Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
Proceedings of the 2nd ACM conference on Electronic commerce
Quality driven web services composition
WWW '03 Proceedings of the 12th international conference on World Wide Web
A Peer-to-Peer Framework for Web Service Discovery with Ranking
ICWS '04 Proceedings of the IEEE International Conference on Web Services
Reputation = f(User Ranking, Compliance, Verity)
ICWS '04 Proceedings of the IEEE International Conference on Web Services
Enforcing Secure Service Composition
CSFW '05 Proceedings of the 18th IEEE workshop on Computer Security Foundations
COMPSAC '05 Proceedings of the 29th Annual International Computer Software and Applications Conference - Volume 01
WS-Attestation: Efficient and Fine-Grained Remote Attestation on Web Services
ICWS '05 Proceedings of the IEEE International Conference on Web Services
Fuzzy nature of trust and dynamic trust modeling in service oriented environments
Proceedings of the 2005 workshop on Secure web services
RobustBPEL2: Transparent Autonomization in Business Processes through Dynamic Proxies
ISADS '07 Proceedings of the Eighth International Symposium on Autonomous Decentralized Systems
Composition and evaluation of trustworthy web services
International Journal of Web and Grid Services
Non-intrusive monitoring and service adaptation for WS-BPEL
Proceedings of the 17th international conference on World Wide Web
Efficient online monitoring of web-service SLAs
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering
Behavioral attestation for web services (BA4WS)
Proceedings of the 2008 ACM workshop on Secure web services
Developing Service-Based Software Systems with QoS Monitoring and Adaptation
FTDCS '08 Proceedings of the 2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems
Tisa: Toward Trustworthy Services in a Service-Oriented Architecture
IEEE Transactions on Services Computing
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Secure peer-to-peer networks for trusted collaboration
COLCOM '07 Proceedings of the 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing
An Adaptive Tradeoff Model for Service Performance and Security in Service-Based Systems
ICWS '09 Proceedings of the 2009 IEEE International Conference on Web Services
RATEWeb: Reputation Assessment for Trust Establishment among Web services
The VLDB Journal — The International Journal on Very Large Data Bases
Trust Is in the Eye of the Beholder
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 03
Quantifying Utility and Trustworthiness for Advice Shared on Online Social Media
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 04
Toward Development of Adaptive Service-Based Software Systems
IEEE Transactions on Services Computing
Evaluating the trustworthiness of Wikipedia articles through quality and credibility
Proceedings of the 5th International Symposium on Wikis and Open Collaboration
QoS-Based service selection and ranking with trust and reputation management
OTM'05 Proceedings of the 2005 Confederated international conference on On the Move to Meaningful Internet Systems - Volume >Part I
Hi-index | 0.05 |
Service-oriented architecture facilitates rapid development and management of large-scale distributed service-based systems (SBS), where new workflows are composed of available services. Besides services' capabilities, the qualities of services (QoS) also need to be considered in service composition in order to have high-quality workflows. The QoS profiles of services provided by their service providers may be inaccurate. In this paper, an approach is presented to improving the trustworthiness of the QoS information of services to facilitate the development of high-quality workflows in SBS. Our approach is based on identifying the deviation between the QoS profiles of the services claimed by their service providers and the QoS profiles determined by monitors and service user feedbacks. An example is given to illustrate the approach.