Trust evaluation in composite services selection and discovery

Lei Li*, Yan Wang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

26 Citations (Scopus)
27 Downloads (Pure)

Abstract

In Serviced-Oriented Computing (SOC) environments, the trust level of a service or a service provider is a critical issue for a service client to consider, particularly when the client is looking for a service from a large set of services or service providers. However, a service may invoke other services offered by different providers forming composite services. The complex invocation relations significantly increase the complexity of trust evaluation in composite services. In this paper, we propose a novel algorithm for trust evaluation in composite services that takes all atomic invocations into account, which is essential for composite services selection and discovery.

Original languageEnglish
Title of host publicationSCC 2009 - 2009 IEEE International Conference on Services Computing
Place of PublicationLos Alamitos, CA, USA
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages482-485
Number of pages4
ISBN (Print)9780769538112
DOIs
Publication statusPublished - 2009
EventSCC 2009 - 2009 IEEE International Conference on Services Computing - Bangalore, India
Duration: 21 Sept 200925 Sept 2009

Other

OtherSCC 2009 - 2009 IEEE International Conference on Services Computing
Country/TerritoryIndia
CityBangalore
Period21/09/0925/09/09

Bibliographical note

Copyright 2009 IEEE. Reprinted from 2009 IEEE International Conference on Services Computing : proceedings, Bangalore, India, 21-25 September 2009. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Macquarie University’s products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

Fingerprint

Dive into the research topics of 'Trust evaluation in composite services selection and discovery'. Together they form a unique fingerprint.

Cite this