2010 Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshop 2010
DOI: 10.1109/sasow.2010.34
|View full text |Cite
|
Sign up to set email alerts
|

Reputation Management for Distributed Service-Oriented Architectures

Abstract: Nowadays, several network applications require that\ud consumer nodes acquire distributed services from unknown service providers on the Internet. The main goal of consumer nodes is the selection of the best services among the huge multitude provided\ud by the network. As basic criteria for this choice, service cost and Quality-of-Service (QoS) can be considered, provided that the underlying Service-Oriented Architecture (SOA) be augmented in\ud order to support the declaration of this information. The correct… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…We also noticed that, in some cases, out-of-scope questions could be asked by untrustworthy users, that are interested on testing/stressing the system by providing unpredictable inputs. To overcome this limitation, a trust management mechanism could be adopted [6], [2].…”
Section: Discussionmentioning
confidence: 99%
“…We also noticed that, in some cases, out-of-scope questions could be asked by untrustworthy users, that are interested on testing/stressing the system by providing unpredictable inputs. To overcome this limitation, a trust management mechanism could be adopted [6], [2].…”
Section: Discussionmentioning
confidence: 99%
“…Finally, we want to investigate the adoption of more sophisticated techniques to estimate the trustworthy of the users and, consequently of their feedbacks. To this aim, we plan to provide the system with a reputation management algorithm, such as those reported in [19], [20], in order to ensure the robustness of reputable systems against attacks on their security [21], [22].…”
Section: Discussionmentioning
confidence: 99%
“…As an example of the first situation, Conner et al [2] present a feedback-based reputation framework to help service providers to determine trust in incoming requests from clients. As an example of the second approach, Crapanzano et al [3] propose a hierarchical architecture for SOA where there is a so-called super node overlay that acts as a trusting authority when a service consumer looks for a service provider.…”
Section: Related Workmentioning
confidence: 99%
“…Once the developer has annotated the classes with both Kevoree and trust information, maven 2 is used to call both the Kevoree and the trust frameworks. These frameworks generate code according to the annotation information passed to them by the Maven Kevoree and Maven Trust plugins 3 .…”
Section: Towards a Trust-aware Self-adaptive Development Frameworkmentioning
confidence: 99%
See 1 more Smart Citation