Introduction to probability and statistics (7th ed.)
Introduction to probability and statistics (7th ed.)
Introduction to algorithms
Simulation, verification and automated composition of web services
Proceedings of the 11th international conference on World Wide Web
Machine Learning
IEEE Internet Computing
Building Trustworthy Software Agents
IEEE Internet Computing
IEEE Intelligent Systems
Trustworthy service composition: challenges and research questions
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
A survey of trust in internet applications
IEEE Communications Surveys & Tutorials
A fuzzy model for calculating workflow trust using provenance data
Proceedings of the 15th ACM Mardi Gras conference: From lightweight mash-ups to lambda grids: Understanding the spectrum of distributed computing requirements, applications, tools, infrastructures, interoperability, and the incremental adoption of key capabilities
ReMan: A pro-active reputation management infrastructure for composite Web services
ICSE '09 Proceedings of the 31st International Conference on Software Engineering
Applying a fuzzy trust model to e-commerce systems
AI'05 Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence
An architecture for unifying web services authentication and authorization
ICSOC'05 Proceedings of the Third international conference on Service-Oriented Computing
A web service composition modeling and evaluation method used petri net
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Hi-index | 0.00 |
Service Oriented Architecture (SOA) is an architectural style that could seamlessly integrate existing software to fulfill dynamic requests in a platform-independent way but the loosely coupled and distributed characteristics of SOA will incur the trustworthiness problem in service composition. In this paper, we utilized the statistical techniques and Petri nets to propose an evaluation method for trustworthy service compositions. The trustworthiness of involved Web Services will be evaluated by analyzing past experiences so that the trustworthiness of the composite service could be estimated from the evaluation of each Web Service and aggregation topology of the composite service.