The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Trustworthiness evaluation is an increasingly common theme in service-oriented computing. However, existing approaches are not effective for web services trustworthiness assessment. In this paper, we present a web services trustworthiness evaluation model based on Fuzzy Cognitive Maps. The model combines the trust evidence framework and the dynamic context reputation feedback at runtime. The simulation...
Our work focuses on selecting a trusted service from service consumer's perspective. First, we distinguish the two kinds of trust context to separate the ability of service as both a service provider and a service consumer in a service web; and we classify the reputation into two different categories. Second we generate a reputation metric model by improving Subject Logic. The trust decision model...
Services are expected to be a promising way for people to use information and computing resources in the emerging ubiquitous network society. In this study, we propose a metaphoric concept called flowable service. It is defined as a logical stream that organizes and provides circumjacent services in such a way that they are perceived by individuals as those naturally embedded in their surrounding...
This paper presents an algebraic specification language for the formal specification of the semantics of web services. A set of rules for transforming WSDL into algebraic structures is proposed. Its practical usability is also demonstrated by an example.
Through the research of the existing security mechanisms and security technologies, combined with the actual security requirements of Web communications, this paper proposes a Web services security communication model. The model not only can meet the basic requirements for secure communications, and can achieve better results in the Web service application with higher security requirements. Compared...
Constraints are considered to be the principal motivation for RBAC model. XACML profile for RBAC can not meet the need of expressing static and dynamic RBAC constraints well. We give the XACML syntax of common static and dynamic Separation of Duty constraints and cardinality constraints of RBAC. We also complement Role Enablement Authority to extend this profile in order to enforce these constraints.
Trust problems exist in open distributed service oriented computing environments. A lot of research work has been done on the theories and applications of trust and reputation management in service oriented environment. However, the design expertise on trust is not well documented yet. In this paper we propose to use trust patterns for documenting solutions for trust problems. The main benefit of...
Providing data as a service has not only fostered the access to data from anywhere at anytime but also reduced the cost of investment. However, data is often associated with various concerns that must be explicitly described and modeled in order to ensure that the data consumer can find and select relevant data services as well as utilize the data in the right way. In particular, the use of data is...
Since the Internet of Services (IoS) is becoming reality, there is an inherent need for novel service selection mechanisms, which work in spite of large numbers of alternative services and take the user-centric nature of services in the IoS into account. One way to do this is to incorporate feedback from previous service users. However, practical issues such as trust aspects, interaction contexts...
Mashup tools are becoming increasingly important enabling users to compose services and processes on the Web. Most existing tools focus on Web-based interfaces, usability, and visual languages for creating mashups. A major challenge that has received limited attention is context-awareness and adaptivity of service mashups. In this paper we focus on two main aspects: First, a service capability model...
A key challenge in Web services security is the design of effective access control schemes that can adequately meet the unique security challenges posed by the Web services paradigm. Despite the recent advances in Web based access control approaches applicable to Web services, there remain issues that impede the development of effective access control models for Web services environment. Amongst them...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.