.org/livepubs/surveys/public/2000/dec/index.html

    Article  Google Scholar 

  46. He, Y., Zhu, M.: A complete and efficient strategy based on Petri Nets in automated trust negotiation. In: Proceedings of the 2nd international conference on Scalable information systems (InfoScale), pp. 1–7, ICST, Brussels, Belgium, Belgium, 2007. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) (2007)

    Google Scholar 

  47. Hobbs, J.R., Pan, F.: An ontology of time for the semantic web. ACM Trans. Asian Lang. Inf. Process. 3(1), 66–85 (2004)

    Article  Google Scholar 

  48. Huai, J., Sun, H., Hu, C., Zhu, Y., Liu, Y., Li, J.: Rost: Remote and hot service deployment with trustworthiness in crown grid. Future Generation Computer Systems 23(6), 825–835 (2007)

    Article  Google Scholar 

  49. Irwin, K., Yu, T.: Preventing attribute information leakage in automated trust negotiation. In: Proceedings of the 12th ACM conference on Computer and communications security (CCS ’05), New York, NY, USA, pp. 36–45. ACM (2005)

    Google Scholar 

  50. Jennings, N.R., Faratin, P., Lomuscio, A.R., Parsons, S., Wooldridge, M.J., Sierra, C.: Automated negotiation: Prospects, methods and challenges. Group Decision and Negotiation 10(2), 199–215 (2001)

    Article  Google Scholar 

  51. Keller, A., Ludwig, H.: The WSLA framework: Specifying and monitoring service level agreements for web services. Journal of Network and Systems Management 11(1), 57–81 (2003)

    Article  Google Scholar 

  52. Koshutanski, H., Massacci, F.: Interactive credential negotiation for stateful business processes. In: iTrust, pp. 256–272 (2005)

    Google Scholar 

  53. Kritikos, K., Plexousakis, D.: Semantic qos metric matching. In: ECOWS ’06: Proceedings of the European Conference on Web Services, Zurich, Switzerland, pp. 265–274. IEEE Computer Society (2006)

    Google Scholar 

  54. Kritikos, K., Plexousakis, D.: Semantic QoS-based web service discovery algorithms. In: ECOWS ’07: Proceedings of the Fifth European Conference on Web Services, Halle, Germany, pp. 181–190. IEEE Computer Society (2007)

    Google Scholar 

  55. Kritikos, K., Plexousakis, D.: Requirements for QoS-based Web Service Description and Discovery. IEEE Transactions on Services Computing, accepted (2009)

    Google Scholar 

  56. Lai, G., Li, C., Sycara, K., Giampapa, J.A.: Literature review on multi-attribute negotiations. Technical Report CMU-RI-TR-04-66, Robotics Institute, Carnegie Mellon University, Pittsburgh, PA (December 2004)

    Google Scholar 

  57. Lamparter, S., Luckner, S., Mutschelr, S.: Formal specification of Web service contracts for automated contracting and monitoring. In: Proceedings of the 40th Hawaii International Conference on System Sciences, Honolulu, Hawaii, pp. 63–73 (2007)

    Google Scholar 

  58. Lamparter, S., Luckner, S., Mutschler, S.: Formal specification of web service contracts for automated contracting and monitoring. In: HICSS ’07: Proceedings of the 40th Annual Hawaii International Conference on System Sciences, Washington, DC, USA, IEEE Computer Society (2007)

    Google Scholar 

  59. Lee, A., Winslett, M., Basney, J., Welch, V.: Traust: a trust negotiation-based authorization service for open systems. In: SACMAT ’06: Proceedings of the eleventh ACM symposium on Access control models and technologies, New York, ACM (2006)

    Google Scholar 

  60. Lee, A.J., Winslett, M., Basney, J., Welch, V.: The Traust authorization service. ACM Trans. Inf. Syst. Secur. 11(1), 1–33 (2008)

    Article  Google Scholar 

  61. Li, J., Huai, J., Xu, J., Zhu, Y., Xue, W.: Tower: Practical trust negotiation framework for grids. In: Second IEEE International Conference on e-Science and Grid Computing (e-Science’06), 0:26 (2006)

    Google Scholar 

  62. Li, N., Mitchell, J.: Rt: A role-based trust-management framework. In: The Third DARPA Information Survivability Conference and Exposition (DISCEX III) (April 2003)

    Google Scholar 

  63. Liu, Y., Ngu, A.H.H., Zeng, L.: QoS computation and policing in dynamic web service selection. In: Feldman, S.I., Uretsky, M., Najork, M., Wills, C.E. (eds.) WWW (Alternate Track Papers & Posters), pp. 66–73. ACM Press, New York (2004)

    Google Scholar 

  64. Ludwig, H., Keller, A., Dan, A., King, R.P., Franck, R.: Web Service Level Agreement (WSLA) Language Specification. Technical report, IBM Corporation (2003)

    Google Scholar 

  65. Mani, A., Nagarajan, A.: Understanding quality of service for web services (2002), http://www-128.ibm.com/developerworks/library/ws-quality.html

  66. Masolo, C., Borgo, S., Gangemi, A., Guarino, N., Oltramari, A., Schneider, L.: Wonderweb deliverable d17. the wonderweb library of foundational ontologies and the dolce ontology

    Google Scholar 

  67. Maximilien, E.M., Singh, M.P.: Conceptual model of web service reputation. SIGMOD Rec. 31(4), 36–41 (2002)

    Article  Google Scholar 

  68. Maximilien, E.M., Singh, M.P.: A framework and ontology for dynamic web services selection. IEEE Internet Computing 8(5), 84–93 (2004)

    Article  Google Scholar 

  69. Mbanaso, U.M., Cooper, G.S., Chadwick, D.W., Proctor, S.: Privacy preserving trust authorization framework using XACML. In: 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM’06), pp. 673–678. IEEE (2006)

    Google Scholar 

  70. Menascé, D., Dubey, V.: Utility-based QoS brokering in service oriented architectures. In: Proceedings of the 2007 International Conference on Web services (2007)

    Google Scholar 

  71. Mukhi, N.K., Plebani, P.: Supporting policy-driven behaviors in Web services: experiences and issues. In: Proceedings of the 2nd International Conference on Service Oriented Computing, New York, NY (2004)

    Google Scholar 

  72. Nadalin, A., Goodner, M., Gudgin, M., Barbir, A., Granqvist, H.: WS-Trust specification. Technical report. OASIS Working Draft (2007), http://www.ibm.com/developerworks/webservices/library/specification/ws-trust

  73. Ncho, A., Aimeur, E.: Building a multi-agent system for automated negotiation in Web service applications. In: Proc. of AAMAS’04 (2004)

    Google Scholar 

  74. Oldham, N., Verma, K., Sheth, A., Hakimpour, F.: Semantic WS-agreement partner selection. In: WWW ’06: Proceedings of the 15th International conference on World Wide Web, Edinburgh, Scotland, pp. 697–706. ACM Press, New York (2006)

    Chapter  Google Scholar 

  75. Oldham, N., Verma, K., Sheth, A., Hakimpour, F.: Semantic WS-agreement partner selection. In: WWW ’06: Proceedings of the 15th international conference on World Wide Web, New York, NY, USA, pp. 697–706. ACM (2006)

    Google Scholar 

  76. Oliver-Lalana, A.D.: Consent as a threat. A critical approach to privacy negotiation in e-commerce practices. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol. 3184, pp. 110–119. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  77. Olmedilla, D., Lara, R., Polleres, A., Lausen, H.: Trust Negotiation for Semantic Web Services. In: Cardoso, J., Sheth, A.P. (eds.) SWSWPC 2004. LNCS, vol. 3387, pp. 81–95. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  78. Olson, L.E., Rosulek, M.J., Winslett, M.: Harvesting credentials in trust negotiation as an honest-but-curious adversary. In: Proceedings of the 2007 ACM workshop on Privacy in electronic society (WPES ’07), New York, NY, USA, pp. 64–67. ACM (2007)

    Google Scholar 

  79. Olson, L., Winslett, M., Tonti, G., Seeley, N., Uszok, A., Bradshaw, J.: Trust negotiation as an authorization service forweb services. In: ICDEW ’06: Proceedings of the 22nd International Conference on Data Engineering Workshops, Washington, DC, USA, IEEE Computer Society (2006)

    Google Scholar 

  80. O’Sullivan, J., Edmond, D., ter Hofstede, A.H.M.: Formal description of non-functional service properties. Technical report, Queensland University of Technology (2005)

    Google Scholar 

  81. Bonatti, P., Samarati, P.: Regulating service access and information release on the web. In: CCS ’00: Proceedings of the 7th ACM conference on Computer and communications security, New York, NY, pp. 134–143. ACM (2000)

    Google Scholar 

  82. Preibusch, S.: Implementing privacy negotiations in E-commerce. In: Zhou, X., Li, J., Shen, H.T., Kitsuregawa, M., Zhang, Y. (eds.) APWeb 2006. LNCS, vol. 3841, pp. 604–615. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  83. Ran, S.: A model for web services discovery with QoS. SIGecom Exch. 4(1), 1–10 (2003)

    Article  Google Scholar 

  84. Ran, S.: A model for web services discovery with qos. SIGecom Exch. 4(1), 1–10 (2003)

    Article  Google Scholar 

  85. Redman, T.C.: Data Quality for the Information Age (Foreword By - Blanton Godfrey, A.). Artech House, Inc., Norwood (1997)

    Google Scholar 

  86. Ruohomaa, S., Kutvonen, L.: Trust management survey. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 77–92. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  87. Ryutov, T., Zhou, L., Neuman, C., Leithead, T., Seamons, K.E.: Adaptive trust negotiation and access control. In: Proceedings of the tenth ACM symposium on Access control models and technologies (SACMAT ’05), New York, NY, USA, pp. 139–146. ACM (2005)

    Google Scholar 

  88. Sabata, B., Chatterjee, S., Davis, M., Sydir, J.J., Lawrence, T.F.: Taxonomy for QoS Specifications. In: Third International Workshop on Object-Oriented Real-Time Dependable Systems, 1997. Proceedings, 5-7 Feb. 1997, pp. 100–107 (1997)

    Google Scholar 

  89. Sahai, A., Durante, A., Machiraju, V.: Towards Automated SLA Management for Web Services. Technical Report HPL-2001-310, HP Laboratories, Palo Alto, CA (July 2002)

    Google Scholar 

  90. Sakellariou, R., Yarmolenko, V.: On the flexibility of WS-Agreement for job submission. In: Proceedings of the 3rd International Workshop on Middleware for Grid Computing, MGC’05 (2005)

    Google Scholar 

  91. Sakellariou, R., Yarmolenko, V.: Job Scheduling on the Grid: Towards SLA-Based Scheduling. In: High Performance Computing and Grids in Action (March 2008)

    Google Scholar 

  92. Seamons, K.E., Winslett, M., Yu, T., Yu, L., Jarvis, R.: Protecting privacy during on-line trust negotiation. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 129–143. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  93. Seidel, J., Wäldrich, O., Ziegler, W., Wieder, P., Yahyapour, R.: a survey. Using SLA for resource management and scheduling. Technical report, TR-0096, Institute on Resource Management and Scheduling, CoreGRID - Network of Excellence (August. 2007)

    Google Scholar 

  94. Shen, H., Hong, F.: An attribute-based access control model for web services. In: Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2006), pp. 74–79 (2006)

    Google Scholar 

  95. Skogsrud, H., Benatallah, B., Casati, F.: Trust-Serv: Model-driven lifecycle management of trust negotiation policies for web services. In: Proc. 13th World Wide Web Conf. (May 2004)

    Google Scholar 

  96. Sommerville, I.: Software Engineering, 4th edn. Addison-Wesley, Reading (1992)

    MATH  Google Scholar 

  97. Squicciarini, A., Bertino, E., Ferrari, E., Paci, F., Thuraisingham, B.: PP-trust-X: A system for privacy preserving trust negotiations. ACM Transactions on Information and System Security (TISSEC) 10(3), 12 (2007)

    Article  Google Scholar 

  98. Strong, D.M., Lee, Y.W., Wang, R.Y.: 10 potholes in the road to information quality. Computer 30(8), 38–46 (1997)

    Article  Google Scholar 

  99. Sycara, K., et al.: OWL-S 1.0 Release. OWL-S Coalition (2003), http://www.daml.org/services/owl-s/1.0/

  100. The OASIS Group. Quality model for web services. Technical report, The Oasis Group (September 2005)

    Google Scholar 

  101. The OMG Group. UMLTM Profile for Modeling Quality of Service and Fault Tolerance Characteristics and Mechanisms. Technical Report ptc/2005-05-02, The OMG Group (May 2005)

    Google Scholar 

  102. Tian, M., Gramm, A., Nabulsi, M., Ritter, H., Schiller, J., Voigt, T.: Qos integration in web services. In: Gesellschaft fur Informatik DWS 2003, Doktorandenworkshop Technologien und Anwendungen von XML (October 2003)

    Google Scholar 

  103. Tosic, V., Esfandiari, B., Pagurek, B., Patel, K.: On requirements for ontologies in management of web services. In: Bussler, C.J., McIlraith, S.A., Orlowska, M.E., Pernici, B., Yang, J. (eds.) CAiSE 2002 and WES 2002. LNCS, vol. 2512, pp. 237–247. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  104. Tosic, V., Pagurek, B., Patel, K.: WSOL - A language for the formal specification of classes of service for web services. In: Zhang, L.-J. (ed.) ICWS, June 2003, pp. 375–381. CSREA Press (2003)

    Google Scholar 

  105. Tosic, V., Patel, K., Pagurek, B.: WSOL - web service offerings language. In: Bussler, C.J., McIlraith, S.A., Orlowska, M.E., Pernici, B., Yang, J. (eds.) CAiSE 2002 and WES 2002. LNCS, vol. 2512, pp. 57–67. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  106. Tsesmetzis, D.T., Roussaki, I.G., Papaioannou, I.V., Anagnostou, M.E.: Qos awareness support in web-service semantics. In: AICT-ICIW ’06: Proceedings of the Advanced Int’l Conference on Telecommunications and Int’l Conference on Internet and Web Applications and Services, Guadeloupe, French Caribbean, pp. 128–134. IEEE Computer Society,

    Google Scholar 

  107. Uszok, A., Bradshaw, J., Jeffers, R., Suri, N., Hayes, P., Breedy, M., Bunch, L., Johnson, M., Kulkarni, S., Lott, J.: Kaos policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement. In: POLICY ’03: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, Washington, DC, USA, IEEE Computer Society (2003)

    Google Scholar 

  108. Wang, X., Vitvar, T., Kerrigan, M., Toma, I.: A qoS-aware selection model for semantic web services. In: Dan, A., Lamersdorf, W. (eds.) ICSOC 2006. LNCS, vol. 4294, pp. 390–401. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  109. Winsborough, W.H., Li, N.: Safety in automated trust negotiation. ACM Transactions on Information and System Security (TISSEC) 9(3), 352–390 (2006)

    Article  Google Scholar 

  110. Winslett, M., Yu, T., Seamons, K.E., Hess, A., Jacobson, J., Jarvis, R., Smith, B., Yu, L.: The TrustBuilder architecture for trust negotiation. IEEE Internet Computing 6(6), 30–37 (2002)

    Article  Google Scholar 

  111. Winslett, M., Zhang, C.C., Bonatti, P.A.: Peeraccess: a logic for distributed authorization. In: CCS ’05: Proceedings of the 12th ACM conference on Computer and communications security, pp. 168–179, New York, NY, USA. ACM (2005)

    Google Scholar 

  112. WS-AGREEMENT. WS-Agreement Framework (September 2003), https://forge.gridforum.org/projects/graap-wg

  113. Yan, J., Zhang, J.Y., Chhetri, M.B., Lin, J., Goh, S., Kowalczyk, R.: Towards autonomous service level agreement negotiation for adaptvive service composition. In: Proc. 10th Int. Conf. on Computer Supported Cooperative Work in Design (2006)

    Google Scholar 

  114. Yu, T., Winslett, M.: Policy migration for sensitive credentials in trust negotiation. In: Proceedings of the 2003 ACM workshop on Privacy in the electronic society (WPES ’03), New York, NY, USA, pp. 9–20. ACM (2003)

    Google Scholar 

  115. Yu, T., Winslett, M., Seamons, K.E.: Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur. 6(1), 1–42 (2003)

    Article  Google Scholar 

  116. Zhang, S., Makedon, F.: Privacy preserving learning in negotiation. In: Proceedings of the 2005 ACM symposium on Applied computing (SAC ’05), New York, NY, USA, pp. 821–825. ACM (2005)

    Google Scholar 

  117. Zhou, C., Chia, L.-T., Lee, B.-S.: Daml-qos ontology for web services. In: ICWS ’04: Proceedings of the IEEE International Conference on Web Services (ICWS’04), San Diego, CA, USA, pp. 472–479. IEEE Computer Society (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Benbernou, S. et al. (2010). Modeling and Negotiating Service Quality. In: Papazoglou, M.P., Pohl, K., Parkin, M., Metzger, A. (eds) Service Research Challenges and Solutions for the Future Internet. Lecture Notes in Computer Science, vol 6500. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17599-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17599-2_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17598-5

  • Online ISBN: 978-3-642-17599-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics