Trust-oriented composite service selection and discovery

Lei Li*, Yan Wang, Ee Peng Lim

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

50 Citations (Scopus)

Abstract

In Service-Oriented Computing (SOC) environments, service clients interact with service providers for consuming services. From the viewpoint of service clients, the trust level of a service or a service provider is a critical issue to consider in service selection and discovery, particularly when a client is looking for a service from a large set of services or service providers. However, a service may invoke other services offered by different providers forming composite services. The complex invocations in composite services greatly increase the complexity of trust-oriented service selection and discovery. In this paper, we propose novel approaches for composite service representation, trust evaluation and trust-oriented service selection and discovery. Our experiments illustrate that compared with the existing approaches our proposed trust-oriented service selection and discovery algorithm is realistic and more efficient.

Original languageEnglish
Title of host publicationService-Oriented Computing - 7th International Joint Conference, ICSOC-Service Wave 2009, Proceedings
EditorsLuciano Baresi, Chi-Hung Chi, Jun Suzuki
Place of PublicationBerlin
PublisherSpringer, Springer Nature
Pages50-67
Number of pages18
Volume5900 LNCS
ISBN (Print)3642103820, 9783642103827
DOIs
Publication statusPublished - 2009
Event7th International Joint Conference on Service-Oriented Computing, ICSOC-ServiceWave 2009 - Stockholm, Sweden
Duration: 24 Nov 200927 Nov 2009

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume5900
ISSN (Print)0302-9743

Other

Other7th International Joint Conference on Service-Oriented Computing, ICSOC-ServiceWave 2009
CountrySweden
CityStockholm
Period24/11/0927/11/09

Fingerprint Dive into the research topics of 'Trust-oriented composite service selection and discovery'. Together they form a unique fingerprint.

Cite this