메뉴 건너뛰기




Volumn 3, Issue , 2009, Pages 599-606

Toward trustworthy Web services approaches, weaknesses and Trust-By-Contract framework

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTING ENVIRONMENTS; FUNDAMENTAL BUILDING BLOCKS; SERVICE-ORIENTED COMPUTING; TRUSTWORTHY WEB SERVICES; WEB SERVICE SELECTION;

EID: 77957985367     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WI-IAT.2009.359     Document Type: Conference Paper
Times cited : (19)

References (39)
  • 2
    • 4243048792 scopus 로고    scopus 로고
    • Service-oriented computing
    • M. Papazoglou and D. Georgakopoulos, "Service-Oriented Computing," CACM, vol. 46, no. 10, pp. 25-65, 2003.
    • (2003) CACM , vol.46 , Issue.10 , pp. 25-65
    • Papazoglou, M.1    Georgakopoulos, D.2
  • 4
    • 4544359599 scopus 로고    scopus 로고
    • Beyond concern: A privacy-trust-behavioral intention model of electronic commerce
    • C. Liu, J. Marchewkaa, J. Lub, and C. Yub, "Beyond concern: a privacy-trust-behavioral intention model of electronic commerce," Information & Management, vol. 42, no. 1, pp. 127-142, 2004.
    • (2004) Information & Management , vol.42 , Issue.1 , pp. 127-142
    • Liu, C.1    Marchewkaa, J.2    Lub, J.3    Yub, C.4
  • 7
    • 35948972837 scopus 로고    scopus 로고
    • A review on trust and reputation for web service selection
    • Washington, DC, USA: IEEE
    • Y. Wang and J. Vassileva, "A review on trust and reputation for web service selection," in Proc. of ICDCS. Washington, DC, USA: IEEE, 2007.
    • (2007) Proc. of ICDCS
    • Wang, Y.1    Vassileva, J.2
  • 8
    • 70350525809 scopus 로고    scopus 로고
    • Reputation bootstrapping for trust establishment among web services
    • Z. Malik and A. Bouguettaya, "Reputation bootstrapping for trust establishment among web services," Internet Computing, vol. 13, no. 1, pp. 40-47, 2009.
    • (2009) Internet Computing , vol.13 , Issue.1 , pp. 40-47
    • Malik, Z.1    Bouguettaya, A.2
  • 9
    • 20844435854 scopus 로고    scopus 로고
    • Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions
    • G. Adomavicius and E. Tuzhilin, "Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions," IEEE TKDE, vol. 17, pp. 734-749, 2005.
    • (2005) IEEE TKDE , vol.17 , pp. 734-749
    • Adomavicius, G.1    Tuzhilin, E.2
  • 10
    • 80052126248 scopus 로고    scopus 로고
    • Trust based recommender system for the semantic web
    • P. Bedi, H. Kaur, and S. Marwaha, "Trust based recommender system for the semantic web," in Proc. of IJCAI, 2007, pp. 2677-2682.
    • (2007) Proc. of IJCAI , pp. 2677-2682
    • Bedi, P.1    Kaur, H.2    Marwaha, S.3
  • 11
    • 38649109809 scopus 로고    scopus 로고
    • A formal framework for trust management of service-oriented systems
    • IEEE
    • L. Zhengping, L. Xiaoli, W. Guoqing, Y. Min, and Z. Fan, "A formal framework for trust management of service-oriented systems," in Proc. of SOCA. IEEE, 2007, pp. 241-248.
    • (2007) Proc. of SOCA , pp. 241-248
    • Zhengping, L.1    Xiaoli, L.2    Guoqing, W.3    Min, Y.4    Fan, Z.5
  • 12
    • 0001812831 scopus 로고    scopus 로고
    • Community-based service location
    • M. Singh, B. Yu, and M. Venkatraman, "Community-based service location," CACM, vol. 44, no. 4, pp. 49-54, 2001.
    • (2001) CACM , vol.44 , Issue.4 , pp. 49-54
    • Singh, M.1    Yu, B.2    Venkatraman, M.3
  • 13
    • 18144381559 scopus 로고    scopus 로고
    • Engineering self-organizing referral networks for trustworthy service selection
    • P. Yolum and M. Singh, "Engineering Self-Organizing Referral Networks for Trustworthy Service Selection," IEEE Trans. on Sys., Man, and Cyb., vol. 35, no. 3, pp. 396-407, 2005.
    • (2005) IEEE Trans. on Sys., Man, and Cyb. , vol.35 , Issue.3 , pp. 396-407
    • Yolum, P.1    Singh, M.2
  • 14
    • 47749105669 scopus 로고    scopus 로고
    • A trust based methodology for web service selection
    • IEEE
    • S. Galizia, A. Gugliotta, and J. Dominque, "A trust based methodology for web service selection," in Proc. of ICSC. IEEE, 2007, pp. 193-200.
    • (2007) Proc. of ICSC , pp. 193-200
    • Galizia, S.1    Gugliotta, A.2    Dominque, J.3
  • 18
    • 35248892017 scopus 로고    scopus 로고
    • Trust-based service provider selection in open environments
    • ACM Press
    • H. Billhardt, R. Hermoso, S. Ossowski, and R. Centeno, "Trust-based service provider selection in open environments," in Proc. of SAC. ACM Press, 2007, pp. 1375-1380.
    • (2007) Proc. of SAC , pp. 1375-1380
    • Billhardt, H.1    Hermoso, R.2    Ossowski, S.3    Centeno, R.4
  • 19
    • 33748707875 scopus 로고    scopus 로고
    • QoS-based service selection and ranking with trust and reputation management
    • ser. LNCS. Springer- Verlag
    • L.-H. Vu, M. Hauswirth, and K. Aberer, "QoS-based Service Selection and Ranking with Trust and Reputation Management," in Proc. of CIS, ser. LNCS. Springer-Verlag, 2005.
    • (2005) Proc. of CIS
    • Vu, L.-H.1    Hauswirth, M.2    Aberer, K.3
  • 20
    • 33846966283 scopus 로고    scopus 로고
    • An integrated trust and reputation model for open multi-agent systems
    • T. Huynh, N. Jennings, and N. Shadbolt, "An integrated trust and reputation model for open multi-agent systems," JAAMAS, vol. 13, no. 2, pp. 119-154, 2006.
    • (2006) JAAMAS , vol.13 , Issue.2 , pp. 119-154
    • Huynh, T.1    Jennings, N.2    Shadbolt, N.3
  • 21
    • 52149092491 scopus 로고    scopus 로고
    • Combining trust and reputation management for web-based services
    • Springer-Verlag
    • A. Josang, T. Bhuiyan, Y. Xu, and C. Cox, "Combining Trust and Reputation Management for Web-Based Services," in Proc. of TrustBus. Springer-Verlag, 2008, pp. 90-99.
    • (2008) Proc. of TrustBus , pp. 90-99
    • Josang, A.1    Bhuiyan, T.2    Xu, Y.3    Cox, C.4
  • 22
    • 85041439566 scopus 로고    scopus 로고
    • Principles of trust for mas: Cognitive anatomy, social importance,and quantification
    • IEEE
    • R. Falcone and C. Castelfranchi, "Principles of trust for mas: cognitive anatomy, social importance,and quantification," in Proc. of ICMAS. IEEE, 1998, pp. 72-79.
    • (1998) Proc. of ICMAS , pp. 72-79
    • Falcone, R.1    Castelfranchi, C.2
  • 23
    • 7044245599 scopus 로고    scopus 로고
    • Trust, reputation and security: Theories and practice
    • Special Issue on. Springer- Verlag, ch. A fuzzy approach to a belief-based trust computation
    • R. Falcone, G. Pezzulo, and C. Castelfranchi, Special Issue on "Trust, Reputation and Security: Theories and Practice", ser. LNAI. Springer-Verlag, 2003, ch. A fuzzy approach to a belief-based trust computation, pp. 73-86.
    • (2003) LNAI , pp. 73-86
    • Falcone, R.1    Pezzulo, G.2    Castelfranchi, C.3
  • 25
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • T. Yu, M. Winslett, and K. E. Seamons, "Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation," ACM TISSEC, vol. 6, no. 1, pp. 1-42, 2003.
    • (2003) ACM TISSEC , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3
  • 26
    • 13244299177 scopus 로고    scopus 로고
    • Collaborative automated trust negotiation in peer-to-peer systems
    • IEEE
    • S. Ye, F. Makedon, and J. Ford, "Collaborative automated trust negotiation in peer-to-peer systems," in Proc. of P2P. IEEE, 2004, pp. 108-115.
    • (2004) Proc. of P2P , pp. 108-115
    • Ye, S.1    Makedon, F.2    Ford, J.3
  • 27
    • 35048841281 scopus 로고    scopus 로고
    • Peertrust: Automated trust negotiation for peers on the semantic web
    • Springer
    • W. Nejdl, D. Olmedilla, and M. Winslett, "Peertrust: Automated trust negotiation for peers on the semantic web," in Proc. of SDM, vol. 3178. Springer, 2004, pp. 118-132.
    • (2004) Proc. of SDM , vol.3178 , pp. 118-132
    • Nejdl, W.1    Olmedilla, D.2    Winslett, M.3
  • 29
    • 3142676730 scopus 로고    scopus 로고
    • Trust-x: A peer-to-peer framework for trust establishment
    • E. Bertino, E. Ferrari, and A. C. Squicciarini, "Trust-x: A peer-to-peer framework for trust establishment," TKDE, vol. 16, no. 7, pp. 827-842, 2004.
    • (2004) TKDE , vol.16 , Issue.7 , pp. 827-842
    • Bertino, E.1    Ferrari, E.2    Squicciarini, A.C.3
  • 30
    • 84902459113 scopus 로고    scopus 로고
    • Interactive access control for web services
    • Kluwer Press
    • H. Koshutanski and F. Massacci, "Interactive access control for web services," in Proc. of IFIP ISC. Kluwer Press, 2004, pp. 151-166.
    • (2004) Proc. of IFIP ISC , pp. 151-166
    • Koshutanski, H.1    Massacci, F.2
  • 31
    • 34250616363 scopus 로고    scopus 로고
    • Access control enforcement for conversation-based web services
    • ACM Press
    • M. Mecella, M. Ouzzani, F. Paci, and E. Bertino, "Access control enforcement for conversation-based web services." in Proc. of WWW. ACM Press, 2006, pp. 257-266.
    • (2006) Proc. of WWW , pp. 257-266
    • Mecella, M.1    Ouzzani, M.2    Paci, F.3    Bertino, E.4
  • 32
    • 85029609685 scopus 로고    scopus 로고
    • Simulated social control for secure internet commerce
    • ACM Press
    • L. Rasmusson and S. Jansson, "Simulated social control for secure internet commerce," in Proc. of NSPW. ACM Press, 1996, pp. 18-25.
    • (1996) Proc. of NSPW , pp. 18-25
    • Rasmusson, L.1    Jansson, S.2
  • 33
    • 15744379239 scopus 로고    scopus 로고
    • Towards contract-based testing of web services
    • R. Heckel and M. Lohmann, "Towards contract-based testing of web services," Electr. Notes Theor. Comput. Sci., vol. 116, pp. 145-156, 2005.
    • (2005) Electr. Notes Theor. Comput. Sci. , vol.116 , pp. 145-156
    • Heckel, R.1    Lohmann, M.2
  • 34
    • 84856869310 scopus 로고    scopus 로고
    • A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems
    • To appear in
    • N. Dragoni, F. Massacci, and A. Saidane, "A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems," To appear in Computer Networks Journal.
    • Computer Networks Journal
    • Dragoni, N.1    Massacci, F.2    Saidane, A.3
  • 35
    • 0002817535 scopus 로고    scopus 로고
    • The PERMIS X.509 role-based privilege management infrastructure
    • ACM Press
    • D. W. Chadwick and A. Otenko, "The PERMIS X.509 role-based privilege management infrastructure," in Proc. of SACMAT. ACM Press, 2002, pp. 135-140.
    • (2002) Proc. of SACMAT , pp. 135-140
    • Chadwick, D.W.1    Otenko, A.2
  • 36
    • 33947544647 scopus 로고    scopus 로고
    • A negotiation scheme for access rights establishment in autonomic communication
    • H. Koshutanski and F. Massacci, "A negotiation scheme for access rights establishment in autonomic communication," Journal of Network and System Management, vol. 15, no. 1, pp. 117-136, 2007.
    • (2007) Journal of Network and System Management , vol.15 , Issue.1 , pp. 117-136
    • Koshutanski, H.1    Massacci, F.2
  • 38
    • 37849002157 scopus 로고    scopus 로고
    • Security-by-contract: Toward a semantics for digital signatures on mobile code
    • Springer- Verlag
    • N. Dragoni, F. Massacci, K. Naliuka, and I. Siahaan, "Security-by- contract: Toward a semantics for digital signatures on mobile code," in Proc. of EUROPKI. Springer-Verlag, 2007, pp. 297-312.
    • (2007) Proc. of EUROPKI , pp. 297-312
    • Dragoni, N.1    Massacci, F.2    Naliuka, K.3    Siahaan, I.4
  • 39
    • 49049117172 scopus 로고    scopus 로고
    • Matching policies with security claims of mobile applications
    • IEEE
    • N. Bielova, M. D. Torre, N. Dragoni, and I. Siahaan, "Matching policies with security claims of mobile applications," in Proc. of ARES. IEEE, 2008.
    • (2008) Proc. of ARES
    • Bielova, N.1    Torre, M.D.2    Dragoni, N.3    Siahaan, I.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.