Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/1762128.1762133guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Trustworthy service composition: challenges and research questions

Published: 15 July 2002 Publication History

Abstract

Web services have been gathering an increasing amount of attention lately. The raison d'etre of Web services is that we compose them to create new services. For Web services to be effectively composed, however, requires that they be trustworthy and in fact be trusted by their users and other collaborating services. In our conceptual scheme, principals interact as autonomous peers to provide services to one another. Trust is captured as a composite relationship between the trusted and the trusting principal. Principals help each other discover and locate trustworthy services and weed out untrustworthy players. The interactions of the principals combined with the needs of different applications induce interesting structures on the network.We apply multiagent systems techniques to model interactions among the principals.
By varying the requirements of different applications, the needs of different principals, the existence of special principals such as trusted authorities, and the mechanisms underlying the interactions, we draw attention to a variety of important settings where Web services would be composed. One, leading to superior methods through which trust can be evolved and managed in realistic service-composition settings. Two, studying the relationships between aspects of trust forWeb services and the evolution of Web structure.

References

[1]
Réka Albert, Hawoong Jeong, and Albert-László Barabási. Diameter of the world-wide web. Nature, 401:130-131, September 1999.
[2]
Matt Blaze, Joan Feigenbaum, and Angelos D. Keromytis. The role of trust management in distributed systems security. In {28}, pages 185-210. 1999.
[3]
Don Box, David Ehnebuske, Gopal Kakivaya, Andrew Layman, Noah Mendelsohn, Henrik Frystyk Nielsen, Satish Thatte, and Dave Winer. Simple object access protocol (SOAP) 1.1, 2000. www.w3.org/TR/SOAP.
[4]
Sergey Brin and Lawrence Page. The anatomy of a large-scale hypertextual Web search engine. Computer Networks and ISDN Systems, 30(1-7):107-117, 1998.
[5]
Cristiano Castelfranchi. Commitments: From individual intentions to groups and organizations. In Proceedings of the International Conference on Multiagent Systems, pages 41-48, 1995.
[6]
Cristiano Castelfranchi and Rino Falcone. Principles of trust for MAS: cognitive anatomy, social importance, and quantification. In Proceedings of the 3rd International Conference on Multiagent Systems, pages 72-79, 1998.
[7]
Erik Christensen, Francisco Curbera, Greg Meredith, and Sanjiva Weerawarana.Web services description language (WSDL) 1.1, 2001. www.w3.org/TR/wsdl.
[8]
Mark d'Inverno, David Kinny, and Michael Luck. Interaction protocols in Agentis. In Proceedings of the 3rd International Conference on Multiagent Systems (ICMAS), pages 112-119. IEEE Computer Society Press, July 1998.
[9]
Freenet. Home page, 2001. http://freenet.sourceforge.net.
[10]
Noah E. Friedkin. Information flow through strong and weak ties in intraorganizational social network. Social Networks, 3:273-285, 1982.
[11]
Les Gasser. Social conceptions of knowledge and action: DAI foundations and open systems semantics. In {15}, pages 389-404. 1998. (Reprinted from Artificial Intelligence, 1991).
[12]
David Gibson, Jon Kleinberg, and Prabhakar Raghavan. Inferring Web communities from link topology. In Proceedings of the 9th ACM Conference on Hypertext and Hypermedia: Links, Objects, Time and Space - Structure in Hypermedia Systems, pages 225-234. ACM, 1999.
[13]
Gnutella. Home page, 2001. http://gnutella.wego.com.
[14]
Tyrone Grandison and Morris Sloman. A survey of trust in Internet applications. IEEE Communications Surveys and Tutorials, 3(4):2-16, December 2000.
[15]
Michael N. Huhns and Munindar P. Singh, editors. Readings in Agents. Morgan Kaufmann, San Francisco, 1998.
[16]
Henry Kautz, Bart Selman, and Mehul Shah. ReferralWeb: Combining social networks and collaborative filtering. Communications of the ACM, 40(3):63-65, March 1997.
[17]
Ebrahim (Abe) Mamdani and Jeremy Pitt. Responsible agent behavior: A distributed computing perspective. IEEE Internet Computing, 4(5):27-31, September 2000.
[18]
Steven P. Marsh. Formalising Trust as a Computational Concept. PhD thesis, Department of Computing Science and Mathematics, University of Stirling, April 1994.
[19]
Uttam Mukhopadhyay, Larry Stephens, Michael Huhns, and Ronald Bonnell. An intelligent system for document retrieval in distributed office environments. Journal of American Society for Information Sciences, 37:123-135, 1986.
[20]
Bonnie A. Nardi, Steve Whittaker, and Heinrich Schwarz. It's not what you know, it's who you know: work in the information age. First Monday, 5(5), May 2000.
[21]
Lars Rasmusson and Sverker Janson. Simulated social control for secure Internet commerce. In Proceedings of the Workshop on New Security Paradigms, pages 18-25, 1996.
[22]
Tim Rea and Peter Skevington. Engendering trust in electronic commerce. British Telecommunications Engineering, 17(3):150-157, 1998.
[23]
Peter H. Reingen and Jerome B. Kernan. Analysis of referral networks in marketing: Methods and illustration. Journal of Marketing Research, 23:370-378, November 1986.
[24]
Michael Schillo and Petra Funk. Who can you trust: Dealing with deception. In Proceedings of the Autonomous AgentsWorkshop on Deception, Fraud and Trust in Agent Societies, pages 95-106, 1999.
[25]
Munindar P. Singh. Peering at peer-to-peer computing. IEEE Internet Computing, 5(1):4-5, January 2001. Instance of the column Being Interactive.
[26]
Marvin A. Sirbu. Credits and debits on the Internet. In {15}, pages 299-305. 1998. (Reprinted from IEEE Spectrum, 1997).
[27]
UDDI technical white paper, 2000. www.uddi.org/pubs/Iru-UDDI-Technical-White-Paper.pdf.
[28]
Jan Vitek and Christian D. Jensen, editors. Secure Internet Programming: Security Issues for Mobile and Distributed Objects, volume 1603 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1999.
[29]
Duncan J. Watts and Steven H. Strogatz. Collective dynamics of 'small-world' networks. Nature, 393:440-442, June 1998.
[30]
Uwe G. Wilhelm, Sebastian M. Staamann, and Levente Buttyán. A pessimistic approach to trust in mobile agent platforms. IEEE Internet Computing, 4(5):40-48, September 2000.
[31]
PinarYolum and Munindar P. Singh. Commitment machines. In Proceedings of the 8th International Workshop on Agent Theories, Architectures, and Languages (ATAL-01). Springer-Verlag, 2002. In press.
[32]
Giorgos Zacharia, Alexandros Moukas, and Pattie Maes. Collaborative reputation mechanisms in electronic marketplaces. Decision Support Systems, 29(4):371-388, December 2000.

Cited By

View all
  • (2011)A taxonomy of trust oriented approaches for services computingProceedings of the 13th International Conference on Information Integration and Web-based Applications and Services10.1145/2095536.2095602(353-358)Online publication date: 5-Dec-2011
  • (2011)Trustworthiness monitoring of dynamic service compositionsProceedings of the 6th International Workshop on Enhanced Web Service Technologies10.1145/2031325.2031329(25-29)Online publication date: 14-Sep-2011
  • (2008)A fuzzy model for calculating workflow trust using provenance dataProceedings of the 15th ACM Mardi Gras conference: From lightweight mash-ups to lambda grids: Understanding the spectrum of distributed computing requirements, applications, tools, infrastructures, interoperability, and the incremental adoption of key capabilities10.1145/1341811.1341823(1-8)Online publication date: 29-Jan-2008
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
AAMAS'02: Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
July 2002
234 pages
ISBN:3540009884
  • Editors:
  • Rino Falcone,
  • Suzanne Barber,
  • Larry Korba,
  • Munindar Singh

Sponsors

  • ALFEBIITE European Project
  • TICCA Project
  • Institute of Cognitive Sciences and Technologies
  • Italian National Research Council

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 15 July 2002

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2011)A taxonomy of trust oriented approaches for services computingProceedings of the 13th International Conference on Information Integration and Web-based Applications and Services10.1145/2095536.2095602(353-358)Online publication date: 5-Dec-2011
  • (2011)Trustworthiness monitoring of dynamic service compositionsProceedings of the 6th International Workshop on Enhanced Web Service Technologies10.1145/2031325.2031329(25-29)Online publication date: 14-Sep-2011
  • (2008)A fuzzy model for calculating workflow trust using provenance dataProceedings of the 15th ACM Mardi Gras conference: From lightweight mash-ups to lambda grids: Understanding the spectrum of distributed computing requirements, applications, tools, infrastructures, interoperability, and the incremental adoption of key capabilities10.1145/1341811.1341823(1-8)Online publication date: 29-Jan-2008
  • (2005)Why trust is hard – challenges in e-mediated servicesTrusting Agents for Trusting Electronic Societies10.5555/2137725.2137736(180-199)Online publication date: 1-Jan-2005
  • (2005)Decentralized reputation-based trust for assessing agent reliability under aggregate feedbackTrusting Agents for Trusting Electronic Societies10.5555/2137725.2137732(110-128)Online publication date: 1-Jan-2005
  • (2005)Composition and evaluation of trustworthy Web ServicesProceedings of the IEEE EEE05 international workshop on Business services networks10.5555/1063516.1063521(5-5)Online publication date: 29-Mar-2005
  • (2005)Credit in the grid resource managementProceedings of the 4th international conference on Grid and Cooperative Computing10.1007/11590354_90(725-731)Online publication date: 30-Nov-2005

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media