Reference Hub10
Trust Based Service Selection in Service Oriented Environment

Trust Based Service Selection in Service Oriented Environment

Jun Li, Xiaolin Zheng, Deren Chen, William Wei Song
Copyright: © 2012 |Volume: 9 |Issue: 3 |Pages: 20
ISSN: 1545-7362|EISSN: 1546-5004|EISBN13: 9781466614758|DOI: 10.4018/jwsr.2012070102
Cite Article Cite Article

MLA

Li, Jun, et al. "Trust Based Service Selection in Service Oriented Environment." IJWSR vol.9, no.3 2012: pp.23-42. http://doi.org/10.4018/jwsr.2012070102

APA

Li, J., Zheng, X., Chen, D., & Song, W. W. (2012). Trust Based Service Selection in Service Oriented Environment. International Journal of Web Services Research (IJWSR), 9(3), 23-42. http://doi.org/10.4018/jwsr.2012070102

Chicago

Li, Jun, et al. "Trust Based Service Selection in Service Oriented Environment," International Journal of Web Services Research (IJWSR) 9, no.3: 23-42. http://doi.org/10.4018/jwsr.2012070102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In a service-oriented environment, it is inevitable and indeed quite common to deal with web services, whose reliability is unknown to the users. The reputation system is a popular technique currently used for providing a global quality score of a service provider to requesters. However, such global information is far from sufficient for service requesters to choose the most qualified services. In order to tackle this problem, the authors present a trust based architecture containing a computational trust model for quantifying and comparing the trustworthiness of services. In this trust model, they firstly construct a network based on the direct trust relations between participants and rating similarity in service oriented environments, then propose an algorithm for propagating trust in the social network based environment which can produce personalized trust information for a specific service requester, and finally implement the trust model and simulate various malicious behaviors in not only dense but also sparse networks which can verify the attack-resistant and robustness of the proposed approach. The experiment results also demonstrate the feasibility and benefit of the approach.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.