Trust management for service-oriented environments:
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer
2009
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XX, 135 S. Ill., graph. Darst. |
ISBN: | 9781441903099 9781441903105 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV035981390 | ||
003 | DE-604 | ||
005 | 20110606 | ||
007 | t | ||
008 | 100128s2009 ad|| |||| 00||| eng d | ||
020 | |a 9781441903099 |9 978-1-4419-0309-9 | ||
020 | |a 9781441903105 |9 978-1-4419-0310-5 | ||
035 | |a (OCoLC)422753181 | ||
035 | |a (DE-599)BVBBV035981390 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-355 | ||
050 | 0 | |a TK5105.88813 | |
082 | 0 | |a 621.38 | |
084 | |a QH 500 |0 (DE-625)141607: |2 rvk | ||
084 | |a ST 230 |0 (DE-625)143617: |2 rvk | ||
100 | 1 | |a Malik, Zaki |e Verfasser |4 aut | |
245 | 1 | 0 | |a Trust management for service-oriented environments |c Zaki Malik ; Athman Bouguettaya |
264 | 1 | |a New York, NY |b Springer |c 2009 | |
300 | |a XX, 135 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Peer-to-peer architecture (Computer networks) | |
650 | 4 | |a Web services |x Security measures | |
650 | 0 | 7 | |a Verteiltes System |0 (DE-588)4238872-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Serviceorientierte Architektur |0 (DE-588)4841015-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Serviceorientierte Architektur |0 (DE-588)4841015-9 |D s |
689 | 0 | 1 | |a Verteiltes System |0 (DE-588)4238872-7 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Bouguettaya, Athman |e Verfasser |0 (DE-588)136720099 |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Bayreuth |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018875300&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-018875300 |
Datensatz im Suchindex
_version_ | 1804141004604833792 |
---|---|
adam_text | Contents
1
Introduction
................................................... 1
1.1
Trast Management
.......................................... 4
1.1.1
Motivation..........................................
4
1.1.2
Trust
............................................... 5
1.1.3
Traditional
Solutions
for Establishing
Trast
.............. 6
1.2
The Role of Reputation in
Trast Management
................... 9
1.3
Example Scenario
.......................................... 9
1.4
Book Organization
......................................... 12
2
Service-Oriented Environments
.................................. 13
2.1
SOE
Interaction Model
...................................... 14
2.1.1
Entities and Interactions
.............................. 14
2.2
Service Interactions: Extension through Ontologies
.............. 18
2.2.1
Definition of Communities
............................ 19
2.2.2
Operational Description of Communities
................ 22
2.2.3
Interactions
......................................... 28
3
Reputation Information Creation
................................ 31
3.1
Parameters Reflecting the Quality of Web Services
............... 31
3.2
Reputation Bootstrapping
.................................... 34
3.2.1
Option I: Adapting Initial Reputation to Majority Behavior
. 36
3.2.2
Option II: Assigned Initial Reputation
................... 38
4
Reputation Assessment
......................................... 43
4.1
Web Service Reputation
..................................... 43
4.2
Reputation Evaluation Metrics
................................ 45
4.2.1
Credibility of Raters
.................................. 46
4.2.2
Evaluating Rater Credibility
........................... 47
4.2.3
Personalized Preferences
.............................. 52
4.2.4
Temporal Sensitivity
................................. 52
4.2.5
First-hand Knowledge
................................ 53
Contents
4.3 Reputation
Assessment with Scarce Ratings
.................... 55
4.4
Reputation Assessment for Service Compositions
................ 60
4.4.1
Share the Fame
/
Share the Blame
...................... 62
Robustness and Performance Study
.............................. 69
5.1
Reputation Bootstrapping Evaluation
.......................... 69
5.1.1
Comparing Bootstrap Approaches
...................... 69
5.
1
.2
Evaluating the Adaptive Approach
...................... 70
5.1.3
Comparing the Reputation Assignment Approaches
....... 72
5.2
Rater Credibility Analysis
................................... 73
5.2.1
Honest Raters in Majority
............................. 75
5.2.2
Equal Number of Honest and Dishonest Raters
........... 76
5.2.3
Dishonest Raters in Majority
........................... 77
5.3
RATEWeb Evaluation and Comparison
........................ 79
5.3.1
Honest Raters in Majority
............................. 81
5.3.2
Equal Number of Honest and Dishonest Raters
........... 82
5.3.3
Dishonest Raters in Majority
........................... 83
5.3.4
Case of Optimistic Consumer
.......................... 85
5.3.5
Case of Pessimistic Consumer
.......................... 85
5.3.6
Measuring Transaction Success
........................ 87
5.3.7
Changing Rate of Maliciousness
....................... 88
5.4
Reputation Assessment with Scarce Ratings
.................... 90
5.4.1
HMM
vs ANN
...................................... 91
5.4.2
No Prediction or Personal Experience Input
.............. 93
5.4.3
No Prediction but Including Personal Experience
.......... 93
5.5
Composed Services Reputation Evaluation
..................... 94
5.5.1
Fuzzy Rules for Composition Reputation
................ 94
5.5.2
Blame Propagation Effects
............................ 95
5.5.3
Choosing a Blame Forwarding Strategy
................. 97
5.5.4
Impact of Orchestrator s Decision
...................... 99
5.5.5
Blame Forwarding Impact in Relation to Maliciousness
___100
5.6
Reputation Assessment Cost Analysis
.........................101
5.6.1
Model Performance Comparison
.......................
1
04
5.6.2
Performance Analysis
................................105
Related Work
.................................................107
6.1
Reputation Systems for E-business
............................107
6.1.1
Incentives-based Solutions
............................108
6.1.2
Credibility-based Solutions
............................108
6.2
Decentralized Reputation Management
........................110
6.2.1
Peer-to-Peer Reputation Systems
.......................110
6.2.2
Reputation Management on the Grid
....................113
6.2.3
Reputation Management for
Multi-
Agents Systems
........114
6.3
Reputation in Game Theory
..................................115
6.4
Reputation Management for the Web
..........................116
Contents xvii
6.4.1
Search Engines
......................................116
6.4.2
Electronic Mail
......................................116
6.5
Reputation in Web Services
..................................117
7
Conclusion
....................................................121
References
.........................................................127
Index
.............................................................135
|
any_adam_object | 1 |
author | Malik, Zaki Bouguettaya, Athman |
author_GND | (DE-588)136720099 |
author_facet | Malik, Zaki Bouguettaya, Athman |
author_role | aut aut |
author_sort | Malik, Zaki |
author_variant | z m zm a b ab |
building | Verbundindex |
bvnumber | BV035981390 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.88813 |
callnumber-search | TK5105.88813 |
callnumber-sort | TK 45105.88813 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | QH 500 ST 230 |
ctrlnum | (OCoLC)422753181 (DE-599)BVBBV035981390 |
dewey-full | 621.38 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.38 |
dewey-search | 621.38 |
dewey-sort | 3621.38 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Informatik Elektrotechnik / Elektronik / Nachrichtentechnik Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01965nam a2200481 c 4500</leader><controlfield tag="001">BV035981390</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110606 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">100128s2009 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781441903099</subfield><subfield code="9">978-1-4419-0309-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781441903105</subfield><subfield code="9">978-1-4419-0310-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)422753181</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035981390</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.88813</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.38</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QH 500</subfield><subfield code="0">(DE-625)141607:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 230</subfield><subfield code="0">(DE-625)143617:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Malik, Zaki</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trust management for service-oriented environments</subfield><subfield code="c">Zaki Malik ; Athman Bouguettaya</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XX, 135 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Peer-to-peer architecture (Computer networks)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web services</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Serviceorientierte Architektur</subfield><subfield code="0">(DE-588)4841015-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Serviceorientierte Architektur</subfield><subfield code="0">(DE-588)4841015-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bouguettaya, Athman</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)136720099</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bayreuth</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018875300&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018875300</subfield></datafield></record></collection> |
id | DE-604.BV035981390 |
illustrated | Illustrated |
indexdate | 2024-07-09T22:08:59Z |
institution | BVB |
isbn | 9781441903099 9781441903105 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018875300 |
oclc_num | 422753181 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | XX, 135 S. Ill., graph. Darst. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Springer |
record_format | marc |
spelling | Malik, Zaki Verfasser aut Trust management for service-oriented environments Zaki Malik ; Athman Bouguettaya New York, NY Springer 2009 XX, 135 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Computer networks Security measures Peer-to-peer architecture (Computer networks) Web services Security measures Verteiltes System (DE-588)4238872-7 gnd rswk-swf Serviceorientierte Architektur (DE-588)4841015-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Serviceorientierte Architektur (DE-588)4841015-9 s Verteiltes System (DE-588)4238872-7 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s DE-604 Bouguettaya, Athman Verfasser (DE-588)136720099 aut Digitalisierung UB Bayreuth application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018875300&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Malik, Zaki Bouguettaya, Athman Trust management for service-oriented environments Computer networks Security measures Peer-to-peer architecture (Computer networks) Web services Security measures Verteiltes System (DE-588)4238872-7 gnd Serviceorientierte Architektur (DE-588)4841015-9 gnd Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4238872-7 (DE-588)4841015-9 (DE-588)4274324-2 (DE-588)4011144-1 |
title | Trust management for service-oriented environments |
title_auth | Trust management for service-oriented environments |
title_exact_search | Trust management for service-oriented environments |
title_full | Trust management for service-oriented environments Zaki Malik ; Athman Bouguettaya |
title_fullStr | Trust management for service-oriented environments Zaki Malik ; Athman Bouguettaya |
title_full_unstemmed | Trust management for service-oriented environments Zaki Malik ; Athman Bouguettaya |
title_short | Trust management for service-oriented environments |
title_sort | trust management for service oriented environments |
topic | Computer networks Security measures Peer-to-peer architecture (Computer networks) Web services Security measures Verteiltes System (DE-588)4238872-7 gnd Serviceorientierte Architektur (DE-588)4841015-9 gnd Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Computer networks Security measures Peer-to-peer architecture (Computer networks) Web services Security measures Verteiltes System Serviceorientierte Architektur Computersicherheit Datensicherung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018875300&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT malikzaki trustmanagementforserviceorientedenvironments AT bouguettayaathman trustmanagementforserviceorientedenvironments |